2008 1st IFIP Wireless Days最新文献

筛选
英文 中文
A new generic model for signal propagation in Wi-Fi and WiMAX environments Wi-Fi和WiMAX环境下信号传播的一种新的通用模型
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812872
R. Ezzine, Ala Al-Fuqaha, R. Braham, A. Belghith
{"title":"A new generic model for signal propagation in Wi-Fi and WiMAX environments","authors":"R. Ezzine, Ala Al-Fuqaha, R. Braham, A. Belghith","doi":"10.1109/WD.2008.4812872","DOIUrl":"https://doi.org/10.1109/WD.2008.4812872","url":null,"abstract":"The ability to accurately predict radio propagation behavior for wireless communication systems, such as cellular mobile radio, is becoming crucial to system design. Since site measurements are costly, propagation models have been developed as suitable, low-cost, and convenient alternative. In this paper, we will propose a new generic signal propagation model for Wi-Fi and WiMAX environments. To develop this model we used existing models which are classified as: Free space models and land propagation models. This includes different types of loss: path loss, slow fading (shadowing) and fast fading. Our aim is to have a flexible model to be applicable in indoor and outdoor environments. Experiments carried out for indoor Wi-Fi and outdoor WiMAX cases have shown excellent results for the proposed model.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Security management process or video surveillance systems in heterogeneous communication networks 异构通信网络中视频监控系统的安全管理过程
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812865
K. Kraus, O. Martikainen, R. Reda
{"title":"Security management process or video surveillance systems in heterogeneous communication networks","authors":"K. Kraus, O. Martikainen, R. Reda","doi":"10.1109/WD.2008.4812865","DOIUrl":"https://doi.org/10.1109/WD.2008.4812865","url":null,"abstract":"In this paper, we are going to study and analyze the security management process for video surveillance systems. Subsequently, an architecture concept will be presented, showing the different standard security processes e.g. physical security, application security, network security and describe and analyze the individual factors affecting each process. Then the influence and impact to the video surveillance business continuity as well as on the law & ethic issues will be discussed. Finally the interdependencies between different security process and/or the different security parameters in video surveillance systems will be analyzed while keeping in mind the heterogeneous nature of the networks in order to achieve an optimal security management process architecture.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Low complexity iterative decoding algorithm for low-density parity-check (LDPC) codes 低密度奇偶校验码的低复杂度迭代译码算法
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1007/978-3-642-17758-3_29
Albashir Mohamed, M. Elsabrouty, S. El-Ramly
{"title":"Low complexity iterative decoding algorithm for low-density parity-check (LDPC) codes","authors":"Albashir Mohamed, M. Elsabrouty, S. El-Ramly","doi":"10.1007/978-3-642-17758-3_29","DOIUrl":"https://doi.org/10.1007/978-3-642-17758-3_29","url":null,"abstract":"","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"553 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secured vertical handoff decision scheme for the Fourth Generation (4G) wireless networks 第四代(4G)无线网络的安全垂直切换决策方案
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812889
R. Tawil, Jacques Demarjien, G. Pujolle
{"title":"Secured vertical handoff decision scheme for the Fourth Generation (4G) wireless networks","authors":"R. Tawil, Jacques Demarjien, G. Pujolle","doi":"10.1109/WD.2008.4812889","DOIUrl":"https://doi.org/10.1109/WD.2008.4812889","url":null,"abstract":"One of the main issues in the fourth generation (4G) wireless networks is the vertical handoff decision. The handoff is the mechanism used in order to let a mobile node (MN) switches from a network to another without remarkable service disconnection. Thus, the delay consumed to choose the suitable network to which the MN may connect is a major issue, which may impact the offered quality of service (QoS). In this paper we will present a Secured Vertical Handoff Decision (Sec-DVHD) scheme using the PKI algorithm, which is an extension of our proposed scheme, the distributed vertical handoff decision (DVHD). The simulation shows a good performance of the Sec-DVHD in term of handoff blocking rate and throughput.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive subcarrier and power allocation for OFDMA systems OFDMA系统的自适应子载波和功率分配
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812830
C. Weeraddana, W. Li, M. Codreanu, M. Latva-aho
{"title":"Adaptive subcarrier and power allocation for OFDMA systems","authors":"C. Weeraddana, W. Li, M. Codreanu, M. Latva-aho","doi":"10.1109/WD.2008.4812830","DOIUrl":"https://doi.org/10.1109/WD.2008.4812830","url":null,"abstract":"We consider the sum rate maximization problem in downlink OFDMA systems subject to total transmit power and minimum user rate constraints. A low complexity suboptimal resource allocation algorithm is proposed for joint optimization of multiuser subcarrier assignment and power allocation. The algorithm is based on Lagrangian relaxation where the non-convex optimization problem is decomposed into a master problem and a subproblem. Subproblem has a similar form as standard weighted sum rate maximization subject to total transmit power. Standard subgradient method is used in the master problem and a suboptimal algorithm inspired from primal decomposition techniques is also proposed to approximately solve the subproblem. Simulations are provided to compare the performance of the proposed algorithm to fixed spectrum assignment based algorithms with adaptive power control.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wireless cooperative networks: Partnership selection and fairness 无线合作网络:伙伴选择与公平性
