首页 > 最新文献

2017 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Artificial-noise-aided beamforming design against a multi-antenna eavesdropper under secrecy outage constraint 保密中断约束下多天线窃听器的人工噪声辅助波束形成设计
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996336
Bo Wang, Pengcheng Mu, Zongze Li, Weile Zhang, Huiming Wang, Qinye Yin
The artificial noise (AN) aided beamforming design in the MISOME (multiple-input, single-output, multiple-eavesdropper) wiretap channel is studied from the perspective of secrecy outage. Unlike many existing works which directly adopted the traditional null-space AN scheme, we start with a general assumption on the structure of the transmit signal, and seek to find the optimal structure by solving a secrecy outage probability (SOP) constrained secrecy rate maximization problem. By generalizing several existing conclusions regarding a single-antenna eavesdropper, we prove that the null-space AN scheme is indeed optimal for an arbitrary number of the eavesdropper's antennas from the perspective of secrecy outage. The power allocation problem is also studied and the closed-form optimal solution is obtained. It is found that the increase in the eavesdropper's antenna number is equivalent to requiring a smaller SOP.
从保密中断的角度研究了多输入、单输出、多窃听器窃听信道中人工噪声辅助波束形成设计。与许多现有研究直接采用传统的零空间AN方案不同,我们首先对发射信号的结构进行一般假设,并通过求解保密中断概率(SOP)约束下的保密率最大化问题来寻求最优结构。通过推广已有的关于单天线窃听器的结论,从保密中断的角度证明了对于任意数目的窃听器天线,零空间AN方案确实是最优的。并对功率分配问题进行了研究,得到了闭环最优解。研究发现,窃听者天线数量的增加相当于要求更小的SOP。
{"title":"Artificial-noise-aided beamforming design against a multi-antenna eavesdropper under secrecy outage constraint","authors":"Bo Wang, Pengcheng Mu, Zongze Li, Weile Zhang, Huiming Wang, Qinye Yin","doi":"10.1109/ICC.2017.7996336","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996336","url":null,"abstract":"The artificial noise (AN) aided beamforming design in the MISOME (multiple-input, single-output, multiple-eavesdropper) wiretap channel is studied from the perspective of secrecy outage. Unlike many existing works which directly adopted the traditional null-space AN scheme, we start with a general assumption on the structure of the transmit signal, and seek to find the optimal structure by solving a secrecy outage probability (SOP) constrained secrecy rate maximization problem. By generalizing several existing conclusions regarding a single-antenna eavesdropper, we prove that the null-space AN scheme is indeed optimal for an arbitrary number of the eavesdropper's antennas from the perspective of secrecy outage. The power allocation problem is also studied and the closed-form optimal solution is obtained. It is found that the increase in the eavesdropper's antenna number is equivalent to requiring a smaller SOP.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90257049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cooperative receiver for ambient backscatter communications with multiple antennas 多天线环境后向散射通信的协同接收机
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997479
Gang Yang, Ying-Chang Liang, Qianqian Zhang
In ambient backscatter communications (Am-BC), a backscatter device can harvest power from ambient RF signals and modulate its information symbols over the ambient carriers without using complex RF transmitter. Conventional receiver design for AmBC focuses on tackling the direct link interference from the RF source. In this paper, a novel receiver, which is called cooperative receiver, is proposed to recover signals not only from the ambient backscatter device (A-BD), but also from the RF source. We first study the optimal maximum-likelihood (ML) detection for such system. Then, by exploiting the structural property of the system model, linear detectors and successive interference cancellation (SIC) based detectors are proposed. We also derive the closed-form bit error rate (BER) expressions for both ML detection and the proposed SIC algorithms. Finally, extensive numerical results show that the existence of backscattered signal in the considered system can significantly enhance the ML detection performance of the source signal, and the proposed SIC-based detectors can achieve near-ML detection performance for typical application scenarios.
