2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)最新文献

筛选
英文 中文
Cryptographic key management methods for mission-critical wireless networks 关键任务无线网络的密码密钥管理方法
Celia Li, Cungang Yang
{"title":"Cryptographic key management methods for mission-critical wireless networks","authors":"Celia Li, Cungang Yang","doi":"10.1109/ICEIEC.2017.8076506","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076506","url":null,"abstract":"When a large scale disaster strikes, it demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional communication infrastructures such as landline phone or cellular networks are damaged and dont provide adequate communication services to first responders for exchanging emergency related information. Wireless mesh networks is the promising alternatives in such type of situations. The security requirements for emergency response communications include privacy, data integrity, authentication, access control and availability. To build a secure communication system, usually the first attempt is to employ cryptographic keys. In critical-mission wireless mesh networks, a mesh router needs to maintain secure data communication with its neighboring mesh routers. The effective designs on fast pairwise key generation and rekeying for mesh routers are critical for emergency response and are essential to protect unicast traffic. In this paper, we present a security-enhanced session key generation and rekeying protocols EHPFS (enhanced 4-way handshake with PFS support). It eliminate the DoS attack problem of the 4-way handshake in 802.11s. EHPFS provides additional support for perfect forward secrecy (PFS). Even in case a Primary Master Key (PMK) is exposed, the session key PTK will not be compromised. The performance and security analysis show that EHPFS is efficient.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124934656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and privacy on internet of things 物联网的安全和隐私
Z. Ren, Xiangang Liu, Runguo Ye, Zhang Tao
{"title":"Security and privacy on internet of things","authors":"Z. Ren, Xiangang Liu, Runguo Ye, Zhang Tao","doi":"10.1109/ICEIEC.2017.8076530","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076530","url":null,"abstract":"There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks on the different layers of IoT, such as unauthorized access to tags, tag cloning, sybil attack, sinkhole attack, denial of service attack, malicious code injection, and man in middle attack. IoT devices are more vulnerable to attacks because it is simple and some security measures can not be implemented. We analyze the privacy and security challenges in the IoT and survey on the corresponding solutions to enhance the security of IoT architecture and protocol. We should focus more on the security and privacy on IoT and help to promote the development of IoT.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116611766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Transmission opportunity and capacity analysis for cellular based clustered VANET 基于蜂窝式集群VANET的传输机会和容量分析
Yu-jue Peng, T. Luo, Hang Zhang
{"title":"Transmission opportunity and capacity analysis for cellular based clustered VANET","authors":"Yu-jue Peng, T. Luo, Hang Zhang","doi":"10.1109/ICEIEC.2017.8076503","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076503","url":null,"abstract":"In the research of vehicular Ad Hoc network (VANET), integrated VANET and LTE heterogeneous network is a frontier topic as it meets the needs of data transmission as well as Internet access, where the value of cellular based clustering algorithm is prominent. In this paper, we analyze transmission opportunity and capacity in cellular based clustered VANET with stochastic geometry tools. Vehicular mobility pattern in this paper is Car Following Model and clustering of cars is managed by eNodeB along a linear road under the Lowest-ID algorithm. With three scenarios built to make a detailed research and IEEE 802.11p applied in data packets transmission, theoretical analysis and simulation results show that introduction of clustering algorithm lowers average transmission opportunity and capacity upper bound in the network. A suggested mean cluster size is proposed as a reference in the end of this paper with which expected transmission opportunity and capacity attain their maximum when employing clustering algorithms.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved block CFO estimation algorithm based on zadoff-chu pilot sequence for LDACS in UAV channel 基于zadoff-chu导频序列的改进块CFO估计算法
Yang Ding, Zhang Tao
