首页 > 最新文献

2015 IEEE International Conference on Communication Workshop (ICCW)最新文献

英文 中文
Simplicial homology based energy saving algorithms for wireless networks 基于简单同调的无线网络节能算法
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247173
N. Le, P. Martins, L. Decreusefond, A. Vergne
Energy saving is one of the most investigated problems in wireless networks. In this paper, we introduce two homology based algorithms: a simulated annealing one and a robust one. These algorithms optimize the energy consumption at network level while maintaining the maximal coverage. By using simplicial homology, the complex geometrical calculation of the coverage is reduced to simple matrix computation. The simulated annealing algorithm gives a solution that approaches the global optimal one. The robust algorithm gives a local optimal solution. Our simulations show that this local optimal solution also approaches the global optimal one. Our algorithms can save at most 65% of system's maximal consumption power in polynomial time. The probability density function of the optimized radii of cells is also analyzed and discussed.
无线网络的节能问题一直是人们研究的热点问题之一。本文介绍了两种基于同调的算法:模拟退火算法和鲁棒算法。这些算法在保持最大覆盖范围的同时,优化了网络级的能耗。利用简单同调,将复盖面积的复杂几何计算简化为简单的矩阵计算。模拟退火算法给出的解接近全局最优解。鲁棒算法给出了一个局部最优解。仿真结果表明,该局部最优解也接近全局最优解。我们的算法在多项式时间内最多可以节省系统最大消耗功率的65%。并对优化单元半径的概率密度函数进行了分析和讨论。
{"title":"Simplicial homology based energy saving algorithms for wireless networks","authors":"N. Le, P. Martins, L. Decreusefond, A. Vergne","doi":"10.1109/ICCW.2015.7247173","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247173","url":null,"abstract":"Energy saving is one of the most investigated problems in wireless networks. In this paper, we introduce two homology based algorithms: a simulated annealing one and a robust one. These algorithms optimize the energy consumption at network level while maintaining the maximal coverage. By using simplicial homology, the complex geometrical calculation of the coverage is reduced to simple matrix computation. The simulated annealing algorithm gives a solution that approaches the global optimal one. The robust algorithm gives a local optimal solution. Our simulations show that this local optimal solution also approaches the global optimal one. Our algorithms can save at most 65% of system's maximal consumption power in polynomial time. The probability density function of the optimized radii of cells is also analyzed and discussed.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"1 1","pages":"166-172"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89364998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Recognition of Human daily activities 人类日常活动的识别
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247193
Krasimir Tonchev, Strahil Sokolov, Yuliyan Velchev, Georgi R. Balabanov, V. Poulkov
Capturing the type of physical activity a person is performing thorough his daily life, can inspire the development of new and innovative applications. Examples include monitoring patients' health and physical activity performance, reasoning upon the observed activity to recommend better training strategy, new therapeutic programs, etc. In this work we propose an algorithm for Human Activity Recognition based on the application of a geometrically motivated feature selection method. We test the algorithm on a standard data set and validate its performance by comparing it with the existing results of other known algorithms.