在环境反向散射通信(Am-BC)中,反向散射设备可以从环境射频信号中获取能量,并在环境载波上调制其信息符号,而无需使用复杂的射频发射机。传统的AmBC接收机设计侧重于解决射频源的直接链路干扰。本文提出了一种新型的接收机,即协作接收机,它不仅可以从环境后向散射装置(a - bd)中恢复信号,而且可以从射频源中恢复信号。我们首先研究了这种系统的最优最大似然(ML)检测。然后,利用系统模型的结构特性,提出了基于线性检测器和基于逐次干扰消除(SIC)的检测器。我们还推导了ML检测和SIC算法的闭式误码率(BER)表达式。最后,大量的数值结果表明,考虑系统中背散射信号的存在可以显著增强源信号的机器学习检测性能,并且基于sic的检测器可以在典型应用场景下实现接近机器学习的检测性能。
{"title":"Cooperative receiver for ambient backscatter communications with multiple antennas","authors":"Gang Yang, Ying-Chang Liang, Qianqian Zhang","doi":"10.1109/ICC.2017.7997479","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997479","url":null,"abstract":"In ambient backscatter communications (Am-BC), a backscatter device can harvest power from ambient RF signals and modulate its information symbols over the ambient carriers without using complex RF transmitter. Conventional receiver design for AmBC focuses on tackling the direct link interference from the RF source. In this paper, a novel receiver, which is called cooperative receiver, is proposed to recover signals not only from the ambient backscatter device (A-BD), but also from the RF source. We first study the optimal maximum-likelihood (ML) detection for such system. Then, by exploiting the structural property of the system model, linear detectors and successive interference cancellation (SIC) based detectors are proposed. We also derive the closed-form bit error rate (BER) expressions for both ML detection and the proposed SIC algorithms. Finally, extensive numerical results show that the existence of backscattered signal in the considered system can significantly enhance the ML detection performance of the source signal, and the proposed SIC-based detectors can achieve near-ML detection performance for typical application scenarios.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"24 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84007944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
SegHyPer: Segmentation- and hypothesis based network performance evaluation for high speed train users 基于分割和假设的高速列车用户网络性能评价
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997335
T. Berisha, P. Svoboda, Stephan Ojak, C. Mecklenbräuker
Two solutions are presented to overcome the coverage and low bit rate problems for cellular network services in high mobility: amplify-and-forward Moving Relay Nodes (MRNs) and prototype windows on-board Wi-Fi enabled High Speed Trains (HSTs). This paper focuses on 3G/4G User Equipments (UEs) located on-board the high Vehicular Penetration Loss (VPL) vehicles travelling throughout long-range geographical routes. This work is supported by extensive real-world measurements conducted along Austrian railways such as from Vienna to Salzburg and from Vienna to Graz. We propose a novelistic approach and we call SegHyPer. The approach is established by multi-level non-parametric hypotheses tests based on route segmentation link quality parameters to enable micro-analysis in current and future cellular networks for mobile users on-board railjet HST with- and without treatment.
提出了两种解决方案来克服高移动性蜂窝网络服务的覆盖和低比特率问题:放大和前向移动中继节点(mrn)和基于Wi-Fi的高速列车(HSTs)的原型窗口。本文主要研究了在长途地理路线上行驶的高车辆穿透损耗(VPL)车辆上安装的3G/4G用户设备。这项工作得到了奥地利铁路沿线广泛的实际测量的支持,例如从维也纳到萨尔茨堡和从维也纳到格拉茨。我们提出了一种小说式的方法,我们称之为SegHyPer。该方法是通过基于路由分割链路质量参数的多级非参数假设检验建立的,能够在当前和未来的蜂窝网络中对铁路喷气机HST上的移动用户进行微分析,无论是否进行处理。
{"title":"SegHyPer: Segmentation- and hypothesis based network performance evaluation for high speed train users","authors":"T. Berisha, P. Svoboda, Stephan Ojak, C. Mecklenbräuker","doi":"10.1109/ICC.2017.7997335","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997335","url":null,"abstract":"Two solutions are presented to overcome the coverage and low bit rate problems for cellular network services in high mobility: amplify-and-forward Moving Relay Nodes (MRNs) and prototype windows on-board Wi-Fi enabled High Speed Trains (HSTs). This paper focuses on 3G/4G User Equipments (UEs) located on-board the high Vehicular Penetration Loss (VPL) vehicles travelling throughout long-range geographical routes. This work is supported by extensive real-world measurements conducted along Austrian railways such as from Vienna to Salzburg and from Vienna to Graz. We propose a novelistic approach and we call SegHyPer. The approach is established by multi-level non-parametric hypotheses tests based on route segmentation link quality parameters to enable micro-analysis in current and future cellular networks for mobile users on-board railjet HST with- and without treatment.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"147 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83805960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Spectrum and energy efficiency maximization in UAV-enabled mobile relaying 频谱和能源效率最大化在无人机启用的移动中继
