首页 > 最新文献

无线互联科技最新文献

英文 中文
A novel security scheme for wireless adhoc network 一种新的无线自组网安全方案
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940856
Abhijit Das, S. Basu, A. Chaudhuri
Wireless adhoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless adhoc environment is an important concern. In this paper we propose to use shared cryptography to secure message communication in adhoc network. In this approach we divide any information into multiple shares and transmit the different shares via multiple disjoint paths between any pair of communicating nodes and if possible at different point of time. At the receiving end the original information is reconstructed by combining the shares received via different paths at different point of time. We have also proposed to keep redundancy in the number of shares to withstand loss of some shares due to loss in transmission or security attacks. Compared to other available schemes, it has minimal computational complexity. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.
无线自组织网络是自主的,基础设施较少,并且根据其应用类型可能是移动的。无线自组网环境下信息的安全传输是一个重要的问题。在本文中,我们提出了在自组织网络中使用共享加密技术来保证消息通信的安全。在这种方法中,我们将任何信息分成多个共享,并通过任意对通信节点之间的多条不相交路径传输不同的共享,如果可能的话,在不同的时间点传输。在接收端,通过不同路径在不同时间点接收到的份额,重构原始信息。我们亦建议在股份数目上保持冗余,以承受部分股份因传输损失或安全攻击而损失。与其他方案相比,它具有最小的计算复杂度。这使得它在使用电池驱动的低端处理器的节能分布式环境中更加有效,安全性也是一个主要挑战。
{"title":"A novel security scheme for wireless adhoc network","authors":"Abhijit Das, S. Basu, A. Chaudhuri","doi":"10.1109/WIRELESSVITAE.2011.5940856","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940856","url":null,"abstract":"Wireless adhoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless adhoc environment is an important concern. In this paper we propose to use shared cryptography to secure message communication in adhoc network. In this approach we divide any information into multiple shares and transmit the different shares via multiple disjoint paths between any pair of communicating nodes and if possible at different point of time. At the receiving end the original information is reconstructed by combining the shares received via different paths at different point of time. We have also proposed to keep redundancy in the number of shares to withstand loss of some shares due to loss in transmission or security attacks. Compared to other available schemes, it has minimal computational complexity. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"68 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73413209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Service continuity support in self-organizing IMS networks 自组织IMS网络中的服务连续性支持
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940890
C. Makaya, A. Dutta, S. Das, D. Chee, F. Lin, S. Komorita, H. Yokota, H. Schulzrinne
With the increasing interest in deploying 4G/LTE networks, IMS has a potential to be deployed in a wide scale in order to support mobile Internet and value-added services over next-generation networks. Moreover, the effort to create an operator-controlled signaling infrastructure using IP-based protocols has resulted in a large number of functional components and interactions between core networks elements. Thus, the carriers are trying to explore alternative ways to deploy IMS that will allow them to manage their network in a cost effective manner while offering rich communications services. One of such approaches is self-organization of IMS (SOIMS). The self-organizing IMS can enable the IMS functional components to adapt dynamically based on the features like network load, number of users, node failures and available system resources. This paper proposes different mechanisms to handle self-organizing IMS with usage of load balancing paradigm. The proposed solution enables topology hiding, IMS nodes failure recovery, session continuity support, and IMS scalability.
