{"title":"SWMM: Secure Wireless Mobility Management","authors":"Ikbel Daly, F. Zarai, L. Kamoun","doi":"10.1109/ICTEL.2010.5478851","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478851","url":null,"abstract":"Mesh technology has captured the interest of university research and industry, because of its capacity to meet at the same time the requirements of suppliers of wireless access to Internet and of users. But, the architecture and the configuration of this type of network do not ensure a protection against the unauthorized use of the network since the basic security measures used do not include the notion of mobility, which characterizes these networks. Our endeavor in this paper is to introduce a secure re-authentication mechanism named SWMM (Secure Wireless Mobility Management), which is carried out during the cross of mobile stations by different nodes to allow users fulfilling an effective and reliable handoff as well as a secure access to services offered in Mesh network. Our study shows that SWMM outperforms other existing method, as a result of a comparison in term of handoff latency, loss and blocking rate.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133393040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Sensor Networks for Structural Health Monitoring: Considerations for communication protocol design","authors":"S. Wijetunge, U. Gunawardana, R. Liyanapathirana","doi":"10.1109/ICTEL.2010.5478798","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478798","url":null,"abstract":"Structural Health Monitoring (SHM) systems have been used with many important structures to enhance the public safety and to reduce the economical losses. Wireless Sensor Networks (WSN) is an emerging technology which can be deployed with SHM applications. However, some system requirements have been overlooked in the current WSN designs for SHM applications. Therefore a complete analysis in system requirements is needed for WSN for SHM. In this paper, the system requirements posed by SHM applications are considered to assess potential candidates for the protocols in WSN for SHM. Based on that, we show that none of the commonly available protocols satisfy all the requirements associated with SHM systems. Hence, it is necessary to modify the existing protocols or design an entirely new protocol to completely satisfy the requirements of WSN for SHM application.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121690834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kd-tree codebook for limited feedback CDMA","authors":"Kritsada Mamat, W. Santipach","doi":"10.1109/ICTEL.2010.5478831","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478831","url":null,"abstract":"We propose a quantization scheme based on a Kd (K dimensional)-tree algorithm for signature sequence in a reverselink direct sequence (DS)- code division multiple access (CDMA). With a few feedback bits, a receiver quantizes the optimal signature that minimizes interference for a desired user, and relays it to the user via an error-free feedback channel. A user performance depends on the quantization codebook and a number of feedback bits. We show the performance of the proposed Kd-tree codebook with a nearest neighbor criterion and derive the performance approximation. Also we modify the Kd-tree scheme to search for the entry in the codebook, which gives the least interference. Numerical examples show that the Kd-tree codebook performs close to the optimal codebook with only fraction of computational complexity.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124898958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Ka-band horn antenna excited with parasitic dielectric resonator antenna","authors":"A. Othman, M. F. Ain, A. A. Sulaiman, M. Othman","doi":"10.1109/ICTEL.2010.5478792","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478792","url":null,"abstract":"A pyramidal horn antenna excited with parasitic dielectric resonator (DR) antenna for use at Ka-band frequencies is proposed. This antenna been divided into two parts, microstrip-fed rectangular slot DR antenna and a pyramidal horn. DR antenna consists of five identical cylindrical parasitic DR fed by a microstrip feedline through a coupling rectangular slot in the ground plane between them. It is designed to parasitic type for high gain, high isolation and wideband characteristics. Simulated result shows the antenna produce high gain that is larger than 19.8dB. CST simulation results of the electrical performance for pyramidal horn antenna operating at 38GHz are presented.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123953342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive strategy for scheduling data-intensive applications in Grid environments","authors":"Wantao Liu, R. Kettimuthu, B. Li, Ian T Foster","doi":"10.1109/ICTEL.2010.5478755","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478755","url":null,"abstract":"Data-intensive applications are becoming increasingly common in Grid environments. These applications require enormous volume of data for the computation. Most conventional meta-scheduling approaches are aimed at computation intensive application and they do not take data requirement of the applications into account, thus leading to poor performance. Efficient scheduling of data-intensive applications in Grid environments is a challenging problem. In addition to process utilization and average turnaround time, it is important to consider the worst-case turnaround time in evaluating the performance of Grid scheduling strategies. In this paper, we propose an adaptive scheduling scheme that takes into account both the computational requirements and the data requirements of the jobs while making scheduling decisions. In our scheme, data transfer is viewed in par with computation and explicitly considered when scheduling. Jobs are dispatched to the sites that are optimal in terms of both data transfer time and computation time. In addition, our scheme overlaps a job's data transfer time with its own queuing time and other jobs' computation time as much as possible. Trace-based simulations show that the proposed scheme can gain significant performance benefits for data-intensive jobs.