2012 1st IEEE International Conference on Communications in China (ICCC)最新文献

筛选
英文 中文
Isolate secure executing environment for a safe cloud 为安全的云隔离安全的执行环境
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356995
Yue-hua Dai, Xiaoguang Wang, Yi Shi, Jianbao Ren, Yong Qi
{"title":"Isolate secure executing environment for a safe cloud","authors":"Yue-hua Dai, Xiaoguang Wang, Yi Shi, Jianbao Ren, Yong Qi","doi":"10.1109/ICCChina.2012.6356995","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356995","url":null,"abstract":"The use of virtualization in cloud computing is becoming more and more popular. Cloud service providers leverage virtualization technology to multiplex hardware resource, consolidate servers, and provide a rounded executing environment to remote cloud users. However, the current executing environment the cloud provides is not trustable. For a user's computing environment faces threats from other malicious cloud users who aim at attacking the whole underlying virtualization software (virtual machine monitor, VMM, or hypervisor). In this paper, we make an analysis of the potential threat to a commodity hyper-visor, and propose architecture for safe executing environment on hardware-sharing platform. The main ideas of our architecture are: removal of interaction between hypervisor and executing environment; attestation of the initial environment state to remote user. To prove the effectiveness of our architecture, we build a prototype system which can create multiple secure isolated executing environment on current multi-core x86 hardware. The final evaluation shows that with current commodity virtualization techniques, we can provide a safe executing environment for remote cloud users with no performance overhead.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improvement of EPC-C1G2 RFID authentication protocols EPC-C1G2 RFID认证协议的改进
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356882
W. Ku, Yi-Han Chen
{"title":"Improvement of EPC-C1G2 RFID authentication protocols","authors":"W. Ku, Yi-Han Chen","doi":"10.1109/ICCChina.2012.6356882","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356882","url":null,"abstract":"The EPC-C1G2 standard is widely regarded as an international mainstream when developing RFID applications due to its major property of lightweight cost. Up to now, many RFID authentication protocols conforming to EPC-C1G2 have been proposed. In 2010, Lo and Yeh proposed an EPC-C1G2 RFID authentication protocol, and employed a formal logic proof to prove the security of their protocol. Herein, we show that Lo-Yeh's protocol is vulnerable to an EPC cracking attack, a location tracking attack, and two impersonation attacks. To improve the security of EPC-C1G2 without incurring much extra cost and overhead, we propose an extended version of EPC-C1G2, called EPC-C1G2*, which only employs stronger CRC and PRNG functions. And then, we propose an improved RFID authentication protocol conforming to EPC-C1G2*, and show that our improved protocol has better security.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Contract design for relay-based cooperative communication with hidden channel state information 隐藏信道状态信息的基于中继的协同通信契约设计
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356994
B. Nazari, A. Jamalipour
{"title":"Contract design for relay-based cooperative communication with hidden channel state information","authors":"B. Nazari, A. Jamalipour","doi":"10.1109/ICCChina.2012.6356994","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356994","url":null,"abstract":"In cooperative communication, relay nodes help forwarding the information of the source node in case of failure in communication between source and destination. However, in the presence of asymmetric information between the source and potential relay nodes, the relay communication becomes an issue of great concern. To resolve the matter incurred by the existence of asymmetric information, the intrinsic availability of the relay-destination channel state information at the relay node can be exploited. In such case, the source node as an uninformed party not just stimulates relays to participate in cooperative communication, but also incites relays to reveal their channel state information in a trustworthy manner. In this paper, the problem of cooperation incentives under the existence of asymmetric information is studied. The principle of contract theory is applied to cooperative communication and an incentive compatible and individually rational contract is proposed to relay nodes. The designed contract consists of a set of power-credit pairs and offers credit to relays as a reward for participation. To evaluate the accuracy of the proposed scheme, a network system under two different information scenarios is simulated and the effects of the information asymmetry on its performance and sustainability are discussed.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127384333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An improved spectrum management scheme for OFDMA femtocell networks 一种改进的OFDMA飞蜂窝网络频谱管理方案
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356866
Mingjie Feng, Da Chen, Zhiqiang Wang, Tao Jiang, Daiming Qu
