首页 > 最新文献

2010 IEEE Global Telecommunications Conference GLOBECOM 2010最新文献

英文 中文
Superanalysis of the Interference Effect on Adaptive Antenna Systems 自适应天线系统干扰效应的超分析
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683404
Youngmin Jeong, Hyundong Shin, M. Win
We analyze the performance of optimum combining in a general cochannel interference environment with thermal noise. Specifically, we consider multiple unequal-power interferers, each is spatially correlated across receiving antennas. We develop a new mathematical methodology to analyze the average symbol error probability (SEP) of optimum combining diversity systems in Rayleigh fading. The analysis resorts to the so-called Berezin's supermathematics that treats both commuting and Grassmann anticommuting variables on an equal footing. This superanalysis framework enables us to derive the exact SEP expression for an arbitrary number of interferers with spatial correlation and possibly different power levels. Our results therefore encompass all the previous analytical results, based on the theory of multivariate statistics relating to complex Wishart matrices, for equal-power and/or spatially-uncorrelated interferers. Connecting the powerful supermathematical framework to the analysis of wireless diversity systems with optimum combining, we quantify the interference effects in terms of the degree of power unbalance and the amount of spatial correlation.
分析了在含热噪声的一般共信道干扰环境下的最佳组合性能。具体来说,我们考虑了多个不等功率干扰,每个干扰在接收天线上都是空间相关的。提出了一种新的数学方法来分析瑞利衰落下最优组合分集系统的平均码差概率(SEP)。该分析采用了所谓的Berezin的超级数学,该数学将交换变量和Grassmann反交换变量同等对待。这种超分析框架使我们能够推导出具有空间相关性和可能不同功率水平的任意数量干扰的精确SEP表达式。因此,我们的结果包含了所有先前的分析结果,基于与复杂Wishart矩阵相关的多元统计理论,用于等功率和/或空间不相关的干扰。将强大的超数学框架与最佳组合的无线分集系统分析联系起来,我们根据功率不平衡程度和空间相关量来量化干扰效应。
{"title":"Superanalysis of the Interference Effect on Adaptive Antenna Systems","authors":"Youngmin Jeong, Hyundong Shin, M. Win","doi":"10.1109/GLOCOM.2010.5683404","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683404","url":null,"abstract":"We analyze the performance of optimum combining in a general cochannel interference environment with thermal noise. Specifically, we consider multiple unequal-power interferers, each is spatially correlated across receiving antennas. We develop a new mathematical methodology to analyze the average symbol error probability (SEP) of optimum combining diversity systems in Rayleigh fading. The analysis resorts to the so-called Berezin's supermathematics that treats both commuting and Grassmann anticommuting variables on an equal footing. This superanalysis framework enables us to derive the exact SEP expression for an arbitrary number of interferers with spatial correlation and possibly different power levels. Our results therefore encompass all the previous analytical results, based on the theory of multivariate statistics relating to complex Wishart matrices, for equal-power and/or spatially-uncorrelated interferers. Connecting the powerful supermathematical framework to the analysis of wireless diversity systems with optimum combining, we quantify the interference effects in terms of the degree of power unbalance and the amount of spatial correlation.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75983051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Bandwidth Allocation with Dynamic Service Selection in Heterogeneous Wireless Networks 异构无线网络中动态业务选择的最优带宽分配
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683238
K. Zhu, D. Niyato, Ping Wang
Bandwidth allocation for different service classes in heterogeneous wireless networks is an important issue for service provider in terms of balancing service quality and profit. It is especially challenging when considering the dynamic competition both among service providers and among users. To address this problem, a two-level game framework is developed in this paper. The underlying dynamic service selection is modeled as an evolutionary game based on replicator dynamics. An upper bandwidth allocation differential game is formulated to model the competition among different service providers. The service selection distribution of the underlying evolutionary game describes the state of the upper differential game. An open-loop Nash equilibrium is considered to be the solution of this linear state differential game. The proposed framework can be implemented with minimum communication cost since no information broadcasting is required. Also, we observe that the selfish behavior of service providers can also maximize the social welfare.
