Yue-hua Dai, Xiaoguang Wang, Yi Shi, Jianbao Ren, Yong Qi
{"title":"Isolate secure executing environment for a safe cloud","authors":"Yue-hua Dai, Xiaoguang Wang, Yi Shi, Jianbao Ren, Yong Qi","doi":"10.1109/ICCChina.2012.6356995","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356995","url":null,"abstract":"The use of virtualization in cloud computing is becoming more and more popular. Cloud service providers leverage virtualization technology to multiplex hardware resource, consolidate servers, and provide a rounded executing environment to remote cloud users. However, the current executing environment the cloud provides is not trustable. For a user's computing environment faces threats from other malicious cloud users who aim at attacking the whole underlying virtualization software (virtual machine monitor, VMM, or hypervisor). In this paper, we make an analysis of the potential threat to a commodity hyper-visor, and propose architecture for safe executing environment on hardware-sharing platform. The main ideas of our architecture are: removal of interaction between hypervisor and executing environment; attestation of the initial environment state to remote user. To prove the effectiveness of our architecture, we build a prototype system which can create multiple secure isolated executing environment on current multi-core x86 hardware. The final evaluation shows that with current commodity virtualization techniques, we can provide a safe executing environment for remote cloud users with no performance overhead.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of EPC-C1G2 RFID authentication protocols","authors":"W. Ku, Yi-Han Chen","doi":"10.1109/ICCChina.2012.6356882","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356882","url":null,"abstract":"The EPC-C1G2 standard is widely regarded as an international mainstream when developing RFID applications due to its major property of lightweight cost. Up to now, many RFID authentication protocols conforming to EPC-C1G2 have been proposed. In 2010, Lo and Yeh proposed an EPC-C1G2 RFID authentication protocol, and employed a formal logic proof to prove the security of their protocol. Herein, we show that Lo-Yeh's protocol is vulnerable to an EPC cracking attack, a location tracking attack, and two impersonation attacks. To improve the security of EPC-C1G2 without incurring much extra cost and overhead, we propose an extended version of EPC-C1G2, called EPC-C1G2*, which only employs stronger CRC and PRNG functions. And then, we propose an improved RFID authentication protocol conforming to EPC-C1G2*, and show that our improved protocol has better security.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contract design for relay-based cooperative communication with hidden channel state information","authors":"B. Nazari, A. Jamalipour","doi":"10.1109/ICCChina.2012.6356994","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356994","url":null,"abstract":"In cooperative communication, relay nodes help forwarding the information of the source node in case of failure in communication between source and destination. However, in the presence of asymmetric information between the source and potential relay nodes, the relay communication becomes an issue of great concern. To resolve the matter incurred by the existence of asymmetric information, the intrinsic availability of the relay-destination channel state information at the relay node can be exploited. In such case, the source node as an uninformed party not just stimulates relays to participate in cooperative communication, but also incites relays to reveal their channel state information in a trustworthy manner. In this paper, the problem of cooperation incentives under the existence of asymmetric information is studied. The principle of contract theory is applied to cooperative communication and an incentive compatible and individually rational contract is proposed to relay nodes. The designed contract consists of a set of power-credit pairs and offers credit to relays as a reward for participation. To evaluate the accuracy of the proposed scheme, a network system under two different information scenarios is simulated and the effects of the information asymmetry on its performance and sustainability are discussed.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127384333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingjie Feng, Da Chen, Zhiqiang Wang, Tao Jiang, Daiming Qu
{"title":"An improved spectrum management scheme for OFDMA femtocell networks","authors":"Mingjie Feng, Da Chen, Zhiqiang Wang, Tao Jiang, Daiming Qu","doi":"10.1109/ICCChina.2012.6356866","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356866","url":null,"abstract":"The femtocell network is regarded as an effective approach to provide better services for indoor users with higher capacity. However, the spectrum allocation problem of the femtocell network is challenging for the wireless operator, since the added femtocell tier either requires additional spectrum resource or brings interference to the existing cellular network. In this paper, we consider the methods of spectrum allocation and spectrum sharing to improve the capacity performance of femtocell networks. We first propose a spectrum allocation strategy that utilizes the structure of the cellular network to reduce interference. Then, we propose a spectrum sharing scheme that deals with the problem of insufficient channels for femtocells. Adjacent femtocells could coordinate with each other for resource allocation by taking the instantaneous traffic demand into consideration. Finally, the proposed spectrum management methods are compared with several conventional methods and the improvements of the proposed schemes are verified by simulation results.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information as a service based architectural solution for WSN","authors":"Ankur Deshwal, Soma Kohli, K. Chethan","doi":"10.1109/ICCChina.2012.6356972","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356972","url":null,"abstract":"Wireless Sensors have seen a lot of applications in our daily lives in the recent years. The market has been flooded with high end consumer electronics using wireless sensor technology. However, most of the current technologies require the sensor to be in the vicinity of the end-user application. There has been some study in the techniques for sensor provisioning and sharing for the large number of existing Wireless Sensor Networks. Virtualization of Wireless Sensor Networks (WSNs) is a step forward in exposing these WSNs to large user base from remote locations. However, there is still a huge gap in bringing together information available from heterogeneous, distributed resources of Wireless Sensor Networks to a non-localized user. In this work, we utilize IaaS paradigm of Cloud Computing in virtualization of sensor networks which gives the flexibility of handling heterogeneous systems. The system also enables a smart device user to access information generated by Wireless Sensors through the cloud via SaaS based design. This allows the system to take common computational tasks to be hosted as a service through the cloud. It frees the smart device user from running heavy applications for data processing and storing. Thus, system provides the smart device user a Cloud Enabled Wireless Sensor Network infrastructure. The system architecture provides the necessary features for it to be scalable and flexible, ensuring reliable sensor data transfer and processing through cloud infrastructure. We also present a small test bed implementation of the system.