首页 > 最新文献

2010 IEEE Global Telecommunications Conference GLOBECOM 2010最新文献

英文 中文
Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching 加速多串匹配的独立平行紧凑有限自动机
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684119
Yi Tang, Junchen Jiang, Xiaofei Wang, B. Liu, Yang Xu
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS). Existing DFA-based approaches always tradeoff between memory and throughput, and fail to has the best of both worlds. This paper extends the classic longest prefix principle from single-character to multi-character string matching and proposes a multi-string matching acceleration scheme named Independent Parallel Compact Finite Automata (PC-FA). In the scheme, DFA is divided into k PC-FAs, each of which can process one character from the input stream, achieving a speedup up to k with reduced memory occupation. Theoretical proof is given for the equivalency between traditional DFA and PC-FA approach. Experi-mental evaluations show that seven times of speedup can be practically achieved with a reduced memory size than up-to-date DFA-based compression approaches.
多字符串匹配是实现网络入侵检测系统(NIDS)等网络安全应用的关键技术。现有的基于dfa的方法总是在内存和吞吐量之间进行权衡,而不能兼顾两者的优点。本文将经典的最长前缀原理从单字符扩展到多字符字符串匹配,并提出了一种独立并行紧凑有限自动机(PC-FA)的多字符串匹配加速方案。在该方案中,DFA被划分为k个pc - fa,每个pc - fa可以处理输入流中的一个字符,在减少内存占用的情况下实现高达k的加速。从理论上证明了传统DFA方法与PC-FA方法的等价性。实验评估表明,与最新的基于dfa的压缩方法相比,在减少内存大小的情况下,实际上可以实现7倍的加速。
{"title":"Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching","authors":"Yi Tang, Junchen Jiang, Xiaofei Wang, B. Liu, Yang Xu","doi":"10.1109/GLOCOM.2010.5684119","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684119","url":null,"abstract":"Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS). Existing DFA-based approaches always tradeoff between memory and throughput, and fail to has the best of both worlds. This paper extends the classic longest prefix principle from single-character to multi-character string matching and proposes a multi-string matching acceleration scheme named Independent Parallel Compact Finite Automata (PC-FA). In the scheme, DFA is divided into k PC-FAs, each of which can process one character from the input stream, achieving a speedup up to k with reduced memory occupation. Theoretical proof is given for the equivalency between traditional DFA and PC-FA approach. Experi-mental evaluations show that seven times of speedup can be practically achieved with a reduced memory size than up-to-date DFA-based compression approaches.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"10 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78117935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Effect of Feedback Delay on Limited-Rate Beamforming Systems 反馈延迟对有限速率波束形成系统的影响
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684288
Yiyue Wu, Andreas Achtzehn, M. Petrova, P. Mähönen, A. Calderbank
The use of beamforming to enable higher data rates in telecommunications is widely appreciated, but performance gains are typically calculated assuming delay-free feedback from the receiver and neglecting processing time. This paper introduces a mathematical framework based on outage probability that measures the extent to which current channel state information is accurate. Performance gains from beamforming can then be evaluated as a function of the currency of system state. Results are provided for Multiple Input Single Output (MISO) and for Multiuser Multiple Input Multiple Output (MU-MIMO) systems. Outage probabilities and effective diversity orders are calculated for widely used methods of beamforming such as Transmit Antenna Selection as a function of the speed of channel variation.
在电信中使用波束成形来实现更高的数据速率受到广泛赞赏,但性能增益通常是在假设来自接收器的无延迟反馈并忽略处理时间的情况下计算的。本文介绍了一个基于中断概率的数学框架来衡量当前信道状态信息的准确程度。然后,波束形成的性能增益可以作为系统状态货币的函数来评估。结果提供了多输入单输出(MISO)和多用户多输入多输出(MU-MIMO)系统。对于广泛使用的波束形成方法,如发射天线选择,计算了中断概率和有效分集顺序作为信道变化速度的函数。
{"title":"On the Effect of Feedback Delay on Limited-Rate Beamforming Systems","authors":"Yiyue Wu, Andreas Achtzehn, M. Petrova, P. Mähönen, A. Calderbank","doi":"10.1109/GLOCOM.2010.5684288","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684288","url":null,"abstract":"The use of beamforming to enable higher data rates in telecommunications is widely appreciated, but performance gains are typically calculated assuming delay-free feedback from the receiver and neglecting processing time. This paper introduces a mathematical framework based on outage probability that measures the extent to which current channel state information is accurate. Performance gains from beamforming can then be evaluated as a function of the currency of system state. Results are provided for Multiple Input Single Output (MISO) and for Multiuser Multiple Input Multiple Output (MU-MIMO) systems. Outage probabilities and effective diversity orders are calculated for widely used methods of beamforming such as Transmit Antenna Selection as a function of the speed of channel variation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"28 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79873354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic HMC:一种识别加密P2P雷电流量的新机制
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683651
Chenglong Li, Y. Xue, Yingfei Dong, Dongsheng Wang
Thunder (also called Xunlei) is the most popular P2P file sharing application in China and probably the most popular P2P software in term of traffic volume and number of users. Precisely identifying Thunder traffic can help network administrators to efficiently manage their networks. Traditional methods of identifying P2P traffic such as port-based or content-based approaches are ineffective to Thunder traffic, because of its dynamic packet format, flexible port numbers, and payload encryption. In this paper, we developed a novel Heuristic Message Clustering approach (HMC) to identify Thunder traffic, and obtain its state machine and key transaction cycles, thus identifying Thunder traffic fast and accurately. We first evaluate our method in a controlled environment and then with real campus traces. The results show that HMC is able to identify Thunder flows with high precision and low error rate.
