{"title":"An efficient Recursive Inverse adaptive filtering algorithm for channel equalization","authors":"Mohammad Shukri Ahmad, O. Kukrer, A. Hocanin","doi":"10.1109/EW.2010.5483397","DOIUrl":"https://doi.org/10.1109/EW.2010.5483397","url":null,"abstract":"Recursive Inverse (RI) adaptive filtering algorithm which uses a variable step-size and the instantaneous value of the autocorrelation matrix in the coefficient update equation was proposed in [1]. The algorithm was shown to have a higher performance compared with the RLS and RRLS algorithms. In this paper, a more efficient version with lower computational complexity is presented. The performance of the algorithm has been tested in a channel equalization setting and compared with those of the Recursive Least Squares (RLS) and Stabilized Fast Transversal Recursive Least Squares (SFTRLS) algorithms in Additive White Gaussian Noise (AWGN), Additive Correlated Gaussian Noise (ACGN), Additive White Impulsive Noise (AWIN) and Additive Correlated Impulsive Noise (ACIN) environments. Simulation results show that the Fast RI algorithm performs better than RLS and requires less computations. Additionally, the performance of the Fast RI algorithm is shown to be superior to that of the SFTRLS algorithm under the same conditions.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection and fairness oriented cognitive radio MAC protocol for ad hoc networks (PROFCR)","authors":"B. Kahraman, F. Buzluca","doi":"10.1109/EW.2010.5483429","DOIUrl":"https://doi.org/10.1109/EW.2010.5483429","url":null,"abstract":"Spectrum scarcity and underutilized frequency bands are the most challenging wireless networking problems in the last decade. Cognitive radio (CR) is the promising solution for these two problems. We propose a protection and fairness oriented cognitive radio MAC protocol (PROFCR) for ad hoc networks. PROFCR allows secondary users (SU) to utilize the unused and underutilized frequency bands while bounding the harm against the QoS of primary users (PU). An important advantage of PROFCR is that it completely eliminates the spectrum sensing process. Each SU decides next operating channel by calculating state variables of channels using only local information. Instead of choosing another data channel after each collision, PROFCR tries to utilize the same data channel until a state variable reaches the limit. This process reduces the number of handovers and decreases the delays that arise from changing channels frequently. The proposed protocol includes three protection schemes, which limit the harm caused by SUs against the QoS of PUs. These protection schemes are: limiting the packet size of SUs, assigning larger congestion window size to SUs that compete for channel resources with PUs, and requiring SUs to wait before attempting to access the channel. We have created a discrete time simulator to analyze the efficiency of the proposed protocol. The simulation results indicate that PROFCR utilizes the spectrum holes efficiently while protecting primary transmission.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127945356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A case for mobility- and traffic-driven routing algorithms for wireless access mesh networks","authors":"B. Nazari, S. Wen","doi":"10.1109/EW.2010.5483501","DOIUrl":"https://doi.org/10.1109/EW.2010.5483501","url":null,"abstract":"We present an approach for developing routing algorithms where we first attempt to understand the network characteristics (i.e. network connectivity, mobility and rate of change of the topology) and expected traffic patterns of a specified mobile scenario before proceeding to design an algorithm that optimizing routing performance for the common cases. We apply our approach to Triton, a proposed 802.16-based (WiMax) maritime wireless access mesh network. Our trace-based analysis shows that in our environment, if stationary nodes are preferred in the route selection, the rate of change for the routes to the gateway nodes is reduced by 23.3% and the average duration for which routes between a node and a gateway remains valid is increased by 31%. We also show that it is important to take the expected traffic patterns into account when designing routing for a specific system. By ignoring changes to the network topology that do not affect the anticipated traffic, we can significantly reduce the overheads associated with the repair of the routing tables.