捕捉一个人在日常生活中进行的身体活动类型,可以激发新的创新应用的发展。例如,监测患者的健康状况和身体活动表现,根据观察到的活动进行推理,以推荐更好的训练策略,新的治疗方案等。在这项工作中,我们提出了一种基于几何动机特征选择方法的人类活动识别算法。我们在标准数据集上测试了该算法,并通过将其与其他已知算法的现有结果进行比较来验证其性能。
{"title":"Recognition of Human daily activities","authors":"Krasimir Tonchev, Strahil Sokolov, Yuliyan Velchev, Georgi R. Balabanov, V. Poulkov","doi":"10.1109/ICCW.2015.7247193","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247193","url":null,"abstract":"Capturing the type of physical activity a person is performing thorough his daily life, can inspire the development of new and innovative applications. Examples include monitoring patients' health and physical activity performance, reasoning upon the observed activity to recommend better training strategy, new therapeutic programs, etc. In this work we propose an algorithm for Human Activity Recognition based on the application of a geometrically motivated feature selection method. We test the algorithm on a standard data set and validate its performance by comparing it with the existing results of other known algorithms.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"34 1","pages":"290-293"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87353919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Millimeter wave channel model and system design considerations 毫米波信道模型及系统设计注意事项
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247343
Q. Li, H. Shirani-Mehr, Tommaso Balercia, Huaning Niu, A. Papathanassiou, Geng Wu
In order to exploit millimeter wave (mmWave) bands for 5G communications, challenges mainly due to blockage and strong dependency on beamforming operation need to be overcome. In this work, we address some of the fundamental issues related to the use of mmWave bands for 5G communications, from propagation channel characteristics and modeling to the implications on system and network architecture design. A statistical mmWave channel model considering cluster-level spatial/temporal correlation is proposed. System-level simulation results based on the proposed model demonstrate the channel characteristics and system performance. Following that, key techniques in enabling mmWave system operation are discussed. Although we believe that mmWave bands can be utilized in 5G networks, significant efforts and time are needed in order to complete the air interface, device and network design which is shown to be quite different from the existing cellular design.
为了将毫米波(mmWave)频段用于5G通信,需要克服主要由阻塞和对波束形成操作的强烈依赖引起的挑战。在这项工作中,我们解决了与在5G通信中使用毫米波频段相关的一些基本问题,从传播信道特性和建模到对系统和网络架构设计的影响。提出了一种考虑簇级时空相关的毫米波信道统计模型。基于该模型的系统级仿真结果验证了信道特性和系统性能。然后,讨论了使毫米波系统运行的关键技术。虽然我们相信毫米波频段可以用于5G网络,但要完成空中接口、设备和网络设计,需要付出巨大的努力和时间,这与现有的蜂窝设计有很大不同。
{"title":"Millimeter wave channel model and system design considerations","authors":"Q. Li, H. Shirani-Mehr, Tommaso Balercia, Huaning Niu, A. Papathanassiou, Geng Wu","doi":"10.1109/ICCW.2015.7247343","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247343","url":null,"abstract":"In order to exploit millimeter wave (mmWave) bands for 5G communications, challenges mainly due to blockage and strong dependency on beamforming operation need to be overcome. In this work, we address some of the fundamental issues related to the use of mmWave bands for 5G communications, from propagation channel characteristics and modeling to the implications on system and network architecture design. A statistical mmWave channel model considering cluster-level spatial/temporal correlation is proposed. System-level simulation results based on the proposed model demonstrate the channel characteristics and system performance. Following that, key techniques in enabling mmWave system operation are discussed. Although we believe that mmWave bands can be utilized in 5G networks, significant efforts and time are needed in order to complete the air interface, device and network design which is shown to be quite different from the existing cellular design.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"9 1","pages":"1214-1219"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88350985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure and fast missing RFID tags identification with lightweight MAC and rateless coding 安全,快速丢失RFID标签识别轻量MAC和无速率编码
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247580
Kentaroh Toyoda, I. Sasase
The realtime identification of missing items, e.g., valuables or confidential documents in shops and warehouses, is one of the most important system. Although many RFID-based schemes that quickly identify missing tag-attached items are proposed, most of the schemes overlooks the possibility of the internal crime. If a person controls an untrusted reader, he/she can freely forge responses from tags and steal items without being detected. In this paper, we propose a secure and fast missing tags identification against both the internal and external attackers. Our scheme first identifies tags stolen by an external attacker with a channel estimation based scheme. Then, our scheme lets tags send cryptographically generated responses, which are socalled MAC (Message Authentication Code), and verifies them to identify stolen tags by an internal attacker. In order to shorten the time to collect responses, our scheme lets multiple tags transmit responses simultaneously and decodes them by leveraging the estimated channels. By the security analysis and the computer simulation, we show the effectiveness of our scheme.
