2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)最新文献

筛选
英文 中文
Up to 35 Gbps ultra-wideband wireless data transmission links 高达35gbps的超宽带无线数据传输链路
R. Puerta, S. Rommel, J. Olmos, I. Monroy
{"title":"Up to 35 Gbps ultra-wideband wireless data transmission links","authors":"R. Puerta, S. Rommel, J. Olmos, I. Monroy","doi":"10.1109/PIMRC.2016.7794775","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794775","url":null,"abstract":"For the first time Ultra-Wideband record data transmission rates up to 35.1 Gbps and 21.6 Gbps are achieved, compliant with the restrictions on the effective radiated power established by both the United States Federal Communications Commission and the European Electronic Communications Committee, respectively. To achieve these record bit rates, the multi-band approach of Carrierless Amplitude Phase modulation scheme was employed. Wireless transmissions were achieved with a BER below the 7% overhead FEC threshold of 3.810−3.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122436754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Graph-based detectors for filter bank multicarrier systems 滤波器组多载波系统的基于图的检测器
Fangyu Cui, Minjian Zhao, J. Zhong
{"title":"Graph-based detectors for filter bank multicarrier systems","authors":"Fangyu Cui, Minjian Zhao, J. Zhong","doi":"10.1109/PIMRC.2016.7794733","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794733","url":null,"abstract":"Filter Bank Multicarrier (FBMC) modulation is thought to be important in 5th generation (5G) wireless communication systems for its higher spectral efficiency than conventional orthogonal frequency division multiplexing (OFDM). In this paper, we apply a kind of soft-input-soft-output (SISO) factor-graph-based maximum-a-posterior (MAP) detector in FBMC systems. The detector has better performance than simple minimum mean square error (MMSE) and zero forcing (ZF) equalizers in coded systems. Its computational complexity grows linearly with the number of interferences which means a good tradeoff between performance and complexity. The simulation results show the good performance of the detector. And the complexity is also analyzed in this paper.1","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"30 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114041993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical adaptive trust establishment solution for vehicular networks 车联网分层自适应信任建立方案
Kerrache Chaker Abdelaziz, C. Calafate, N. Lagraa, Juan-Carlos Cano, P. Manzoni
{"title":"Hierarchical adaptive trust establishment solution for vehicular networks","authors":"Kerrache Chaker Abdelaziz, C. Calafate, N. Lagraa, Juan-Carlos Cano, P. Manzoni","doi":"10.1109/PIMRC.2016.7794617","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794617","url":null,"abstract":"Cooperative intelligent transportation systems (CITS), mainly represented by Vehicular Ad Hoc Networks (VANETs), were developed to enhance safety on roads before being generalized to support other comfort and efficiency applications. Most VANET applications, including safety ones, are based on multi-hop communications. Hence, a certain trustworthiness should exist among vehicles to ensure a reliable and trusted communication excluding dishonest peers from all network operations. In this paper we propose an hierarchical trust establishment solution able to cope with VANET applications and their requirements. Our solution is based on a three-level architecture, which enables it to adapt to the communication scenario and the required security level. Simulation results conducted done NS2 tool evidence that our solution is able to reach almost optimal attacker detection ratios (more than 90%) even in the presence of a significant number of attackers in the network (25%) while reducing the wrong relay decision ratios.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"36 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114124644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
CRRP: A cooperative relay routing protocol for IoT networks CRRP:物联网网络的协同中继路由协议
Jingwen Bai, Y. Sun, C. Phillips
