首页 > 最新文献

... IEEE Global Communications Conference. IEEE Global Communications Conference最新文献

英文 中文
A novel multi-objective relay-jammer pair selection scheme in wireless cooperative networks 一种新的无线合作网络多目标中继干扰机对选择方案
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6504023
Li Wang, Xi Zhang, Mei Song, Tenghui Ke
To further enhance the quality of service (QoS), this paper proposes a novel multi-objective relay-jammer pair selection scheme in wireless cooperative networks where the wireless channels are modeled as first-order finite-state Markov channels (FSMCs). The FSMC model is used to approximate the time variations of the average received signal-to-noise ratio (SNR), channel power gain, and remaining power of nodes. In addition, the candidate cooperative nodes can be selected as relay and jammer, respectively, to assist the transmission or disturb the eavesdropper. Thus, we can formulate a restless bandit problem to model and analyze how to select the optimal relay-jammer pair according to the desired QoS optimization goals, in terms of energy balance, mitigating error propagation and increasing secrecy capacity (SC). The obtained simulation results show that our proposed schemes outperform the other existing schemes.
为了进一步提高服务质量(QoS),本文提出了一种新的无线合作网络多目标中继干扰器对选择方案,该方案将无线信道建模为一阶有限状态马尔可夫信道(FSMCs)。FSMC模型用于近似平均接收信噪比(SNR)、信道功率增益和节点剩余功率的时间变化。此外,还可以选择候选合作节点分别作为中继节点和干扰节点,协助传输或干扰窃听者。因此,我们可以制定一个不宁匪问题来建模和分析如何根据期望的QoS优化目标,在能量平衡、减少错误传播和增加保密能力(SC)方面选择最优中继干扰器对。仿真结果表明,本文提出的方案优于现有的方案。
{"title":"A novel multi-objective relay-jammer pair selection scheme in wireless cooperative networks","authors":"Li Wang, Xi Zhang, Mei Song, Tenghui Ke","doi":"10.1109/GLOCOM.2012.6504023","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6504023","url":null,"abstract":"To further enhance the quality of service (QoS), this paper proposes a novel multi-objective relay-jammer pair selection scheme in wireless cooperative networks where the wireless channels are modeled as first-order finite-state Markov channels (FSMCs). The FSMC model is used to approximate the time variations of the average received signal-to-noise ratio (SNR), channel power gain, and remaining power of nodes. In addition, the candidate cooperative nodes can be selected as relay and jammer, respectively, to assist the transmission or disturb the eavesdropper. Thus, we can formulate a restless bandit problem to model and analyze how to select the optimal relay-jammer pair according to the desired QoS optimization goals, in terms of energy balance, mitigating error propagation and increasing secrecy capacity (SC). The obtained simulation results show that our proposed schemes outperform the other existing schemes.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74673970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constructing time-varying contact graphs for heterogeneous delay tolerant networks 异构容延迟网络的时变接触图构造
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503963
X. Hong, Bo Gu, Yuguang Zeng, Jingyuan Zhang
Human mobility, hence the movement pattern of mobile devices, often confines to relatively local geographic areas. Such a movement pattern reduces the opportunities for a message to be disseminated to a more global geographical region using the encounter-based “store-carry-forward” routing approach. On the other hand, different local areas often overlap to cover the entire region. A feasible communication architecture to help message dissemination is to deploy static storage-and-communication devices at those overlapping areas to serve as relays between the local areas. In this paper, we introduce the method to derive the simulation model for this heterogeneous network from contact trace and GPS trace of buses. Our main focus is to model communication properties between the static nodes and the mobile nodes. Typically, they are time-varying link delays formed by a collection of multiple mobile nodes. We further use a Markovian model to describe the time dependency among link delays at each static nodes and use the states to develop a network model for simulation. In the paper, we present simulation results to validate the reproduction of the mobility with the original traces by comparing routing performance. We show that the proposed network model can be used for performance evaluations with inherited realistic. The contributions of this work reside in the reproducibility to the real world traces and its flexibility in configurations. Further, it is the first simulator that enables to produce contact graph for a heterogeneous network with time-varying link properties. Its ability goes beyond simply calculating encounter events, but is well suitable for protocol evaluation in opportunistic networks, mobile social networks and delay tolerant networks.