商店和仓库中的贵重物品或机密文件等丢失物品的实时识别是最重要的系统之一。虽然提出了许多基于rfid的方案来快速识别丢失的标签物品,但大多数方案都忽略了内部犯罪的可能性。如果一个人控制了一个不受信任的阅读器,他/她可以自由地伪造标签的响应,并在不被发现的情况下窃取物品。在本文中,我们提出了一种安全、快速的缺失标签识别方法,以对抗内部和外部攻击者。我们的方案首先使用基于信道估计的方案识别被外部攻击者窃取的标签。然后,我们的方案允许标签发送加密生成的响应,即所谓的MAC(消息认证码),并验证它们以识别被内部攻击者窃取的标签。为了缩短收集响应的时间,我们的方案允许多个标签同时传输响应,并利用估计的信道对它们进行解码。通过安全性分析和计算机仿真,验证了该方案的有效性。
{"title":"Secure and fast missing RFID tags identification with lightweight MAC and rateless coding","authors":"Kentaroh Toyoda, I. Sasase","doi":"10.1109/ICCW.2015.7247580","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247580","url":null,"abstract":"The realtime identification of missing items, e.g., valuables or confidential documents in shops and warehouses, is one of the most important system. Although many RFID-based schemes that quickly identify missing tag-attached items are proposed, most of the schemes overlooks the possibility of the internal crime. If a person controls an untrusted reader, he/she can freely forge responses from tags and steal items without being detected. In this paper, we propose a secure and fast missing tags identification against both the internal and external attackers. Our scheme first identifies tags stolen by an external attacker with a channel estimation based scheme. Then, our scheme lets tags send cryptographically generated responses, which are socalled MAC (Message Authentication Code), and verifies them to identify stolen tags by an internal attacker. In order to shorten the time to collect responses, our scheme lets multiple tags transmit responses simultaneously and decodes them by leveraging the estimated channels. By the security analysis and the computer simulation, we show the effectiveness of our scheme.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"53 1","pages":"2659-2664"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86598702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intra-slot Interference Cancellation for collision resolution in Irregular Repetition Slotted ALOHA 不规则重复槽ALOHA中碰撞分辨率的槽内干扰消除
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247486
Giovanni Interdonato, S. Pfletschinger, F. V. Gallego, J. Alonso-Zarate, G. Araniti
ALOHA-type protocols became a popular solution for distributed and uncoordinated multiple random access in wireless networks. However, such distributed operation of the Medium Access Control (MAC) layer leads to sub-optimal utilization of the shared channel. One of the reasons is the occurrence of collisions when more than one packet is transmitted at the same time. These packets cannot be decoded and retransmissions are necessary. However, it has been recently shown that it is possible to apply signal processing techniques with these collided packets so that useful information can be decoded. This was recently proposed in the Irregular Repetition Slotted ALOHA (IRSA), achieving a throughput T ≃ 0.97 for very large MAC frame lengths as long as the number of active users is smaller than the number of slots per frame. In this paper, we extend the operation of IRSA with i) an iterative physical layer decoding processing that exploits the capture effect and ii) a Successive Interference Cancellation (SIC) processing at the slot-level, named intra-slot SIC, to decode more than one colliding packet per slot. We evaluate the performance of the proposed scheme, referred to as Extended IRSA (E-IRSA), in terms of throughput and channel capacity. Computer-based simulation results show that E-IRSA protocol allows to reach the maximum theoretical achievable throughput even in scenarios where the number of active users is higher than the number of slots per frame. Results also show that E-IRSA protocol significantly improves the performance even for small MAC frame lengths used in practical scenarios.
