{"title":"A comparative survey of routing protocol for vehicular sensor networks","authors":"Xin Su","doi":"10.1109/WCINS.2010.5542309","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5542309","url":null,"abstract":"Recently, vehicular sensor networks (VSNs) have been paid much attention. In VSNs, the vehicular sensors are equipped on vehicles, such as buses and cars. They move fast and have no strict constraints on processing power and storage capabilities. In this challenging mobile and novel environment, routing is a hot issue which needs more attention in the future works when traditional wireless sensor network routing approaches for data reporting become unfeasible. In this paper, we overview challenging issues of routing protocols for VSNs, and summarize and compare routing protocols which are adaptable to VSNs.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang
{"title":"Behavior profiling for robust anomaly detection","authors":"Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang","doi":"10.1109/WCINS.2010.5541822","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541822","url":null,"abstract":"Internet attacks are evolving using evasion techniques such as polymorphism and stealth scanning. Conventional detection systems using signature-based and/or rule-based anomaly detection techniques no longer suffice. It is difficult to predict what form the next malware attack will take and these pose a great challenge to the design of a robust intrusion detection system. We focus on the anomalous behavioral characteristics between attack and victim when they undergo sequences of compromising actions and that are inherent to the classes of vulnerability-exploit attacks. A new approach, Gestalt, is proposed to statefully capture and monitor activities between hosts and progressively assess possible network anomalies by multilevel behavior tracking, cross-level triggering and correlation, and a probabilistic inference model is proposed for intrusion assessment and detection. Such multilevel design provides a collective perspective to reveal more anomalies than individual levels. We show that Gestalt is robust and effective in detecting polymorphic, stealthy variants of known attacks.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114242486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical vulnerability remediation model","authors":"Deepak Subramanian, H. Le, P. Loh, A. Premkumar","doi":"10.1109/WCINS.2010.5541803","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541803","url":null,"abstract":"Vulnerability detection and diagnosis goes hand-in-hand with a effective remediation process as part of a dependable software security framework. This paper describes the design of a proposed system model for targeted remediation of vulnerabilities and their variants.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134001923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DCT-domain translation for composing better pictures in the MDSQ-based multiple description video coding","authors":"Shuyuan Zhu, J. Au-Yeung, B. Zeng","doi":"10.1109/WCINS.2010.5541891","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541891","url":null,"abstract":"Multiple description coding (MDC) is an effective technique for transmission of image and video signals over error-prone channels. Naturally, a good MDC system needs to guarantee a quality gain when more descriptions are received. To this goal, a transform-domain overlapping technique can be used in the popular multiple description scalar quantization (MDSQ) scheme. However, this overlapping technique often becomes inapplicable in multiple description video coding (MDVC) because different reference frames are used in different descriptions at the motion-compensation stage. In this paper, we introduce a DCT-domain translation to solve this problem, i.e., after the translation, the overlapping technique can be applied to all predictive frames. We demonstrate that frames with a better quality can be composed upon receiving more descriptions. In particular, a remarkable objective quality gain (in terms of PSNR) has been observed.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind spreading sequence set estimation of the M-ary direct sequence spread spectrum signals","authors":"P. Qiu, Dan Xu, Zhitao Huang, Wenli Jiang","doi":"10.1109/WCINS.2010.5541917","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541917","url":null,"abstract":"In the non-cooperative context, the M-ary direct sequence spread spectrum (DSSS) signals are much more difficult to be intercepted than the conventional DSSS signals. Few literatures can be found to provide the information of this kind of signal in such circumstances. In this paper, a blind spreading sequence set estimation algorithm for the M-ary DSSS signals is proposed. This method exploits the signal structure and the cross-correlation properties between the spreading sequences. Firstly, the received signal samples are divided into a set of vectors. Secondly, using a correlation-based iteration, one of the spreading sequences is recovered. And, the vectors corresponding to this sequence are removed from the signal vector set. Thirdly, by repeating the above procedure, a set of estimates are obtained. Finally, false answers are removed by checking the estimates with the original signal samples, then, the spreading sequence set is recovered. This method is capable of providing good estimates when the signal-to-noise ratio is greater than −1dB. Besides, the proposed method is much faster and more robust than the existing K-means clustering dispreading method. Simulation results verify the capabilities of the proposed method.