异构无线网络中不同业务类别的带宽分配是服务提供商在平衡服务质量和利润方面面临的一个重要问题。考虑到服务提供商之间和用户之间的动态竞争,这尤其具有挑战性。为了解决这一问题,本文提出了一个两级博弈框架。将底层动态服务选择建模为基于复制器动态的进化博弈。为了模拟不同服务提供商之间的竞争,建立了一个带宽分配差异博弈模型。底层进化博弈的服务选择分布描述了上层微分博弈的状态。一个开环纳什均衡被认为是这个线性状态微分对策的解。由于不需要信息广播,因此可以以最小的通信成本实现所提出的框架。同时,我们观察到服务提供者的自私行为也可以使社会福利最大化。
{"title":"Optimal Bandwidth Allocation with Dynamic Service Selection in Heterogeneous Wireless Networks","authors":"K. Zhu, D. Niyato, Ping Wang","doi":"10.1109/GLOCOM.2010.5683238","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683238","url":null,"abstract":"Bandwidth allocation for different service classes in heterogeneous wireless networks is an important issue for service provider in terms of balancing service quality and profit. It is especially challenging when considering the dynamic competition both among service providers and among users. To address this problem, a two-level game framework is developed in this paper. The underlying dynamic service selection is modeled as an evolutionary game based on replicator dynamics. An upper bandwidth allocation differential game is formulated to model the competition among different service providers. The service selection distribution of the underlying evolutionary game describes the state of the upper differential game. An open-loop Nash equilibrium is considered to be the solution of this linear state differential game. The proposed framework can be implemented with minimum communication cost since no information broadcasting is required. Also, we observe that the selfish behavior of service providers can also maximize the social welfare.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"107 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87472602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Achieving Full Rate Network Coding with Constellation Compatible Modulation and Coding 星座兼容调制编码实现全速率网络编码
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5684262
Suhua Tang, H. Yomo, T. Ueda, R. Miura, S. Obana
Network coding is an effective method to improving relay efficiency by reducing the number of transmissions. However, its performance is limited by several factors such as packet length mismatch and rate mismatch. Although the former may be solved by re-framing, the latter remains a challenge and is likely to greatly degrade the efficiency of network coding. In this paper, we re-interpret network coding as a mapping of modulation constellation. On this basis, we extend such mapping to enable simultaneous use of different modulations by nesting the low-level constellation as a subset of the high level constellation. When relay links have different qualities, the messages of different flows are combined together in such a way that for each relay link its desired message is transmitted at its own highest rate. Compared with previous solutions to rate mismatch, the proposed scheme achieves the full rate of all relay links on the broadcast channel.