aloha协议已成为无线网络中分布式、非协调多随机接入的一种流行解决方案。然而,这种介质访问控制(MAC)层的分布式操作导致了共享信道的次优利用率。其中一个原因是,当多个数据包同时传输时,会发生冲突。这些数据包无法解码,需要重新传输。然而,最近的研究表明,有可能对这些碰撞包应用信号处理技术,以便对有用的信息进行解码。这是最近在不规则重复槽ALOHA (IRSA)中提出的,只要活跃用户的数量小于每帧的槽数,在非常大的MAC帧长度下实现吞吐量T≃0.97。在本文中,我们扩展了IRSA的操作,i)利用捕获效应的迭代物理层解码处理和ii)在插槽级别的连续干扰消除(SIC)处理,称为插槽内SIC,每个插槽解码多个碰撞数据包。我们在吞吐量和信道容量方面评估了拟议方案的性能,称为扩展IRSA (E-IRSA)。基于计算机的仿真结果表明,即使在活动用户数量大于每帧插槽数量的情况下,E-IRSA协议也可以达到理论可实现的最大吞吐量。结果还表明,即使在实际场景中使用的MAC帧长度很小的情况下,E-IRSA协议也能显著提高性能。
{"title":"Intra-slot Interference Cancellation for collision resolution in Irregular Repetition Slotted ALOHA","authors":"Giovanni Interdonato, S. Pfletschinger, F. V. Gallego, J. Alonso-Zarate, G. Araniti","doi":"10.1109/ICCW.2015.7247486","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247486","url":null,"abstract":"ALOHA-type protocols became a popular solution for distributed and uncoordinated multiple random access in wireless networks. However, such distributed operation of the Medium Access Control (MAC) layer leads to sub-optimal utilization of the shared channel. One of the reasons is the occurrence of collisions when more than one packet is transmitted at the same time. These packets cannot be decoded and retransmissions are necessary. However, it has been recently shown that it is possible to apply signal processing techniques with these collided packets so that useful information can be decoded. This was recently proposed in the Irregular Repetition Slotted ALOHA (IRSA), achieving a throughput T ≃ 0.97 for very large MAC frame lengths as long as the number of active users is smaller than the number of slots per frame. In this paper, we extend the operation of IRSA with i) an iterative physical layer decoding processing that exploits the capture effect and ii) a Successive Interference Cancellation (SIC) processing at the slot-level, named intra-slot SIC, to decode more than one colliding packet per slot. We evaluate the performance of the proposed scheme, referred to as Extended IRSA (E-IRSA), in terms of throughput and channel capacity. Computer-based simulation results show that E-IRSA protocol allows to reach the maximum theoretical achievable throughput even in scenarios where the number of active users is higher than the number of slots per frame. Results also show that E-IRSA protocol significantly improves the performance even for small MAC frame lengths used in practical scenarios.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"62 1","pages":"2069-2074"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86772480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Experimental proof-of-concept of optical spatial modulation OFDM using micro LEDs 使用微型led的光学空间调制OFDM的实验概念验证
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247364
M. Ijaz, D. Tsonev, J. McKendry, E. Xie, S. Rajbhandari, H. Chun, G. Faulkner, E. Gu, M. Dawson, D. O’brien, H. Haas
This paper investigates experimentally the performance of optical spatial modulation (OSM) with orthogonal frequency division multiplexing (OFDM) in a multiple-input and multiple-output (MIMO) based visible light communication (VLC) system. Gallium nitride based micro light emitting diodes (μLEDs) are considered as a transmitter unit. A two transmitter and two optical receiver based MIMO setup is used. The performance of OSM-OFDM system is experimentally analysed by varying the semi-angle at half power, θ½ of the μLEDs. The optical cross-talk in the MIMO channel is quantified and its effect on the achievable data rate and bit error rate (BER) performance is analysed. The experimental results show that OSM-OFDM achieves higher data rates than single-input and single-output (SISO)-OFDM for all the ranges of θ½ of the μLEDs under study. However, the BER performance of OSM-OFDM is worse than in the case of SISO-OFDM. The maximum achievable data rate in OSM-OFDM is 1.34 Gb/s and 1.17 Gb/s in SISO-OFDM for θ½ of 2.27° at a link distance of 1 m using adaptive data loading. The experimental results also show that due to the strongly correlated channels, the system performance is highly dependent on the θ½ of the μLEDs.