人类的移动性,因此移动设备的移动模式,往往局限于相对局部的地理区域。这种移动模式减少了使用基于偶遇的“存储-向前转”路由方法将消息传播到更全球化地理区域的机会。另一方面,不同的局部区域往往重叠覆盖整个区域。在这些重叠区域部署静态存储通信设备,作为局部区域之间的中继,是帮助消息传播的一种可行的通信架构。本文介绍了利用总线的接触迹线和GPS迹线推导异构网络仿真模型的方法。我们的主要重点是对静态节点和移动节点之间的通信属性进行建模。通常,它们是由多个移动节点的集合形成的时变链路延迟。我们进一步使用马尔可夫模型来描述每个静态节点的链路延迟之间的时间依赖性,并使用这些状态来开发用于仿真的网络模型。在本文中,我们给出了仿真结果,通过比较路由性能来验证迁移率与原始迹线的再现。结果表明,所提出的网络模型可用于具有继承现实性的性能评估。这项工作的贡献在于对现实世界痕迹的再现性及其配置的灵活性。此外,它是第一个能够为具有时变链路属性的异构网络生成接触图的模拟器。它的能力超越了简单地计算相遇事件,而非常适合于机会网络、移动社交网络和延迟容忍网络中的协议评估。
{"title":"Constructing time-varying contact graphs for heterogeneous delay tolerant networks","authors":"X. Hong, Bo Gu, Yuguang Zeng, Jingyuan Zhang","doi":"10.1109/GLOCOM.2012.6503963","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503963","url":null,"abstract":"Human mobility, hence the movement pattern of mobile devices, often confines to relatively local geographic areas. Such a movement pattern reduces the opportunities for a message to be disseminated to a more global geographical region using the encounter-based “store-carry-forward” routing approach. On the other hand, different local areas often overlap to cover the entire region. A feasible communication architecture to help message dissemination is to deploy static storage-and-communication devices at those overlapping areas to serve as relays between the local areas. In this paper, we introduce the method to derive the simulation model for this heterogeneous network from contact trace and GPS trace of buses. Our main focus is to model communication properties between the static nodes and the mobile nodes. Typically, they are time-varying link delays formed by a collection of multiple mobile nodes. We further use a Markovian model to describe the time dependency among link delays at each static nodes and use the states to develop a network model for simulation. In the paper, we present simulation results to validate the reproduction of the mobility with the original traces by comparing routing performance. We show that the proposed network model can be used for performance evaluations with inherited realistic. The contributions of this work reside in the reproducibility to the real world traces and its flexibility in configurations. Further, it is the first simulator that enables to produce contact graph for a heterogeneous network with time-varying link properties. Its ability goes beyond simply calculating encounter events, but is well suitable for protocol evaluation in opportunistic networks, mobile social networks and delay tolerant networks.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80370126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rate adaptation strategy for video streaming over multiple wireless access networks 多无线接入网络视频流的速率自适应策略
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6504037
Min Xing, Siyuan Xiang, Lin X. Cai
Video streaming is gaining popularity among mobile users. The latest mobile devices, such as smart phones and tablets are equipped with multiple wireless network interfaces. How to efficiently and cost-effectively utilize multiple links to improve the video streaming quality needs to be investigated. In order to maintain high video streaming quality while reduce the wireless service cost, in this paper, the optimal video streaming process with multiple links is formulated as a Markov Decision Process (MDP). The reward function is designed to consider the quality of experience (QoE) requirements for video traffic, such as the interruption rate, average playback quality, playback smoothness and wireless service cost. Using dynamic programming, the MDP can be solved to obtain the optimal streaming policy. To evaluate the performance of the proposed multi-link rate adaptation (MLRA) algorithm, we implement a testbed using the Android mobile phone and the open-source X264 video codec. Experimental results demonstrate the feasibility and effectiveness of the proposed MLRA algorithm for mobile video streaming applications, which outperforms the existing state-of-the-art one.