{"title":"An improved block CFO estimation algorithm based on zadoff-chu pilot sequence for LDACS in UAV channel","authors":"Yang Ding, Zhang Tao","doi":"10.1109/ICEIEC.2017.8076501","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076501","url":null,"abstract":"The L-Band Digital Aeronautical Communication System (LDACS) is a typical pilot-aided orthogonal frequency division multiplexing (OFDM) communication system. With the performance of LDACS in the Unmanned Aerial Vehicle (UAV) over-water channel, the pilot is redesign based on Zadoff-Chu (ZC) sequence. The new periodic ZC-pilot could reduce the effects of noise by correlated calculation. Based on new ZC-pilot, an improved block frequency offset estimation algorithm is proposed. The frequency offset of data frame is estimated and compensated by block pilots correlated calculation, which eliminates the influence of residual Doppler effect. The simulation results show that the stability and convergence of the block frequency offset estimation algorithm are much better than one-shot estimation algorithm. Besides, the proposed algorithm could obtain approximately 6dB performance gain in aviation enroute channel, while 4dB in the UAV over-water channel. Compared with the loop-filtering algorithm, the proposed algorithm has similar carrier-frequency offset (CFO) tracking performance and bit error rate (BER) performance, but saves 80% multiplexing resources, which leads to lower transmission latency and computational complexity.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security of full-duplex jamming SWIPT system with multiple non-colluding eavesdroppers 具有多个非串通窃听器的全双工干扰SWIPT系统的安全性
Xuan xuan Tang, Wendong Yang, Yueming Cai, Weiwei Yang, Yu-zhen Huang
{"title":"Security of full-duplex jamming SWIPT system with multiple non-colluding eavesdroppers","authors":"Xuan xuan Tang, Wendong Yang, Yueming Cai, Weiwei Yang, Yu-zhen Huang","doi":"10.1109/ICEIEC.2017.8076513","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076513","url":null,"abstract":"In this paper, the secrecy performance of full-duplex jamming SWIPT system is conducted where multiple eavesdroppers intercept the confidential information individually. The closed-form expressions of the connection outage probability (COP), the secrecy outage probability (SOP), the reliable-secure probability (RSP) and the secrecy throughput are obtained, which depict the secrecy performance of the system intuitively. The results demonstrate the significance of the power-splitting ratio, the transmit signal-to-noise ratio (SNR) and the secrecy information rate on the system security. All the observations indicate the existence of a optimum pair of the secrecy information rate and the power splitting ratio which maximize the secrecy throughput. Numerical results are provided for the validation of the analysis.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132473067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Simultaneous wireless information and power transfer with energy-preserving relaying 同时无线信息和能量传输与节能继电器
Suye Fang, Shaoshuai Gao
{"title":"Simultaneous wireless information and power transfer with energy-preserving relaying","authors":"Suye Fang, Shaoshuai Gao","doi":"10.1109/ICEIEC.2017.8076500","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076500","url":null,"abstract":"Conventional simultaneous wireless information and power transfer (SWIPT) schemes generally assume that only the currently harvested energy will be used for the following signal forwarding. As a result, it is impossible to amplify the signal in theory. And even unfortunately, the forwarded signal power is splitted and the forwarded signal will be subject to severe attenuation when compared to the received signal, since there will be energy loss of circuit. On the other hand, in most cases, the signal is transmitted intermittently, i.e. sometimes the relay node will be idle, during which it can still harvest energy from the radio frequency interference around. And the harvested energy can be stored for future use. In this case, we analyze the optimal power splitting ratio and the maximal system throughput in full-duplex (FD) and half-duplex (HD) modes respectively. Numerical results show that the FD relay generally outperforms the HD relay but excessive energy supply will decrease the system throughput due to the increasing self-interference. The system throughput of HD relay will remain constant after it reaches a peak. Also, the impacts of other key system parameters, such as source power and distance, on the throughput of the energy-preserving FD/HD relay systems are analyzed.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underground wireless attendance realized by wireless sensor network and radio frequency identification 利用无线传感器网络和射频识别技术实现地下无线考勤
Zhou Ling-ling, Liang Liang, Ling Meng, Du Yu-xin, Tong Min-ming