随着人们对部署4G/LTE网络的兴趣日益浓厚,IMS有可能被大规模部署,以便在下一代网络上支持移动互联网和增值服务。此外,使用基于ip的协议创建运营商控制的信令基础设施的努力导致了核心网络元素之间的大量功能组件和交互。因此,运营商正在尝试探索部署IMS的替代方法,这将使他们能够在提供丰富通信服务的同时以一种经济有效的方式管理网络。其中一种方法是IMS的自组织(SOIMS)。自组织IMS可以使IMS功能组件根据网络负载、用户数量、节点故障和可用系统资源等特性进行动态调整。本文提出了利用负载平衡范式处理自组织IMS的不同机制。提出的解决方案支持拓扑隐藏、IMS节点故障恢复、会话连续性支持和IMS可伸缩性。
{"title":"Service continuity support in self-organizing IMS networks","authors":"C. Makaya, A. Dutta, S. Das, D. Chee, F. Lin, S. Komorita, H. Yokota, H. Schulzrinne","doi":"10.1109/WIRELESSVITAE.2011.5940890","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940890","url":null,"abstract":"With the increasing interest in deploying 4G/LTE networks, IMS has a potential to be deployed in a wide scale in order to support mobile Internet and value-added services over next-generation networks. Moreover, the effort to create an operator-controlled signaling infrastructure using IP-based protocols has resulted in a large number of functional components and interactions between core networks elements. Thus, the carriers are trying to explore alternative ways to deploy IMS that will allow them to manage their network in a cost effective manner while offering rich communications services. One of such approaches is self-organization of IMS (SOIMS). The self-organizing IMS can enable the IMS functional components to adapt dynamically based on the features like network load, number of users, node failures and available system resources. This paper proposes different mechanisms to handle self-organizing IMS with usage of load balancing paradigm. The proposed solution enables topology hiding, IMS nodes failure recovery, session continuity support, and IMS scalability.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"38 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79102205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Steg-OFDM blend for highly secure multi-user communication 用于高度安全的多用户通信的Steg-OFDM混合
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940918
PadmaPriya Praveen Kumar, Rengarajan Amirtharajan, K. Thenmozhi, J. Rayappan
Gone are the days when machines were the world's "prime movers". Today, the "prime mover" of the world is information, particularly, secret information. It is also a commodity whose value perishes with time. This dual-quality of power and perish-ability makes information to be the wealth, most difficult to protect on the earth. Nevertheless, in order to protect the secret information, technology has given us methods which provide security, though not a fool-proof one. Steganography is one such method which incorporates security by hiding the very existence of the secret by camouflaging it inside an image. In addition to the enormous security provided by the steganographic algorithms, if we implement some security in the very methodology of transmission and reception of an image, it would prove to be an useful venture. Such an useful venture is proposed in this paper, where four different users can transmit secret messages through a single stego image by taking advantage of the OFDM-QPSK(Orthogonal Frequency Division Multiplexing-Quadrature Phase Shift Keying) duo, thereby imparting multiple-access and improving security in an otherwise normal stego image. Comparison of BER in AWGN and Random Noise channel has also been done in order to quantify the effectiveness of the proposed technique.
机器是世界“原动力”的日子一去不复返了。今天,世界的“原动力”是信息,特别是秘密信息。它也是一种价值随着时间而消失的商品。这种权力和易逝性的双重特性,使信息成为地球上最难保护的财富。然而,为了保护秘密信息,技术给了我们提供安全的方法,尽管不是万无一失的方法。隐写术就是这样一种方法,它通过将秘密隐藏在图像中来隐藏秘密的存在,从而结合了安全性。除了隐写算法提供的巨大安全性之外,如果我们在图像的传输和接收方法上实现一些安全性,它将被证明是一个有用的冒险。本文提出了这样一个有用的风险,其中四个不同的用户可以利用OFDM-QPSK(正交频分复用-正交相移键控)二人组通过单个隐写图像传输秘密消息,从而在其他正常的隐写图像中实现多路访问并提高安全性。为了量化所提出的技术的有效性,还对AWGN和随机噪声信道的误码率进行了比较。
{"title":"Steg-OFDM blend for highly secure multi-user communication","authors":"PadmaPriya Praveen Kumar, Rengarajan Amirtharajan, K. Thenmozhi, J. Rayappan","doi":"10.1109/WIRELESSVITAE.2011.5940918","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940918","url":null,"abstract":"Gone are the days when machines were the world's \"prime movers\". Today, the \"prime mover\" of the world is information, particularly, secret information. It is also a commodity whose value perishes with time. This dual-quality of power and perish-ability makes information to be the wealth, most difficult to protect on the earth. Nevertheless, in order to protect the secret information, technology has given us methods which provide security, though not a fool-proof one. Steganography is one such method which incorporates security by hiding the very existence of the secret by camouflaging it inside an image. In addition to the enormous security provided by the steganographic algorithms, if we implement some security in the very methodology of transmission and reception of an image, it would prove to be an useful venture. Such an useful venture is proposed in this paper, where four different users can transmit secret messages through a single stego image by taking advantage of the OFDM-QPSK(Orthogonal Frequency Division Multiplexing-Quadrature Phase Shift Keying) duo, thereby imparting multiple-access and improving security in an otherwise normal stego image. Comparison of BER in AWGN and Random Noise channel has also been done in order to quantify the effectiveness of the proposed technique.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82808789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