视频流媒体在移动用户中越来越受欢迎。最新的移动设备,如智能手机和平板电脑,都配备了多个无线网络接口。如何高效、经济地利用多链路来提高视频流的质量是一个需要研究的问题。为了在保持高视频流质量的同时降低无线业务成本,本文将多链路的最优视频流过程表述为马尔可夫决策过程(Markov Decision process, MDP)。奖励函数的设计考虑了视频流量对体验质量(QoE)的要求,如中断率、平均播放质量、播放平滑度和无线服务成本。利用动态规划方法求解MDP,得到最优流策略。为了评估所提出的多链路速率自适应(MLRA)算法的性能,我们在Android手机和开源的X264视频编解码器上实现了一个测试平台。实验结果表明,本文提出的MLRA算法在移动视频流应用中的可行性和有效性,优于现有的最先进算法。
{"title":"Rate adaptation strategy for video streaming over multiple wireless access networks","authors":"Min Xing, Siyuan Xiang, Lin X. Cai","doi":"10.1109/GLOCOM.2012.6504037","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6504037","url":null,"abstract":"Video streaming is gaining popularity among mobile users. The latest mobile devices, such as smart phones and tablets are equipped with multiple wireless network interfaces. How to efficiently and cost-effectively utilize multiple links to improve the video streaming quality needs to be investigated. In order to maintain high video streaming quality while reduce the wireless service cost, in this paper, the optimal video streaming process with multiple links is formulated as a Markov Decision Process (MDP). The reward function is designed to consider the quality of experience (QoE) requirements for video traffic, such as the interruption rate, average playback quality, playback smoothness and wireless service cost. Using dynamic programming, the MDP can be solved to obtain the optimal streaming policy. To evaluate the performance of the proposed multi-link rate adaptation (MLRA) algorithm, we implement a testbed using the Android mobile phone and the open-source X264 video codec. Experimental results demonstrate the feasibility and effectiveness of the proposed MLRA algorithm for mobile video streaming applications, which outperforms the existing state-of-the-art one.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87662481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Prediction handover trigger scheme for reducing handover latency in two-tier Femtocell networks 减少两层Femtocell网络切换延迟的预测切换触发方案
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503934
Hongjia Li, S. Ci, Zejue Wang
Service continuity in two-tier Femtocell networks, especially impaired by the handover latency, remains as a problem to be solved. Motivated by this problems, a Layer 3 prediction handover scheme is proposed, which can be integrated into the user equipment (UE) part of industry-preferable mobile-assisted network-controlled handover (MANCH). The main contributions of the proposed scheme include: 1) based on time series analysis theory, the prediction model of Layer 3 (L3) filtered reference signal received power (RSRP) is constructed to activate L3 handover prior to Layer 2 (L2) handover procedure; 2) in order to improve the reliability and robustness of the L3 prediction model, a two-priority handover trigger event evaluation method is designed, where the classical and prediction handover trigger event evaluation parts co-exist, and the former is prior to the latter; 3) the relationship between defined prediction handover gain (PHG) and the probability of false handover prediction trigger is derived. In simulations, to evaluate the robustness of the proposed scheme, a module of UEs' movement pattern is designed, considering characteristics of the UE's movement pattern. Results of the performance evaluation show that handover latency of indoor handover UEs can be effectively reduced with high prediction accuracy.
