2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)最新文献

筛选
英文 中文
Study on the effects of self-similar traffic on the IEEE 802.15.4 wireless sensor networks 自相似流量对IEEE 802.15.4无线传感器网络的影响研究
Chi-Ming Wong, Huai-Kuei Wu
{"title":"Study on the effects of self-similar traffic on the IEEE 802.15.4 wireless sensor networks","authors":"Chi-Ming Wong, Huai-Kuei Wu","doi":"10.4108/EAI.19-8-2015.2260984","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260984","url":null,"abstract":"A significant number of previous studies have shown, however, network traffic exhibited frequently large bursty traffic possesses self-similar properties. For the future applications of wireless sensor networks (WSNs) with large number of cluster structures, such as Internet of Things (IoT) and smart grid, the network traffic should not be assumed as conventional Poisson process. We thus employ ON/OFF traffic source with the duration of heavy-tailed distribution in one or both of the states instead of Poisson traffic to be as the asymptotically self-similar traffic for experimenting on the performance of IEEE 802.15.4 WSNs. In this paper, we will show the impact on the performance of IEEE 802.15.4 WSNs in different traffic sources such as Poisson and Pareto ON/OFF distribution by ns2 simulator. For the Pareto ON/OFF distribution traffic, we demonstrate that the packet delay and throughput appear bursty-like high value in some certain time scales, especially for the low traffic load; and the throughput will be no longer bursty-like while the traffic load increases. Intuitively, the bursty-like high delay may result in loss of some important real-time packets. For the Poisson traffic, both the throughput and packet delay appear non-bursty, especially for the high traffic load.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Authenticating with privacy protection in opportunistic networks 机会主义网络中的身份验证与隐私保护
Ming-Huang Guo, H. Liaw, Meng-Yu Chiu, Li-Ping Tsai
{"title":"Authenticating with privacy protection in opportunistic networks","authors":"Ming-Huang Guo, H. Liaw, Meng-Yu Chiu, Li-Ping Tsai","doi":"10.4108/EAI.19-8-2015.2260862","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260862","url":null,"abstract":"In this study, we propose an authentication mechanism with privacy protection for opportunistic networks. It is applied for the short-term and limited-time wireless network environment, and a super node is set to manage node registration. The proposal implements some encryption and security technologies to against security threats and attacks. In the analysis, the proposed mechanism finishes the authentication with less data, and provides anonymity and user privacy in the network.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114143353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A reliable and energy efficient VBF-improved cross-layer protocol for underwater acoustic sensor network 一种可靠、节能的改进vbf的水声传感器网络跨层协议
Ning Sun, Guangjie Han, Tongtong Wu, Jinfang Jiang, Lei Shu
{"title":"A reliable and energy efficient VBF-improved cross-layer protocol for underwater acoustic sensor network","authors":"Ning Sun, Guangjie Han, Tongtong Wu, Jinfang Jiang, Lei Shu","doi":"10.4108/EAI.19-8-2015.2260909","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260909","url":null,"abstract":"Underwater sensor networks (USNs) has many characteristics different from terrestrial wireless sensor networks (WSNs), such as dynamic network topology, unreliable acoustic communication, which increases the difficulty in energy efficiency and reliability of data transmission, for traditional WSN protocols are not suitable for underwater acoustic sensor networks (UASNs). Vector based forwarding (VBF) protocol is an energy efficient routing protocol for UASNs, by using the location information of nodes to limit the scale of flooding so that to save energy consumption and handle the mobility of nodes. In this paper a cross-layer protocol is proposed, which not only utilizes the VBF-based routing algorithm, but also considers the residual energy and the times of data relay in a cycle time to make more optimized decision whether a node will forward data or not. According to the simulation results, more evenly energy consumption and reliable data transmission are achieved, compared to previous VBF-based routing protocols for UASNs.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cooperative jamming and beamforming in amplify-and-forward relay systems for physical-layer security 物理层安全放大转发中继系统中的协同干扰和波束形成
Henan Lei, Li Guo, Jianwei Zhang
