首页 > 最新文献

2013 Wireless Telecommunications Symposium (WTS)最新文献

英文 中文
W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi W-AKA:在Wi-Fi上使用安全通道的隐私增强LTE-AKA
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566240
Khodor Hamandi, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi
In this paper, we propose a privacy-enhanced LTE authentication and key agreement scheme, W-AKA. The scheme promises to improve privacy by employing a dynamic identity instead of the static IMSI. In order to exchange the IMSI and inform the user of the new randomized identity, we propose two methods. The first method uses a Wi-Fi secured side channel since Wi-Fi hotspots are becoming ubiquitous. The other method is incorporated as part of the mobile AKA. We also present a simple method through which a random temporary identity is generated. We studied the conditions where W-AKA outperforms the original AKA and where it underperforms. Our analysis shows that in the presence of Wi-Fi, and unless an attacker jams the Wi-Fi channel, W-AKA can sustain both active and passive attacks. On the other hand, in the absence of Wi-Fi, it can only mitigate risks of passive attacks. The difficulties and challenges of the proposed work are also analyzed. The scheme was implemented and compared with previously-published techniques in order to study the computational overhead to accomplish enhanced privacy.
在本文中,我们提出了一种增强隐私的LTE认证和密钥协议方案W-AKA。该方案承诺通过使用动态身份而不是静态IMSI来改善隐私。为了交换IMSI并通知用户新的随机化身份,我们提出了两种方法。第一种方法使用Wi-Fi安全侧信道,因为Wi-Fi热点变得无处不在。另一种方法被合并为移动AKA的一部分。我们还提出了一种生成随机临时身份的简单方法。我们研究了W-AKA在哪些方面优于原始AKA以及在哪些方面表现不佳。我们的分析表明,在Wi-Fi存在的情况下,除非攻击者堵塞Wi-Fi通道,否则W-AKA可以承受主动和被动攻击。另一方面,在没有Wi-Fi的情况下,它只能减轻被动攻击的风险。分析了本文工作的难点和挑战。为了研究实现增强隐私所需的计算开销,对该方案进行了实现并与先前发表的技术进行了比较。
{"title":"W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi","authors":"Khodor Hamandi, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/WTS.2013.6566240","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566240","url":null,"abstract":"In this paper, we propose a privacy-enhanced LTE authentication and key agreement scheme, W-AKA. The scheme promises to improve privacy by employing a dynamic identity instead of the static IMSI. In order to exchange the IMSI and inform the user of the new randomized identity, we propose two methods. The first method uses a Wi-Fi secured side channel since Wi-Fi hotspots are becoming ubiquitous. The other method is incorporated as part of the mobile AKA. We also present a simple method through which a random temporary identity is generated. We studied the conditions where W-AKA outperforms the original AKA and where it underperforms. Our analysis shows that in the presence of Wi-Fi, and unless an attacker jams the Wi-Fi channel, W-AKA can sustain both active and passive attacks. On the other hand, in the absence of Wi-Fi, it can only mitigate risks of passive attacks. The difficulties and challenges of the proposed work are also analyzed. The scheme was implemented and compared with previously-published techniques in order to study the computational overhead to accomplish enhanced privacy.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116991541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
National approaches to technology standards for mobile telecommunications 移动通信技术标准的国家方法
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566259
Michael Murphree, J. Shim, Kevin Love
The standards' acceptance process is not an easy path to navigate and is littered with successes and failures. Today's mobile communication standards emerged through different processes: some through collaboration between government and business and others from businesses alone. Mobile technology is evolving at a rapid pace and the way in which standards are created is evolving as well. The purpose of this paper is to discuss standardization processes utilizing examples from American, European, Asian models. The background of technology standards will be discussed along with the impacts of different national models. The paper closes with a discussion focusing on the Chinese approach to telecommunication standards and the future of telecommunications standards.
