{"title":"Measuring anonymity using network coordinate systems","authors":"Thorsten Ries, R. State, T. Engel","doi":"10.1109/ISCIT.2011.6089954","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089954","url":null,"abstract":"Popularity and awareness of anonymisation systems increased tremendously over the past years, however only a very few systems made it from research to production. These systems usually add intermediate nodes in the communication path aiming to hide user identities. Several attacks against these systems exist, like timing attacks or exploitation of latency information. In this paper, we propose an alternative approach to disclose users of current popular anonymisation systems in practice by the means of virtual network coordinate systems, a widely accepted method for latency prediction and network optimisation. Mapping physical nodes to a n-dimensional space can reveal a geographical proximity that is used to disclose users, who expect to stay anonymous. We define a model that leverages network coordinates in order to measure quantitatively the anonymity services and evaluate it on the Planet-Lab research network. The basic idea is to analyse the relative distance between nodes and to calculate the probability of nodes being hosted in the same location. Evaluation proves that our proposed model can be used as a measure of anonymity.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PAPR reduction with harmony annealing research for OFDM systems","authors":"Jing Gao, Jinkuan Wang, Bin Wang, Xin Song","doi":"10.1109/ISCIT.2011.6092149","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092149","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) system has the problem of high peak-to-average power ratio (PAPR) due to its multiple sub-carriers. In general, partial transmitted sequence (PTS) technique is applied to obtain optimal PAPR reduction performance, but its exhausted search for the optimal phase factors must be accomplished accordingly. As the number of sub-blocks and phase factors increase, the computational complexity increases exponentially. In order to tackle this problem, a new method is proposed to find the sub-optimal phase factor using harmony annealing search. Comparison is performed between the proposed method and the various techniques developed previously. Simulation results show that the proposed algorithm can yield good tradeoff between PAPR reduction performance and computational complexity.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active RFID positioning of vehicles in road traffic","authors":"Enzhan Zhang, Yujun Kuang, Weili Jiang, M. Umer","doi":"10.1109/ISCIT.2011.6089737","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089737","url":null,"abstract":"Vehicle positioning is critical for Inter-vehicle Communication, navigation, vehicle monitoring and tracking, which are regarded as the technology to make everyday-driving safer. Conventional positioning methods (for example GPS) have poor accuracy (approximately ten meters, D-GPS has higher accuracy about one or two meters.), and could not positioning onto the lane, which is not enough to satisfy vehicle safety requirements such as collision avoidance. RFID (Radio Frequency Identification) is an old but newly emerged technology. In this paper, we propose RFID technology into vehicle positioning to improve positioning performance. The idea of this positioning scheme is that the RFID tags are installed along lanes on road to form RFID matrix and the vehicle equipped with RFID readers locate itself by retrieving position information from tags around it, thus called Active RFID Positioning (ARP). The proposed ARP scheme not only dramatically improves the accuracy of positioning; it is also more practical as well for scenarios like tunnels or underground parking where GPS is not available now.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An auxiliary unicode Han character lookup service based on glyph shape similarity","authors":"Jeng-Wei Lin, Feng-Sheng Lin","doi":"10.1109/ISCIT.2011.6092155","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092155","url":null,"abstract":"Most legacy computer systems only well support input and display of 20,902 Han characters (Hanzis for short) encoded in Unicode 1.0. In 2010, Unicode 6.0 has encoded 75,616 Hanzis. However, it is not easy to use these newly encoded Hanzis, even in the latest computers. Most of these newly encoded Hanzis are rarely used in daily lives. Some are only used in ancient literature or individual Sinospherical countries. Users may have confusion of their glyph shapes, pronunciations, meanings, and usages. Most Chinese IMEs (input method editors) require users to have good knowledge of Hanzis. As a result, users cannot input these Hanzis. We present an auxiliary Unicode Hanzi lookup service based on glyph shape similarity. One can key in a similar Hanzi by any IME to look up the wanted Hanzi. Each Unicode Hanzi is decomposed as a glyph expression. The similarity of glyph shapes of two Hanzis is calculated based on a derived edit distance on their glyph expressions. As a result, the system provides users a convenient way to look up unfamiliar Hanzis.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multichannel non-persistent CSMA MAC schemes with reinforcement learning for cognitive radio networks","authors":"Yi Tang, D. Grace, T. Clarke, Jibo Wei","doi":"10.1109/ISCIT.2011.6092159","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092159","url":null,"abstract":"This paper presents two multichannel non-persistent CSMA (M-np-CSMA) MAC schemes using Simple Reinforcement Learning and State-Action-Reward-State-Action (SARSA) learning respectively for distributed cognitive radio networks. The two learning schemes both use reinforcement learning to help the users learn the environment and historical transmissions. Compared with M-np-CSMA MAC protocol with random channel choice, the learning schemes can help the cognitive users choose the best channels which offer more spectrum access opportunities to sense and access. The results show that both learning schemes can effectively improve the throughput and decrease the packet delay at heavy traffic loads and with a large number of cognitive users. The Simple Reinforcement Learning scheme and SARSA scheme can achieves a 15% and 25% improvement in the maximum throughput respectively, compared with the M-np-CSMA without learning.