{"title":"Cooperative jamming and beamforming in amplify-and-forward relay systems for physical-layer security","authors":"Henan Lei, Li Guo, Jianwei Zhang","doi":"10.4108/EAI.19-8-2015.2261538","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2261538","url":null,"abstract":"In this paper, we propose a hybrid cooperative beamforming and jamming scheme to enhance the physical-layer security in the two-way relay network with an eavesdropper and a primary receiver. Cooperative beamforming and jamming are designed to maximize the secrecy rate with a total transmit power constraint of the relays and interference power constraint at the primary receiver. The beamformer weights can be obtained by solving a semidefinite programming (SDP). And a method based on the first order Taylor polynomial which has lower complexity but comparable performance is introduced. Simulations show the joint scheme greatly improves the security.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130213941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A 3D geometry-based stochastic model for 5G massive MIMO channels 基于三维几何的5G海量MIMO信道随机模型
Yi Xie, Bo Li, Xiaoya Zuo, Mao Yang, Zhongjiang Yan
{"title":"A 3D geometry-based stochastic model for 5G massive MIMO channels","authors":"Yi Xie, Bo Li, Xiaoya Zuo, Mao Yang, Zhongjiang Yan","doi":"10.4108/eai.19-8-2015.2259755","DOIUrl":"https://doi.org/10.4108/eai.19-8-2015.2259755","url":null,"abstract":"Massive MIMO is one of the most promising technologies for the fifth generation (5G) mobile communication systems. In order to better assess the system performance, it is essential to build a corresponding channel model accurately. In this paper, a three-dimension (3D) two-cylinder regular-shaped geometry-based stochastic model (GBSM) for non-isotropic scattering massive MIMO channels is proposed. Based on geometric method, all the scatters are distributed on the surface of a cylinder as equivalent scatters. Non-stationary property is that one antenna has its own visible area of scatters by using a virtual sphere. The proposed channel model is evaluated by comparing with the 3GPP 3D channel model [1]. The statistical properties are investigated. Simulation results show that close agreements are achieved between the characteristics of the proposed channel model and those of the 3GPP channel model, which justify the correctness of the proposed model. The model has advantages such as good applicability.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Comprehensive learning particle swarm optimization with Tabu operator based on ripple neighborhood for global optimization 基于波纹邻域禁忌算子的综合学习粒子群全局优化
Jin Qi, Bin Xu, Kun Wang, Xi Yin, Xiaoxuan Hu, Yanfei Sun
{"title":"Comprehensive learning particle swarm optimization with Tabu operator based on ripple neighborhood for global optimization","authors":"Jin Qi, Bin Xu, Kun Wang, Xi Yin, Xiaoxuan Hu, Yanfei Sun","doi":"10.4108/EAI.19-8-2015.2260857","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260857","url":null,"abstract":"For the weak convergence at the latter stage of the comprehensive learning particle swarm optimizer (CLPSO), we put forward a new CLPSO based on Tabu search to enhance the performance. Inspired by the phenomenon of water waves, a Ripple Neighborhood (RP) structure based on the Gaussian distribution is proposed to construct a new adaptive neighborhood structure to guide the selection of candidate solutions in Tabu search, which solves the problem of low convergence and improves the quality of the solution in CLPSO. Experimental results on the standard 26 test functions show that the proposed algorithm achieves a better performance compared with CLPSO.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing a cloud virtual maintenance system for machine tools management 开发面向机床管理的云虚拟维护系统
Yueh-Ling Lin, Chih-Chieh Lin, Hung-Sheng Chiu
{"title":"Developing a cloud virtual maintenance system for machine tools management","authors":"Yueh-Ling Lin, Chih-Chieh Lin, Hung-Sheng Chiu","doi":"10.4108/EAI.19-8-2015.2261333","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2261333","url":null,"abstract":"Developing efficient maintenance system for Taiwan's machine-tool industry is important because of the cloud service enhancement recently. This study provides innovative maintenance system via cloud virtual computing for machine tool management. The virtual maintenance cloud is a monitoring system for precision manufacturing plant. The virtual maintenance cloud can combine eight kinds of numerical controllers following TMTC (Taiwan MTConnect Protocol). It is compatible with MTConnect function to build the client monitoring application services for the whole plant. The system provides 3 ways to determine the tool life cycle including tool usage frequency, tool usage time, and tool usage distance. A remote control platform was developed for controlling specific number of tools. The system can extract numerical controller data across various brands to achieve the whole plant monitoring. The proposed system was demonstrated by following TMTC communication protocol to develop tool management and application services for machine tool industry. The tool life management system can enhance information used for tool usage analysis for manufacturing machine tools. Thus, the system can increase tool usage rate, decrease processing time, and reduce waste of workpiece materials.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive Smart Power Control Algorithm for LTE downlink cross-tier interference avoidance LTE下行链路跨层干扰避免的自适应智能功率控制算法