迅雷(也叫迅雷)是中国最流行的P2P文件共享应用程序,在流量和用户数量方面可能是最流行的P2P软件。准确识别迅雷流量可以帮助网络管理员有效地管理网络。传统的识别P2P流量的方法,如基于端口或基于内容的方法,对Thunder流量无效,因为它具有动态数据包格式、灵活的端口号和有效载荷加密。本文提出了一种新的启发式消息聚类方法(HMC)来识别迅雷流量,并获得其状态机和密钥交易周期,从而快速准确地识别迅雷流量。我们首先在受控环境中评估我们的方法,然后在真实的校园痕迹中进行评估。结果表明,该方法能够以较高的精度和较低的错误率识别雷电流。
{"title":"HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic","authors":"Chenglong Li, Y. Xue, Yingfei Dong, Dongsheng Wang","doi":"10.1109/GLOCOM.2010.5683651","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683651","url":null,"abstract":"Thunder (also called Xunlei) is the most popular P2P file sharing application in China and probably the most popular P2P software in term of traffic volume and number of users. Precisely identifying Thunder traffic can help network administrators to efficiently manage their networks. Traditional methods of identifying P2P traffic such as port-based or content-based approaches are ineffective to Thunder traffic, because of its dynamic packet format, flexible port numbers, and payload encryption. In this paper, we developed a novel Heuristic Message Clustering approach (HMC) to identify Thunder traffic, and obtain its state machine and key transaction cycles, thus identifying Thunder traffic fast and accurately. We first evaluate our method in a controlled environment and then with real campus traces. The results show that HMC is able to identify Thunder flows with high precision and low error rate.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80359716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Improvement on the Soft Reliability-Based Iterative Majority-Logic Decoding Algorithm for LDPC Codes 基于软可靠性的LDPC码迭代多数逻辑译码算法改进
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684111
T. Ngatched, A. Alfa, Jun Cai
This paper presents an improvement of the reliability-based iterative majority-logic decoding algorithms for regular low-density parity-check (LDPC) codes proposed by Huang et al. We improve the computation of the extrinsic information that is used to update the reliability measure of each received bit in each iteration with some kind of reliability measures of the check-sums that are orthogonal on the considered bit. The improved algorithm achieves a significant gain over the standard one with only a modest increase in computational complexity.
本文对Huang等人提出的基于可靠性的正则低密度奇偶校验(LDPC)码迭代多数逻辑译码算法进行了改进。我们改进了用于在每次迭代中更新每个接收位的可靠性度量的外部信息的计算,使用某种正交于所考虑位的校验和的可靠性度量。与标准算法相比,改进后的算法获得了显著的增益,而计算复杂度仅略有增加。
{"title":"An Improvement on the Soft Reliability-Based Iterative Majority-Logic Decoding Algorithm for LDPC Codes","authors":"T. Ngatched, A. Alfa, Jun Cai","doi":"10.1109/GLOCOM.2010.5684111","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684111","url":null,"abstract":"This paper presents an improvement of the reliability-based iterative majority-logic decoding algorithms for regular low-density parity-check (LDPC) codes proposed by Huang et al. We improve the computation of the extrinsic information that is used to update the reliability measure of each received bit in each iteration with some kind of reliability measures of the check-sums that are orthogonal on the considered bit. The improved algorithm achieves a significant gain over the standard one with only a modest increase in computational complexity.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"94 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80367469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fast Heuristics for the QoS Multicast Routing Problem QoS组播路由问题的快速启发式算法
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683883
Alia Bellabas, S. Lahoud, M. Molnár
The NP-hard QoS Multicast Routing (QoSMR) is one of the most challenging problems in recent networks. In this paper, we investigate the QoSMR problem as well as its different existing formulations. We analyze the limitations of these formulations and propose a novel one. The main advantage of our formulation is that it considers not only the quality of the multicast subgraph formed by the computed paths, but also takes into account the end-to-end quality of each of these paths. Moreover, we study the state of the art proposal for solving the QoSMR problem and show that the well-known MAMCRA algorithm can be very expensive in computation time. Therefore, we propose two efficient heuristics based on the computation of shortest paths. Extensive simulations are performed, and obtained results prove that these fast heuristics have bounded computation time and find satisfying solutions for the QoS requirements.