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997208
Jingwei Zhang, Yong Zeng, Rui Zhang
Wireless communication by leveraging the use of low-altitude unmanned aerial vehicles (UAVs) has received significant interests recently due to its low-cost and flexibility in providing wireless connectivity in areas without infrastructure coverage. This paper studies a UAV-enabled mobile relaying system, where a high-mobility UAV is deployed to assist in the information transmission from a ground source to a ground destination with their direct link blocked. By assuming that the UAV adopts the energy-efficient circular trajectory and employs time-division duplexing (TDD) based decode-and-forward (DF) relaying, we maximize the spectrum efficiency (SE) in bits/second/Hz as well as energy efficiency (EE) in bits/Joule of the considered system by jointly optimizing the time allocations for the UAV's relaying together with its flying speed and trajectory. It is revealed that for UAV-enabled mobile relaying with the UAV propulsion energy consumption taken into account, there exists a trade-off between the maximum achievable SE and EE by exploiting the new degree of freedom of UAV trajectory design.
利用低空无人机(uav)的无线通信由于其在没有基础设施覆盖的地区提供无线连接的低成本和灵活性,最近受到了极大的关注。本文研究了一种基于无人机的移动中继系统,在该系统中,部署一架高机动性的无人机,在直接链路被阻断的情况下,辅助从地源到地面目标的信息传输。假设无人机采用节能圆形轨迹,采用基于时分双相(TDD)的译码转发(DF)中继,结合无人机的飞行速度和轨迹,共同优化无人机中继的时间分配,使所考虑系统的频谱效率(SE) (bits/second/Hz)和能量效率(EE) (bits/Joule)最大化。研究表明,在考虑无人机推进能量消耗的情况下,利用无人机轨迹设计的新自由度,在最大可达SE和EE之间存在权衡。
{"title":"Spectrum and energy efficiency maximization in UAV-enabled mobile relaying","authors":"Jingwei Zhang, Yong Zeng, Rui Zhang","doi":"10.1109/ICC.2017.7997208","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997208","url":null,"abstract":"Wireless communication by leveraging the use of low-altitude unmanned aerial vehicles (UAVs) has received significant interests recently due to its low-cost and flexibility in providing wireless connectivity in areas without infrastructure coverage. This paper studies a UAV-enabled mobile relaying system, where a high-mobility UAV is deployed to assist in the information transmission from a ground source to a ground destination with their direct link blocked. By assuming that the UAV adopts the energy-efficient circular trajectory and employs time-division duplexing (TDD) based decode-and-forward (DF) relaying, we maximize the spectrum efficiency (SE) in bits/second/Hz as well as energy efficiency (EE) in bits/Joule of the considered system by jointly optimizing the time allocations for the UAV's relaying together with its flying speed and trajectory. It is revealed that for UAV-enabled mobile relaying with the UAV propulsion energy consumption taken into account, there exists a trade-off between the maximum achievable SE and EE by exploiting the new degree of freedom of UAV trajectory design.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88015495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
Identifying counterfeit smart grid devices: A lightweight system level framework 识别假冒智能电网设备:一个轻量级系统级框架
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996877
Leonardo Babun, Hidayet Aksu, A. Uluagac
The use of counterfeit smart grid devices throughout the smart grid communication infrastructure represents a real problem. Hence, monitoring and early detection of counterfeit smart grid devices is critical for protecting smart grid's components and data. To address these concerns, in this paper, we introduce a novel system level approach to identify counterfeit smart grid devices. Specifically, our approach is a configurable framework that combines system and function call tracing techniques and statistical analysis to detect counterfeit smart grid devices based on their behavioural characteristics. Moreover, we measure the efficacy of our framework with a realistic testbed that includes both resource-limited and resource-rich counterfeit devices. In total, we analyze six different counterfeit devices in our testbed. The devices communicate via an open source version of the IEC61850 protocol suite (i.e., libiec61850). Experimental results reveal an excellent rate on the detection of smart grid counterfeit devices. Finally, the performance analysis demonstrates that the use of the proposed framework has minimal overhead on the smart grid devices' computing resources.