Yen-Wei Kuo, Li-Der Chou, Yi-Ming Chen
{"title":"Adaptive Smart Power Control Algorithm for LTE downlink cross-tier interference avoidance","authors":"Yen-Wei Kuo, Li-Der Chou, Yi-Ming Chen","doi":"10.4108/EAI.19-8-2015.2261142","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2261142","url":null,"abstract":"In the deployment of heterogeneous Long Term Evolution (LTE), due to the unmanaged power range of femtocells, inter-cell interference problems cause severe degradation in network performance, particularly in Closed Subscriber Group (CSG) mode. In the paper, we proposed an effective approach termed Adaptive Smart Power Control Algorithm (ASPCA), which can be applied to cluster users in coverage hole and to tackle cross-tier interference issues by determining an appropriate serving range for femtocells without requiring neither standard changing nor complicated negotiation among cells. In simulation model, several frequency-reuse-based schemes have been investigated. As a result, we demonstrate that compared to conventional way, the ASPCA significantly improved the macrocell performance about 51.32% in average user throughput but less affected the femtocell performance around 8.63% reduction in average user throughput and caused a negligible 0.46% overall loss in average throughput. The ASPCA also provided well conditions for frequency-reuse-based schemes of Inter-Cell Interference Coordination (ICIC), such as Soft Frequency Reuse (SFR) and Fractional Frequency Reuse (FFR), which can be integrated to provide the most benefit for cellular networks.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cryptanalysis of biometric-based multi-server authentication scheme using smart card 基于智能卡的生物特征多服务器认证方案的密码分析
Jongho Mun, Jiye Kim, Donghoon Lee, Dongho Won
{"title":"Cryptanalysis of biometric-based multi-server authentication scheme using smart card","authors":"Jongho Mun, Jiye Kim, Donghoon Lee, Dongho Won","doi":"10.4108/EAI.19-8-2015.2260660","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260660","url":null,"abstract":"Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data via insecure communication channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based remote user authentication schemes for multi-server environment are a widely used and researched method. One of the benefits of smart card-based authentication scheme is that a server does not have to keep a verifier table. Furthermore, remote user authentication scheme for multi-server environment has resolved the problem of users to manage the different identities and passwords. In 2015, Baruah et al. improved Mishra et al.'s scheme, and claimed that their scheme is more secure and practical remote user authentication scheme. However, we find that Baruah et al.'s scheme is still insecure. In this paper, we demonstrate that their scheme is vulnerable to outsider attack, smart card stolen attack, user impersonation attack and replay attack.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A multi-level system for sequential update summarization 用于顺序更新汇总的多级系统
Chunyun Zhang, Zhanyu Ma, Jiayue Zhang, Weiran Xu, Jun Guo
{"title":"A multi-level system for sequential update summarization","authors":"Chunyun Zhang, Zhanyu Ma, Jiayue Zhang, Weiran Xu, Jun Guo","doi":"10.4108/EAI.19-8-2015.2260848","DOIUrl":"https://doi.org/10.4108/EAI.19-8-2015.2260848","url":null,"abstract":"When an emergency occurs, such as the outbreak of natural disaster, the news about the incident showed a trend of blowout. Mostly, these news are reproduced by people and spread out with duplicate, unimportant or wrong information. Hence, it is necessary and vital to provide individuals with timely and important information of these incidents during their development. In this paper, we present a new multi-level system which can broadcasts with useful, new, and timely sentence-length updates about a developing event. The new system proposed a novel method, which incorporates techniques from topic-level and sentence-level summarization. To evaluate the performance of the proposed system, we applied it to the task of sequential update summarization of Temporal Summarization (TS) track at Text Retrieval Conference (TREC). Experimental results showed that our proposed method have a good performance.","PeriodicalId":152628,"journal":{"name":"2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE)","volume":"C-18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126766325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信