网络编码是通过减少传输次数来提高中继效率的有效方法。但是,它的性能受到数据包长度不匹配和速率不匹配等因素的限制。虽然前者可以通过重帧来解决,但后者仍然是一个挑战,并且可能会大大降低网络编码的效率。本文将网络编码重新解释为调制星座的映射。在此基础上,我们扩展了这种映射,通过将低级星座嵌套为高级星座的子集来实现不同调制的同时使用。当中继链路具有不同的质量时,不同流的消息以这样一种方式组合在一起,即对于每个中继链路,其所需的消息以其自己的最高速率传输。与以往的速率失配解决方案相比,该方案实现了广播信道上所有中继链路的全速率。
{"title":"Achieving Full Rate Network Coding with Constellation Compatible Modulation and Coding","authors":"Suhua Tang, H. Yomo, T. Ueda, R. Miura, S. Obana","doi":"10.1109/GLOCOM.2010.5684262","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5684262","url":null,"abstract":"Network coding is an effective method to improving relay efficiency by reducing the number of transmissions. However, its performance is limited by several factors such as packet length mismatch and rate mismatch. Although the former may be solved by re-framing, the latter remains a challenge and is likely to greatly degrade the efficiency of network coding. In this paper, we re-interpret network coding as a mapping of modulation constellation. On this basis, we extend such mapping to enable simultaneous use of different modulations by nesting the low-level constellation as a subset of the high level constellation. When relay links have different qualities, the messages of different flows are combined together in such a way that for each relay link its desired message is transmitted at its own highest rate. Compared with previous solutions to rate mismatch, the proposed scheme achieves the full rate of all relay links on the broadcast channel.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"37 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87852615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Feature Interaction Analysis for Collaboration Spaces with Communication Endpoints 具有通信端点的协作空间特征交互分析
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683537
M. Kolberg, J. Buford, K. Dhara, V. Krishnaswamy, Xiaotao Wu
Online collaboration platforms such as Google Wave provide basic tools for collaboration and communication as well as an interface to include external applications. Separately, we have defined a collaboration platform called ConnectedSpaces which extends these basic capabilities towards enterprise use. Using the ConnectedSpaces model, here we categorize, illustrate, and analyze new types of feature interactions for collaboration platforms. Furthermore, we discuss handling feature interactions which are caused by using ConnectedSpaces as a communication endpoint with enterprise communication platforms. The work in this paper is novel as it is the first investigation into feature interactions with collaboration platforms. Our approach uses a runtime feature interaction technique which can cope with features provided by different organizations.
谷歌Wave等在线协作平台提供了协作和通信的基本工具,以及包含外部应用程序的接口。另外,我们还定义了一个名为ConnectedSpaces的协作平台,将这些基本功能扩展到企业使用。使用ConnectedSpaces模型,我们对协作平台的新型功能交互进行分类、说明和分析。此外,我们还讨论了如何处理由于使用ConnectedSpaces作为企业通信平台的通信端点而导致的功能交互。本文的工作是新颖的,因为它是第一次研究与协作平台的功能交互。我们的方法使用运行时功能交互技术,该技术可以处理不同组织提供的功能。
{"title":"Feature Interaction Analysis for Collaboration Spaces with Communication Endpoints","authors":"M. Kolberg, J. Buford, K. Dhara, V. Krishnaswamy, Xiaotao Wu","doi":"10.1109/GLOCOM.2010.5683537","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683537","url":null,"abstract":"Online collaboration platforms such as Google Wave provide basic tools for collaboration and communication as well as an interface to include external applications. Separately, we have defined a collaboration platform called ConnectedSpaces which extends these basic capabilities towards enterprise use. Using the ConnectedSpaces model, here we categorize, illustrate, and analyze new types of feature interactions for collaboration platforms. Furthermore, we discuss handling feature interactions which are caused by using ConnectedSpaces as a communication endpoint with enterprise communication platforms. The work in this paper is novel as it is the first investigation into feature interactions with collaboration platforms. Our approach uses a runtime feature interaction technique which can cope with features provided by different organizations.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"24 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86830408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Sum-Rate of MIMO Interference Channel MIMO干扰信道和速率研究
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683827
Harpreet S. Dhillon, R. Buehrer
The problem of maximizing the sum-rate of a MIMO interference channel is investigated. Each receiver node is assumed to perform single user detection by treating interference from other users as Gaussian noise. It is assumed that all the users share a single frequency band and no pre-coding is performed over time. The sum-rate maximization in such a setup is a long-standing open problem due to its non-linear non-convex nature. The solution, to date, has only been approximated using the local optimization algorithms. In this paper, we couple the branch and bound strategy with the reformulation and linearization technique (BB/RLT) to develop a global optimization algorithm that finds a provably optimal solution. This problem is essentially an optimal power control problem over spatial channels and should not be confused with some recent developments such as Interference Alignment (IA) that typically require pre-coding over temporal, spectral or spatial dimensions. As a comparison with the state of the art, we compare the sum-rate achievable in the current system with the one predicted by IA and draw some interesting conclusions. It should be noted however, that even though the sum-rate achievable by IA can be predicted by assuming $N/2$ degrees of freedom in an $N$-user interference channel, the feasibility of IA over a limited number of signaling dimensions is an open problem.