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116901799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling and resource allocation in OFDM and FBMC systems: An interactive approach and performance comparison","authors":"Qing Bai, N. Passas, J. Nossek","doi":"10.1109/EW.2010.5483515","DOIUrl":"https://doi.org/10.1109/EW.2010.5483515","url":null,"abstract":"In modern wireless communication systems, scheduling and resource allocation are two closely related tasks of the medium access control (MAC) and physical (PHY) layers respectively. In this paper, we present a separate yet interactive design of the two functional modules, where the scheduler prioritizes data packets from different service flows according to their traffic characteristics and feedback from the resource allocator, while the resource allocator performs quality of service (QoS) constrained transmit power minimization given lists of prioritized packets from the scheduler. The simulation results of applying the model to both cyclic prefix based OFDM (CP-OFDM) and the filter bank based multicarrier (FBMC) systems demonstrate the superior performance of the latter.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improvement of collision probability in biased birthday attack against A5/1 stream cipher","authors":"H. Kourkchi, Hamidreza Tavakoli, M. Naderi","doi":"10.1109/EW.2010.5483496","DOIUrl":"https://doi.org/10.1109/EW.2010.5483496","url":null,"abstract":"A5/1 is the strong version of the encryption algorithm on GSM (Global System for Mobile communications) used in many countries. It is constructed of a combination of three LFSRs (Linear Feedback Shift Registers) with irregular clocking manner. One of the most practical attacks against this algorithm is time-memory trade-off attack, which is based on birthday paradox. The goal of this attack is to find any intersection between precomputed LFSRs states set and set of states generating the output bits in the actual execution of the algorithm. In order to increase feasibility of this attack, the biased birthday attack was introduced. In this attack special states producing a specific pattern in output bits are sampled and only a fraction of the special states with higher probability of occurrence are stored. By using a 16-bit pattern of data there are 248 parallelizable preparation stages. This attack requires about 150 GB of memory and two minutes of conversation. Under these conditions, the probability of collision is about 0.61. In this paper an improvement in the collision probability is introduced without changing the available memory capacity and duration of conversation. Our approach is based on using multiple data patterns instead of using a single one. This approach leads to increment of the preprocessing and the collision probability. It is shown that there is a trade-off between the collision probability and the preprocessing complexity.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alberto Vigato, L. Vangelista, C. Méasson, Xinzhou Wu
{"title":"Joint discovery in wireless networks","authors":"Alberto Vigato, L. Vangelista, C. Méasson, Xinzhou Wu","doi":"10.1109/EW.2010.5483508","DOIUrl":"https://doi.org/10.1109/EW.2010.5483508","url":null,"abstract":"Given a wireless network with N nodes located uniformly at random on a finite plane, we consider the problem of distributed peer discovery: all nodes want to discover as many other nodes as possible. We assume that there are a total of K physical resources dedicated for the discovery purpose. Each node can pick one resource to transmit its node identifier on, and can receive on the remaining K -1 resources. We assume that node identifiers are broadcast via coded transmission on one single physical resource using a single hop. This paper addresses link level strategies to maximize the average number of discovered devices when K <;<; N. A classical strategy of decoding one node per resource would lead to a maximum of K -1 nodes being discovered. We observe that typically this number is much lower (~K/2). We focus on n-user joint coding schemes to improve this performance and, more particularly, on joint iterative decoding (JID). It is shown through system simulations that JID may gain by significantly more than 100% over the classical single-user decoding, and by 20-25% over interference cancellation, provided that the number n of jointly decoded identifiers matches the actual interference density.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127315691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secret key agreement on wiretap channel with transmitter side information","authors":"A. Khisti","doi":"10.1109/EW.2010.5483458","DOIUrl":"https://doi.org/10.1109/EW.2010.5483458","url":null,"abstract":"The secret-key agreement problem over wiretap channels controlled by a state parameter is studied. The entire state sequence is known (non-causally) to the sender but not to the receiver and the eavesdropper. Upper and lower bounds on the secret-key capacity are established both with and without public discussion. In absence of public-discussion, our lower bound is strictly better than the best known lower bound for transmitting an independent secret message. This illustrates that the coding schemes for secret-key agreement are substantially different than secret-message transmission. For the special case of Gaussian channels, we establish the secret-key capacity when the legitimate receiver's signal-to-noise-ratio is greater than 0 dB. When a public discussion channel is available between the sender and the receiver, upper and lower bounds on the secret-key capacity are again established. These bounds coincide, yielding the capacity, when then the channels of the receiver and the eavesdropper satisfy an independent noise condition.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eirini-Eleni Tsiropoulou, Georgios K. Katsinis, S. Papavassiliou