在整个智能电网通信基础设施中使用假冒智能电网设备是一个真正的问题。因此,监测和早期发现假冒智能电网设备对于保护智能电网的组件和数据至关重要。为了解决这些问题,在本文中,我们引入了一种新的系统级方法来识别假冒智能电网设备。具体来说,我们的方法是一个可配置的框架,结合了系统和功能调用跟踪技术以及统计分析,以根据其行为特征检测假冒智能电网设备。此外,我们通过一个现实的测试平台来衡量我们的框架的有效性,该测试平台包括资源有限和资源丰富的伪造设备。在我们的测试平台上,我们总共分析了六种不同的假冒设备。这些设备通过开源版本的IEC61850协议套件(即libiec61850)进行通信。实验结果表明,该方法对智能电网假冒设备的检测率很高。最后,性能分析表明,使用所提出的框架对智能电网设备的计算资源的开销最小。
{"title":"Identifying counterfeit smart grid devices: A lightweight system level framework","authors":"Leonardo Babun, Hidayet Aksu, A. Uluagac","doi":"10.1109/ICC.2017.7996877","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996877","url":null,"abstract":"The use of counterfeit smart grid devices throughout the smart grid communication infrastructure represents a real problem. Hence, monitoring and early detection of counterfeit smart grid devices is critical for protecting smart grid's components and data. To address these concerns, in this paper, we introduce a novel system level approach to identify counterfeit smart grid devices. Specifically, our approach is a configurable framework that combines system and function call tracing techniques and statistical analysis to detect counterfeit smart grid devices based on their behavioural characteristics. Moreover, we measure the efficacy of our framework with a realistic testbed that includes both resource-limited and resource-rich counterfeit devices. In total, we analyze six different counterfeit devices in our testbed. The devices communicate via an open source version of the IEC61850 protocol suite (i.e., libiec61850). Experimental results reveal an excellent rate on the detection of smart grid counterfeit devices. Finally, the performance analysis demonstrates that the use of the proposed framework has minimal overhead on the smart grid devices' computing resources.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"142 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74947878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Difference Bloom Filter: A probabilistic structure for multi-set membership query 差分布隆过滤器:一种用于多集隶属查询的概率结构
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996678
Dongsheng Yang, Deyu Tian, Junzhi Gong, Siang Gao, Tong Yang, Xiaoming Li
Given v sets and an incoming item e, multi-set membership query is to report which set contains item e. Multi-set membership query is a fundamental problem in computer systems and applications. All existing data structures cannot achieve small memory usage, fast query speed and high accuracy at the same time. In this paper, we propose a novel probabilistic data structure named Difference Bloom Filter (DBF) for fast multi-set membership query, which not only is more accurate than the state-of-the-art, but has a faster query speed. There are two key design principles for DBF. The first one is to make the representation of the membership of elements exclusive by writing different number of 1s and 0s in the same filter, and the second one is to use the slow but cheap DRAM memory to improve the accuracy of the filter on the fast but expensive SRAM memory. Experimental results show that in terms of accuracy, DBF has a great advantage compared to state-of-the-art, being hundreds of times more accurate than the state-of-the-art vBF and ShBF. Furthermore, we have made the source code of our DBF available at our homepage [1] and GitHub [2].