研究了MIMO干扰信道的和速率最大化问题。假设每个接收节点通过将来自其他用户的干扰视为高斯噪声来执行单用户检测。假设所有用户共享一个频带,并且随着时间的推移没有进行预编码。由于其非线性非凸性质,在这种设置中求和速率最大化是一个长期开放的问题。到目前为止,该解决方案仅使用局部优化算法进行了近似。在本文中,我们将分支定界策略与重构和线性化技术(BB/RLT)结合起来,开发了一种寻找可证明的最优解的全局优化算法。这个问题本质上是空间信道上的最优功率控制问题,不应与一些最近的发展相混淆,例如干扰对准(IA),后者通常需要在时间、频谱或空间维度上进行预编码。作为与当前技术水平的比较,我们将当前系统中可实现的求和速率与IA预测的求和速率进行了比较,并得出了一些有趣的结论。然而,应该注意的是,即使通过假设$N$用户干扰信道中的$N/2$自由度可以预测IA实现的和速率,但是在有限数量的信令维度上IA的可行性是一个开放的问题。
{"title":"On the Sum-Rate of MIMO Interference Channel","authors":"Harpreet S. Dhillon, R. Buehrer","doi":"10.1109/GLOCOM.2010.5683827","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683827","url":null,"abstract":"The problem of maximizing the sum-rate of a MIMO interference channel is investigated. Each receiver node is assumed to perform single user detection by treating interference from other users as Gaussian noise. It is assumed that all the users share a single frequency band and no pre-coding is performed over time. The sum-rate maximization in such a setup is a long-standing open problem due to its non-linear non-convex nature. The solution, to date, has only been approximated using the local optimization algorithms. In this paper, we couple the branch and bound strategy with the reformulation and linearization technique (BB/RLT) to develop a global optimization algorithm that finds a provably optimal solution. This problem is essentially an optimal power control problem over spatial channels and should not be confused with some recent developments such as Interference Alignment (IA) that typically require pre-coding over temporal, spectral or spatial dimensions. As a comparison with the state of the art, we compare the sum-rate achievable in the current system with the one predicted by IA and draw some interesting conclusions. It should be noted however, that even though the sum-rate achievable by IA can be predicted by assuming $N/2$ degrees of freedom in an $N$-user interference channel, the feasibility of IA over a limited number of signaling dimensions is an open problem.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"3 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87108924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing 一种高效的云计算隐私保护发布-订阅服务方案
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683310
Yanping Xiao, Chuang Lin, Yixin Jiang, Xiaowen Chu, Fangqin Liu
Cloud computing provides a novel computing paradigm for enterprises to store programs and data in the Cloud in a transparent manner, which poses the challenge of security and privacy. In this paper, based on homomorphic cryptography and Zero-Knowledge Proof, we present a novel privacy-preserving scheme for Cloud publish/subscribe service, which achieve efficient privacy-preserving authentication, data integrity, and publish-subscribe confidentiality. The performance evaluation and security analysis demonstrate the practice and validity of the proposed scheme.