实验研究了正交频分复用(OFDM)光空间调制(OSM)在多输入多输出(MIMO)可见光通信(VLC)系统中的性能。基于氮化镓的微发光二极管(μ led)被认为是一个发射单元。采用了基于MIMO的双发射器和双光接收器设置。通过改变μ led在半功率θ 1 / 2时的半角,实验分析了OSM-OFDM系统的性能。对MIMO信道中的光串扰进行了量化,分析了其对可实现数据率和误码率(BER)性能的影响。实验结果表明,在所研究的μ led的所有θ½范围内,OSM-OFDM都比单输入单输出(SISO)-OFDM具有更高的数据速率。但是,OSM-OFDM的误码率性能比sso - ofdm差。采用自适应数据加载,在链路距离为1 m时,OSM-OFDM的最大可实现数据速率为1.34 Gb/s, SISO-OFDM的最大可实现数据速率为1.17 Gb/s, θ½为2.27°。实验结果还表明,由于存在强相关通道,系统性能高度依赖于μ led的θ½。
{"title":"Experimental proof-of-concept of optical spatial modulation OFDM using micro LEDs","authors":"M. Ijaz, D. Tsonev, J. McKendry, E. Xie, S. Rajbhandari, H. Chun, G. Faulkner, E. Gu, M. Dawson, D. O’brien, H. Haas","doi":"10.1109/ICCW.2015.7247364","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247364","url":null,"abstract":"This paper investigates experimentally the performance of optical spatial modulation (OSM) with orthogonal frequency division multiplexing (OFDM) in a multiple-input and multiple-output (MIMO) based visible light communication (VLC) system. Gallium nitride based micro light emitting diodes (μLEDs) are considered as a transmitter unit. A two transmitter and two optical receiver based MIMO setup is used. The performance of OSM-OFDM system is experimentally analysed by varying the semi-angle at half power, θ½ of the μLEDs. The optical cross-talk in the MIMO channel is quantified and its effect on the achievable data rate and bit error rate (BER) performance is analysed. The experimental results show that OSM-OFDM achieves higher data rates than single-input and single-output (SISO)-OFDM for all the ranges of θ½ of the μLEDs under study. However, the BER performance of OSM-OFDM is worse than in the case of SISO-OFDM. The maximum achievable data rate in OSM-OFDM is 1.34 Gb/s and 1.17 Gb/s in SISO-OFDM for θ½ of 2.27° at a link distance of 1 m using adaptive data loading. The experimental results also show that due to the strongly correlated channels, the system performance is highly dependent on the θ½ of the μLEDs.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"31 1","pages":"1338-1343"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86990300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Large-scale analysis of linear massive MIMO Precoders in the Presence of Phase Noise 存在相位噪声的线性海量MIMO预编码器的大规模分析
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247336
R. Krishnan, M. Khanzadi, N. Krishnan, Yongpeng Wu, A. G. Amat, T. Eriksson, R. Schober
We study the impact of phase noise on the downlink performance of a multi-user multiple-input multiple-output system, where the base station (BS) employs a large number of transmit antennas M. We consider a setup where the BS employs Mosc free-running oscillators, and M/Mosc antennas are connected to each oscillator. For this configuration, we analyze the impact of phase noise on the performance of regularized zero-forcing (RZF) precoding, when M and the number of users K are asymptotically large, while the ratio M/K = β is fixed. We analytically show that the impact of phase noise on the signal-to-interference-plus-noise ratio (SINR) can be quantified as an effective reduction in the quality of the channel state information available at the BS when compared to a system without phase noise. As a consequence, we observe that as Mosc increases, the SINR of the RZF precoder degrades as the interference power increases, and the desired signal power decreases. On the other hand, the variance of the random phase variations caused by the BS oscillators reduces with increasing Mosc. Through simulations, we verify our analytical results, and study the performance of the RZF precoder for different phase noise and channel noise variances.