np硬QoS组播路由(qsmr)是当前网络中最具挑战性的问题之一。本文研究了qsmr问题及其现有的不同表述。我们分析了这些公式的局限性,并提出了一个新的公式。我们的公式的主要优点是它不仅考虑了由计算路径形成的多播子图的质量,而且考虑了每个路径的端到端质量。此外,我们研究了解决qsmr问题的最新方案,并表明众所周知的MAMCRA算法在计算时间上是非常昂贵的。因此,我们提出了两种基于最短路径计算的高效启发式算法。大量的仿真结果表明,这些快速启发式算法具有有限的计算时间和满足QoS要求的解。
{"title":"Fast Heuristics for the QoS Multicast Routing Problem","authors":"Alia Bellabas, S. Lahoud, M. Molnár","doi":"10.1109/GLOCOM.2010.5683883","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683883","url":null,"abstract":"The NP-hard QoS Multicast Routing (QoSMR) is one of the most challenging problems in recent networks. In this paper, we investigate the QoSMR problem as well as its different existing formulations. We analyze the limitations of these formulations and propose a novel one. The main advantage of our formulation is that it considers not only the quality of the multicast subgraph formed by the computed paths, but also takes into account the end-to-end quality of each of these paths. Moreover, we study the state of the art proposal for solving the QoSMR problem and show that the well-known MAMCRA algorithm can be very expensive in computation time. Therefore, we propose two efficient heuristics based on the computation of shortest paths. Extensive simulations are performed, and obtained results prove that these fast heuristics have bounded computation time and find satisfying solutions for the QoS requirements.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"34 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82153363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Upload Time of Data from Mobile Devices 优化移动设备数据上传时间
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684290
Ying Zhu
The technological advances in mobile devices have resulted in increasing numbers of applications on them, and users use these applications to create lots of data. Due to the truly ubiquitous nature of these devices, the data is created potentially at all times of the day and in different wireless environments, e.g., at home, on the subway, at a coffeeshop. These data must eventually be uploaded to the server cloud from the mobile device by connecting to a wireless network. In different environments, the available wireless networks change, and the cost of connecting to them in order to upload these data also changes. For different applications, the preference for the uploading time for their data may be very different. We study the problem of optimizing the time for uploading based on the preferenc measure as well as the cost of the wireless network available at the time of uploading. Furthermore, because the wireless environment is dynamic and nondeterministic in the future, we use machine learning techniques for modeling user mobility patterns and predicting the wireless network in the near future, to assist in finding the optimal uploading time.
移动设备的技术进步导致其上的应用程序越来越多,用户使用这些应用程序创建大量数据。由于这些设备真正无处不在的性质,数据可能在一天中的任何时间和不同的无线环境中产生,例如,在家里,在地铁上,在咖啡馆。这些数据最终必须通过连接无线网络从移动设备上传到服务器云。在不同的环境中,可用的无线网络会发生变化,为了上传这些数据而连接到这些网络的费用也会发生变化。对于不同的应用程序,对数据上传时间的偏好可能非常不同。我们研究了基于偏好度量的上传时间优化问题,并考虑了上传时可用无线网络的成本。此外,由于未来的无线环境是动态的和不确定的,我们使用机器学习技术来建模用户移动模式并预测不久的将来的无线网络,以帮助找到最佳上传时间。
{"title":"Optimizing Upload Time of Data from Mobile Devices","authors":"Ying Zhu","doi":"10.1109/GLOCOM.2010.5684290","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684290","url":null,"abstract":"The technological advances in mobile devices have resulted in increasing numbers of applications on them, and users use these applications to create lots of data. Due to the truly ubiquitous nature of these devices, the data is created potentially at all times of the day and in different wireless environments, e.g., at home, on the subway, at a coffeeshop. These data must eventually be uploaded to the server cloud from the mobile device by connecting to a wireless network. In different environments, the available wireless networks change, and the cost of connecting to them in order to upload these data also changes. For different applications, the preference for the uploading time for their data may be very different. We study the problem of optimizing the time for uploading based on the preferenc measure as well as the cost of the wireless network available at the time of uploading. Furthermore, because the wireless environment is dynamic and nondeterministic in the future, we use machine learning techniques for modeling user mobility patterns and predicting the wireless network in the near future, to assist in finding the optimal uploading time.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"2675 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82181719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Minimizing Detection Time While Guaranteeing Desired Detection Accuracy in Cooperative Primary User Detection 在保证主用户协作检测精度的前提下,最小化检测时间
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683434
Shengliang Peng, Xi Yang, Shuli Shu, Lan Tang, Xiuying Cao
This paper investigates the issue of minimizing the detection time while guaranteeing the desired detection accuracy in cooperative primary user detection for cognitive radio. To achieve this goal, the sequential cooperative energy detection (SCED) scheme is firstly introduced. This scheme implements sequential probability ratio test to make final decisions and can guarantee the desired detection accuracy with less detection time compared with other schemes. Then, detection time in the SCED scheme is minimized by choosing an optimum sample number. Expressions for the optimum sample number and the minimum detection time in four typical scenarios are also derived. Simulation results are presented to illustrate the benefits of the SCED scheme and to examine the optimum sample number as well as the minimum detection time.