标准的接受过程不是一条容易的道路,充满了成功和失败。今天的移动通信标准是通过不同的过程产生的:一些是政府和企业之间的合作,另一些是企业单独产生的。移动技术正在快速发展,标准的制定方式也在不断发展。本文的目的是利用美国、欧洲和亚洲模式的例子来讨论标准化过程。将讨论技术标准的背景以及不同国家模式的影响。本文最后着重讨论了中国制定电信标准的方法和电信标准的未来。
{"title":"National approaches to technology standards for mobile telecommunications","authors":"Michael Murphree, J. Shim, Kevin Love","doi":"10.1109/WTS.2013.6566259","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566259","url":null,"abstract":"The standards' acceptance process is not an easy path to navigate and is littered with successes and failures. Today's mobile communication standards emerged through different processes: some through collaboration between government and business and others from businesses alone. Mobile technology is evolving at a rapid pace and the way in which standards are created is evolving as well. The purpose of this paper is to discuss standardization processes utilizing examples from American, European, Asian models. The background of technology standards will be discussed along with the impacts of different national models. The paper closes with a discussion focusing on the Chinese approach to telecommunication standards and the future of telecommunications standards.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133609357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cacheability analysis of HTTP traffic in an operational LTE network 操作LTE网络中HTTP流量的可缓存性分析
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566245
Buvaneswari Ramanan, L. Drabeck, M. Haner, N. Nithi, T. Klein, Chitra Sawkar
With the rapid increase of traffic on the web, content caching reduces user-perceived latency as well as the transmission of redundant traffic on the network. In this study, we analyze the gains of HTTP content caching at the location of SGW in an LTE Wireless network. High cache hit ratio can be achieved if the proxy server caches only those contents that are guaranteed of significant revisits. In this paper, we identify such contents for optimum proxy server performance. We compare the cacheability gains for different content types such as image, video, text etc, and also for popular websites. Our analysis shows that amongst all the contents, `image' type have the highest revisit rate, which means caching them is beneficial. Amongst the popular websites compared, cacheable contents from `Facebook' have the highest probability of revisits. We extend the analysis by varying the interval of caching and studying its effect on the cacheability. Based on these results, we provide guidelines for configuring the proxy server for high cacheability benefits.
随着网络流量的快速增长,内容缓存减少了用户感知的延迟以及网络中冗余流量的传输。在本研究中,我们分析了在LTE无线网络中SGW位置的HTTP内容缓存的收益。如果代理服务器只缓存那些保证重要重访的内容,则可以实现高缓存命中率。在本文中,我们确定了最佳代理服务器性能的这些内容。我们比较了不同内容类型(如图像、视频、文本等)以及流行网站的可缓存性增益。我们的分析表明,在所有内容中,“图像”类型的重访率最高,这意味着缓存它们是有益的。在比较的热门网站中,来自“Facebook”的可缓存内容具有最高的访问概率。我们通过改变缓存间隔并研究其对可缓存性的影响来扩展分析。基于这些结果,我们提供了配置代理服务器以获得高可缓存性优势的指导方针。
{"title":"Cacheability analysis of HTTP traffic in an operational LTE network","authors":"Buvaneswari Ramanan, L. Drabeck, M. Haner, N. Nithi, T. Klein, Chitra Sawkar","doi":"10.1109/WTS.2013.6566245","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566245","url":null,"abstract":"With the rapid increase of traffic on the web, content caching reduces user-perceived latency as well as the transmission of redundant traffic on the network. In this study, we analyze the gains of HTTP content caching at the location of SGW in an LTE Wireless network. High cache hit ratio can be achieved if the proxy server caches only those contents that are guaranteed of significant revisits. In this paper, we identify such contents for optimum proxy server performance. We compare the cacheability gains for different content types such as image, video, text etc, and also for popular websites. Our analysis shows that amongst all the contents, `image' type have the highest revisit rate, which means caching them is beneficial. Amongst the popular websites compared, cacheable contents from `Facebook' have the highest probability of revisits. We extend the analysis by varying the interval of caching and studying its effect on the cacheability. Based on these results, we provide guidelines for configuring the proxy server for high cacheability benefits.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Blind calibration of five-port receiver based on Independent Component Analysis (ICA) 基于独立分量分析(ICA)的五口接收机盲定标
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566246
Francisco Vidal, A. Neto, A. Martins, B. Huyart
Five-port direct conversion receiver has been demonstrated as an interesting alternative for application in software-defined radio since its design is simple and it can operate in a wide range of frequencies. However, in order to carry out in-phase and quadrature demodulation, the five-port receiver must be calibrated for each frequency and modulation type. In this paper, we evaluate the performance of a blind calibration procedure based on Independent Component Analysis (ICA). The experimental and simulation results show the effectiveness of the FastICA algorithm when it is applied to the recovery of the components sI(t) and sQ(t) of the baseband signal in a five-port receiver.
