2010 IEEE International Conference on Wireless Communications, Networking and Information Security最新文献

筛选
英文 中文
Covert channel for local area network 局域网隐蔽信道
Liping Ji, Yu Fan, Chuang Ma
{"title":"Covert channel for local area network","authors":"Liping Ji, Yu Fan, Chuang Ma","doi":"10.1109/WCINS.2010.5541791","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541791","url":null,"abstract":"There exist many TCP/IP covert channels in WAN for network hidden communication in last decades. However, there are few covert channels designed for the LAN while existing WAN covert channels could not be adapted for the LAN applications. In this paper we proposed a novel covert channel based on ARP broadcasting packets for LAN. In our method we employed the normal ARP request packets as the carrier which could escape feature-based detections. In addition, our method would not lead to abnormal network traffic. Experimental results show that our covert channel has great resistance to not only the feature-based detections but also the network traffic detections.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
CHARMS: Cooperative hybrid architecture for relaying multicast satellite streams to sites without a satellite receiver CHARMS:用于在没有卫星接收器的情况下将多播卫星流中继到站点的合作混合架构
F. Tommasi, S. Molendini, E. Scialpi, Catiuscia Melle
{"title":"CHARMS: Cooperative hybrid architecture for relaying multicast satellite streams to sites without a satellite receiver","authors":"F. Tommasi, S. Molendini, E. Scialpi, Catiuscia Melle","doi":"10.1109/WCINS.2010.5541782","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541782","url":null,"abstract":"This paper describes an architecture dedicated to the terrestrial relaying of a real-time IP multicast audio-video stream broadcasted by a satellite. Such relaying is performed by nodes equipped with both a satellite receiver and a terrestrial Internet link. The stream is requested and obtained by sites that are not equipped with satellite receiving hardware but are nonetheless willing to receive it. By exploiting the properties of satellite transmission and adopting an hybrid satellite/terrestrial, multicast/unicast approach the described architecture allows to overcome the restrictions suffered by multicast traffic in the global Internet, allowing it to scale easily across autonomous systems.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127638827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Interference-aware radio resource allocation techniques for OFDMA-based wireless networks 基于ofdma的无线网络干扰感知无线电资源分配技术
Furaih AlShaalan, S. Alshebeili, A. Adinoyi
{"title":"Interference-aware radio resource allocation techniques for OFDMA-based wireless networks","authors":"Furaih AlShaalan, S. Alshebeili, A. Adinoyi","doi":"10.1109/WCINS.2010.5544145","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544145","url":null,"abstract":"This paper presents frameworks for performing radio resource allocation in Orthogonal Frequency-Division Multiple-Access (OFDMA) networks. The schemes exploit the system interference dynamics to achieve improved system throughput. One of the schemes, the interference-aware is suitable for the conventional (non-relay) network, while the second scheme is conceived for relay-based networks. The two schemes exploit the interference situation. The numerical results show a significant improvement in throughput through the proposed schemes. Our investigation provides insights on the potential performance improvements from a two-hop relaying scheme with simple distributed resource management policies. The results demonstrate that although researchers may be looking for advanced and complex radio resource management (RRM) scheme for future broadband wireless networks, some simple but moderately interferencesmart schemes are enough to provide sufficiently good results.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127836952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The design of binary shaping filter of binary code 二进位码整形滤波器的设计
Shao-Lun Huang, Y. Blankenship, Lizhong Zheng
{"title":"The design of binary shaping filter of binary code","authors":"Shao-Lun Huang, Y. Blankenship, Lizhong Zheng","doi":"10.1109/WCINS.2010.5541727","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541727","url":null,"abstract":"In information theory, in order to maximize the total throughput, it is required that the codebook has an empirical distribution that maximizes the mutual information over the channel. In coding theory, however, most codes we can generate have Bernoulli (1 over 2) distribution. In this paper, we present a new coding scheme to efficiently generate binary codes with different distributions. Our main approach is to first encode the information bits by a linear code C, and then quantized the codeword to the closest codeword in another linear code Cs. The quantization error is then treated as the encoded codeword in our coding scheme. We discuss the practicality and advantage of such codes and give a design example.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New algorithm for fractional channel reservation in limited fractional gurad channel policy 有限分数守卫信道策略中分数信道保留的新算法
Leila Mortazavi Far, Z. Firouzi
{"title":"New algorithm for fractional channel reservation in limited fractional gurad channel policy","authors":"Leila Mortazavi Far, Z. Firouzi","doi":"10.1109/WCINS.2010.5544549","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544549","url":null,"abstract":"In the current and even the coming generation of wireless networks, cellular system is still considered as the major method of telecommunication infrastructure. One of the major challenges in multi-services wireless cellular networks is the design of effective call admission control algorithm. The probability of dropping and blocking of calls is the significant performance metrics for quality of service in wireless network. In this study, a new fractional guard channel policy is proposed in a cell based on the current estimation of dropping probability of handoff calls. This policy introduces variable threshold for fractional guard channels. The new algorithm is proposed to find optimal fractional channel reservation which reduces data blocking probability. It shows improvements in comparison with guard channel policy by reducing the new call blocking probability, increasing the carried traffic. At the end, the two- dimensional traffic model is simulated and the related results are reviewed.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation analysis of error correction method of headlamp detection based on driving direction 基于行车方向的前照灯检测误差校正方法仿真分析