High altitude platform system(HAPS) and co-existence with fixed satellite service(FSS) in frequency range 5850–7075 MHz 高空平台系统(HAPS)和在5850-7075 MHz频率范围内与固定卫星业务(FSS)共存
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940833
Masoud Mohebbi Nia, T. Rahman
HAPS has cropped up as a neoteric technology in the wireless communications field in recent years. The straightforwardness with which HAPS gets along with a telephone network service provider or the Internet, has made it to a unique feature of future wireless networks. Most HAPS' criteria have been well circumscribed by the International Telecommunication Union (ITU) or subscribed to in World Radiocommunication Conferences (WRCs). This procedure will prolong to function the various frequency ranges in future, most notably in WRC-12. To curb and clarify assessment probe, it should be explicated that FSS links are sited in C-Band frequency range to condense overwhelming conceivable propagation attenuation attributable to disproportionate rain amount in tropical and subtropical regions. Consequently, FSS uplink is ranged between 5925 and 6725 MHz. Where as, HAPS gateway links' frequency range is delineated between 5850 and 7075 MHz. Hence, FSS uplink intervenes with HAPS frequency range partially. Accordingly, HAPS spectrum sharing with FSS uplink in the Frequency range 5850–7075 MHz is appraised at this juncture. HAPS spectrum implementing in alluded frequency range instigates interference renowned as Co-Channel Interference (CCI). CCI reckoning is based upon Spectrum Emission Masks (SEM), Antennas' Radiation Pattern and Clutter Loss. The co-channel frequency deployment prospects are delved at this article.
HAPS是近年来在无线通信领域兴起的一门新兴技术。HAPS与电话网络服务提供商或互联网的直接合作使其成为未来无线网络的独特功能。大多数HAPS的标准已由国际电信联盟(ITU)明确规定,或已在世界无线电通信大会(wrc)上得到认可。该程序将在未来扩展到各种频率范围,特别是在WRC-12中。为了抑制和澄清评估探头,应该说明FSS链路位于c波段频率范围内,以压缩热带和亚热带地区不成比例的降雨量导致的绝大多数可能的传播衰减。因此,FSS上行链路的范围在5925和6725 MHz之间。其中,HAPS网关链路的频率范围划定在5850至7075兆赫之间。因此,FSS上行链路部分干扰了HAPS频率范围。据此,在5850 ~ 7075 MHz频率范围内,评估了HAPS与FSS上行链路的频谱共享。在特定的频率范围内实现HAPS频谱会引发称为同信道干扰(CCI)的干扰。CCI的计算基于频谱发射掩模(SEM)、天线的辐射方向图和杂波损耗。本文将深入探讨同信道频率部署的前景。
{"title":"High altitude platform system(HAPS) and co-existence with fixed satellite service(FSS) in frequency range 5850–7075 MHz","authors":"Masoud Mohebbi Nia, T. Rahman","doi":"10.1109/WIRELESSVITAE.2011.5940833","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940833","url":null,"abstract":"HAPS has cropped up as a neoteric technology in the wireless communications field in recent years. The straightforwardness with which HAPS gets along with a telephone network service provider or the Internet, has made it to a unique feature of future wireless networks. Most HAPS' criteria have been well circumscribed by the International Telecommunication Union (ITU) or subscribed to in World Radiocommunication Conferences (WRCs). This procedure will prolong to function the various frequency ranges in future, most notably in WRC-12. To curb and clarify assessment probe, it should be explicated that FSS links are sited in C-Band frequency range to condense overwhelming conceivable propagation attenuation attributable to disproportionate rain amount in tropical and subtropical regions. Consequently, FSS uplink is ranged between 5925 and 6725 MHz. Where as, HAPS gateway links' frequency range is delineated between 5850 and 7075 MHz. Hence, FSS uplink intervenes with HAPS frequency range partially. Accordingly, HAPS spectrum sharing with FSS uplink in the Frequency range 5850–7075 MHz is appraised at this juncture. HAPS spectrum implementing in alluded frequency range instigates interference renowned as Co-Channel Interference (CCI). CCI reckoning is based upon Spectrum Emission Masks (SEM), Antennas' Radiation Pattern and Clutter Loss. The co-channel frequency deployment prospects are delved at this article.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78675787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Nonlinear suppression scheme employing transmit power control for MIMO-OFDM systems 基于发射功率控制的MIMO-OFDM系统非线性抑制方案
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940929
Takuto Arai, Yunhan Wang, N. Kamiya, F. Maehara
This paper proposes a deterministic nonlinear distortion suppression scheme employing transmit power control for MIMO-OFDM systems. The feature of the proposed scheme is to suppress the nonlinear distortion by adjusting the transmit power level of each transmit antenna to be the maximum signal-to-noise-plus-distortion ratio (SNDR) and to perform MIMO signal detection using the appropriate transmit power levels notified to the receiver. In the proposed scheme, since the transmit power tends to be lowered to satisfy the maximum theoretical SNDR, the transmit power as well as the bit error rate (BER) can be fortunately reduced in comparison with the traditional constant power transmission scheme, which consequently leads to alleviating the out-of-band radiation. The effectiveness of the proposed scheme is demonstrated compared with the traditional scheme with constant transmit power by means of computer simulations.