两层Femtocell网络的业务连续性,特别是切换延迟的影响,仍然是一个有待解决的问题。针对这些问题,提出了一种三层预测切换方案,该方案可以集成到行业首选的移动辅助网控切换(MANCH)的用户设备部分。该方案的主要贡献包括:1)基于时间序列分析理论,构建了第3层(L3)滤波后参考信号接收功率(RSRP)预测模型,在第2层(L2)切换之前激活L3切换;2)为了提高L3预测模型的可靠性和鲁棒性,设计了经典切换触发事件评估部分和预测切换触发事件评估部分并存且前者优先于后者的双优先级切换触发事件评估方法;3)推导了预测切换增益(PHG)与切换预测触发错误概率之间的关系。在仿真中,为了评估所提方案的鲁棒性,考虑了UE运动模式的特点,设计了UE运动模式模块。性能评估结果表明,该方法能有效降低室内切换ue的切换延迟,预测精度较高。
{"title":"Prediction handover trigger scheme for reducing handover latency in two-tier Femtocell networks","authors":"Hongjia Li, S. Ci, Zejue Wang","doi":"10.1109/GLOCOM.2012.6503934","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503934","url":null,"abstract":"Service continuity in two-tier Femtocell networks, especially impaired by the handover latency, remains as a problem to be solved. Motivated by this problems, a Layer 3 prediction handover scheme is proposed, which can be integrated into the user equipment (UE) part of industry-preferable mobile-assisted network-controlled handover (MANCH). The main contributions of the proposed scheme include: 1) based on time series analysis theory, the prediction model of Layer 3 (L3) filtered reference signal received power (RSRP) is constructed to activate L3 handover prior to Layer 2 (L2) handover procedure; 2) in order to improve the reliability and robustness of the L3 prediction model, a two-priority handover trigger event evaluation method is designed, where the classical and prediction handover trigger event evaluation parts co-exist, and the former is prior to the latter; 3) the relationship between defined prediction handover gain (PHG) and the probability of false handover prediction trigger is derived. In simulations, to evaluate the robustness of the proposed scheme, a module of UEs' movement pattern is designed, considering characteristics of the UE's movement pattern. Results of the performance evaluation show that handover latency of indoor handover UEs can be effectively reduced with high prediction accuracy.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76635245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secret key agreement for cooperative wireless communications: bounds and efficient protocol design 协作无线通信的密钥协议:边界和高效协议设计
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503481
Ning Wang, Ning Zhang, T. Gulliver
We study practical information-theoretically secure secret key agreement protocol design for wireless cooperative communication networks. By assuming the relay selection process is finished in advance, we study the key agreement problem for a classical three-node cooperative wireless communication system over independent additive white Gaussian noise (AWGN) channels. Passive attacks from an eavesdropper collocated with the relay are assumed. We derive upper and lower bounds on the secret key rate under the assumed cooperative wireless system model and find that they are close, which indicates the tightness of the bounds. We then propose an efficient practical secret key agreement protocol with both Bob and the honest relay participating in the public discussion. A compromise between security and efficiency is achieved by the joint advantage distillation and privacy amplification.