我们研究了相位噪声对多用户多输入多输出系统下行链路性能的影响,其中基站(BS)采用大量发射天线M.我们考虑了一种设置,其中BS采用Mosc自由运行振荡器,M/Mosc天线连接到每个振荡器。对于这种配置,我们分析了当M和用户数量K渐近较大,而比值M/K = β固定时,相位噪声对正则化强制零(RZF)预编码性能的影响。我们分析表明,与没有相位噪声的系统相比,相位噪声对信噪比(SINR)的影响可以量化为在BS处可用的信道状态信息质量的有效降低。因此,我们观察到,随着Mosc的增加,RZF预编码器的SINR随着干扰功率的增加而降低,期望的信号功率降低。另一方面,BS振荡器引起的随机相位变化的方差随着Mosc的增加而减小。通过仿真验证了我们的分析结果,并研究了RZF预编码器在不同相位噪声和信道噪声方差下的性能。
{"title":"Large-scale analysis of linear massive MIMO Precoders in the Presence of Phase Noise","authors":"R. Krishnan, M. Khanzadi, N. Krishnan, Yongpeng Wu, A. G. Amat, T. Eriksson, R. Schober","doi":"10.1109/ICCW.2015.7247336","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247336","url":null,"abstract":"We study the impact of phase noise on the downlink performance of a multi-user multiple-input multiple-output system, where the base station (BS) employs a large number of transmit antennas M. We consider a setup where the BS employs Mosc free-running oscillators, and M/Mosc antennas are connected to each oscillator. For this configuration, we analyze the impact of phase noise on the performance of regularized zero-forcing (RZF) precoding, when M and the number of users K are asymptotically large, while the ratio M/K = β is fixed. We analytically show that the impact of phase noise on the signal-to-interference-plus-noise ratio (SINR) can be quantified as an effective reduction in the quality of the channel state information available at the BS when compared to a system without phase noise. As a consequence, we observe that as Mosc increases, the SINR of the RZF precoder degrades as the interference power increases, and the desired signal power decreases. On the other hand, the variance of the random phase variations caused by the BS oscillators reduces with increasing Mosc. Through simulations, we verify our analytical results, and study the performance of the RZF precoder for different phase noise and channel noise variances.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"40 1","pages":"1172-1177"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86848866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Proxy-based end-to-end key establishment protocol for the Internet of Things 基于代理的物联网端到端密钥建立协议
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247583
P. Porambage, An Braeken, Pardeep Kumar, A. Gurtov, M. Ylianttila
The Internet of Things (IoT) drives the world towards an always connected paradigm by interconnecting wide ranges of network devices irrespective of their resource capabilities and local networks. This would inevitably enhance the requirements of constructing dynamic and secure end-to-end (E2E)connections among the heterogenous network devices with imbalanced resource profiles and less or no previous knowledge about each other. The device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. We propose a proxy-based key establishment protocol for the IoT, which enables any two unknown high resource constrained devices to initiate secure E2E communication. The high constrained devices should be legitimate and maintain secured connections with the neighbouring less constrained devices in the local networks, in which they are deployed. The less constrained devices are performing as the proxies and collaboratively advocate the expensive cryptographic operations during the session key computation. Finally, we demonstrate the applicability of our solution in constrained IoT devices by providing performance and security analysis.
