{"title":"Cryptographic key management methods for mission-critical wireless networks","authors":"Celia Li, Cungang Yang","doi":"10.1109/ICEIEC.2017.8076506","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076506","url":null,"abstract":"When a large scale disaster strikes, it demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional communication infrastructures such as landline phone or cellular networks are damaged and dont provide adequate communication services to first responders for exchanging emergency related information. Wireless mesh networks is the promising alternatives in such type of situations. The security requirements for emergency response communications include privacy, data integrity, authentication, access control and availability. To build a secure communication system, usually the first attempt is to employ cryptographic keys. In critical-mission wireless mesh networks, a mesh router needs to maintain secure data communication with its neighboring mesh routers. The effective designs on fast pairwise key generation and rekeying for mesh routers are critical for emergency response and are essential to protect unicast traffic. In this paper, we present a security-enhanced session key generation and rekeying protocols EHPFS (enhanced 4-way handshake with PFS support). It eliminate the DoS attack problem of the 4-way handshake in 802.11s. EHPFS provides additional support for perfect forward secrecy (PFS). Even in case a Primary Master Key (PMK) is exposed, the session key PTK will not be compromised. The performance and security analysis show that EHPFS is efficient.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124934656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and privacy on internet of things","authors":"Z. Ren, Xiangang Liu, Runguo Ye, Zhang Tao","doi":"10.1109/ICEIEC.2017.8076530","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076530","url":null,"abstract":"There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks on the different layers of IoT, such as unauthorized access to tags, tag cloning, sybil attack, sinkhole attack, denial of service attack, malicious code injection, and man in middle attack. IoT devices are more vulnerable to attacks because it is simple and some security measures can not be implemented. We analyze the privacy and security challenges in the IoT and survey on the corresponding solutions to enhance the security of IoT architecture and protocol. We should focus more on the security and privacy on IoT and help to promote the development of IoT.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116611766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmission opportunity and capacity analysis for cellular based clustered VANET","authors":"Yu-jue Peng, T. Luo, Hang Zhang","doi":"10.1109/ICEIEC.2017.8076503","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076503","url":null,"abstract":"In the research of vehicular Ad Hoc network (VANET), integrated VANET and LTE heterogeneous network is a frontier topic as it meets the needs of data transmission as well as Internet access, where the value of cellular based clustering algorithm is prominent. In this paper, we analyze transmission opportunity and capacity in cellular based clustered VANET with stochastic geometry tools. Vehicular mobility pattern in this paper is Car Following Model and clustering of cars is managed by eNodeB along a linear road under the Lowest-ID algorithm. With three scenarios built to make a detailed research and IEEE 802.11p applied in data packets transmission, theoretical analysis and simulation results show that introduction of clustering algorithm lowers average transmission opportunity and capacity upper bound in the network. A suggested mean cluster size is proposed as a reference in the end of this paper with which expected transmission opportunity and capacity attain their maximum when employing clustering algorithms.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved block CFO estimation algorithm based on zadoff-chu pilot sequence for LDACS in UAV channel","authors":"Yang Ding, Zhang Tao","doi":"10.1109/ICEIEC.2017.8076501","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076501","url":null,"abstract":"The L-Band Digital Aeronautical Communication System (LDACS) is a typical pilot-aided orthogonal frequency division multiplexing (OFDM) communication system. With the performance of LDACS in the Unmanned Aerial Vehicle (UAV) over-water channel, the pilot is redesign based on Zadoff-Chu (ZC) sequence. The new periodic ZC-pilot could reduce the effects of noise by correlated calculation. Based on new ZC-pilot, an improved block frequency offset estimation algorithm is proposed. The frequency offset of data frame is estimated and compensated by block pilots correlated calculation, which eliminates the influence of residual Doppler effect. The simulation results show that the stability and convergence of the block frequency offset estimation algorithm are much better than one-shot estimation algorithm. Besides, the proposed algorithm could obtain approximately 6dB performance gain in aviation enroute channel, while 4dB in the UAV over-water channel. Compared with the loop-filtering algorithm, the proposed algorithm has similar carrier-frequency offset (CFO) tracking performance and bit error rate (BER) performance, but saves 80% multiplexing resources, which leads to lower transmission latency and computational complexity.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuan xuan Tang, Wendong Yang, Yueming Cai, Weiwei Yang, Yu-zhen Huang
{"title":"Security of full-duplex jamming SWIPT system with multiple non-colluding eavesdroppers","authors":"Xuan xuan Tang, Wendong Yang, Yueming Cai, Weiwei Yang, Yu-zhen Huang","doi":"10.1109/ICEIEC.2017.8076513","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076513","url":null,"abstract":"In this paper, the secrecy performance of full-duplex jamming SWIPT system is conducted where multiple eavesdroppers intercept the confidential information individually. The closed-form expressions of the connection outage probability (COP), the secrecy outage probability (SOP), the reliable-secure probability (RSP) and the secrecy throughput are obtained, which depict the secrecy performance of the system intuitively. The results demonstrate the significance of the power-splitting ratio, the transmit signal-to-noise ratio (SNR) and the secrecy information rate on the system security. All the observations indicate the existence of a optimum pair of the secrecy information rate and the power splitting ratio which maximize the secrecy throughput. Numerical results are provided for the validation of the analysis.