研究了无线协作通信网络中实用的信息理论安全密钥协议设计。在假设中继选择过程已经提前完成的前提下,研究了独立加性高斯白噪声(AWGN)信道上经典三节点协作无线通信系统的关键协议问题。假设来自与中继配置在一起的窃听者的被动攻击。在假设的协作无线系统模型下,我们推导出了密钥速率的上下界,发现它们是接近的,这表明了边界的严密性。然后,我们提出一个有效实用的密钥协议,Bob和诚实中继都参与公共讨论。通过优势升华和隐私放大的结合,实现了安全与效率的折衷。
{"title":"Secret key agreement for cooperative wireless communications: bounds and efficient protocol design","authors":"Ning Wang, Ning Zhang, T. Gulliver","doi":"10.1109/GLOCOM.2012.6503481","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503481","url":null,"abstract":"We study practical information-theoretically secure secret key agreement protocol design for wireless cooperative communication networks. By assuming the relay selection process is finished in advance, we study the key agreement problem for a classical three-node cooperative wireless communication system over independent additive white Gaussian noise (AWGN) channels. Passive attacks from an eavesdropper collocated with the relay are assumed. We derive upper and lower bounds on the secret key rate under the assumed cooperative wireless system model and find that they are close, which indicates the tightness of the bounds. We then propose an efficient practical secret key agreement protocol with both Bob and the honest relay participating in the public discussion. A compromise between security and efficiency is achieved by the joint advantage distillation and privacy amplification.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78554131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Bayesian compressive sensing for ultra-wideband channel estimation 基于增强贝叶斯压缩感知的超宽带信道估计
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503753
Xiantao Cheng, Y. Guan, Guangrong Yue, Shaoqian Li
This paper addresses the application of the emerging compressive sensing (CS) technology to the detection of ultra-wideband (UWB) signals. Capitalizing on the sparseness of random UWB signals in the basis of eigen-functions, we develop a new CS dictionary called eigen- dictionary. Coupled with this eigen-dictionary, an enhanced Bayesian learning procedure is proposed to reconstruct the sparse UWB signal from a small collection of random projection measurements. Furthermore, by utilizing a common sparsity profile inherent in UWB signals, the proposed Bayesian algorithm naturally lends itself to multi-task CS for simultaneously recovering multiple UWB signals. Since the statistical inter-relationships between different CS tasks are exploited, the multi-task (MT) Bayesian CS can efficiently improve the reconstruction accuracy and thus the performance of UWB communications. Simulations based on real UWB data demonstrate the advantages of the proposed approach over its counterparts.
本文讨论了新兴的压缩感知(CS)技术在超宽带信号检测中的应用。利用随机超宽带信号在特征函数基础上的稀疏性,我们开发了一种新的CS字典——特征字典。结合该特征字典,提出了一种增强的贝叶斯学习方法,用于从少量随机投影测量数据中重建稀疏的超宽带信号。此外,通过利用超宽带信号固有的共同稀疏性,所提出的贝叶斯算法自然适合于同时恢复多个超宽带信号的多任务CS。由于利用了不同CS任务之间的统计相互关系,多任务贝叶斯CS可以有效地提高重建精度,从而提高超宽带通信性能。基于真实UWB数据的仿真证明了该方法的优越性。
{"title":"Enhanced Bayesian compressive sensing for ultra-wideband channel estimation","authors":"Xiantao Cheng, Y. Guan, Guangrong Yue, Shaoqian Li","doi":"10.1109/GLOCOM.2012.6503753","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503753","url":null,"abstract":"This paper addresses the application of the emerging compressive sensing (CS) technology to the detection of ultra-wideband (UWB) signals. Capitalizing on the sparseness of random UWB signals in the basis of eigen-functions, we develop a new CS dictionary called eigen- dictionary. Coupled with this eigen-dictionary, an enhanced Bayesian learning procedure is proposed to reconstruct the sparse UWB signal from a small collection of random projection measurements. Furthermore, by utilizing a common sparsity profile inherent in UWB signals, the proposed Bayesian algorithm naturally lends itself to multi-task CS for simultaneously recovering multiple UWB signals. Since the statistical inter-relationships between different CS tasks are exploited, the multi-task (MT) Bayesian CS can efficiently improve the reconstruction accuracy and thus the performance of UWB communications. Simulations based on real UWB data demonstrate the advantages of the proposed approach over its counterparts.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90660710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Precoding strategy based on SLR for secure communication in MUME wiretap systems 基于单反的MUME窃听系统安全通信预编码策略
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503208
Kun Xie, Wen Chen
Secure communication in the Multi-user and Multi-eavesdropper (MUME) scenario is considered in this paper. It has be shown that secrecy can be improved when the transmitter simultaneously transmits information signal to the legitimate receivers and artificial noise to confuse the eavesdroppers. Several processing schemes have been proposed to limit the co-channel interference (CCI). The conventional method and the ZF beamforming method are simple but of little ideal performance. While the block diagonalization (BD) method is of ideal performance but too complex. In this paper, we propose a new alternative approach based on maximizing the signal-to-leakage ratio (SLR). Simulations demonstrates that the proposed SLR method can achieve compromise between the secrecy performance and complexity.