物联网(IoT)通过连接各种网络设备,无论其资源能力和本地网络如何,都将世界推向始终连接的范式。这将不可避免地提高在异构网络设备之间构建动态和安全的端到端(E2E)连接的需求,这些设备具有不平衡的资源配置,并且彼此之前的了解很少或没有。设备约束和动态链接创建使得在物联网中的每个安全端到端通信场景中使用预共享密钥具有挑战性。我们提出了一种基于代理的物联网密钥建立协议,该协议允许任意两个未知的高资源约束设备启动安全的端到端通信。高约束的设备应该是合法的,并且在部署它们的本地网络中与邻近的低约束设备保持安全连接。约束较少的设备作为代理执行,并在会话密钥计算期间协同倡导昂贵的加密操作。最后,我们通过提供性能和安全分析来证明我们的解决方案在受限物联网设备中的适用性。
{"title":"Proxy-based end-to-end key establishment protocol for the Internet of Things","authors":"P. Porambage, An Braeken, Pardeep Kumar, A. Gurtov, M. Ylianttila","doi":"10.1109/ICCW.2015.7247583","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247583","url":null,"abstract":"The Internet of Things (IoT) drives the world towards an always connected paradigm by interconnecting wide ranges of network devices irrespective of their resource capabilities and local networks. This would inevitably enhance the requirements of constructing dynamic and secure end-to-end (E2E)connections among the heterogenous network devices with imbalanced resource profiles and less or no previous knowledge about each other. The device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. We propose a proxy-based key establishment protocol for the IoT, which enables any two unknown high resource constrained devices to initiate secure E2E communication. The high constrained devices should be legitimate and maintain secured connections with the neighbouring less constrained devices in the local networks, in which they are deployed. The less constrained devices are performing as the proxies and collaboratively advocate the expensive cryptographic operations during the session key computation. Finally, we demonstrate the applicability of our solution in constrained IoT devices by providing performance and security analysis.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"243 1","pages":"2677-2682"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87045272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Extending LTE to unlicensed band - Merit and coexistence 将LTE扩展到非授权频段-优点和共存
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247531
A. Sadek, T. Kadous, Kai Tang, Heechoon Lee, M. Fan
Innovations enabling efficient spectrum utilization is a key element to optimize user experience with growing data demand. This paper discusses the approach of extending enhancements in cellular technology like LTE to unlicensed band for higher spectral efficiency and better user experience. A key challenge for such extension is the coexistence with legacy technology such as Wi-Fi. The description herein highlights techniques for effective coexistence. The results include evaluation and lab data that demonstrate how the technology provide benefit to surrounding Wi-Fi deployment and contribute towards enhancing spectral efficiency of the unlicensed band.
在不断增长的数据需求下,实现高效频谱利用的创新是优化用户体验的关键因素。本文讨论了将蜂窝技术(如LTE)的增强功能扩展到非授权频段的方法,以获得更高的频谱效率和更好的用户体验。这种扩展的一个关键挑战是与Wi-Fi等传统技术共存。本文的描述重点介绍了有效共存的技术。结果包括评估和实验室数据,这些数据展示了该技术如何为周围的Wi-Fi部署带来好处,并有助于提高未授权频段的频谱效率。
{"title":"Extending LTE to unlicensed band - Merit and coexistence","authors":"A. Sadek, T. Kadous, Kai Tang, Heechoon Lee, M. Fan","doi":"10.1109/ICCW.2015.7247531","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247531","url":null,"abstract":"Innovations enabling efficient spectrum utilization is a key element to optimize user experience with growing data demand. This paper discusses the approach of extending enhancements in cellular technology like LTE to unlicensed band for higher spectral efficiency and better user experience. A key challenge for such extension is the coexistence with legacy technology such as Wi-Fi. The description herein highlights techniques for effective coexistence. The results include evaluation and lab data that demonstrate how the technology provide benefit to surrounding Wi-Fi deployment and contribute towards enhancing spectral efficiency of the unlicensed band.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"1 1","pages":"2344-2349"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86508753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Efficient and secure data forwarding for erasure-code-based cloud storage 基于擦除码的云存储高效、安全的数据转发
Pub Date : 2015-06-08 DOI: 10.1109/ICCW.2015.7247445
Jian Liu, Kun Huang, Hong Rong, Huimei Wang, Ming Xian
Cloud computing is a promising computing paradigm which has drawn extensive attention from both academia and industry. Since that the cloud is very likely to be outside of the trust domain of the users, serious concerns over the confidentiality of the outsourced data are arising. Traditional encryption methods guarantee data confidentiality, but also limit the functionality of the cloud storage as few operations are supported over encrypted data. The main technique contribution of this paper is that we present an efficient data forwarding scheme for the erasure-coded and encrypted cloud, which enforces the cloud not only provide data reliability and confidentiality, but also support the functionality that the encrypted data can be forwarded to another user without being retrieved back. Specifically, we design an all-or-nothing transform based encryption and a variant of ElGamal-based proxy re-encryption algorithms, blending them with the Reed-Solomon erasure code, our scheme is quite more efficient compared with previous studies and only needs to update partial data blocks instead of the whole file for data forwarding. In addition, our scheme also satisfies another practical property that the original data owner can no longer decrypt or forward the re-encrypted data again to other users after a complete data forwarding, which is termed to be “original inaccessibility” in our study. Analysis shows that our scheme is secure and satisfactory. Finally we theoretically and experimentally evaluate the performance of our scheme and the results indicate that our scheme is efficient in the procedure of file dispersal, forward and retrieval.