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"28 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed random projection code scheme for decode and forward relay channel","authors":"Min Wang, Lin Wan, Jun Wu","doi":"10.1109/ICCChina.2012.6356900","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356900","url":null,"abstract":"Random projection code (RPC) is a promising technique to implement the rate adaption in modern wireless communication system. This paper introduces RPC to decode-and-forward relay channel system, and proposes a scheme of distributed RPC (DRPC) with rate adaption nature. In this paper, we discuss how to demodulate and decode signal jointly for DRPC. Finally, we evaluate DRPC schemes by an evaluation metric named goodput. Experimental results show that the throughput of DRPC schemes is higher at least 0.4 bit/s/Hz than RPC scheme at SNR ranging from 5dB to 25dB.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127936243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dezhang Chen, Jingjing Yang, Jida Wu, Hao Tang, Ming Huang
{"title":"Spectrum occupancy analysis based on radio monitoring network","authors":"Dezhang Chen, Jingjing Yang, Jida Wu, Hao Tang, Ming Huang","doi":"10.1109/ICCChina.2012.6356981","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356981","url":null,"abstract":"As the demand for wireless communication system grows, the need for radio spectrum increases accordingly. In this context, cognitive radio has emerged as a breakthrough for effective utilization of radio spectrum. In order to realize dynamic spectrum management in the future, it is imperative to possess a thorough understanding about how wireless spectrum behaves over time, frequency, and space, etc. In this paper, we report the spectrum occupancy measurement campaign conducted in the frequency range of 20-3000MHz based on the radio monitoring network in Yunnan Province. Spectrum occupancy with space and time dependent characteristic at six typical fixed stations are obtained. The measurement results show relatively low spectrum occupancy with great potential for dynamic usage of spectrum. Besides, the ambient noise has a great influence on the measurement results, thus its calibration is a key issue in radio monitoring which is based on energy detection.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126370775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fei Wang, Weiqiang Liu, Xiaohui Chen, Weidong Wang
{"title":"Auction-based resource allocation for spectrum-sharing femtocell networks","authors":"Fei Wang, Weiqiang Liu, Xiaohui Chen, Weidong Wang","doi":"10.1109/ICCChina.2012.6356918","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356918","url":null,"abstract":"This paper studies the resource allocation problem for spectrum-sharing femtocell networks. An auction-based algorithm, VCG auction, is proposed to ensure femtocell users submit their utilities truthfully despite the selfish nature of them, so that the resource allocation scheme works efficiently and fairly. We investigate the uplink transmission in a sparsely deployed scenario of Femto-network. By introducing the VCG auction mechanism, an optimum resource allocation scheme is obtained to enhance each femtocell user and the whole macrocell network's revenue both. Anyone who lie about his information will be penalized by extremely high payment and his revenues will decrease a lot. So, the users would rather tell the truth to obtain maximal revenue. Finally, numerical examples are presented to verify the proposed algorithm.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114095354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beamforming based signal strengthening via underground acoustics sensor networks","authors":"Xiaokun Yan, Pengfei Hu, Tianbo Gu, Kai Xing","doi":"10.1109/ICCChina.2012.6356859","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356859","url":null,"abstract":"As the advances in sensing and wireless communication technologies, e.g., ZigBee, RFID, and WiFi, wireless sensor networks provide a promising opportunity to enhance underground environment monitoring, e.g., coal mine disaster monitoring. However, these wireless technologies suffer from signal distortion and short Non-Line-Of-Sight (NLOS). Furthermore, in underground disaster it is difficult to transmit sensing data to the ground via wireless signals. In this paper, we study beamforming based signal strengthening scheme in underground wireless sensor networks. Compare with traditional wireless signals, we use acoustic signal, which has several merits: first, it has much longer wavelength, which results to slower decay and longer propagation distance; second, it is resistant to signal distortion, which may help enhance the robustness of the underground monitoring system. Theoretical analysis is provided on both systematic and stochastic errors. Extensive simulations are carried out for theoretical verification.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Li, Tianyi Song, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing, T. Znati
{"title":"Delay modeling in mobile cognitive radio networks","authors":"Wei Li, Tianyi Song, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing, T. Znati","doi":"10.1109/ICCChina.2012.6356858","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356858","url":null,"abstract":"In mobile cognitive radio networks, the expected delay for a packet to be delivered to its destination via a singlehop communication (without relaying) is a fundamental metric that can provide a guidance to multi-hop routing protocol design and route planning. In this paper, we characterize the impact of PU activities, spectrum availabilities, channel bandwidth, MAC access, SU mobilities, and interference, on cognitive radio network delays, and derive the expected delay for a packet to be directly delivered to its destination by incorporating both the waiting delay and the transmission delay. Simulation studies are performed to validate the effectiveness of our delay model.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116231770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}