本文研究了多用户多窃听者(MUME)场景下的安全通信问题。研究表明,在向合法的接收者发送信息信号的同时,利用人工噪声干扰窃听者,可以提高信息的保密性。为了限制同信道干扰(CCI),提出了几种处理方案。传统方法和ZF波束形成方法简单,但性能不理想。而块对角化(BD)方法虽然性能理想,但过于复杂。在本文中,我们提出了一种新的基于最大化信漏比(SLR)的替代方法。仿真结果表明,该方法可以在保密性能和复杂度之间取得折衷。
{"title":"Precoding strategy based on SLR for secure communication in MUME wiretap systems","authors":"Kun Xie, Wen Chen","doi":"10.1109/GLOCOM.2012.6503208","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503208","url":null,"abstract":"Secure communication in the Multi-user and Multi-eavesdropper (MUME) scenario is considered in this paper. It has be shown that secrecy can be improved when the transmitter simultaneously transmits information signal to the legitimate receivers and artificial noise to confuse the eavesdroppers. Several processing schemes have been proposed to limit the co-channel interference (CCI). The conventional method and the ZF beamforming method are simple but of little ideal performance. While the block diagonalization (BD) method is of ideal performance but too complex. In this paper, we propose a new alternative approach based on maximizing the signal-to-leakage ratio (SLR). Simulations demonstrates that the proposed SLR method can achieve compromise between the secrecy performance and complexity.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72694500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy-preserving and secure top-k query in two-tier wireless sensor network 两层无线传感器网络中的隐私保护和安全top-k查询
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503135
Xiaojing Liao, Jianzhong Li
In two-tier wireless sensor networks, resource-rich storage nodes at the upper tier collect sensing data from resource-poor sensor nodes at the low tier, and then answer queries from the user. Sensor nodes perform sensing task and submit sensing data in one time-slot to the nearest storage node while storage nodes answer and process the query from the network owner. However the storage nodes confront serious security concerns. Storage nodes may be compromised and leak the sensitive data as well as returning fake query result. Therefore, it is important to protect the privacy and verify the query results. In this paper, we define and solve the practical and challenging problem of privacy-preserving and verifiable top-k query processing performed on the time-slot sensing data set in two-tier sensor network, and establish a set of privacy and correctness requirements for such a secure top-k query scheme to become a reality. We propose the basic PriSecTopk scheme by using order-preserving encryption, and then improve it step by step to achieve various privacy requirements as well as the correctness requirements in three levels of threat models. Theoretical analysis and experiment on the real-world data set successfully validate the efficacy and efficiency of the proposed schemes.
