2010 IEEE International Conference on Wireless Communications, Networking and Information Security最新文献

筛选
英文 中文
A comparative survey of routing protocol for vehicular sensor networks 车载传感器网络路由协议的比较研究
Xin Su
{"title":"A comparative survey of routing protocol for vehicular sensor networks","authors":"Xin Su","doi":"10.1109/WCINS.2010.5542309","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5542309","url":null,"abstract":"Recently, vehicular sensor networks (VSNs) have been paid much attention. In VSNs, the vehicular sensors are equipped on vehicles, such as buses and cars. They move fast and have no strict constraints on processing power and storage capabilities. In this challenging mobile and novel environment, routing is a hot issue which needs more attention in the future works when traditional wireless sensor network routing approaches for data reporting become unfeasible. In this paper, we overview challenging issues of routing protocols for VSNs, and summarize and compare routing protocols which are adaptable to VSNs.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Behavior profiling for robust anomaly detection 稳健异常检测的行为分析
Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang
{"title":"Behavior profiling for robust anomaly detection","authors":"Shun-Wen Hsiao, Yeali S. Sun, Meng Chang Chen, Hui Zhang","doi":"10.1109/WCINS.2010.5541822","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541822","url":null,"abstract":"Internet attacks are evolving using evasion techniques such as polymorphism and stealth scanning. Conventional detection systems using signature-based and/or rule-based anomaly detection techniques no longer suffice. It is difficult to predict what form the next malware attack will take and these pose a great challenge to the design of a robust intrusion detection system. We focus on the anomalous behavioral characteristics between attack and victim when they undergo sequences of compromising actions and that are inherent to the classes of vulnerability-exploit attacks. A new approach, Gestalt, is proposed to statefully capture and monitor activities between hosts and progressively assess possible network anomalies by multilevel behavior tracking, cross-level triggering and correlation, and a probabilistic inference model is proposed for intrusion assessment and detection. Such multilevel design provides a collective perspective to reveal more anomalies than individual levels. We show that Gestalt is robust and effective in detecting polymorphic, stealthy variants of known attacks.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114242486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An empirical vulnerability remediation model 一个经验漏洞修复模型
Deepak Subramanian, H. Le, P. Loh, A. Premkumar
{"title":"An empirical vulnerability remediation model","authors":"Deepak Subramanian, H. Le, P. Loh, A. Premkumar","doi":"10.1109/WCINS.2010.5541803","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541803","url":null,"abstract":"Vulnerability detection and diagnosis goes hand-in-hand with a effective remediation process as part of a dependable software security framework. This paper describes the design of a proposed system model for targeted remediation of vulnerabilities and their variants.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134001923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DCT-domain translation for composing better pictures in the MDSQ-based multiple description video coding 基于mdq的多描述视频编码中dct域转换的图像合成
Shuyuan Zhu, J. Au-Yeung, B. Zeng
{"title":"DCT-domain translation for composing better pictures in the MDSQ-based multiple description video coding","authors":"Shuyuan Zhu, J. Au-Yeung, B. Zeng","doi":"10.1109/WCINS.2010.5541891","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541891","url":null,"abstract":"Multiple description coding (MDC) is an effective technique for transmission of image and video signals over error-prone channels. Naturally, a good MDC system needs to guarantee a quality gain when more descriptions are received. To this goal, a transform-domain overlapping technique can be used in the popular multiple description scalar quantization (MDSQ) scheme. However, this overlapping technique often becomes inapplicable in multiple description video coding (MDVC) because different reference frames are used in different descriptions at the motion-compensation stage. In this paper, we introduce a DCT-domain translation to solve this problem, i.e., after the translation, the overlapping technique can be applied to all predictive frames. We demonstrate that frames with a better quality can be composed upon receiving more descriptions. In particular, a remarkable objective quality gain (in terms of PSNR) has been observed.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blind spreading sequence set estimation of the M-ary direct sequence spread spectrum signals 直接序列扩频信号的盲扩频序列集估计
P. Qiu, Dan Xu, Zhitao Huang, Wenli Jiang
{"title":"Blind spreading sequence set estimation of the M-ary direct sequence spread spectrum signals","authors":"P. Qiu, Dan Xu, Zhitao Huang, Wenli Jiang","doi":"10.1109/WCINS.2010.5541917","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541917","url":null,"abstract":"In the non-cooperative context, the M-ary direct sequence spread spectrum (DSSS) signals are much more difficult to be intercepted than the conventional DSSS signals. Few literatures can be found to provide the information of this kind of signal in such circumstances. In this paper, a blind spreading sequence set estimation algorithm for the M-ary DSSS signals is proposed. This method exploits the signal structure and the cross-correlation properties between the spreading sequences. Firstly, the received signal samples are divided into a set of vectors. Secondly, using a correlation-based iteration, one of the spreading sequences is recovered. And, the vectors corresponding to this sequence are removed from the signal vector set. Thirdly, by repeating the above procedure, a set of estimates are obtained. Finally, false answers are removed by checking the estimates with the original signal samples, then, the spreading sequence set is recovered. This method is capable of providing good estimates when the signal-to-noise ratio is greater than −1dB. Besides, the proposed method is much faster and more robust than the existing K-means clustering dispreading method. Simulation results verify the capabilities of the proposed method.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114345598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A FFT-window search algorithm for diversity combining in downlink multipoint joint transmission 下行多点联合传输分集组合的fft窗口搜索算法