云计算为企业以透明的方式将程序和数据存储在云中提供了一种新的计算范式,这对安全性和隐私性提出了挑战。本文基于同态密码学和零知识证明,提出了一种新的云发布/订阅服务隐私保护方案,实现了高效的隐私保护认证、数据完整性和发布-订阅保密性。性能评估和安全性分析验证了该方案的实用性和有效性。
{"title":"An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing","authors":"Yanping Xiao, Chuang Lin, Yixin Jiang, Xiaowen Chu, Fangqin Liu","doi":"10.1109/GLOCOM.2010.5683310","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683310","url":null,"abstract":"Cloud computing provides a novel computing paradigm for enterprises to store programs and data in the Cloud in a transparent manner, which poses the challenge of security and privacy. In this paper, based on homomorphic cryptography and Zero-Knowledge Proof, we present a novel privacy-preserving scheme for Cloud publish/subscribe service, which achieve efficient privacy-preserving authentication, data integrity, and publish-subscribe confidentiality. The performance evaluation and security analysis demonstrate the practice and validity of the proposed scheme.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"2 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87519574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Iterative Beamforming and Power Control for MIMO Ad Hoc Networks MIMO Ad Hoc网络的迭代波束形成与功率控制
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683754
E. Zeydan, D. Kivanc-Tureli, U. Tureli
We present a distributed joint power control and transmit beamforming selection scheme for multiple antenna wireless ad hoc networks. Under the total network power minimization criterion, a joint iterative beamforming and power control algorithm is proposed to reduce mutual interference at each node. Total network transmit power is minimized while ensuring a constant received signal-to-interference and noise(SINR) at each receiver. First, transmit beamformers are selected from a predefined codebook to minimize the total power in a cooperative fashion. We also study the interference impaired network as a noncooperative beamforming game. By selecting transmit beamformers judiciously and performing power control, convergence of noncooperative beamformer games are guaranteed throughout the iterations. The noncooperative distributed algorithm is compared with centralized and cooperative solutions through simulation results.
提出了一种多天线无线自组网的分布式联合功率控制和发射波束成形选择方案。在全网功率最小准则下,提出了一种联合迭代波束形成和功率控制算法,以减少各节点的相互干扰。总网络发射功率最小化,同时确保每个接收器接收到的信号干扰和噪声(SINR)恒定。首先,从预定义的码本中选择发射波束形成器,以合作的方式使总功率最小。我们还将干扰干扰网络作为非合作波束形成博弈进行了研究。通过合理选择发射波束形成器并进行功率控制,保证了非合作波束形成博弈在整个迭代过程中的收敛性。通过仿真结果将非合作分布式算法与集中式和协作式算法进行了比较。
{"title":"Iterative Beamforming and Power Control for MIMO Ad Hoc Networks","authors":"E. Zeydan, D. Kivanc-Tureli, U. Tureli","doi":"10.1109/GLOCOM.2010.5683754","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683754","url":null,"abstract":"We present a distributed joint power control and transmit beamforming selection scheme for multiple antenna wireless ad hoc networks. Under the total network power minimization criterion, a joint iterative beamforming and power control algorithm is proposed to reduce mutual interference at each node. Total network transmit power is minimized while ensuring a constant received signal-to-interference and noise(SINR) at each receiver. First, transmit beamformers are selected from a predefined codebook to minimize the total power in a cooperative fashion. We also study the interference impaired network as a noncooperative beamforming game. By selecting transmit beamformers judiciously and performing power control, convergence of noncooperative beamformer games are guaranteed throughout the iterations. The noncooperative distributed algorithm is compared with centralized and cooperative solutions through simulation results.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87580941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analytical Modelling of IEEE 802.15.4 for Multi-Hop Networks with Heterogeneous Traffic and Hidden Terminals 面向异构流量和隐藏终端的多跳网络的IEEE 802.15.4分析建模
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683811
Piergiuseppe Di Marco, P. Park, C. Fischione, K. Johansson
IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Existing analysis of the IEEE 802.15.4 medium access control (MAC) protocol are often based on assumptions of homogeneous traffic and ideal carrier sensing, which are far from the reality when predicting performance for multi-hop networks. In this paper, a generalized analysis of the unslotted IEEE 802.15.4 MAC is presented. The model considers heterogeneous traffic and hidden terminals due to limited carrier sensing capabilities, and allows us to investigate jointly IEEE 802.15.4 MAC and routing algorithms. The analysis is validated via Monte Carlo simulations, which show that routing over multi-hop networks is significantly influenced by the IEEE 802.15.4 MAC performance. Routing decisions based on packet loss probability may lead to an unbalanced distribution of the traffic load across paths, thus motivating the need of a joint optimization of routing and MAC.