{"title":"An improved spectrum management scheme for OFDMA femtocell networks","authors":"Mingjie Feng, Da Chen, Zhiqiang Wang, Tao Jiang, Daiming Qu","doi":"10.1109/ICCChina.2012.6356866","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356866","url":null,"abstract":"The femtocell network is regarded as an effective approach to provide better services for indoor users with higher capacity. However, the spectrum allocation problem of the femtocell network is challenging for the wireless operator, since the added femtocell tier either requires additional spectrum resource or brings interference to the existing cellular network. In this paper, we consider the methods of spectrum allocation and spectrum sharing to improve the capacity performance of femtocell networks. We first propose a spectrum allocation strategy that utilizes the structure of the cellular network to reduce interference. Then, we propose a spectrum sharing scheme that deals with the problem of insufficient channels for femtocells. Adjacent femtocells could coordinate with each other for resource allocation by taking the instantaneous traffic demand into consideration. Finally, the proposed spectrum management methods are compared with several conventional methods and the improvements of the proposed schemes are verified by simulation results.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Information as a service based architectural solution for WSN 基于信息即服务的WSN体系结构解决方案
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356972
Ankur Deshwal, Soma Kohli, K. Chethan
{"title":"Information as a service based architectural solution for WSN","authors":"Ankur Deshwal, Soma Kohli, K. Chethan","doi":"10.1109/ICCChina.2012.6356972","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356972","url":null,"abstract":"Wireless Sensors have seen a lot of applications in our daily lives in the recent years. The market has been flooded with high end consumer electronics using wireless sensor technology. However, most of the current technologies require the sensor to be in the vicinity of the end-user application. There has been some study in the techniques for sensor provisioning and sharing for the large number of existing Wireless Sensor Networks. Virtualization of Wireless Sensor Networks (WSNs) is a step forward in exposing these WSNs to large user base from remote locations. However, there is still a huge gap in bringing together information available from heterogeneous, distributed resources of Wireless Sensor Networks to a non-localized user. In this work, we utilize IaaS paradigm of Cloud Computing in virtualization of sensor networks which gives the flexibility of handling heterogeneous systems. The system also enables a smart device user to access information generated by Wireless Sensors through the cloud via SaaS based design. This allows the system to take common computational tasks to be hosted as a service through the cloud. It frees the smart device user from running heavy applications for data processing and storing. Thus, system provides the smart device user a Cloud Enabled Wireless Sensor Network infrastructure. The system architecture provides the necessary features for it to be scalable and flexible, ensuring reliable sensor data transfer and processing through cloud infrastructure. We also present a small test bed implementation of the system.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"28 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Distributed random projection code scheme for decode and forward relay channel 用于解码和转发中继信道的分布式随机投影码方案
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356900
Min Wang, Lin Wan, Jun Wu
{"title":"Distributed random projection code scheme for decode and forward relay channel","authors":"Min Wang, Lin Wan, Jun Wu","doi":"10.1109/ICCChina.2012.6356900","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356900","url":null,"abstract":"Random projection code (RPC) is a promising technique to implement the rate adaption in modern wireless communication system. This paper introduces RPC to decode-and-forward relay channel system, and proposes a scheme of distributed RPC (DRPC) with rate adaption nature. In this paper, we discuss how to demodulate and decode signal jointly for DRPC. Finally, we evaluate DRPC schemes by an evaluation metric named goodput. Experimental results show that the throughput of DRPC schemes is higher at least 0.4 bit/s/Hz than RPC scheme at SNR ranging from 5dB to 25dB.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127936243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spectrum occupancy analysis based on radio monitoring network 基于无线电监测网的频谱占用分析
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356981
Dezhang Chen, Jingjing Yang, Jida Wu, Hao Tang, Ming Huang