给定v个集合和一个传入的项目e,多集隶属查询就是报告哪个集合包含项目e。多集隶属查询是计算机系统和应用中的一个基本问题。现有的所有数据结构都无法同时实现小内存占用、快查询速度和高精度。本文提出了一种新的概率数据结构差分布隆过滤器(Difference Bloom Filter, DBF)用于快速多集隶属度查询,不仅比现有的查询方法更准确,而且具有更快的查询速度。DBF有两个关键的设计原则。第一种方法是通过在同一个过滤器中写入不同数量的1和0来表示元素的成员关系,第二种方法是使用缓慢但便宜的DRAM内存来提高快速但昂贵的SRAM内存上过滤器的准确性。实验结果表明,在精度方面,DBF具有很大的优势,其精度是目前最先进的vBF和ShBF的数百倍。此外,我们已经在我们的主页[1]和GitHub[2]上提供了DBF的源代码。
{"title":"Difference Bloom Filter: A probabilistic structure for multi-set membership query","authors":"Dongsheng Yang, Deyu Tian, Junzhi Gong, Siang Gao, Tong Yang, Xiaoming Li","doi":"10.1109/ICC.2017.7996678","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996678","url":null,"abstract":"Given v sets and an incoming item e, multi-set membership query is to report which set contains item e. Multi-set membership query is a fundamental problem in computer systems and applications. All existing data structures cannot achieve small memory usage, fast query speed and high accuracy at the same time. In this paper, we propose a novel probabilistic data structure named Difference Bloom Filter (DBF) for fast multi-set membership query, which not only is more accurate than the state-of-the-art, but has a faster query speed. There are two key design principles for DBF. The first one is to make the representation of the membership of elements exclusive by writing different number of 1s and 0s in the same filter, and the second one is to use the slow but cheap DRAM memory to improve the accuracy of the filter on the fast but expensive SRAM memory. Experimental results show that in terms of accuracy, DBF has a great advantage compared to state-of-the-art, being hundreds of times more accurate than the state-of-the-art vBF and ShBF. Furthermore, we have made the source code of our DBF available at our homepage [1] and GitHub [2].","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79891789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Energy consumption reduction methods of geographic routing protocols with out-of-date location information in mobile ad hoc networks 移动自组织网络中具有过时位置信息的地理路由协议的能耗降低方法
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996329
Yao-Jen Tang, Chung-Wei Lee, Meng-Han Lin, Bing-Hong Liu, Ming-Jer Tsai
Geographic routing protocols route packets in a hop-by-hop manner, where a node selects a relay node to forward packets among the (1-hop) neighboring nodes based on the obtained (geographic) location information of the neighboring nodes. To employ geographic routing protocols, two neighboring nodes need to exchange the location information with each other periodically. In a mobile ad hoc network, however, a packet transmitted between two neighboring nodes may be lost due to the out-of-date location information, resulting in demanding extra energy to retransmit the packet. In this paper, by considering the out-of-date neighboring location information, we propose two methods capable of augmenting geographic routing protocols to reduce energy consumption in mobile ad hoc networks. The first one considers a tradeoff between the progress distance and the energy consumption when selecting a relay node. The second one puts emphasis only on the energy consumption when selecting a relay node, and it consumes minimum energy to route a packet between a source-destination pair in the continuous domain. Simulations show that geographic routing protocols augmented with our methods can significantly reduce the energy consumption while preserving the high packet delivery rate.