IEEE 802.15.4多跳无线网络是许多应用的重要通信基础设施,包括工业控制、家庭自动化和智能电网。现有的IEEE 802.15.4介质访问控制(MAC)协议分析往往基于均匀流量和理想载波感知的假设,在预测多跳网络性能时与现实相去甚远。本文对IEEE 802.15.4无槽MAC进行了广义分析。该模型考虑了由于载波感知能力有限而导致的异构流量和隐藏终端,并允许我们联合研究IEEE 802.15.4 MAC和路由算法。通过蒙特卡罗仿真验证了分析结果,结果表明IEEE 802.15.4 MAC性能对多跳网络上的路由有显著影响。基于丢包概率的路由决策可能导致流量负载在路径上的不平衡分布,因此需要对路由和MAC进行联合优化。
{"title":"Analytical Modelling of IEEE 802.15.4 for Multi-Hop Networks with Heterogeneous Traffic and Hidden Terminals","authors":"Piergiuseppe Di Marco, P. Park, C. Fischione, K. Johansson","doi":"10.1109/GLOCOM.2010.5683811","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683811","url":null,"abstract":"IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Existing analysis of the IEEE 802.15.4 medium access control (MAC) protocol are often based on assumptions of homogeneous traffic and ideal carrier sensing, which are far from the reality when predicting performance for multi-hop networks. In this paper, a generalized analysis of the unslotted IEEE 802.15.4 MAC is presented. The model considers heterogeneous traffic and hidden terminals due to limited carrier sensing capabilities, and allows us to investigate jointly IEEE 802.15.4 MAC and routing algorithms. The analysis is validated via Monte Carlo simulations, which show that routing over multi-hop networks is significantly influenced by the IEEE 802.15.4 MAC performance. Routing decisions based on packet loss probability may lead to an unbalanced distribution of the traffic load across paths, thus motivating the need of a joint optimization of routing and MAC.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"105 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88035379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity 带m天线窃听器的无线信道:中断概率和中断保密能力的表征
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683623
Vinay Uday Prabhu, M. Rodrigues
In this paper, we consider secure communications between a single antenna transmitter and a single antenna receiver in the presence of a multiple antenna eavesdropper employing MRC or SDC reception. We show that an M-antenna eavesdropper performing SDC reception has precisely the same degrading effect on secrecy as M single antenna eavesdroppers under independent fading conditions. We also show that an M-antenna eavesdropper performing MRC reception causes greater secrecy degradation than an M-antenna eavesdropper performing SDC reception or M single antenna eavesdroppers. We also derive closed-form expressions for the asymptotic high SNR outage secrecy capacity for both the MRC and the SDC eavesdropper cases. Various numerical results are presented that corroborate the analysis.