研究了认知无线电协同主用户检测中在保证检测精度的同时最小化检测时间的问题。为了实现这一目标,首先引入了顺序协同能量检测(SCED)方案。该方案通过序列概率比检验进行最终决策,与其他方案相比,能够以更少的检测时间保证所需的检测精度。然后,通过选择最优样本数,使SCED方案的检测时间最小化。推导了四种典型情况下的最佳样本数和最小检测时间表达式。仿真结果说明了SCED方案的优点,并检验了最佳样本数量和最小检测时间。
{"title":"Minimizing Detection Time While Guaranteeing Desired Detection Accuracy in Cooperative Primary User Detection","authors":"Shengliang Peng, Xi Yang, Shuli Shu, Lan Tang, Xiuying Cao","doi":"10.1109/GLOCOM.2010.5683434","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683434","url":null,"abstract":"This paper investigates the issue of minimizing the detection time while guaranteeing the desired detection accuracy in cooperative primary user detection for cognitive radio. To achieve this goal, the sequential cooperative energy detection (SCED) scheme is firstly introduced. This scheme implements sequential probability ratio test to make final decisions and can guarantee the desired detection accuracy with less detection time compared with other schemes. Then, detection time in the SCED scheme is minimized by choosing an optimum sample number. Expressions for the optimum sample number and the minimum detection time in four typical scenarios are also derived. Simulation results are presented to illustrate the benefits of the SCED scheme and to examine the optimum sample number as well as the minimum detection time.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"57 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82279682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Expanding Horizon and Capture Effect in RFID Singulation RFID仿真中的扩展视界与捕获效应
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683908
Charles-Francois Natali, N. Vaidya, Victor K. Y. Wu
We present two singulation schemes for passive RFID systems. The first scheme, called expanding horizon, uses interrogator transmit power control to singulate tags in concentric annuli. We show through analysis that this scheme is very time-efficient and conserves energy. Our second scheme is a combination parallel interrogation and TDMA scheme that applies to multiple interrogator situations. It leverages the capture effect to singulate many tags, even when these tags may be receiving signals from multiple interrogators. This provides a time-efficient scheme, as shown in our simulations.
我们提出了两种无源RFID系统的仿真方案。第一种方案称为扩展视界,它使用询问器发送功率控制来模拟同心环空中的单个标签。通过分析表明,该方案既省时又节能。我们的第二个方案是并行审讯和TDMA方案的组合,适用于多个审讯者的情况。它利用捕获效应来单个标记,即使这些标记可能从多个询问器接收信号。这提供了一个省时的方案,如我们的模拟所示。
{"title":"Expanding Horizon and Capture Effect in RFID Singulation","authors":"Charles-Francois Natali, N. Vaidya, Victor K. Y. Wu","doi":"10.1109/GLOCOM.2010.5683908","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683908","url":null,"abstract":"We present two singulation schemes for passive RFID systems. The first scheme, called expanding horizon, uses interrogator transmit power control to singulate tags in concentric annuli. We show through analysis that this scheme is very time-efficient and conserves energy. Our second scheme is a combination parallel interrogation and TDMA scheme that applies to multiple interrogator situations. It leverages the capture effect to singulate many tags, even when these tags may be receiving signals from multiple interrogators. This provides a time-efficient scheme, as shown in our simulations.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"47 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81361580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Spectrum Allocation Based Confidentiality for Cognitive Radio Networks 基于机密性的认知无线网络动态频谱分配
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684027
Chao Zou, Chunxiao Chigan
The paradigm of dynamic spectrum access, an intrinsic characteristic of the cognitive radio network (CRN), embraces new opportunity for protecting the privacy of communication content through random channel hopping patterns, which are hard to follow by adversaries. Different from conventional DSA where each active CR user only accesses the spectrum once, the confidentiality driven DSA requires every active user to hop over multiple channels during one transmission session. Hence the DSA process is modeled as a fractional coloring process. By artfully converting two-dimensional color to one-dimensional color through vertex expansion, a Latin square (LS) based DSA is proposed, with confidentiality requirements embedded. Theoretic analysis and simulation results verify the feasibility of the DSA based cryptography and illustrates how confidentiality requirement affects the spectrum utilization efficiency.