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114345598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A FFT-window search algorithm for diversity combining in downlink multipoint joint transmission","authors":"Guolin Sun, Feng Ye","doi":"10.1109/WCINS.2010.5541763","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541763","url":null,"abstract":"In this paper, we consider the downlink of multipoint joint transmission in a multi-cell environment, where all of the base stations involved will be subject to different timing errors. Because a single UE can only be guaranteed synchronization with the transmitter of its serving cell accurately, targeting a practical solution, we consider a measurement based optimization for this problem. In this paper, we firstly analyze the impact of multiple timing errors from the different cooperative cells on the data demodulation performance of the CoMP UEs, especially for edge users. Then we propose a FFT window search method with cognitive measurements for joint transmission, provided with the accurate knowledge on all involved local channel estimation. Simulation results have been provided and show it improves the SINR behind demodulation about 2dB for downlink multipoint joint transmission.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The upper bounds of punctured ring convolutional coded continuous phase modulation","authors":"Lei Zhang, Weibing Xu, Haibo Wang","doi":"10.1109/WCINS.2010.5541910","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541910","url":null,"abstract":"In this paper, upper bounds on the symbol error probability for punctured ring convolutional coded continuous phase modulation with maximum likelihood sequence detection are investigated. The bounds are based on the numerical calculation method using union bound, and can be used as a tool to analyze and design punctured ring convolutional coded continuous phase modulation systems.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A blind digital watermarking for color medical images based on PCA","authors":"Xinde Sun, S. Bo","doi":"10.1109/WCINS.2010.5541812","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541812","url":null,"abstract":"In this paper, we propose a new robust digital image blind watermark scheme that is used to protect color medical images. In this scheme, K-L transform is applied to an RGB medical image and the binary watermark is embedded into low frequency sub-band of DWT of the principal component of medical images. The embedding positions are chosen according to the human visual system (HVS). The embedding method is based on the relationship between center coefficients and the mean values of the nearest neighborhood coefficients. The watermark is extracted from the watermarked image only according to the relationship. The experimental results show that the proposed algorithm is robust, imperceptible and practicable.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117018130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced equalization in OFDM systems using cyclic prefix","authors":"A. A. Quadeer","doi":"10.1109/WCINS.2010.5541882","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541882","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a modulation technique that provides high achievable data rates in wireless environment by combating multipath effects and has relatively simple implementation. In this paper, it is demonstrated that how the cyclic prefix can be used to enhance the operation of an OFDM equalizer when the channel is perfectly known at the receiver or is obtained through training. This method relies on transforming the OFDM channel into two subchannels (circular and linear) that share the same input and are characterized by the same channel parameters. Conventionally, data is recovered by utilizing only the circular subchannel while in this method, both the circular and linear subchannels are used to recover the data. The improved performance of the proposed method is demonstrated with the help of simulations for constant modulus as well as non-constant modulus data.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123238006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of localization in wireless sensor network node based on JENNIC platform","authors":"Guang-zhao Cui, Hao Li","doi":"10.1109/WCINS.2010.5541767","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541767","url":null,"abstract":"As traditional TOA Ranging needs a lot of hardware expenditures to achieve the node time synchronization, combining JN5121 wireless microcontroller and a new Distance Calculation Method which is based on Information lag, We construct a new wireless monitoring, positioning network which is based on Zigbee Protocol. As shown in the system-experiment, the new system does not need to achieve the node time synchronization, and has low power and stable performance, It meets the Low-density, low-accuracy, low-cost wireless network's demand.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}