2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)最新文献

筛选
英文 中文
A simultaneous network search scheme for fast roaming and handover of the simultaneous voice and LTE mobile devices 一种同步网络搜索方案,用于同步语音和LTE移动设备的快速漫游和切换
Minsu Ko, Myung-Gyun Kim, Sungwon Kang
{"title":"A simultaneous network search scheme for fast roaming and handover of the simultaneous voice and LTE mobile devices","authors":"Minsu Ko, Myung-Gyun Kim, Sungwon Kang","doi":"10.5220/0005037600360043","DOIUrl":"https://doi.org/10.5220/0005037600360043","url":null,"abstract":"Most of the countries in the world are currently providing 2G or 3G mobile communication services with limited coverage of LTE services. Therefore when an LTE service user moves into or around such countries, the LTE terminal needs to roam or handover to 2G or 3G network for service quality. For LTE terminals that can be connected to 3GPP Legacy (such as GSM, UMTS, and HSPA) and CDMA networks, it normally takes more than 2 minutes to select one of several candidate networks for roaming and 20 seconds to 2 minutes to handover to other networks before getting out of the LTE service area, which is considered very long by many LTE users. This paper proposes a scheme for fast roaming and handover that simultaneously searches for multiple networks with a Dual RF LTE terminal for both voice and data communication. In our experiment with the simultaneous network search implemented in a commercial LTE terminal with dual RF, the network selection time for roaming was reduced by 15% to 40% and the delay time for handover in LTE network was reduced by 90%.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124889291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the cooperativeness of users in Wi-Fi networks Wi-Fi网络中用户的协作性评估
S. Szott, Grzegorz Ptaszek, L. Janowski
{"title":"Assessing the cooperativeness of users in Wi-Fi networks","authors":"S. Szott, Grzegorz Ptaszek, L. Janowski","doi":"10.5220/0005117300600064","DOIUrl":"https://doi.org/10.5220/0005117300600064","url":null,"abstract":"Wi-Fi networks are based on the cooperation of users in sharing a common resource — the radio channel. This is a security risk because users may behave selfishly to increase their own throughput but at the same time decrease the overall network performance. Many scientific analyses have focused on this problem, but none have taken into account real user behavior. We present the initial results of a work-in-progress in which we studied a group of users in terms of their online behavior as well as their psychological characteristics. We have found that users behave selfishly in a wireless setting, regardless of their cooperative nature. We provide lessons learned as well as pose open questions for further research in this field.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource allocation in GMD and SVD-based MIMO system 基于GMD和svd的MIMO系统资源分配
A. Ahrens, Francisco Cano-Broncano, C. Benavente-Peces
{"title":"Resource allocation in GMD and SVD-based MIMO system","authors":"A. Ahrens, Francisco Cano-Broncano, C. Benavente-Peces","doi":"10.5220/0005020300270035","DOIUrl":"https://doi.org/10.5220/0005020300270035","url":null,"abstract":"Singular-value decomposition (SVD)-based multiple-input multiple output (MIMO) systems, where the whole MIMO channel is decomposed into a number of unequally weighted single-input single-output (SISO) channels, have attracted a lot of attention in the wireless community. The unequal weighting of the SISO channels has led to intensive research on bit- and power allocation even in MIMO channel situation with poor scattering conditions identified as the antennas correlation effect. In this situation, the unequal weighting of the SISO channels becomes even much stronger. In comparison to the SVD-assisted MIMO transmission, geometric mean decomposition (GMD)-based MIMO systems are able to compensate the drawback of weighted SISO channels when using SVD, where the decomposition result is nearly independent of the antennas correlation effect. The remaining interferences after the GMD-based signal processing can be easily removed by using dirty paper precoding as demonstrated in this work. Our results show that GMD-based MIMO transmission has the potential to significantly simplify the bit and power loading processes and outperforms the SVD-based MIMO transmission as long as the same QAM-constellation size is used on all equally-weighted SISO channels.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133626184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification technology of mobile phone devices using RFF 基于RFF的手机设备识别技术
S. Japertas, A. Budnikas, G. Cincikas