Guolin Sun, Feng Ye
{"title":"A FFT-window search algorithm for diversity combining in downlink multipoint joint transmission","authors":"Guolin Sun, Feng Ye","doi":"10.1109/WCINS.2010.5541763","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541763","url":null,"abstract":"In this paper, we consider the downlink of multipoint joint transmission in a multi-cell environment, where all of the base stations involved will be subject to different timing errors. Because a single UE can only be guaranteed synchronization with the transmitter of its serving cell accurately, targeting a practical solution, we consider a measurement based optimization for this problem. In this paper, we firstly analyze the impact of multiple timing errors from the different cooperative cells on the data demodulation performance of the CoMP UEs, especially for edge users. Then we propose a FFT window search method with cognitive measurements for joint transmission, provided with the accurate knowledge on all involved local channel estimation. Simulation results have been provided and show it improves the SINR behind demodulation about 2dB for downlink multipoint joint transmission.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The upper bounds of punctured ring convolutional coded continuous phase modulation 穿孔环卷积编码连续相位调制的上界
Lei Zhang, Weibing Xu, Haibo Wang
{"title":"The upper bounds of punctured ring convolutional coded continuous phase modulation","authors":"Lei Zhang, Weibing Xu, Haibo Wang","doi":"10.1109/WCINS.2010.5541910","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541910","url":null,"abstract":"In this paper, upper bounds on the symbol error probability for punctured ring convolutional coded continuous phase modulation with maximum likelihood sequence detection are investigated. The bounds are based on the numerical calculation method using union bound, and can be used as a tool to analyze and design punctured ring convolutional coded continuous phase modulation systems.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blind digital watermarking for color medical images based on PCA 基于PCA的彩色医学图像盲数字水印
Xinde Sun, S. Bo
{"title":"A blind digital watermarking for color medical images based on PCA","authors":"Xinde Sun, S. Bo","doi":"10.1109/WCINS.2010.5541812","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541812","url":null,"abstract":"In this paper, we propose a new robust digital image blind watermark scheme that is used to protect color medical images. In this scheme, K-L transform is applied to an RGB medical image and the binary watermark is embedded into low frequency sub-band of DWT of the principal component of medical images. The embedding positions are chosen according to the human visual system (HVS). The embedding method is based on the relationship between center coefficients and the mean values of the nearest neighborhood coefficients. The watermark is extracted from the watermarked image only according to the relationship. The experimental results show that the proposed algorithm is robust, imperceptible and practicable.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117018130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Enhanced equalization in OFDM systems using cyclic prefix 使用循环前缀的OFDM系统增强均衡
A. A. Quadeer
{"title":"Enhanced equalization in OFDM systems using cyclic prefix","authors":"A. A. Quadeer","doi":"10.1109/WCINS.2010.5541882","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541882","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a modulation technique that provides high achievable data rates in wireless environment by combating multipath effects and has relatively simple implementation. In this paper, it is demonstrated that how the cyclic prefix can be used to enhance the operation of an OFDM equalizer when the channel is perfectly known at the receiver or is obtained through training. This method relies on transforming the OFDM channel into two subchannels (circular and linear) that share the same input and are characterized by the same channel parameters. Conventionally, data is recovered by utilizing only the circular subchannel while in this method, both the circular and linear subchannels are used to recover the data. The improved performance of the proposed method is demonstrated with the help of simulations for constant modulus as well as non-constant modulus data.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123238006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The design of localization in wireless sensor network node based on JENNIC platform 基于JENNIC平台的无线传感器网络节点定位设计
Guang-zhao Cui, Hao Li
{"title":"The design of localization in wireless sensor network node based on JENNIC platform","authors":"Guang-zhao Cui, Hao Li","doi":"10.1109/WCINS.2010.5541767","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541767","url":null,"abstract":"As traditional TOA Ranging needs a lot of hardware expenditures to achieve the node time synchronization, combining JN5121 wireless microcontroller and a new Distance Calculation Method which is based on Information lag, We construct a new wireless monitoring, positioning network which is based on Zigbee Protocol. As shown in the system-experiment, the new system does not need to achieve the node time synchronization, and has low power and stable performance, It meets the Low-density, low-accuracy, low-cost wireless network's demand.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信