{"title":"Utility-based power control via convex pricing for the uplink in CDMA wireless networks","authors":"Eirini-Eleni Tsiropoulou, Georgios K. Katsinis, S. Papavassiliou","doi":"10.1109/EW.2010.5483417","DOIUrl":"https://doi.org/10.1109/EW.2010.5483417","url":null,"abstract":"Efficient power allocation is a key element in supporting real time services' QoS prerequisites in the uplink of CDMA wireless networks. Game-theoretic approaches have been applied to study the power control problem, aiming at users' utilities maximization. However, in many cases the corresponding Nash equilibrium solutions introduce several inefficiencies. To tackle this problem in this paper we adopt a utility-based approach, and utilize a game theoretical framework with convex pricing of users' transmission powers, to obtain an efficient power allocation in the uplink of CDMA wireless networks supporting only real-time services with specific QoS characteristics. A Pareto optimal solution of the formulated noncooperative game is obtained analytically. The performance of the proposed approach is evaluated via modeling and simulation and it is compared against the results of the corresponding game with linear pricing, in terms of achievable users' utilities and transmission powers.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spiderweb: A social mobile network","authors":"Antonio Sapuppo","doi":"10.1109/EW.2010.5483495","DOIUrl":"https://doi.org/10.1109/EW.2010.5483495","url":null,"abstract":"Social networking sites obtained a great success in the last years. Their popularity is related to changing lifestyles, where people increasingly look for new acquaintances or cultivate old friendships by means of the Internet, typically using a PC. Yet along with the rapidly increasing amount of mobile phone users, as well as the development of so-called smart phones, the possibility for creating similar services for mobiles arises. Importantly, the mobile phones are not just entry points to existing social networks with their centralized architectures; being mobile offers one more degree of freedom. However, mobile social network services are unquestionably limited by mobile phones weaknesses (e.g. small screen, keyboards), so several challenges are necessary to be addressed. Consequently, in this paper we analyze usability and user satisfaction of mobile social networks. Thus, a mobile social network application called Spiderweb is implemented and used as a test case. Spiderweb provides to the users an opportunity to make acquaintances, search for people on the basis of certain criteria, chat, view profiles of other users, and with numerous other possibilities. Yet the application not only offers the mobile phone users services similar to social networks available on the web. Spiderweb moves beyond this concept, also giving an opportunity to interact with other users through Bluetooth connectivity. Thus, the application enables establishment of spontaneous collaborative networks which are further explored and evaluated in this paper.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126374253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on channel bonding/aggregation for multi-channel cognitive radio networks","authors":"Lei Jiao, V. Pla, F. Li","doi":"10.1109/EW.2010.5483492","DOIUrl":"https://doi.org/10.1109/EW.2010.5483492","url":null,"abstract":"Channel bonding/aggregation techniques, which assemble several channels together as one channel, could be used in cognitive radio networks for the purpose of achieving better bandwidth utilization. In existing work on this topic, channel bonding/aggregation is focused on the cases when primary channels are time slotted or stationary as compared with secondary users' activities. In this paper, we analyze the performance of channel bonding/aggregation strategies when primary channels are not time slotted and the time scale of primary activities is at the same level as the secondary users', given that spectrum handover is not allowed. Continuous time Markov chain models are built in order to analyze the performance of such a network in terms of three parameters: system capacity for secondary users, forced termination probability and blocking probability. Numerical results show that channel bonding/aggregation does not increase achieved system capacity and it leads to higher blocking probability, but lower forced termination probability is obtained when this technique is used.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123700795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}