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132473067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simultaneous wireless information and power transfer with energy-preserving relaying","authors":"Suye Fang, Shaoshuai Gao","doi":"10.1109/ICEIEC.2017.8076500","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076500","url":null,"abstract":"Conventional simultaneous wireless information and power transfer (SWIPT) schemes generally assume that only the currently harvested energy will be used for the following signal forwarding. As a result, it is impossible to amplify the signal in theory. And even unfortunately, the forwarded signal power is splitted and the forwarded signal will be subject to severe attenuation when compared to the received signal, since there will be energy loss of circuit. On the other hand, in most cases, the signal is transmitted intermittently, i.e. sometimes the relay node will be idle, during which it can still harvest energy from the radio frequency interference around. And the harvested energy can be stored for future use. In this case, we analyze the optimal power splitting ratio and the maximal system throughput in full-duplex (FD) and half-duplex (HD) modes respectively. Numerical results show that the FD relay generally outperforms the HD relay but excessive energy supply will decrease the system throughput due to the increasing self-interference. The system throughput of HD relay will remain constant after it reaches a peak. Also, the impacts of other key system parameters, such as source power and distance, on the throughput of the energy-preserving FD/HD relay systems are analyzed.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhou Ling-ling, Liang Liang, Ling Meng, Du Yu-xin, Tong Min-ming
{"title":"Underground wireless attendance realized by wireless sensor network and radio frequency identification","authors":"Zhou Ling-ling, Liang Liang, Ling Meng, Du Yu-xin, Tong Min-ming","doi":"10.1109/ICEIEC.2017.8076638","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076638","url":null,"abstract":"An underground wireless attendance system is designed based on radio frequency identification and wireless sensor network technology. The advantages of wireless sensor network have been applied in the attendance system, mainly solving the problems of wiring complexity and error-prone information collection, among other issues in the current attendance system. This system consists of radio frequency information acquisition module, wireless transmitting and receiving modules, and an attendance information processing system. After a long-term practice test, this system demonstrates stable performance and achieves the performance and functional requirements proposed in the design stage. The wireless attendance system has broad application prospects.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115512581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact tri-band bandpass filter designed using stub-loaded stepped-impedance resonator","authors":"Hongshu Lu, T. Xie, N. Yuan, Qian Li","doi":"10.1109/ICEIEC.2017.8076508","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076508","url":null,"abstract":"A compact tri-band bandpass filter (BPF) designed using the stub-loaded stepped-impedance resonator (SL-SIR) is presented in this paper. The characteristics of the SIR are firstly studied by using the even-/ odd-mode analysis method. In order to reduce the overall size, a stepped-impedance meander loop resonator is used to design the tri-band BPF. By optimizing the structural parameters, a tri-band BPF operating at 2.45/ 3.5/ 5 GHz is designed and simulated. By adjusting the perturbation size, two degenerate modes are excited and coupling within the first passband. What's more, five transmission zeros which can further improve the performance of the BPF locate on both sides of the three passbands. Simulated results show that the proposed BPF possesses finer frequency response characteristics.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huang-Babg Li, Xuying Zhao, Chen Guo, Donglin Wang
{"title":"A high-parallelism detection algorithm for massive MIMO systems","authors":"Huang-Babg Li, Xuying Zhao, Chen Guo, Donglin Wang","doi":"10.1109/ICEIEC.2017.8076517","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076517","url":null,"abstract":"Due to the asymptotically orthogonal channel, minimum mean square error detection algorithm is near-optimal for uplink massive MIMO systems, but it involves matrix inversion with high complexity. This paper proposes a high-parallelism detection algorithm in an iterative way to avoid the complicated matrix inversion. The parallelism level is analyzed and convergence is proved in detail. The proposed algorithm can be implemented in a high level, which is equal to the max number of received data streams. The complexity can be reduced by one order of magnitude comparing with MMSE algorithm. Simulation results show that the proposed algorithm can closely match the performance of the MMSE algorithm with few number of iterations. It also outperforms Neumann Series approximation algorithm in terms of block error rate (BLER) performance with same number of iterations.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved object tracking algorithm based on tracking-leaning-detection framework","authors":"Wu Runze, Yuxing Wei, Jianlin Zhang","doi":"10.1109/ICEIEC.2017.8076515","DOIUrl":"https://doi.org/10.1109/ICEIEC.2017.8076515","url":null,"abstract":"In object tracking, a novel tracking framework which is called “Tracking-Leaning-Detection” was proposed by Zdenka Kalal. This framework decomposes the object tracking task into tracking, learning and detection. In every frame that follows, the tracker and the detector work simultaneously to obtain the location of the object independently, and the learning acts as an information exchanging center between tracker and detector. To make up defects of the framework's robustness, we reconstruct the detector with local binary pattern feature. Firstly, local binary pattern descriptor of every scanning-window is calculated to generate local binary pattern feature vector. Secondly, the new Local Binary Pattern feature vector is generated by histogram statistics of the local binary pattern feature vector, and the positive and negative samples (image patches) are transformed in the same way. Thirdly, the new local binary pattern statistics feature vector of the scanning-window is matched with the positive and negative samples set based on normalized cross correlation. Finally, the detection results and the tracking results are fused and the detector is updated online. The experimental results on the public data set show that the proposed algorithm has better tracking performance and robustness.","PeriodicalId":163990,"journal":{"name":"2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127089751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}