Pub Date : 1900-01-01DOI: 10.1109/WCNC.2016.7564713
S. Yamashita, Koji Yamamoto, T. Nishio, M. Morikura
To realize high-speed and high-capacity 5G mobile networks, secondary users (SUs) may opportunistically use licensed spectrum allocated to primary users (PUs). This paper presents a framework to deal with the situation that occurs when a PU suffers harmful interference caused by the secondary use of the spectrum allocated to it. Here, the PU is assumed to be a radar system. In our proposed framework, the PU informs the database that it is suffering harmful interference. Receiving this information, the database updates the primary exclusive region (PER), where SUs are prohibited from using the licensed spectrum. The updated PER depends on the current knowledge of the SUs, which is stored in the database. We assume a circular PER centered at the primary receiver (PR) and derive its optimal radius using stochastic geometry. For each type of SU knowledge stored in the database, we evaluate the optimal PER radius for a target probability at which the PU suffers harmful interference. The results show that more detailed knowledge of the SU density and transmission powers leads to a smaller updated PER radius. Hence, a more efficient spatial reuse of the licensed spectrum is achieved.
{"title":"Knowledge-based update of primary exclusive region for database-driven spectrum sharing towards 5G","authors":"S. Yamashita, Koji Yamamoto, T. Nishio, M. Morikura","doi":"10.1109/WCNC.2016.7564713","DOIUrl":"https://doi.org/10.1109/WCNC.2016.7564713","url":null,"abstract":"To realize high-speed and high-capacity 5G mobile networks, secondary users (SUs) may opportunistically use licensed spectrum allocated to primary users (PUs). This paper presents a framework to deal with the situation that occurs when a PU suffers harmful interference caused by the secondary use of the spectrum allocated to it. Here, the PU is assumed to be a radar system. In our proposed framework, the PU informs the database that it is suffering harmful interference. Receiving this information, the database updates the primary exclusive region (PER), where SUs are prohibited from using the licensed spectrum. The updated PER depends on the current knowledge of the SUs, which is stored in the database. We assume a circular PER centered at the primary receiver (PR) and derive its optimal radius using stochastic geometry. For each type of SU knowledge stored in the database, we evaluate the optimal PER radius for a target probability at which the PU suffers harmful interference. The results show that more detailed knowledge of the SU density and transmission powers leads to a smaller updated PER radius. Hence, a more efficient spatial reuse of the licensed spectrum is achieved.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114541943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/WCNCW.2016.7552745
Cui Zhang, Jinbo Xiong, Qiong Wu
Neighbor Discovery Protocol (NDP) is significant in mobile network, which enables mobile node randomly access to foreign network by Stateless Link Address Autoconfiguration (SLAAC). However, the NDP initially offers no protection mechanism and is prone to address spoofing and Denial of Service (DoS). Secure Neighbor Discovery Protocol (SeNDP) is proposed to solve these NDP threats. Recently there are many solutions presented in SeNDP which relies on special IPv6 addresses named Cryptographically Generated Address (CGA). But there is little work to defend DoS attack on Duplicate Address Detection (DAD). In our paper, we focus on the problems of CGA and propose a novel time-based monitoring DoS attack. The conventional DoS defense mechanisms are realized by monitoring the packet rating and observing connection delay to analyze various DoS attack. Hence, we adopt a delay as an indication to distinct the DoS attack. We set a timer to control the address generation for monitoring abnormal attack to protect each address configuration. In addition, we adopt SHA-224 hash function instead of SHA-1 to improve the security of address generation. Considering the computation overhead, we decrease the hash matching factor from 16 bits to 8 bits. We develop our scheme using the Network Simulator (NS2) and the OpenSSL library. Finally, experiment results prove our scheme can provide more efficient IP generation. Compared with the CGA algorithm in SeNDP, our time consumption decreases to 10%. From the view of defense attack, our scheme can control DoS attack.
{"title":"An efficient CGA algorithm against DoS attack on Duplicate Address Detection process","authors":"Cui Zhang, Jinbo Xiong, Qiong Wu","doi":"10.1109/WCNCW.2016.7552745","DOIUrl":"https://doi.org/10.1109/WCNCW.2016.7552745","url":null,"abstract":"Neighbor Discovery Protocol (NDP) is significant in mobile network, which enables mobile node randomly access to foreign network by Stateless Link Address Autoconfiguration (SLAAC). However, the NDP initially offers no protection mechanism and is prone to address spoofing and Denial of Service (DoS). Secure Neighbor Discovery Protocol (SeNDP) is proposed to solve these NDP threats. Recently there are many solutions presented in SeNDP which relies on special IPv6 addresses named Cryptographically Generated Address (CGA). But there is little work to defend DoS attack on Duplicate Address Detection (DAD). In our paper, we focus on the problems of CGA and propose a novel time-based monitoring DoS attack. The conventional DoS defense mechanisms are realized by monitoring the packet rating and observing connection delay to analyze various DoS attack. Hence, we adopt a delay as an indication to distinct the DoS attack. We set a timer to control the address generation for monitoring abnormal attack to protect each address configuration. In addition, we adopt SHA-224 hash function instead of SHA-1 to improve the security of address generation. Considering the computation overhead, we decrease the hash matching factor from 16 bits to 8 bits. We develop our scheme using the Network Simulator (NS2) and the OpenSSL library. Finally, experiment results prove our scheme can provide more efficient IP generation. Compared with the CGA algorithm in SeNDP, our time consumption decreases to 10%. From the view of defense attack, our scheme can control DoS attack.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/WCNC.2016.7564653
Alaa Awad, Amr M. Mohamed, C. Chiasserini
Rising numbers of mobile devices and wireless access technologies motivate network operators to leverage spectrum across multiple radio access networks, in order to significantly enhance quality of service as well as network capacity. However, there is a substantial need to develop innovative network selection mechanisms that consider energy efficiency while meeting application quality requirements. In this context, this paper proposes an efficient network selection mechanism over heterogeneous wireless networks. We consider different performance aspects, as well as network characteristics and application requirements, so as to obtain an efficient solution that grasps the conflicting nature of the various objectives and addresses this ultimate tradeoff. The proposed methodology advocates a user-centric approach toward the utilization of heterogeneous wireless networks to enhance system performance and support reliable connectivity.
{"title":"User-centric network selection in multi-RAT systems","authors":"Alaa Awad, Amr M. Mohamed, C. Chiasserini","doi":"10.1109/WCNC.2016.7564653","DOIUrl":"https://doi.org/10.1109/WCNC.2016.7564653","url":null,"abstract":"Rising numbers of mobile devices and wireless access technologies motivate network operators to leverage spectrum across multiple radio access networks, in order to significantly enhance quality of service as well as network capacity. However, there is a substantial need to develop innovative network selection mechanisms that consider energy efficiency while meeting application quality requirements. In this context, this paper proposes an efficient network selection mechanism over heterogeneous wireless networks. We consider different performance aspects, as well as network characteristics and application requirements, so as to obtain an efficient solution that grasps the conflicting nature of the various objectives and addresses this ultimate tradeoff. The proposed methodology advocates a user-centric approach toward the utilization of heterogeneous wireless networks to enhance system performance and support reliable connectivity.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}