Hongying Shan, L. Su, Songyan Pan, Shubin Ge, Libin Zhang
{"title":"Simulation analysis of error correction method of headlamp detection based on driving direction","authors":"Hongying Shan, L. Su, Songyan Pan, Shubin Ge, Libin Zhang","doi":"10.1109/WCINS.2010.5541940","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541940","url":null,"abstract":"At present, the elimination of headlamp detection error is to straighten the test-waiting vehicle, namely the straightening device makes the vehicle body axis to be right with headlight detector at the distance required. However, the headlamp illumination direction should be the vehicle's driving direction and the perpendicular direction of rear axle is the vehicle's driving direction, so the detection benchmark to headlamp should be the vehicle's driving direction. This paper proposes a new method of error correction of headlamp detection based on bias angle identification of axle placed. Firstly, this paper establishes a tire model, and carries out research on modeling and simulating bias angle of tire, then make error analysis of bias angle identification. Simulation analysis shows that when changes some influence factors, for example tire size, shape, and convex volume, the device is still of high accuracy, so the method is feasible. This paper also establishes the experimental system of detecting axle bias angle, furthermore makes a test and error analysis pointing to the system. The result verifies the simulation conclusions.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134239629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new pilot design method for OFDM systems with virtual subcarriers 一种虚拟子载波OFDM系统导频设计新方法
D. Hu, Xiaolin Zhou
{"title":"A new pilot design method for OFDM systems with virtual subcarriers","authors":"D. Hu, Xiaolin Zhou","doi":"10.1109/WCINS.2010.5541761","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541761","url":null,"abstract":"In this paper, a new pilot design method for orthogonal frequency division multiplexing (OFDM) systems with virtual subcarriers is proposed. The proposed scheme minimizes a simple function relevant to the mean-square error (MSE) of the least squares (LS) channel estimate instead of minimizing the MSE itself. As a result, the suboptimal pilot subcarriers can be obtained efficiently by sequentially solving several one-dimensional optimization problems. Comparing with the partially equispaced pilot design which is commonly used in many protocols, the proposed scheme is more robust to the system parameters and can provide much more accurate channel estimate for large channel lengths.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133924182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A construction of binary vector-output plateaued functions 二元矢量输出平稳函数的构造
Tinghai Yue
{"title":"A construction of binary vector-output plateaued functions","authors":"Tinghai Yue","doi":"10.1109/WCINS.2010.5541808","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541808","url":null,"abstract":"In this paper, the relationships among the vector-output plateaued functions, the vector-output partially bent functions and the vector-output bent functions are discussed. A new characterization of vector-output partially bent functions is given. Furthermore, a method for constructing vector-output plateaued functions is provided.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protocol support for bulk transfer architecture 对批量传输架构的协议支持
Upendra Rathnayake, H. Petander, M. Ott, A. Seneviratne
{"title":"Protocol support for bulk transfer architecture","authors":"Upendra Rathnayake, H. Petander, M. Ott, A. Seneviratne","doi":"10.1109/WCINS.2010.5545343","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5545343","url":null,"abstract":"Today's mobile devices are increasingly containing multiple radios, enabling users on the move to take advantage of the heterogeneous wireless network environment. In addition, we observe that many bandwidth intensive services such as podcasts, software updates etc are essentially non-real-time and buffers in mobile devices are effectively unlimited. We therefore proposed EMUNE, a new transfer service architecture in our previous work which leverages these aspects and supports opportunistic bulk transfers in high bandwidth networks. EMUNE uses multiple wireless network interfaces according to an optimal transfer schedule derived based on device power concerns, application requirements, user preferences of cost and quality and future network availability. In this paper, we explore the usability of network/transport protocols to achieve the use of multiple network interfaces with required functionalities including flow mobility and striping in mobile environments and propose a MONAMI [1] + R2CP [3] hybrid approach for the architecture.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A color image watermarking algorithm resistant to print-scan 一种抗打印扫描的彩色图像水印算法
Chengqing Guo, Guoai Xu, Xinxin Niu, Yixian Yang, Yang Li
{"title":"A color image watermarking algorithm resistant to print-scan","authors":"Chengqing Guo, Guoai Xu, Xinxin Niu, Yixian Yang, Yang Li","doi":"10.1109/WCINS.2010.5541833","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541833","url":null,"abstract":"Print-scan resilient data hiding finds important applications in image copyright protection. This paper proposes a novel algorithm which combines the methods of image complexity and discrete Fourier transform (DFT). Based on appropriate block partition, we can compute the local image complexity of the block, which is determined whether to embed watermark in this block. The red component of the block is transformed with DFT and a watermark is embedded in the mid-frequency of DFT coefficients. The hidden data can be extracted without using the original image to verify the copyright of the reproduced image. Experiment results suggest that the proposed method is robust after high-quality printing and scanning.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信