{"title":"CRRP: A cooperative relay routing protocol for IoT networks","authors":"Jingwen Bai, Y. Sun, C. Phillips","doi":"10.1109/PIMRC.2016.7794844","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794844","url":null,"abstract":"Wireless communication is increasing along with improvements in chipset performance. New applications associated with the Internet of Things (IoT) often involve self-organization and collaboration among many autonomous wireless devices for which traditional infrastructure-based wireless networks are not suitable. Mobile Ad hoc Networks (MANETs), with their infrastructure-less, spontaneous and arbitrary multi-hop features are considered a popular approach for such scenarios, although they also face certain inherent challenges. These include: the limited communication range of each mobile node, power supply restrictions and frequent link breaks due to node movements. In this paper, in order to address the lack of a systematic cooperative routing scheme, we propose a novel protocol called Cooperative Relay Routing Protocol (CRRP) for data transmission in MANETs. Since node mobility can cause frequent radio link breaks, one of CRRP's pivotal design features is to enhance resilience, therefore improving the overall network throughput. This is achieved by forming localised cooperative (COP) topologies where appropriate. Furthermore, as nodes are often battery-powered, CRRP reduces the energy consumption when packets are forwarded by exploiting cooperative diversity. We assess the performance of CRRP via simulations and the results confirm its favorable operation compared to both classic and newer energy-aware MANET routing protocols.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114185991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transmission mode selection scheme for physical layer security in multi-user multi-relay systems 多用户多中继系统物理层安全传输模式选择方案
Asma Mabrouk, K. Tourki, N. Hamdi
{"title":"Transmission mode selection scheme for physical layer security in multi-user multi-relay systems","authors":"Asma Mabrouk, K. Tourki, N. Hamdi","doi":"10.1109/PIMRC.2016.7794719","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794719","url":null,"abstract":"We study a relay and user selection scheme to improve the secrecy performance of cooperative multi-user multiple amplify-and-forward (AF) relay network. Nevertheless, relay transmission is highly susceptible to eavesdropping since confidential information is broadcasted twice, i.e., by the source and the relay. In particular, we propose a cooperative jamming aided secure transmission through the relay path. Furthermore, with the presence of the direct path, a transmission mode selection scheme is elaborated in such a way to reduce the amount of information leaked to non-selected users in the system, who may overhear the source message as eavesdroppers. Specifically, the selected relay is only activated when it has better secrecy performance than the source. We study the impact of outdated channel state information (CSI) on the system by deriving a closed-form lower bound for the secrecy outage probability (SOP). By investigating the effect of the jamming power level and the correlation coefficients imbalance, a comparison reveals that the proposed scheme outperforms the fixed transmission modes and its signal-to-noise ratio based counterpart. It is shown that the secrecy outage probability can be decreased as the number of destinations grows unless the number of relays is small. Importantly, optimal relay location and jamming power allocation significantly enhance the secrecy performance.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Energy outage and achievable throughput in RF energy harvesting cognitive radio networks 射频能量收集认知无线网络中的能量中断与可实现吞吐量
Shannai Wu, Y. Shin, J. Kim, Dong In Kim
{"title":"Energy outage and achievable throughput in RF energy harvesting cognitive radio networks","authors":"Shannai Wu, Y. Shin, J. Kim, Dong In Kim","doi":"10.1109/PIMRC.2016.7794921","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794921","url":null,"abstract":"In radio frequency (RF) energy harvesting (EH) cognitive radio network (CRN), the EH secondary users (SUs) access an idle channel to transmit data and an occupied channel to harvest energy. Therefore, the EH SUs can reliably transmit data only if sufficient energy and an idle channel are available. In this paper, we analyze the probability that the EH SUs may completely run out of energy and the achievable throughput of the EH SUs is derived accordingly. To improve the throughput of the SUs, we consider a 2-channel sensing scheme that the EH SUs are allowed to sequentially sense up to 2 channels to further search for the opportunities for data transmission. Consequently, the opportunities for data transmission increase, while less opportunities are available for energy harvesting. To validate the proposed analysis, we use the Monte-Carlo simulation to show an agreement between the analytical and simulated values, and the simulation results turn out to be reasonably acceptable.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks 分析随机部署无线传感器网络中的间接Sybil攻击
P. Sarigiannidis, E. Karapistoli, A. Economides