针对MIMO-OFDM系统,提出了一种采用发射功率控制的确定性非线性失真抑制方案。该方案的特点是通过调整每个发射天线的发射功率电平使其达到最大信噪比(SNDR)来抑制非线性失真,并使用通知接收机的适当发射功率电平进行MIMO信号检测。在该方案中,由于为了满足最大的理论SNDR,发射功率往往会降低,因此与传统的恒功率传输方案相比,可以幸运地降低发射功率和误码率(BER),从而减轻带外辐射。通过计算机仿真,与传统的恒定发射功率方案进行了比较,验证了该方案的有效性。
{"title":"Nonlinear suppression scheme employing transmit power control for MIMO-OFDM systems","authors":"Takuto Arai, Yunhan Wang, N. Kamiya, F. Maehara","doi":"10.1109/WIRELESSVITAE.2011.5940929","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940929","url":null,"abstract":"This paper proposes a deterministic nonlinear distortion suppression scheme employing transmit power control for MIMO-OFDM systems. The feature of the proposed scheme is to suppress the nonlinear distortion by adjusting the transmit power level of each transmit antenna to be the maximum signal-to-noise-plus-distortion ratio (SNDR) and to perform MIMO signal detection using the appropriate transmit power levels notified to the receiver. In the proposed scheme, since the transmit power tends to be lowered to satisfy the maximum theoretical SNDR, the transmit power as well as the bit error rate (BER) can be fortunately reduced in comparison with the traditional constant power transmission scheme, which consequently leads to alleviating the out-of-band radiation. The effectiveness of the proposed scheme is demonstrated compared with the traditional scheme with constant transmit power by means of computer simulations.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"87 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81226331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for energy efficiency analysis of wireless networks 无线网络能源效率分析框架
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940861
G. Auer, V. Giannini, M. Olsson, Manuel J. González, C. Desset
In order to quantify the energy savings in wireless networks, the power consumption of the entire system needs to be captured and an appropriate energy efficiency evaluation framework must be defined. In this paper, the necessary enhancements over existing performance evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising component, node and network level contributions can be quantified. This includes a sophisticated power model for various base station (BS) types, which maps the RF output power radiated at the antenna elements to the total supply power of a BS site. The proposed evaluation framework is applied to quantify the energy efficiency of the downlink of a 3GPP LTE radio access network.
为了量化无线网络中的节能,需要捕获整个系统的功耗,并必须定义适当的能效评估框架。在本文中,讨论了对现有性能评估框架的必要改进,以便可以量化包括组件,节点和网络级别贡献的整个网络的能源效率。这包括针对不同类型基站(BS)的复杂功率模型,该模型将天线单元辐射的射频输出功率映射为BS站点的总供电功率。将提出的评估框架用于量化3GPP LTE无线接入网下行链路的能量效率。
{"title":"Framework for energy efficiency analysis of wireless networks","authors":"G. Auer, V. Giannini, M. Olsson, Manuel J. González, C. Desset","doi":"10.1109/WIRELESSVITAE.2011.5940861","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940861","url":null,"abstract":"In order to quantify the energy savings in wireless networks, the power consumption of the entire system needs to be captured and an appropriate energy efficiency evaluation framework must be defined. In this paper, the necessary enhancements over existing performance evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising component, node and network level contributions can be quantified. This includes a sophisticated power model for various base station (BS) types, which maps the RF output power radiated at the antenna elements to the total supply power of a BS site. The proposed evaluation framework is applied to quantify the energy efficiency of the downlink of a 3GPP LTE radio access network.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87293278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A jamming defending data-forwarding scheme for delay sensitive applications in WSN 无线传感器网络中时延敏感应用的抗干扰数据转发方案
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940919
Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit
Wireless sensor network (WSN) has emerged as an important application area where nodes are generally placed in an unattended environment and therefore are vulnerable to attack by adversaries. Moreover in real time application domains delay even by fraction of a second may deceive the purpose of the application. Therefore, designing an attack-defending scheme for WSN without involving any additional delay in data-forwarding is an important challenge in this domain. The present work proposes a data-forwarding scheme having no additional delay to defend jamming attack in WSN. The scheme considers a multilayer architecture where the layers are made up of hexagonal cells each containing sensor nodes in the form of clusters. The nodes are randomly deployed throughout the network and clusters are formed so that every cell hosts two sets of clusters operating in two different predefined frequencies. We have provided design guideline to determine cell size in terms of network parameters. This guideline ensures that for a cluster head there is at least another cluster head at one-hop distance towards the sink and thereby ensures data-forwarding in shortest path. During data-forwarding, if a frequency is jammed, the cluster operating in that frequency becomes inoperative and the other cluster acts as back-up. We claim that the scheme defends jamming attack without incurring any additional delay and the claim is substantiated through simulation.