{"title":"Identification technology of mobile phone devices using RFF","authors":"S. Japertas, A. Budnikas, G. Cincikas","doi":"10.5220/0005011800470052","DOIUrl":"https://doi.org/10.5220/0005011800470052","url":null,"abstract":"The vulnerability of the device identifiers, such as IP and MAC addresses, IMEI and IMSI codes, etc. creates threat to the information security, integrity and reliability. One of the solutions of this threat is usage of Radio Frequency Fingerprinting (RFF) technology for identifying wireless devices based on their unique radiation “fingerprint” as opposed to their addresses or codes. In this work identification problems of mobile radio stations (from here in — mobile phones) are being analyzed and identification methodology for identifying them based on the mathematical processing of front and rear fronts is proposed. All of this provides new insight in the field of signal detection and identification, thus by using this method only the original data is received. The purpose of this work is identification of a mobile phone, working on the DCS (digital cellular service) frequency, based on the phone's radiated signal time characteristics.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128948903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A balanced battery usage routing protocol to maximize network lifetime of MANET based on AODV 基于AODV的均衡电池使用路由协议最大化网络寿命
Esubalew Yitayal, J. Pierson, D. Ejigu
{"title":"A balanced battery usage routing protocol to maximize network lifetime of MANET based on AODV","authors":"Esubalew Yitayal, J. Pierson, D. Ejigu","doi":"10.1007/978-3-319-10353-2_23","DOIUrl":"https://doi.org/10.1007/978-3-319-10353-2_23","url":null,"abstract":"","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Impact of the IEEE 802.11aa intra-AC prioritization on QoE for H.264 compression IEEE 802.11aa ac内优先级对H.264压缩QoE的影响
Katarzyna Kosek-Szott, M. Natkaniec, Lukasz Prasnal, L. Janowski
{"title":"Impact of the IEEE 802.11aa intra-AC prioritization on QoE for H.264 compression","authors":"Katarzyna Kosek-Szott, M. Natkaniec, Lukasz Prasnal, L. Janowski","doi":"10.5220/0005118800650070","DOIUrl":"https://doi.org/10.5220/0005118800650070","url":null,"abstract":"Recently, a new 802.11aa amendment has been released. Its main goal is to increase quality of service support for audio-video traffic streams. Among others, it defines the intra-access category prioritization mechanism coupled with appropriate traffic selection procedures, in order to increase the granularity of traffic prioritization in comparison to the currently used EDCA. This paper presents the preliminary study of the possible impact of the new feature on quality of experience (QoE) in case of H.264 video streams. The obtained results show that IEEE 802.11aa and 802.1Q parameters should be tuned to efficiently use the available bandwidth.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123919557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved secure Neighbor Discovery Protocol (ISEND) for new wireless networks generations 改进了新一代无线网络的安全邻居发现协议(ISEND)
Imen Elbouabidi, S. Smaoui, F. Zarai, M. Obaidat, L. Kamoun
{"title":"Improved secure Neighbor Discovery Protocol (ISEND) for new wireless networks generations","authors":"Imen Elbouabidi, S. Smaoui, F. Zarai, M. Obaidat, L. Kamoun","doi":"10.5220/0005123300710077","DOIUrl":"https://doi.org/10.5220/0005123300710077","url":null,"abstract":"In charge of several critical functionalities, the Neighbor Discovery Protocol (NDP) is used by IPv6 nodes to find out nodes on the link, to learn their link-layer addresses to discover routers, and to preserve reachability information about the paths to active neighbors. Given its important and multifaceted role, security and efficiency must be ensured. However, NDP is vulnerable to critical attacks such as spoofing address, denial-of-service (DoS) and reply attack. Thus, in order to protect the NDP protocol, the Secure Neighbor Discovery (SEND) was designed. Nevertheless, SEND's protection still suffers from numerous threats and it is currently incompatible with the context of mobility and especially with the proxy Neighbor Discovery function used in Mobile IPv6. To overcome these limitations, this paper defines a new protocol named Improved Secure Neighbor Discovery (ISEND) which adapt SEND protocol to the context of mobility and extend it to new functionalities. The proposed protocol (ISEND) has been modeled and verified using the Security Protocol ANimator software (SPAN) for the Automated Validation of Internet Security Protocols and Applications (AVISPA) which have proved that authentication goals are achieved. Hence, the scheme is safe and efficient when an intruder is present.","PeriodicalId":106922,"journal":{"name":"2014 11th International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信