五端口直接转换接收机已被证明是一种有趣的替代应用于软件定义无线电,因为它的设计简单,它可以在很宽的频率范围内工作。然而,为了进行同相和正交解调,五端口接收器必须针对每种频率和调制类型进行校准。在本文中,我们评估了基于独立分量分析(ICA)的盲校准过程的性能。实验和仿真结果表明,将FastICA算法应用于五端口接收机基带信号分量sI(t)和sQ(t)的恢复是有效的。
{"title":"Blind calibration of five-port receiver based on Independent Component Analysis (ICA)","authors":"Francisco Vidal, A. Neto, A. Martins, B. Huyart","doi":"10.1109/WTS.2013.6566246","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566246","url":null,"abstract":"Five-port direct conversion receiver has been demonstrated as an interesting alternative for application in software-defined radio since its design is simple and it can operate in a wide range of frequencies. However, in order to carry out in-phase and quadrature demodulation, the five-port receiver must be calibrated for each frequency and modulation type. In this paper, we evaluate the performance of a blind calibration procedure based on Independent Component Analysis (ICA). The experimental and simulation results show the effectiveness of the FastICA algorithm when it is applied to the recovery of the components sI(t) and sQ(t) of the baseband signal in a five-port receiver.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"5 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133321708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Orthogonal wavefront-multiplexing architecture for communications in non-contiguous channels 非连续信道通信的正交波前复用结构
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566242
D. Chang, H. Yeh, Yulan Sun
In this paper, we investigate the issue of pulse propagation in a fragmented spectrum (FS) and adaptive equalization using embedded probing signals via feed forward paths only. A novel wavefront (WF) multiplexing (Muxing) and de-multiplexing (Demuxing) scheme as a pre- and postprocessing method is proposed for wideband waveforms or data symbols propagation through non-contiguous (NC) frequency slots in an FS. Embedded probing signals as a part of the input to the WF Muxing processor are used for diagnostic as a part of an equalization procedure. The performance of this scheme is evaluated via simulations. The results show pulse distortions can be minimized by equalizing propagation effects of NC channels via the WF Muxing and Demuxing techniques.
在本文中,我们研究了脉冲在碎片频谱(FS)中的传播问题以及仅通过前馈路径使用嵌入式探测信号的自适应均衡问题。提出了一种新的波前(WF)复用(Muxing)和解复用(Demuxing)方案,作为一种预处理和后处理方法,用于通过频域中不连续(NC)频率槽的宽带波形或数据符号的传播。作为WF Muxing处理器输入的一部分的嵌入式探测信号用于诊断,作为均衡过程的一部分。通过仿真对该方案的性能进行了评价。结果表明,采用WF牧行和去牧行技术均衡NC通道的传播效应,可以最大限度地减少脉冲畸变。
{"title":"Orthogonal wavefront-multiplexing architecture for communications in non-contiguous channels","authors":"D. Chang, H. Yeh, Yulan Sun","doi":"10.1109/WTS.2013.6566242","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566242","url":null,"abstract":"In this paper, we investigate the issue of pulse propagation in a fragmented spectrum (FS) and adaptive equalization using embedded probing signals via feed forward paths only. A novel wavefront (WF) multiplexing (Muxing) and de-multiplexing (Demuxing) scheme as a pre- and postprocessing method is proposed for wideband waveforms or data symbols propagation through non-contiguous (NC) frequency slots in an FS. Embedded probing signals as a part of the input to the WF Muxing processor are used for diagnostic as a part of an equalization procedure. The performance of this scheme is evaluated via simulations. The results show pulse distortions can be minimized by equalizing propagation effects of NC channels via the WF Muxing and Demuxing techniques.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130211509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
On the optimality of network assisted power control for a general class of sigmoid functions 一类一般s型函数的网络辅助功率控制的最优性
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566254
Z. Marantz
Controlling the distribution of resources is imperative in any wireless system. Much research has considered the efficiency of the allocation in terms of bits per Joule of radiated energy. In addition, game theoretical concepts have been used to propose algorithms that help systems reach an optimal operating point. This paper investigates in detail the formerly proposed network assisted power control and, unlike other work that has been done, proves that for a very general class of functions it is Pareto Optimal.