无线传感器网络(WSN)已成为一个重要的应用领域,其节点通常放置在无人值守的环境中,因此容易受到攻击者的攻击。此外,在实时应用程序领域中,即使是几分之一秒的延迟也可能欺骗应用程序的目的。因此,设计一种不增加数据转发延迟的WSN攻击防御方案是该领域的一个重要挑战。针对无线传感器网络中的干扰攻击,提出了一种无附加延迟的数据转发方案。该方案考虑了多层体系结构,其中层由六边形单元组成,每个单元以簇的形式包含传感器节点。节点在整个网络中随机部署,并形成集群,以便每个单元承载两组以两种不同的预定义频率运行的集群。我们提供了根据网络参数确定单元大小的设计指南。该准则确保对于一个簇头来说,至少有另一个簇头在与汇聚的一跳距离上,从而确保数据在最短路径上转发。在数据转发过程中,如果某个频率被阻塞,在该频率上运行的集群将失效,而另一个集群将充当备份。我们声称该方案在不产生任何额外延迟的情况下防御了干扰攻击,并通过仿真证实了这一说法。
{"title":"A jamming defending data-forwarding scheme for delay sensitive applications in WSN","authors":"Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit","doi":"10.1109/WIRELESSVITAE.2011.5940919","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940919","url":null,"abstract":"Wireless sensor network (WSN) has emerged as an important application area where nodes are generally placed in an unattended environment and therefore are vulnerable to attack by adversaries. Moreover in real time application domains delay even by fraction of a second may deceive the purpose of the application. Therefore, designing an attack-defending scheme for WSN without involving any additional delay in data-forwarding is an important challenge in this domain. The present work proposes a data-forwarding scheme having no additional delay to defend jamming attack in WSN. The scheme considers a multilayer architecture where the layers are made up of hexagonal cells each containing sensor nodes in the form of clusters. The nodes are randomly deployed throughout the network and clusters are formed so that every cell hosts two sets of clusters operating in two different predefined frequencies. We have provided design guideline to determine cell size in terms of network parameters. This guideline ensures that for a cluster head there is at least another cluster head at one-hop distance towards the sink and thereby ensures data-forwarding in shortest path. During data-forwarding, if a frequency is jammed, the cluster operating in that frequency becomes inoperative and the other cluster acts as back-up. We claim that the scheme defends jamming attack without incurring any additional delay and the claim is substantiated through simulation.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"52 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84672537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Considerations over implementing IEEE 802.21 on a device powered by a mobile operating system 在移动操作系统驱动的设备上实现IEEE 802.21的考虑
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940880
Valentin Andrei, E. Popovici, O. Fratu, S. Halunga, Mihai Gavrilescu
During the last years, software applications performing scenarios related to vertical handovers were revealed. However, the great majority of these demonstrators were designed and optimized for multimode notebooks, having a fair amount of processing power. This article aims to describe on how to implement and optimize the main components of the IEEE 802.21 standard on a device like a smartphone powered by a mobile operating system. Performance evaluations were made in this purpose showing reasonable delays, taking us one step closer to achieving a seamless vertical handover on a mobile terminal.