云计算是一种很有前途的计算范式,已经引起了学术界和工业界的广泛关注。由于云很可能在用户的信任域之外,因此对外包数据的保密性产生了严重的担忧。传统的加密方法保证了数据的机密性,但也限制了云存储的功能,因为在加密数据上支持的操作很少。本文的主要技术贡献在于,我们提出了一种有效的数据转发方案,用于擦除编码和加密云,该方案使云不仅提供数据的可靠性和机密性,而且还支持加密数据可以转发给另一个用户而不被检索回来的功能。具体来说,我们设计了一种基于全有或全无变换的加密算法和一种基于elgamal的代理重加密算法的变体,并将它们与Reed-Solomon擦除码混合在一起,我们的方案比以前的研究更高效,只需要更新部分数据块而不是整个文件进行数据转发。此外,我们的方案还满足了另一个实用属性,即在数据转发完成后,原始数据所有者无法再对重新加密的数据进行解密或再次转发给其他用户,在我们的研究中称为“原始不可访问性”。分析表明,该方案是安全的、令人满意的。最后对该方案进行了理论和实验评价,结果表明该方案在文件分散、转发和检索过程中是有效的。
{"title":"Efficient and secure data forwarding for erasure-code-based cloud storage","authors":"Jian Liu, Kun Huang, Hong Rong, Huimei Wang, Ming Xian","doi":"10.1109/ICCW.2015.7247445","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247445","url":null,"abstract":"Cloud computing is a promising computing paradigm which has drawn extensive attention from both academia and industry. Since that the cloud is very likely to be outside of the trust domain of the users, serious concerns over the confidentiality of the outsourced data are arising. Traditional encryption methods guarantee data confidentiality, but also limit the functionality of the cloud storage as few operations are supported over encrypted data. The main technique contribution of this paper is that we present an efficient data forwarding scheme for the erasure-coded and encrypted cloud, which enforces the cloud not only provide data reliability and confidentiality, but also support the functionality that the encrypted data can be forwarded to another user without being retrieved back. Specifically, we design an all-or-nothing transform based encryption and a variant of ElGamal-based proxy re-encryption algorithms, blending them with the Reed-Solomon erasure code, our scheme is quite more efficient compared with previous studies and only needs to update partial data blocks instead of the whole file for data forwarding. In addition, our scheme also satisfies another practical property that the original data owner can no longer decrypt or forward the re-encrypted data again to other users after a complete data forwarding, which is termed to be “original inaccessibility” in our study. Analysis shows that our scheme is secure and satisfactory. Finally we theoretically and experimentally evaluate the performance of our scheme and the results indicate that our scheme is efficient in the procedure of file dispersal, forward and retrieval.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"460 1","pages":"1820-1826"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77728970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 IEEE International Conference on Communication Workshop (ICCW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1