在两层无线传感器网络中,上层资源丰富的存储节点从下层资源贫乏的传感器节点收集传感数据,然后回答用户的查询。传感器节点执行感知任务,在一个时隙内向最近的存储节点提交感知数据,存储节点回答并处理网络所有者的查询。然而,存储节点面临着严重的安全问题。存储节点可能被入侵,导致敏感数据泄露,并返回虚假的查询结果。因此,保护隐私和验证查询结果非常重要。在本文中,我们定义并解决了在两层传感器网络中对时隙感知数据集进行隐私保护和可验证的top-k查询处理的实际和具有挑战性的问题,并为这种安全的top-k查询方案成为现实建立了一套隐私和正确性要求。提出了基于保序加密的基本PriSecTopk方案,并对其进行了逐步改进,以满足三级威胁模型的各种隐私要求和正确性要求。理论分析和实际数据集实验成功地验证了所提方案的有效性和高效性。
{"title":"Privacy-preserving and secure top-k query in two-tier wireless sensor network","authors":"Xiaojing Liao, Jianzhong Li","doi":"10.1109/GLOCOM.2012.6503135","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503135","url":null,"abstract":"In two-tier wireless sensor networks, resource-rich storage nodes at the upper tier collect sensing data from resource-poor sensor nodes at the low tier, and then answer queries from the user. Sensor nodes perform sensing task and submit sensing data in one time-slot to the nearest storage node while storage nodes answer and process the query from the network owner. However the storage nodes confront serious security concerns. Storage nodes may be compromised and leak the sensitive data as well as returning fake query result. Therefore, it is important to protect the privacy and verify the query results. In this paper, we define and solve the practical and challenging problem of privacy-preserving and verifiable top-k query processing performed on the time-slot sensing data set in two-tier sensor network, and establish a set of privacy and correctness requirements for such a secure top-k query scheme to become a reality. We propose the basic PriSecTopk scheme by using order-preserving encryption, and then improve it step by step to achieve various privacy requirements as well as the correctness requirements in three levels of threat models. Theoretical analysis and experiment on the real-world data set successfully validate the efficacy and efficiency of the proposed schemes.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74084063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Greedy strategy for network coding based reliable broadcast in wireless mesh networks 无线网状网络中基于可靠广播的贪婪网络编码策略
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6504017
Xiaobin Tan, Hao Yue, Yuguang Fang, Wenfei Cheng
Reliable broadcast is an important communication primitive for wireless mesh networks, which has many applications such as multimedia services and software upgrade. Recently, network coding is introduced into reliable broadcast to enhance the throughput of data transmissions. Existing network coding based reliable broadcast schemes, such as Pacifier and R-Code, fail to take advantage of the unique characteristic of reliable broadcast or the broadcast nature of wireless transmissions, which leads to redundant transmissions and performance degradation. In this paper, we propose a greedy strategy for network coding based reliable broadcast, which is called GreedyCode. GreedyCode opportunistically selects the forwarders with the highest transmission efficiency to transmit the encoded packets while the neighbors just listen. In order to measure the efficiency of broadcast transmission of a node, we also define a metric named One-hop Broadcast Throughput (OBT), which considers not only the current reception status of the destinations but also the quality of the broadcast link. Because GreedyCode only needs the information of its one-hop neighbors, so it can be distributed realized. The simulation results show that GreedyCode achieves 100% packet delivery ratio (PDR) and significantly reduces the number of transmissions and the broadcast delay.
可靠广播是无线网状网络的重要通信原语,具有多媒体业务和软件升级等多种应用。近年来,为了提高数据传输的吞吐量,在可靠广播中引入了网络编码。现有的基于网络编码的可靠广播方案,如Pacifier、R-Code等,没有充分利用可靠广播的独特特性和无线传输的广播性,导致传输冗余,性能下降。本文提出了一种基于可靠广播的网络编码贪婪策略,称为GreedyCode。GreedyCode投机地选择传输效率最高的转发器来传输编码后的数据包,而邻居只是监听。为了衡量一个节点的广播传输效率,我们还定义了一跳广播吞吐量(OBT)指标,该指标不仅考虑了目的地当前的接收状态,还考虑了广播链路的质量。由于GreedyCode只需要它的一跳邻居的信息,所以它可以被分布式实现。仿真结果表明,GreedyCode实现了100%的分组分发率(PDR),并显著减少了传输次数和广播延迟。