在过去几年中,揭示了执行与垂直移交相关的场景的软件应用程序。然而,这些演示品中的绝大多数都是针对多模式笔记本电脑设计和优化的,具有相当大的处理能力。本文旨在描述如何在由移动操作系统驱动的智能手机等设备上实现和优化IEEE 802.21标准的主要组件。为此进行了性能评估,显示出合理的延迟,使我们离实现移动终端上的无缝垂直切换更近了一步。
{"title":"Considerations over implementing IEEE 802.21 on a device powered by a mobile operating system","authors":"Valentin Andrei, E. Popovici, O. Fratu, S. Halunga, Mihai Gavrilescu","doi":"10.1109/WIRELESSVITAE.2011.5940880","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940880","url":null,"abstract":"During the last years, software applications performing scenarios related to vertical handovers were revealed. However, the great majority of these demonstrators were designed and optimized for multimode notebooks, having a fair amount of processing power. This article aims to describe on how to implement and optimize the main components of the IEEE 802.21 standard on a device like a smartphone powered by a mobile operating system. Performance evaluations were made in this purpose showing reasonable delays, taking us one step closer to achieving a seamless vertical handover on a mobile terminal.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"18 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84424494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Path selection in wireless Mobile Ad Hoc Network using fuzzy and rough set theory 基于模糊和粗糙集理论的无线移动自组网路径选择
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940820
P. Seethalakshmi, M. Gomathi, G. Rajendran
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes that dynamically forms a network. Many routing protocols exist to find the shortest path using various resources. A novel approach based on fuzzy and rough set theory is described in this work for the selection of effective routing paths using minimum number of resources. This paper shows the rough set technique that can be employed to generate simple rules and to remove irrelevant attributes (resources) for evaluating the best routing paths. An example is also given to illustrate the efficiency of the proposed method.
移动自组网(MANET)是无线移动节点动态组成网络的集合。存在许多路由协议来利用各种资源找到最短路径。本文提出了一种基于模糊和粗糙集理论的路径选择方法。本文展示了粗糙集技术,它可以用来生成简单的规则和去除不相关的属性(资源)来评估最佳路由路径。最后通过一个算例说明了该方法的有效性。
{"title":"Path selection in wireless Mobile Ad Hoc Network using fuzzy and rough set theory","authors":"P. Seethalakshmi, M. Gomathi, G. Rajendran","doi":"10.1109/WIRELESSVITAE.2011.5940820","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940820","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes that dynamically forms a network. Many routing protocols exist to find the shortest path using various resources. A novel approach based on fuzzy and rough set theory is described in this work for the selection of effective routing paths using minimum number of resources. This paper shows the rough set technique that can be employed to generate simple rules and to remove irrelevant attributes (resources) for evaluating the best routing paths. An example is also given to illustrate the efficiency of the proposed method.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85574305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An array antenna for MIMO systems with a decoupling network using bridge susceptances 一种基于电桥电纳解耦网络的MIMO系统阵列天线
Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940905
K. Kagoshima, S. Obote, A. Kagaya, K. Nishimura, N. Endo
Decoupling and matching feeding networks are considerably interested in small wireless terminals to enhance their abilities for MIMO systems. In various proposals of DMFN's, the feeding networks composed of bridge susceptances and transmission lines are simple. However, this DMFN has only been applied to the limited array with special characteristics. This paper presents general design formulas of the DMFN for the two elements and three elements arrays and fundamental numerical data are presented to assure the validity of the design formulas.
解耦和匹配馈电网络在小型无线终端中得到广泛应用,以提高其在MIMO系统中的应用能力。在DMFN的各种方案中,由桥式电纳和传输线组成的馈电网络都比较简单。然而,这种DMFN仅应用于具有特殊特性的有限阵列。本文给出了二元阵和三元阵DMFN的一般设计公式,并给出了基本的数值数据,以保证设计公式的有效性。
{"title":"An array antenna for MIMO systems with a decoupling network using bridge susceptances","authors":"K. Kagoshima, S. Obote, A. Kagaya, K. Nishimura, N. Endo","doi":"10.1109/WIRELESSVITAE.2011.5940905","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940905","url":null,"abstract":"Decoupling and matching feeding networks are considerably interested in small wireless terminals to enhance their abilities for MIMO systems. In various proposals of DMFN's, the feeding networks composed of bridge susceptances and transmission lines are simple. However, this DMFN has only been applied to the limited array with special characteristics. This paper presents general design formulas of the DMFN for the two elements and three elements arrays and fundamental numerical data are presented to assure the validity of the design formulas.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90359979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
无线互联科技
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1