地理路由协议采用逐跳方式路由报文,即节点根据获取到的相邻节点的(地理)位置信息,选择一个中继节点在(1跳)相邻节点之间转发报文。为了使用地理路由协议,两个相邻节点需要定期交换位置信息。然而,在移动自组织网络中,相邻两个节点之间传输的数据包可能会因为位置信息过期而丢失,从而需要额外的能量来重传数据包。本文在考虑相邻位置信息过时的情况下,提出了两种能够增强地理路由协议的方法,以降低移动自组织网络中的能量消耗。第一种方法在选择中继节点时考虑了进度距离和能量消耗之间的权衡。第二种方法在选择中继节点时只考虑能量消耗,在连续域的源-目的对之间路由数据包所消耗的能量最小。仿真结果表明,采用本文方法增强的地理路由协议能够在保持较高数据包传输速率的同时显著降低能耗。
{"title":"Energy consumption reduction methods of geographic routing protocols with out-of-date location information in mobile ad hoc networks","authors":"Yao-Jen Tang, Chung-Wei Lee, Meng-Han Lin, Bing-Hong Liu, Ming-Jer Tsai","doi":"10.1109/ICC.2017.7996329","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996329","url":null,"abstract":"Geographic routing protocols route packets in a hop-by-hop manner, where a node selects a relay node to forward packets among the (1-hop) neighboring nodes based on the obtained (geographic) location information of the neighboring nodes. To employ geographic routing protocols, two neighboring nodes need to exchange the location information with each other periodically. In a mobile ad hoc network, however, a packet transmitted between two neighboring nodes may be lost due to the out-of-date location information, resulting in demanding extra energy to retransmit the packet. In this paper, by considering the out-of-date neighboring location information, we propose two methods capable of augmenting geographic routing protocols to reduce energy consumption in mobile ad hoc networks. The first one considers a tradeoff between the progress distance and the energy consumption when selecting a relay node. The second one puts emphasis only on the energy consumption when selecting a relay node, and it consumes minimum energy to route a packet between a source-destination pair in the continuous domain. Simulations show that geographic routing protocols augmented with our methods can significantly reduce the energy consumption while preserving the high packet delivery rate.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"10 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78085654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-index fusion via similarity matrix pooling for image retrieval 基于相似矩阵池化的多指标融合图像检索
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996333
Xin Chen, Jun Wu, Shaoyan Sun, Q. Tian
Different kinds of features hold some distinct merits, making them complementary to each other. Inspired by this idea an index level multiple feature fusion scheme via similarity matrix pooling is proposed in this paper. We first compute the similarity matrix of each index, and then a novel scheme is used to pool on these similarity matrices for updating the original indices. Compared with the existing fusion schemes, the proposed scheme performs feature fusion at index level to save memory and reduce computational complexity. On the other hand, the proposed scheme treats different kinds of features adaptively based on its importance, thus improves retrieval accuracy. The performance of the proposed approach is evaluated using two public datasets, which significantly outperforms the baseline methods in retrieval accuracy with low memory consumption and computational complexity.
不同的特征各有优点,相互补充。受此思想的启发,本文提出了一种基于相似矩阵池化的索引级多特征融合方案。首先计算每个索引的相似度矩阵,然后采用一种新的方法对这些相似度矩阵进行池化,从而更新原始索引。与现有融合方案相比,该方案在索引级进行特征融合,节省内存,降低计算复杂度。另一方面,该方案根据特征的重要性自适应处理不同类型的特征,从而提高了检索精度。使用两个公共数据集对该方法的性能进行了评估,结果表明该方法在检索精度上明显优于基线方法,并且具有较低的内存消耗和计算复杂度。
{"title":"Multi-index fusion via similarity matrix pooling for image retrieval","authors":"Xin Chen, Jun Wu, Shaoyan Sun, Q. Tian","doi":"10.1109/ICC.2017.7996333","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996333","url":null,"abstract":"Different kinds of features hold some distinct merits, making them complementary to each other. Inspired by this idea an index level multiple feature fusion scheme via similarity matrix pooling is proposed in this paper. We first compute the similarity matrix of each index, and then a novel scheme is used to pool on these similarity matrices for updating the original indices. Compared with the existing fusion schemes, the proposed scheme performs feature fusion at index level to save memory and reduce computational complexity. On the other hand, the proposed scheme treats different kinds of features adaptively based on its importance, thus improves retrieval accuracy. The performance of the proposed approach is evaluated using two public datasets, which significantly outperforms the baseline methods in retrieval accuracy with low memory consumption and computational complexity.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"45 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77435971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Game theoretic study of protecting MIMO transmissions against smart attacks 保护MIMO传输免受智能攻击的博弈研究
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996461
Yanda Li, Liang Xiao, H. Dai, H. Poor
Multiple-input multiple-output (MIMO) systems are threatened by smart attackers, who apply programmable radio devices such as software defined radios to perform multiple types of attacks such as eavesdropping, jamming and spoofing. In this paper, MIMO transmission in the presence of smart attacks is formulated as a noncooperative game, in which a MIMO transmitter chooses its transmit power level and a smart attacker determines its attack type accordingly. A Nash equilibrium of this secure MIMO transmission game is derived and conditions assuring its existence are provided to reveal the impact of the number of antennas and the costs of the attacker to launch each type of attack. A power control strategy based on Q-learning is proposed for the MIMO transmitter to suppress the attack motivation of smart attackers in a dynamic version of MIMO transmission game without being aware of the attack and the radio channel model. Simulation results show that our proposed scheme can reduce the attack rate of smart attackers and improve the secrecy capacity compared with the benchmark strategy.