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved design technique for the realization of wireless sensors' antennas in dissipative media","authors":"D. Trinchero, R. Stefanelli","doi":"10.1109/ICTEL.2010.5478749","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478749","url":null,"abstract":"The interest in the exploitation of wireless sensor networks in dissipative media (other than the free space) is nowadays growing in importance, thanks to the identification of new fields of application. This paper introduces an efficient design methodology for an easy definition of the geometrical characteristics of the antenna. The proposed procedure takes into account the coupling mechanism with the surrounding medium, as well as the electromagnetic interaction with the electronic and metallic components that form the sensor. In this way, the design of the radiofrequency components is carried out by means of a simplified iterative pre-conditioned modeling procedure that avoids expensive running times typical of a complete full wave method. Results obtained for the design of mobile sensor networks floating in underground water conduits confirm the adequacy of the proposed method.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129213365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A technique for Out-of-Band radiation reduction in OFDM-based cognitive radio","authors":"Shama Noreen, N. Z. Azeemi","doi":"10.1109/ICTEL.2010.5478875","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478875","url":null,"abstract":"Out-of-Band (OOB) radiations in Orthogonal Frequency Division Multiplexing (OFDM) system leads to the wastage of the scarce spectral resources and may pose severe interference threats to the legacy user in dynamic spectrum sharing environment. In this paper, we propose a novel technique for reducing OOB radiations caused by the high sidelobes in OFDM system. The principle of this technique is to map groups of two input transmit symbols on to expanded constellation points such that subcarriers in each group are 180 degrees out of phase. As a result, the proposed technique reduces the OFDM sidelobes by more than 10 dB in average at the cost of a slight increase in bit error rate. An important advantage of the proposed technique is that it does not require additional FFTs.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127867405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Myriad based ESPRIT antenna array for impulsive wireless channels","authors":"A. M. Hmidat, Mohamed A. S. Hassan, A. Ukasha","doi":"10.1109/ICTEL.2010.5478660","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478660","url":null,"abstract":"An efficient nonlinear direction of arrival estimation method based on robust statistics is developed for a CDMA receiver to mitigate impulsive noise effects in multipath environments. The proposed scheme is derived from the sample myriad-based covariation matrix. Simulation results demonstrate that the proposed scheme significantly outperforms other linear and non-linear schemes.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121106937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel QoS restoration scheme based on domination set in IP over WDM multicast network","authors":"San-Nan Lee","doi":"10.1109/ICTEL.2010.5478868","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478868","url":null,"abstract":"Due to the advance in WDM technology and real-time applications, multicast communication is discussed recently. An important issue for real-time communication, fault restoration schemes, lets multicast communication reliable. In this paper, a novel QoS restoration scheme based on domination set (HFR-DS) is proposed. The domination node can provide dynamic method to generate the restoration path. This method is not only used for link failure, but also for node failure. The simulation results show that the proposed scheme has better performance in terms of hop count and blocking probability. The delay could be guaranteed to meet the requirements of different kinds of multicast group, such as real-time streams.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124603371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Macro and micro diversity improvement with Patched dynamic decode and forward relaying","authors":"N. Gresset, Mélanie Plainchault, G. R. Othman","doi":"10.1109/ICTEL.2010.5478639","DOIUrl":"https://doi.org/10.1109/ICTEL.2010.5478639","url":null,"abstract":"In this paper, we consider the improvement of the macro and micro diversity by the help of relays using a dynamic decode and forward (DDF) protocol. We first derive bounds on the macro and micro diversity for DDF and Patched-DDF protocols using distributed Mono-stream and Alamouti schemes. We then derive an auto-organized behavior of the relay that maximizes the macro and micro diversity of the broadcast application.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122498083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}