在本文中,我们考虑在采用MRC或SDC接收的多天线窃听器存在的情况下,单天线发射器和单天线接收器之间的安全通信。研究表明,在独立衰落条件下,M天线窃听器进行SDC接收与M单天线窃听器对保密性的降低效果完全相同。我们还表明,执行MRC接收的M-天线窃听器比执行SDC接收的M-天线窃听器或M单天线窃听器造成更大的保密退化。我们还推导了MRC和SDC窃听器情况下渐近高信噪比中断保密能力的封闭表达式。给出了各种数值结果,证实了分析的正确性。
{"title":"On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity","authors":"Vinay Uday Prabhu, M. Rodrigues","doi":"10.1109/GLOCOM.2010.5683623","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683623","url":null,"abstract":"In this paper, we consider secure communications between a single antenna transmitter and a single antenna receiver in the presence of a multiple antenna eavesdropper employing MRC or SDC reception. We show that an M-antenna eavesdropper performing SDC reception has precisely the same degrading effect on secrecy as M single antenna eavesdroppers under independent fading conditions. We also show that an M-antenna eavesdropper performing MRC reception causes greater secrecy degradation than an M-antenna eavesdropper performing SDC reception or M single antenna eavesdroppers. We also derive closed-form expressions for the asymptotic high SNR outage secrecy capacity for both the MRC and the SDC eavesdropper cases. Various numerical results are presented that corroborate the analysis.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"46 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88069506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Evaluation of Anomaly Detection Based on Sketch and PCA 基于草图和主成分分析的异常检测评价
Pub Date : 2010-12-01 DOI: 10.1109/GLOCOM.2010.5683878
Yoshiki Kanda, K. Fukuda, T. Sugawara
Using traffic random projections (sketches) and Principal Component Analysis (PCA) for Internet traffic anomaly detection has become popular topics in the anomaly detection fields, but few studies have been undertaken on the subjective and quantitative comparison of multiple methods using the data traces open to the community. In this paper, we propose a new method that combines sketches and PCA to detect and identify the source IP addresses associated with the traffic anomalies in the backbone traces measured at a single link. We compare the results with those of a method incorporating sketches and multi-resolution gamma modeling using the trans-Pacific link traces. The comparison indicates that each method has its own advantages and disadvantages. Our method is good at detecting worm activities with many packets, whereas the gamma method is good at detecting scan activities for peer hosts with only a few packets, but it reports many false positives for traces of worm outbreaks. Therefore, their use in combination would be effective. We also examined the impact of adaptive decision making on a parameter (the number of normal subspaces in PCA) on the basis of the cumulative proportion of each sketched traffic and conclude that it performs at a higher level than the previous method deciding only on one specific value of the parameter for every divided traffics.
利用流量随机投影(素描)和主成分分析(PCA)进行互联网流量异常检测已成为异常检测领域的热门话题,但利用公开的数据轨迹对多种方法进行主观和定量比较的研究很少。在本文中,我们提出了一种结合草图和PCA的新方法来检测和识别与单链路主干网中流量异常相关的源IP地址。我们将结果与使用跨太平洋链路迹线的结合草图和多分辨率伽马建模的方法进行了比较。比较表明,每种方法都有自己的优点和缺点。我们的方法擅长检测具有许多数据包的蠕虫活动,而gamma方法擅长检测具有少量数据包的对等主机的扫描活动,但它报告了许多蠕虫爆发痕迹的误报。因此,它们的组合使用将是有效的。我们还研究了自适应决策对参数(PCA中正常子空间的数量)的影响,该影响基于每个草图流量的累积比例,并得出结论,它比以前的方法执行更高的水平,仅决定每个划分流量的参数的一个特定值。
{"title":"Evaluation of Anomaly Detection Based on Sketch and PCA","authors":"Yoshiki Kanda, K. Fukuda, T. Sugawara","doi":"10.1109/GLOCOM.2010.5683878","DOIUrl":"https://doi.org/10.1109/GLOCOM.2010.5683878","url":null,"abstract":"Using traffic random projections (sketches) and Principal Component Analysis (PCA) for Internet traffic anomaly detection has become popular topics in the anomaly detection fields, but few studies have been undertaken on the subjective and quantitative comparison of multiple methods using the data traces open to the community. In this paper, we propose a new method that combines sketches and PCA to detect and identify the source IP addresses associated with the traffic anomalies in the backbone traces measured at a single link. We compare the results with those of a method incorporating sketches and multi-resolution gamma modeling using the trans-Pacific link traces. The comparison indicates that each method has its own advantages and disadvantages. Our method is good at detecting worm activities with many packets, whereas the gamma method is good at detecting scan activities for peer hosts with only a few packets, but it reports many false positives for traces of worm outbreaks. Therefore, their use in combination would be effective. We also examined the impact of adaptive decision making on a parameter (the number of normal subspaces in PCA) on the basis of the cumulative proportion of each sketched traffic and conclude that it performs at a higher level than the previous method deciding only on one specific value of the parameter for every divided traffics.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"40 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88420917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1