{"title":"Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks","authors":"P. Sarigiannidis, E. Karapistoli, A. Economides","doi":"10.1109/PIMRC.2016.7794866","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794866","url":null,"abstract":"Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ultra-low latency service provision in 5G Fog-Radio Access Networks 5G雾-无线接入网的超低延迟业务提供
Te-Chuan Chiu, W. Chung, Ai-Chun Pang, Ya-Ju Yu, Pei-Hsuan Yen
{"title":"Ultra-low latency service provision in 5G Fog-Radio Access Networks","authors":"Te-Chuan Chiu, W. Chung, Ai-Chun Pang, Ya-Ju Yu, Pei-Hsuan Yen","doi":"10.1109/PIMRC.2016.7794956","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794956","url":null,"abstract":"With the increasing demand for ultra-low latency services in 5G cellular networks, fog with edge computing is one of promising solutions which migrate the computing from the cloud to the edge of the network. Rather than relying on the distant cloud or additional servers, we propose the Fog-Radio Access Network (F-RAN), which leverages the current infrastructures in the radio access network, such as small cells and macro base stations, to pursue the ultra-low latency by joint powerful computing of multiple F-RAN nodes and near-range communications at the edge. The optimization problem is firstly formulated to tackle the tradeoff between communication and computing resources into time domain within distributed computing scenario, and then we propose a cooperative task computing operation algorithm to simultaneously decide how many F-RAN nodes should be selected with proper communication resource allocation and computing task assignment. The numerical results show that the ultra low-latency services can be achieved by F-RAN via cooperative task computing.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Decentralized data dissemination and harvesting for urban monitoring 分散的数据传播和收集,用于城市监测
Milica Milojevic, J. Barria
{"title":"Decentralized data dissemination and harvesting for urban monitoring","authors":"Milica Milojevic, J. Barria","doi":"10.1109/PIMRC.2016.7794905","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794905","url":null,"abstract":"This paper presents a Decentralized data Dissemination and Harvesting (DDH) mechanism for urban pollution monitoring using mobile sensor nodes with limited resources. The proposed DDH mechanism enables participating nodes to self-decide whether to process the received data or not, thus, reducing the on-board processing load. Based on the harvested data, the nodes calculate their level of interest in monitoring the particular street segments. In this way a reduction in the number of actively participating nodes is accomplished. In addition, the mobile nodes process raw sensor readings using the Delayed State Information Filter (DSIF) to maintain the past pollution states and perform a decentralized data fusion. The proposed DDH mechanism is assessed using simulations with varying number of the participating nodes. The results show that the proposed mechanism outperforms existing solutions in terms of the utilisation of nodes resources, without affecting the amount of volume of gathered data for the monitored street segments.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129621329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Radio parameter design for OFDM-based millimeter-wave systems 基于ofdm的毫米波系统无线电参数设计
Lei Huang, Yi Wang, Zhenyu Shi, Ronghui Wen
{"title":"Radio parameter design for OFDM-based millimeter-wave systems","authors":"Lei Huang, Yi Wang, Zhenyu Shi, Ronghui Wen","doi":"10.1109/PIMRC.2016.7794620","DOIUrl":"https://doi.org/10.1109/PIMRC.2016.7794620","url":null,"abstract":"In this paper, the radio parameters are designed for OFDM-based millimeter-wave (mmWave) communication systems. Firstly, design principles are presented to meet 5G requirements. Secondly, the radio parameters including TTI length, CP length and sub-carrier spacing for mmWave bands are discussed. In particular the impact of phase noise on subcarrier spacing is analyzed in detail. It shows that the phase noise dominates the sub-carrier spacing design. Based on the measured phase noise model, minimum sub-carrier spacing of 250 kHz and 500 kHz is inferred for typical mmWave bands (30 GHz and 70 GHz). At last a numerology with 600 kHz sub-carrier spacing and 512 OFDM symbols per subframe (1 millisecond) is proposed as a unified one for all mmWave bands, which can satisfy the design principles of mmWave systems.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129950896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信