{"title":"Underground wireless attendance realized by wireless sensor network and radio frequency identification","authors":"Zhou Ling-ling, Liang Liang, Ling Meng, Du Yu-xin, Tong Min-ming","doi":"10.1109/ICEIEC.2017.8076638","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076638","url":null,"abstract":"An underground wireless attendance system is designed based on radio frequency identification and wireless sensor network technology. The advantages of wireless sensor network have been applied in the attendance system, mainly solving the problems of wiring complexity and error-prone information collection, among other issues in the current attendance system. This system consists of radio frequency information acquisition module, wireless transmitting and receiving modules, and an attendance information processing system. After a long-term practice test, this system demonstrates stable performance and achieves the performance and functional requirements proposed in the design stage. The wireless attendance system has broad application prospects.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115512581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compact tri-band bandpass filter designed using stub-loaded stepped-impedance resonator 紧凑的三带带通滤波器设计采用桩负载阶跃阻抗谐振器
Hongshu Lu, T. Xie, N. Yuan, Qian Li
{"title":"Compact tri-band bandpass filter designed using stub-loaded stepped-impedance resonator","authors":"Hongshu Lu, T. Xie, N. Yuan, Qian Li","doi":"10.1109/ICEIEC.2017.8076508","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076508","url":null,"abstract":"A compact tri-band bandpass filter (BPF) designed using the stub-loaded stepped-impedance resonator (SL-SIR) is presented in this paper. The characteristics of the SIR are firstly studied by using the even-/ odd-mode analysis method. In order to reduce the overall size, a stepped-impedance meander loop resonator is used to design the tri-band BPF. By optimizing the structural parameters, a tri-band BPF operating at 2.45/ 3.5/ 5 GHz is designed and simulated. By adjusting the perturbation size, two degenerate modes are excited and coupling within the first passband. What's more, five transmission zeros which can further improve the performance of the BPF locate on both sides of the three passbands. Simulated results show that the proposed BPF possesses finer frequency response characteristics.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A high-parallelism detection algorithm for massive MIMO systems 大规模MIMO系统的高并行检测算法
Huang-Babg Li, Xuying Zhao, Chen Guo, Donglin Wang
{"title":"A high-parallelism detection algorithm for massive MIMO systems","authors":"Huang-Babg Li, Xuying Zhao, Chen Guo, Donglin Wang","doi":"10.1109/ICEIEC.2017.8076517","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076517","url":null,"abstract":"Due to the asymptotically orthogonal channel, minimum mean square error detection algorithm is near-optimal for uplink massive MIMO systems, but it involves matrix inversion with high complexity. This paper proposes a high-parallelism detection algorithm in an iterative way to avoid the complicated matrix inversion. The parallelism level is analyzed and convergence is proved in detail. The proposed algorithm can be implemented in a high level, which is equal to the max number of received data streams. The complexity can be reduced by one order of magnitude comparing with MMSE algorithm. Simulation results show that the proposed algorithm can closely match the performance of the MMSE algorithm with few number of iterations. It also outperforms Neumann Series approximation algorithm in terms of block error rate (BLER) performance with same number of iterations.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved object tracking algorithm based on tracking-leaning-detection framework 基于跟踪-学习-检测框架的改进目标跟踪算法
Wu Runze, Yuxing Wei, Jianlin Zhang
{"title":"Improved object tracking algorithm based on tracking-leaning-detection framework","authors":"Wu Runze, Yuxing Wei, Jianlin Zhang","doi":"10.1109/ICEIEC.2017.8076515","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076515","url":null,"abstract":"In object tracking, a novel tracking framework which is called “Tracking-Leaning-Detection” was proposed by Zdenka Kalal. This framework decomposes the object tracking task into tracking, learning and detection. In every frame that follows, the tracker and the detector work simultaneously to obtain the location of the object independently, and the learning acts as an information exchanging center between tracker and detector. To make up defects of the framework's robustness, we reconstruct the detector with local binary pattern feature. Firstly, local binary pattern descriptor of every scanning-window is calculated to generate local binary pattern feature vector. Secondly, the new Local Binary Pattern feature vector is generated by histogram statistics of the local binary pattern feature vector, and the positive and negative samples (image patches) are transformed in the same way. Thirdly, the new local binary pattern statistics feature vector of the scanning-window is matched with the positive and negative samples set based on normalized cross correlation. Finally, the detection results and the tracking results are fused and the detector is updated online. The experimental results on the public data set show that the proposed algorithm has better tracking performance and robustness.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127089751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信