动态频谱接入范式是认知无线电网络(CRN)的内在特征,它为通过随机信道跳频模式保护通信内容的隐私提供了新的机会,这种模式很难被对手遵循。与传统DSA中每个活动CR用户只访问一次频谱不同,机密性驱动的DSA要求每个活动用户在一个传输会话中跳过多个信道。因此,DSA过程被建模为一个分数着色过程。通过顶点展开将二维颜色巧妙地转换为一维颜色,提出了一种嵌入保密要求的基于拉丁方的DSA。理论分析和仿真结果验证了基于DSA的密码学的可行性,说明了保密性要求对频谱利用效率的影响。
{"title":"Dynamic Spectrum Allocation Based Confidentiality for Cognitive Radio Networks","authors":"Chao Zou, Chunxiao Chigan","doi":"10.1109/GLOCOM.2010.5684027","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684027","url":null,"abstract":"The paradigm of dynamic spectrum access, an intrinsic characteristic of the cognitive radio network (CRN), embraces new opportunity for protecting the privacy of communication content through random channel hopping patterns, which are hard to follow by adversaries. Different from conventional DSA where each active CR user only accesses the spectrum once, the confidentiality driven DSA requires every active user to hop over multiple channels during one transmission session. Hence the DSA process is modeled as a fractional coloring process. By artfully converting two-dimensional color to one-dimensional color through vertex expansion, a Latin square (LS) based DSA is proposed, with confidentiality requirements embedded. Theoretic analysis and simulation results verify the feasibility of the DSA based cryptography and illustrates how confidentiality requirement affects the spectrum utilization efficiency.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"60 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78667690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Temporal Spectrum Sensing in Packet-Based Network Using Double Thresholds 基于双阈值的分组网络时间频谱感知
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683830
Yingxi Liu, Nikhil Kundargi, A. Tewfik
Traditional cognitive radio protocols rely on identifying intervals of time when a channel is available to secondary users. To date, the detection of such opportunities has relied on single threshold based binary hypothesis testing schemes. In this paper, we describe the shortcomings of traditional single threshold transmit opportunity methods. We then propose a hysteresis based detection scheme that uses two different thresholds for detecting that a channel that was unavailable has become available or that an available channel is no longer available. We provide numerical simulation and experimental results to show that the proposed double threshold approach reduces interference to the primary network and enhances the throughput of the secondary network.
传统的认知无线电协议依赖于确定信道对辅助用户可用的时间间隔。迄今为止,这种机会的检测依赖于基于单阈值的二元假设检验方案。本文描述了传统的单阈值传输机会方法的不足。然后,我们提出了一种基于滞后的检测方案,该方案使用两个不同的阈值来检测不可用的通道是否变为可用或可用的通道是否不再可用。数值模拟和实验结果表明,双阈值方法减少了对主网络的干扰,提高了副网络的吞吐量。
{"title":"Temporal Spectrum Sensing in Packet-Based Network Using Double Thresholds","authors":"Yingxi Liu, Nikhil Kundargi, A. Tewfik","doi":"10.1109/GLOCOM.2010.5683830","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683830","url":null,"abstract":"Traditional cognitive radio protocols rely on identifying intervals of time when a channel is available to secondary users. To date, the detection of such opportunities has relied on single threshold based binary hypothesis testing schemes. In this paper, we describe the shortcomings of traditional single threshold transmit opportunity methods. We then propose a hysteresis based detection scheme that uses two different thresholds for detecting that a channel that was unavailable has become available or that an available channel is no longer available. We provide numerical simulation and experimental results to show that the proposed double threshold approach reduces interference to the primary network and enhances the throughput of the secondary network.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"35 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78795845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1