在任何无线系统中,控制资源的分配都是必不可少的。许多研究以每焦耳辐射能量的位数来考虑分配效率。此外,博弈论的概念已经被用来提出算法,帮助系统达到一个最佳的运行点。本文对先前提出的网络辅助功率控制进行了详细的研究,并且与其他工作不同,证明了对于非常一般的一类函数它是帕累托最优的。
{"title":"On the optimality of network assisted power control for a general class of sigmoid functions","authors":"Z. Marantz","doi":"10.1109/WTS.2013.6566254","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566254","url":null,"abstract":"Controlling the distribution of resources is imperative in any wireless system. Much research has considered the efficiency of the allocation in terms of bits per Joule of radiated energy. In addition, game theoretical concepts have been used to propose algorithms that help systems reach an optimal operating point. This paper investigates in detail the formerly proposed network assisted power control and, unlike other work that has been done, proves that for a very general class of functions it is Pareto Optimal.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A linear downlink power control algorithm for wireless networks 无线网络的线性下行功率控制算法
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566241
Yisroel Mirsky, Yoram Haddad
In order to optimize its capacity, a cellular radio system can use a power control algorithm to provide the best overall carrier-to-interference ratio to all of its links. Unfortunately, the optimum algorithm has an impractical exponential complexity of O(2n). However, an approach to the problem has been overlooked. By taking advantage of propagation effects it is possible to split up a large problem into overlapping smaller ones. Doing so can achieve virtually identical results to that of the optimum algorithm in O(n) time (having a stable system). Moreover, this proposed algorithm is suitable as a distributed power control algorithm, whereas the optimum algorithm is a centralized one. This makes the proposed algorithm more suitable for today's cellular network architectures. Furthermore, it is also very easy to parallelize the proposed algorithm over multiple threads and cores offering a great added hardware advantage. In this paper we introduce this algorithm, prove its linear complexity and provide numerical results from simulations.
为了优化其容量,蜂窝无线电系统可以使用功率控制算法为其所有链路提供最佳的总体载波干扰比。不幸的是,最优算法的指数复杂度为O(2n),这是不切实际的。然而,解决这个问题的方法却被忽视了。利用传播效应,可以把一个大问题分解成重叠的小问题。这样做可以在O(n)时间内获得与最优算法几乎相同的结果(具有稳定的系统)。该算法适合作为分布式功率控制算法,而最优算法是集中式功率控制算法。这使得所提出的算法更适合当今的蜂窝网络架构。此外,在多个线程和内核上并行化所提出的算法也非常容易,这提供了一个巨大的附加硬件优势。本文介绍了该算法,证明了其线性复杂度,并给出了仿真结果。
{"title":"A linear downlink power control algorithm for wireless networks","authors":"Yisroel Mirsky, Yoram Haddad","doi":"10.1109/WTS.2013.6566241","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566241","url":null,"abstract":"In order to optimize its capacity, a cellular radio system can use a power control algorithm to provide the best overall carrier-to-interference ratio to all of its links. Unfortunately, the optimum algorithm has an impractical exponential complexity of O(2n). However, an approach to the problem has been overlooked. By taking advantage of propagation effects it is possible to split up a large problem into overlapping smaller ones. Doing so can achieve virtually identical results to that of the optimum algorithm in O(n) time (having a stable system). Moreover, this proposed algorithm is suitable as a distributed power control algorithm, whereas the optimum algorithm is a centralized one. This makes the proposed algorithm more suitable for today's cellular network architectures. Furthermore, it is also very easy to parallelize the proposed algorithm over multiple threads and cores offering a great added hardware advantage. In this paper we introduce this algorithm, prove its linear complexity and provide numerical results from simulations.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123814308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An outage-aware power saving Cooperative Routing algorithm in wireless networks 一种无线网络中可感知中断的节能协同路由算法
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566252
Pouyan Ahmadi, B. Jabbari
In this paper emphasizing the relation between outage and power, we propose a novel cooperative routing algorithm, called Outage-aware K-shortest paths Cooperative Routing (OKCR), which minimizes the transmitted power while exploiting the merit of cooperative communication. The OKCR algorithm (i.e., inherently based on Yen's Kshortest paths algorithm) finds the best route between the source and the destination considering particular outage probability as its constraint. The proposed algorithm nominates k different optimum routes and then selects the best possible relay in each route on the basis of performance analysis. Simulation results show that this strategy enhances power-efficiency in comparison to non-cooperative and other existing cooperative algorithms investigated in the literature by more than 50%.