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117268909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved roughening algorithm and hardware implementation for particle filter applied to bearings-only tracking","authors":"Shaohua Hong, Lin Wang","doi":"10.1109/ISCIT.2011.6089738","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089738","url":null,"abstract":"In this paper, we propose an improved roughening algorithm and its hardware architecture to solve the sample impoverishment problem for particle filter (PF) applied to bearings-only tracking (BOT) problem. The reasonable distribution of the roughening jitter is calculated from the innovations and states related to the survived particles. Simulation results indicate that the PF with the proposed improved roughening algorithm outperforms the general PF and the PF with existing roughening algorithm. Experimental study shows that this roughening algorithm can be efficiently implemented in hardware and the PF with this roughening algorithm can effectively solve the BOT problem.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114259248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved routing protocol for power-line network based on AODV","authors":"Wei Gao, Wenguang Jin, Hao Li","doi":"10.1109/ISCIT.2011.6089739","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089739","url":null,"abstract":"According to the topological feature of the power-line network, an improved On Demand Distance Vector (IPODV) routing is proposed to ensure an efficient data transmission. It is based on Ad hoc On-Demand Distance Vector (AODV) Routing which is a powerful routing protocol used in ad-hoc networks to deal with the fast changing logical topology. IPODV improves two modules of conventional AODV: neighbor table management and route maintenance mechanism. The improved neighbor table management is applied to select stable neighbors to participate in the route discovery. Meanwhile, the route maintenance mechanism is improved to reduce the routing maintenance overhead. It is shown by simulations and experiments that IPODV reduces the routing overhead and improves the stability of the routes compared to conventional AODV.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128176071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Markov chain analysis of IEEE 802.11 wireless networks with greedy behavior and heterogeneous traffic","authors":"Xijie Liu, T. Saadawi","doi":"10.1109/ISCIT.2011.6089956","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089956","url":null,"abstract":"In this paper, we investigate various greedy behavior scenarios that may appear in IEEE 802.11 wireless networks, and provide performances of the MAC layer using a two-dimensional Markov chain analytical model. We obtain the performance of greedy behaving nodes having different Poisson packet arriving rates for different wireless network topology structures and multiple greedy strategies. Besides the analytical results, we present also the simulation results.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123750447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved decoding algorithm for refined clipping noise in IDMA system with limited peak transmission","authors":"Yier Yan, Xueqin Jiang, M. Lee","doi":"10.1109/ISCIT.2011.6092184","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6092184","url":null,"abstract":"In this work, we propose a novel algorithm to combat the clipping noise in Interleave-division multiple access (IDMA) which inherits a peak-to-average power ratio (PAPR) problem especially in large number of multiple accesses. Clipping transmission is efficiently applied to reduce the PAPR to cause the clipping noise which is a weak tradeoff [1][2] to its performance. The proposed algorithm consists of the ordering multiple access interferences and estimating the statistics of refined clipping noise in each detection. The reason is that the estimated statistics of interferences and clipping noise will be carried to the next iteration for updating the clipping noise. The simulation results show that the performance is similar to that of no limited transmission case.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131449349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting bursts in P2P based semi-autonomous underwater acoustic sensor networks","authors":"Ming Xu, Guangzhong Liu","doi":"10.1109/ISCIT.2011.6089740","DOIUrl":"https://doi.org/10.1109/ISCIT.2011.6089740","url":null,"abstract":"Underwater Acoustic Sensor Networks (UW-ASNs) consist of a variable number of sensors and vehicles that are deployed to perform collaborative monitoring tasks over a given area through collecting monitored data or data streams. Detecting bursts in data streams of UW-ASNs is an important area of research with a wide range of applications. In this paper, we build semi-autonomous underwater acoustic sensor networks based on Peer-to-Peer (P2P) technology for sharing various UW-ASNs' information. In addition, we propose a novel approach for solving the problem of elastic burst detection in UW-ASNs based on evolutionary game theory. Extensive experiments have been carried out to assess the performance of the proposed method. The obtained results show that our burst detection method performs better than existing method with different data distributions.","PeriodicalId":226552,"journal":{"name":"2011 11th International Symposium on Communications & Information Technologies (ISCIT)","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}