{"title":"Spectrum occupancy analysis based on radio monitoring network","authors":"Dezhang Chen, Jingjing Yang, Jida Wu, Hao Tang, Ming Huang","doi":"10.1109/ICCChina.2012.6356981","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356981","url":null,"abstract":"As the demand for wireless communication system grows, the need for radio spectrum increases accordingly. In this context, cognitive radio has emerged as a breakthrough for effective utilization of radio spectrum. In order to realize dynamic spectrum management in the future, it is imperative to possess a thorough understanding about how wireless spectrum behaves over time, frequency, and space, etc. In this paper, we report the spectrum occupancy measurement campaign conducted in the frequency range of 20-3000MHz based on the radio monitoring network in Yunnan Province. Spectrum occupancy with space and time dependent characteristic at six typical fixed stations are obtained. The measurement results show relatively low spectrum occupancy with great potential for dynamic usage of spectrum. Besides, the ambient noise has a great influence on the measurement results, thus its calibration is a key issue in radio monitoring which is based on energy detection.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126370775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Auction-based resource allocation for spectrum-sharing femtocell networks 基于拍卖的频谱共享移动蜂窝网络资源分配
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356918
Fei Wang, Weiqiang Liu, Xiaohui Chen, Weidong Wang
{"title":"Auction-based resource allocation for spectrum-sharing femtocell networks","authors":"Fei Wang, Weiqiang Liu, Xiaohui Chen, Weidong Wang","doi":"10.1109/ICCChina.2012.6356918","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356918","url":null,"abstract":"This paper studies the resource allocation problem for spectrum-sharing femtocell networks. An auction-based algorithm, VCG auction, is proposed to ensure femtocell users submit their utilities truthfully despite the selfish nature of them, so that the resource allocation scheme works efficiently and fairly. We investigate the uplink transmission in a sparsely deployed scenario of Femto-network. By introducing the VCG auction mechanism, an optimum resource allocation scheme is obtained to enhance each femtocell user and the whole macrocell network's revenue both. Anyone who lie about his information will be penalized by extremely high payment and his revenues will decrease a lot. So, the users would rather tell the truth to obtain maximal revenue. Finally, numerical examples are presented to verify the proposed algorithm.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114095354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Beamforming based signal strengthening via underground acoustics sensor networks 基于波束形成的地下声学传感器网络信号增强
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356859
Xiaokun Yan, Pengfei Hu, Tianbo Gu, Kai Xing
{"title":"Beamforming based signal strengthening via underground acoustics sensor networks","authors":"Xiaokun Yan, Pengfei Hu, Tianbo Gu, Kai Xing","doi":"10.1109/ICCChina.2012.6356859","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356859","url":null,"abstract":"As the advances in sensing and wireless communication technologies, e.g., ZigBee, RFID, and WiFi, wireless sensor networks provide a promising opportunity to enhance underground environment monitoring, e.g., coal mine disaster monitoring. However, these wireless technologies suffer from signal distortion and short Non-Line-Of-Sight (NLOS). Furthermore, in underground disaster it is difficult to transmit sensing data to the ground via wireless signals. In this paper, we study beamforming based signal strengthening scheme in underground wireless sensor networks. Compare with traditional wireless signals, we use acoustic signal, which has several merits: first, it has much longer wavelength, which results to slower decay and longer propagation distance; second, it is resistant to signal distortion, which may help enhance the robustness of the underground monitoring system. Theoretical analysis is provided on both systematic and stochastic errors. Extensive simulations are carried out for theoretical verification.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121109956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay modeling in mobile cognitive radio networks 移动认知无线网络中的延迟建模
2012 1st IEEE International Conference on Communications in China (ICCC) Pub Date : 2012-11-26 DOI: 10.1109/ICCChina.2012.6356858
Wei Li, Tianyi Song, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing, T. Znati
{"title":"Delay modeling in mobile cognitive radio networks","authors":"Wei Li, Tianyi Song, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing, T. Znati","doi":"10.1109/ICCChina.2012.6356858","DOIUrl":"https://doi.org/10.1109/ICCChina.2012.6356858","url":null,"abstract":"In mobile cognitive radio networks, the expected delay for a packet to be delivered to its destination via a singlehop communication (without relaying) is a fundamental metric that can provide a guidance to multi-hop routing protocol design and route planning. In this paper, we characterize the impact of PU activities, spectrum availabilities, channel bandwidth, MAC access, SU mobilities, and interference, on cognitive radio network delays, and derive the expected delay for a packet to be directly delivered to its destination by incorporating both the waiting delay and the transmission delay. Simulation studies are performed to validate the effectiveness of our delay model.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116231770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信