{"title":"Greedy strategy for network coding based reliable broadcast in wireless mesh networks","authors":"Xiaobin Tan, Hao Yue, Yuguang Fang, Wenfei Cheng","doi":"10.1109/GLOCOM.2012.6504017","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6504017","url":null,"abstract":"Reliable broadcast is an important communication primitive for wireless mesh networks, which has many applications such as multimedia services and software upgrade. Recently, network coding is introduced into reliable broadcast to enhance the throughput of data transmissions. Existing network coding based reliable broadcast schemes, such as Pacifier and R-Code, fail to take advantage of the unique characteristic of reliable broadcast or the broadcast nature of wireless transmissions, which leads to redundant transmissions and performance degradation. In this paper, we propose a greedy strategy for network coding based reliable broadcast, which is called GreedyCode. GreedyCode opportunistically selects the forwarders with the highest transmission efficiency to transmit the encoded packets while the neighbors just listen. In order to measure the efficiency of broadcast transmission of a node, we also define a metric named One-hop Broadcast Throughput (OBT), which considers not only the current reception status of the destinations but also the quality of the broadcast link. Because GreedyCode only needs the information of its one-hop neighbors, so it can be distributed realized. The simulation results show that GreedyCode achieves 100% packet delivery ratio (PDR) and significantly reduces the number of transmissions and the broadcast delay.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81699700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Toward MAC Protocol Service over the air 无线MAC协议服务
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503154
Tae-Suk Kim, T. Park, M. Sha, Chenyang Lu
With the rapid permeation of smartphones and wireless sensors in our society, smartphones are poised to become personal hubs connecting wireless sensors with users and the Internet. Due to frequent changes to applications and network conditions, wireless networks connecting a personal hub and wireless sensors must meet time-varying QoS requirements at minimal energy cost. This paper presents the architecture of a novel Protocol Service System (PSS) towards the vision of protocol service over the air. In contrast to traditional wireless networks where a single MAC protocol is statically selected a priori, PSS switches among multiple MAC protocols at run time to dynamically optimize power efficiency subject and meet current QoS requirements. To meet the memory constraint on wireless sensors PSS employs a component-based reconfigurable MAC architecture to support multiple MAC protocols at significantly reduced memory footprint through component sharing. The feasibility of PSS has been demonstrated through a proof-of-concept implementation of the PSS architecture and the development of a personal hub prototype running the Android OS.
随着智能手机和无线传感器在社会中的迅速普及,智能手机将成为连接无线传感器与用户和互联网的个人枢纽。由于应用程序和网络条件的频繁变化,连接个人集线器和无线传感器的无线网络必须以最小的能量成本满足时变的QoS要求。提出了一种面向空中协议服务的新型协议服务系统(PSS)体系结构。与传统无线网络静态先验选择单一MAC协议不同,PSS在运行时在多个MAC协议之间切换,动态优化能效主体,满足当前QoS要求。为了满足无线传感器的内存限制,PSS采用基于组件的可重构MAC架构来支持多种MAC协议,通过组件共享显著减少内存占用。通过PSS架构的概念验证实现和运行Android操作系统的个人集线器原型的开发,PSS的可行性得到了验证。
{"title":"Toward MAC Protocol Service over the air","authors":"Tae-Suk Kim, T. Park, M. Sha, Chenyang Lu","doi":"10.1109/GLOCOM.2012.6503154","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503154","url":null,"abstract":"With the rapid permeation of smartphones and wireless sensors in our society, smartphones are poised to become personal hubs connecting wireless sensors with users and the Internet. Due to frequent changes to applications and network conditions, wireless networks connecting a personal hub and wireless sensors must meet time-varying QoS requirements at minimal energy cost. This paper presents the architecture of a novel Protocol Service System (PSS) towards the vision of protocol service over the air. In contrast to traditional wireless networks where a single MAC protocol is statically selected a priori, PSS switches among multiple MAC protocols at run time to dynamically optimize power efficiency subject and meet current QoS requirements. To meet the memory constraint on wireless sensors PSS employs a component-based reconfigurable MAC architecture to support multiple MAC protocols at significantly reduced memory footprint through component sharing. The feasibility of PSS has been demonstrated through a proof-of-concept implementation of the PSS architecture and the development of a personal hub prototype running the Android OS.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85509026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
... IEEE Global Communications Conference. IEEE Global Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1