本文在强调停电与功率关系的基础上,提出了一种新的协同路由算法——中断感知k -最短路径协同路由(OKCR),该算法在充分利用协同通信优点的同时使传输功率最小化。OKCR算法(即本质上基于Yen的k最短路径算法)以特定的中断概率作为约束,寻找源和目的之间的最佳路径。该算法提出k条不同的最优路由,然后在性能分析的基础上,在每条路由中选择可能的最优中继。仿真结果表明,与非合作算法和文献中研究的其他合作算法相比,该策略提高了50%以上的功率效率。
{"title":"An outage-aware power saving Cooperative Routing algorithm in wireless networks","authors":"Pouyan Ahmadi, B. Jabbari","doi":"10.1109/WTS.2013.6566252","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566252","url":null,"abstract":"In this paper emphasizing the relation between outage and power, we propose a novel cooperative routing algorithm, called Outage-aware K-shortest paths Cooperative Routing (OKCR), which minimizes the transmitted power while exploiting the merit of cooperative communication. The OKCR algorithm (i.e., inherently based on Yen's Kshortest paths algorithm) finds the best route between the source and the destination considering particular outage probability as its constraint. The proposed algorithm nominates k different optimum routes and then selects the best possible relay in each route on the basis of performance analysis. Simulation results show that this strategy enhances power-efficiency in comparison to non-cooperative and other existing cooperative algorithms investigated in the literature by more than 50%.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Scalable addressing of M2M terminals in 4G cellular wireless networks 4G蜂窝无线网络中M2M终端的可扩展寻址
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566239
Isam Abdalla, S. Venkatesan
Demand for Machine to Machine (M2M) communication over cellular wireless network has recently seen a rapid growth. This growth resulted in extra demand for the limited numbering and addressing resources used in the cellular wireless networks. The two main, potentially, limiting resources for the rising demand for M2M communication in the cellular wireless networks are the International Mobile Subscriber Identity (IMSI) and the Mobile Station International Subscriber Directory Number (MSISDN). Each device communicating over the 4th Generation (4G) cellular wireless network is allocated an IMSI to uniquely identify it in the network and at least one MSISDN that is used for terminating calls to the device. This paper addresses the numbering and addressing impact on M2M communication over the 4G cellular networks. We present a solution, based on the Evolved Packet Core (EPC) of the 4G cellular networks, to extend the use of IMSI to accommodate the projected growth in the M2M communication.