多输入多输出(MIMO)系统受到智能攻击者的威胁,智能攻击者利用可编程无线电设备(如软件定义无线电)进行多种类型的攻击,如窃听、干扰和欺骗。本文将存在智能攻击的MIMO传输表述为一个非合作博弈,其中MIMO发送方选择其发射功率水平,智能攻击方据此确定其攻击类型。推导了该安全MIMO传输博弈的纳什均衡,并给出了保证其存在的条件,揭示了天线数量的影响和攻击者发起各种攻击的代价。提出了一种基于q -学习的MIMO发射机功率控制策略,在动态MIMO传输博弈中,在不知道攻击和无线信道模型的情况下抑制智能攻击者的攻击动机。仿真结果表明,与基准策略相比,该方案可以降低智能攻击者的攻击率,提高保密能力。
{"title":"Game theoretic study of protecting MIMO transmissions against smart attacks","authors":"Yanda Li, Liang Xiao, H. Dai, H. Poor","doi":"10.1109/ICC.2017.7996461","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996461","url":null,"abstract":"Multiple-input multiple-output (MIMO) systems are threatened by smart attackers, who apply programmable radio devices such as software defined radios to perform multiple types of attacks such as eavesdropping, jamming and spoofing. In this paper, MIMO transmission in the presence of smart attacks is formulated as a noncooperative game, in which a MIMO transmitter chooses its transmit power level and a smart attacker determines its attack type accordingly. A Nash equilibrium of this secure MIMO transmission game is derived and conditions assuring its existence are provided to reveal the impact of the number of antennas and the costs of the attacker to launch each type of attack. A power control strategy based on Q-learning is proposed for the MIMO transmitter to suppress the attack motivation of smart attackers in a dynamic version of MIMO transmission game without being aware of the attack and the radio channel model. Simulation results show that our proposed scheme can reduce the attack rate of smart attackers and improve the secrecy capacity compared with the benchmark strategy.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81157393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
On information spreading in multiplex networks with gossip mechanism 基于八卦机制的多路网络信息传播研究
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997367
Yufan Huang, H. Dai
In this work, we investigate information spreading in multiplex networks, adopting the gossip (random-walk) based model. Two key features of multiplex networks allow potentially much faster information spreading: availability of multiple channels and communication actions for each user, and more choices on neighbor contacting. As a first work in this area, we explore the impact of layer number, layer similarity, and average node degree on the efficiency of information spreading, and theoretically prove our results. Another observation is that multiplex network structure can improve network connectivity. Simulation results are provided to support and complement theoretical analysis.
在这项工作中,我们研究了信息在多路网络中的传播,采用基于八卦(随机漫步)的模型。多路网络的两个关键特性允许潜在的更快的信息传播:多个通道的可用性和每个用户的通信行为,以及更多的邻居联系选择。作为该领域的第一个工作,我们探讨了层数、层相似度和平均节点度对信息传播效率的影响,并从理论上证明了我们的结果。另一个观察是,多路网络结构可以改善网络连通性。仿真结果为理论分析提供了支持和补充。
{"title":"On information spreading in multiplex networks with gossip mechanism","authors":"Yufan Huang, H. Dai","doi":"10.1109/ICC.2017.7997367","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997367","url":null,"abstract":"In this work, we investigate information spreading in multiplex networks, adopting the gossip (random-walk) based model. Two key features of multiplex networks allow potentially much faster information spreading: availability of multiple channels and communication actions for each user, and more choices on neighbor contacting. As a first work in this area, we explore the impact of layer number, layer similarity, and average node degree on the efficiency of information spreading, and theoretically prove our results. Another observation is that multiplex network structure can improve network connectivity. Simulation results are provided to support and complement theoretical analysis.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"25 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82042682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1