最近,对通过蜂窝无线网络进行的机器对机器(M2M)通信的需求迅速增长。这种增长导致了对蜂窝无线网络中使用的有限编号和寻址资源的额外需求。蜂窝无线网络中对M2M通信日益增长的需求有两个主要的、潜在的限制资源:国际移动用户标识(IMSI)和移动站国际用户目录号码(MSISDN)。通过第4代(4G)蜂窝无线网络通信的每个设备被分配一个IMSI以在网络中唯一地标识它,并分配至少一个MSISDN用于终止对该设备的呼叫。本文讨论了编号和寻址对4G蜂窝网络上M2M通信的影响。我们提出了一种基于4G蜂窝网络的演进分组核心(EPC)的解决方案,以扩展IMSI的使用,以适应M2M通信的预计增长。
{"title":"Scalable addressing of M2M terminals in 4G cellular wireless networks","authors":"Isam Abdalla, S. Venkatesan","doi":"10.1109/WTS.2013.6566239","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566239","url":null,"abstract":"Demand for Machine to Machine (M2M) communication over cellular wireless network has recently seen a rapid growth. This growth resulted in extra demand for the limited numbering and addressing resources used in the cellular wireless networks. The two main, potentially, limiting resources for the rising demand for M2M communication in the cellular wireless networks are the International Mobile Subscriber Identity (IMSI) and the Mobile Station International Subscriber Directory Number (MSISDN). Each device communicating over the 4th Generation (4G) cellular wireless network is allocated an IMSI to uniquely identify it in the network and at least one MSISDN that is used for terminating calls to the device. This paper addresses the numbering and addressing impact on M2M communication over the 4G cellular networks. We present a solution, based on the Evolved Packet Core (EPC) of the 4G cellular networks, to extend the use of IMSI to accommodate the projected growth in the M2M communication.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128346465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
K-centers Min-Max clustering algorithm over heterogeneous wireless sensor networks 异构无线传感器网络的k中心最小-最大聚类算法
Pub Date : 2013-04-17 DOI: 10.1109/WTS.2013.6566250
Q. Xie, Yizong Cheng
This paper proposes a clustering algorithm for heterogeneous wireless sensor networks, addressing energy dissipation as a key issue. Energy dissipation required by sensor nodes to transmit data depends on the distance between sensor nodes and cluster heads or a base station. Clustering is one of the best techniques for reducing energy consumption and extending sensor network lifetimes. Desirable features of the proposed clustering algorithm include: adaptation to changes in sensor distribution; energy efficiency; localized and distributed data aggregation and decision making; immunity to partial damage; and self-recovery. It employs a smallest disc covering algorithm to achieve a minimum of the maximum distance between a cluster head and sensor nodes compared to k-means clustering. Lawson's multiplicative rule is used for the smallest disc covering algorithm. Our simulation demonstrates that the proposed algorithm takes 50.8% fewer iterations to converge for cluster formation, with 33.9% and 23.2% shorter maximum and average intra-cluster distances versus k-means clustering. Performance is also improved.
本文提出了一种异构无线传感器网络的聚类算法,并将能量耗散作为关键问题加以解决。传感器节点传输数据所需的能量耗散取决于传感器节点与簇头或基站之间的距离。聚类是降低能耗和延长传感器网络寿命的最佳技术之一。本文提出的聚类算法的理想特征包括:适应传感器分布的变化;能源效率;本地化和分布式的数据聚合和决策;对部分损害的免疫;和自动复位。与k-means聚类相比,它采用最小的磁盘覆盖算法来实现簇头和传感器节点之间的最大距离的最小值。最小磁盘覆盖算法采用Lawson乘法规则。仿真结果表明,与k-means聚类相比,该算法收敛聚类的迭代次数减少了50.8%,最大簇内距离和平均簇内距离分别缩短了33.9%和23.2%。性能也得到了提高。
{"title":"K-centers Min-Max clustering algorithm over heterogeneous wireless sensor networks","authors":"Q. Xie, Yizong Cheng","doi":"10.1109/WTS.2013.6566250","DOIUrl":"https://doi.org/10.1109/WTS.2013.6566250","url":null,"abstract":"This paper proposes a clustering algorithm for heterogeneous wireless sensor networks, addressing energy dissipation as a key issue. Energy dissipation required by sensor nodes to transmit data depends on the distance between sensor nodes and cluster heads or a base station. Clustering is one of the best techniques for reducing energy consumption and extending sensor network lifetimes. Desirable features of the proposed clustering algorithm include: adaptation to changes in sensor distribution; energy efficiency; localized and distributed data aggregation and decision making; immunity to partial damage; and self-recovery. It employs a smallest disc covering algorithm to achieve a minimum of the maximum distance between a cluster head and sensor nodes compared to k-means clustering. Lawson's multiplicative rule is used for the smallest disc covering algorithm. Our simulation demonstrates that the proposed algorithm takes 50.8% fewer iterations to converge for cluster formation, with 33.9% and 23.2% shorter maximum and average intra-cluster distances versus k-means clustering. Performance is also improved.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124667016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 Wireless Telecommunications Symposium (WTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1