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812891
E. Elsheikh, Kai‐Kit Wong
{"title":"Wireless cooperative networks: Partnership selection and fairness","authors":"E. Elsheikh, Kai‐Kit Wong","doi":"10.1109/WD.2008.4812891","DOIUrl":"https://doi.org/10.1109/WD.2008.4812891","url":null,"abstract":"This paper presents analytical results that formalize fair-and-effective partnership selection for a distributed wireless network where user cooperation is employed to enhance the network performance and each individual user has the responsibility of identifying an appropriate partner, or makes a decision if a partnership opportunity is offered by other users. In particular, a 2-user time-division reciprocal cooperation is used so that the transmitters in a network are arranged into pairs of cooperating users with the aid of the channel state information (CSI) at the user nodes.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126475223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network level cooperation for resource allocation in future wireless networks 面向未来无线网络资源分配的网络级协作
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812916
M. A. Khan, C. Truong, T. Geithner, F. Sivrikaya, S. Albayrak
{"title":"Network level cooperation for resource allocation in future wireless networks","authors":"M. A. Khan, C. Truong, T. Geithner, F. Sivrikaya, S. Albayrak","doi":"10.1109/WD.2008.4812916","DOIUrl":"https://doi.org/10.1109/WD.2008.4812916","url":null,"abstract":"The increasing number of radio access technologies and the availability of multi-radio devices boost the need for novel resource allocation schemes in cellular networks. This paper uses a cooperative game theoretic approach for resource allocation at the network level, while utilizing simultaneous use of available radio interfaces at the device level. We model resource allocation management using the well known bankruptcy model and apply Kalai-Smorodinsky bargaining solution method to find a distribution rule, based on which we propose resource allocation and call admission control schemes. Performance analysis of our allocation and control schemes demonstrates significant improvements over previous approaches in terms of utilization of the available bandwidth and the number of call drops.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Using SIP identity to prevent man-in-the-middle attacks on ZRTP 使用SIP身份,防止ZRTP受到中间人攻击
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812920
O. Jung, M. Petraschek, T. Hoeher, I. Gojmerac
{"title":"Using SIP identity to prevent man-in-the-middle attacks on ZRTP","authors":"O. Jung, M. Petraschek, T. Hoeher, I. Gojmerac","doi":"10.1109/WD.2008.4812920","DOIUrl":"https://doi.org/10.1109/WD.2008.4812920","url":null,"abstract":"In this paper we present an architecture and associated protocol extensions for securing the media stream of a VoIP session. We make use of ZRTP which is a key agreement protocol that allows two parties to agree upon a secret session key over the media path. Because ZRTP is based on the popular Diffie-Hellmann key exchange mechanism it is inherently vulnerable to man-in-the-middle (MITM) attacks. Although ZRTP offers a mechanism for the prevention of MITM attacks, a sophisticated attacker might be able to launch a successful attack in certain scenarios. We describe an approach that provides authentic cryptographic parameters for ZRTP without sacrificing the independence from a user-level Public Key Infrastructure (PKI). We propose to use the mechanisms provided by RFC 4474 (SIP Identity) to ensure the identity of the parties involved in an ZRTP key exchange.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Practical handover optimization solution using autonomic agent-based piloting system 基于自主智能体的驾驶系统的实用交接优化解决方案
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812921
M. Abid, Mathieu Ligocki, Lionel Molinier, Gérard Nguenguang, G. Pujolle, D. Gaïti, H. Zimmermann
{"title":"Practical handover optimization solution using autonomic agent-based piloting system","authors":"M. Abid, Mathieu Ligocki, Lionel Molinier, Gérard Nguenguang, G. Pujolle, D. Gaïti, H. Zimmermann","doi":"10.1109/WD.2008.4812921","DOIUrl":"https://doi.org/10.1109/WD.2008.4812921","url":null,"abstract":"With the multiplication of wireless communication networks and the increasing capabilities of the user devices equipped with multiple technology interfaces, being always connected tends to be a reality in the near future. In this article we propose to pilot the current weak handover algorithms using an autonomic agent-based piloting system. We specifically focus on the pre-execution handover process. The proposed system main contributions are to recover the useful information and compute it to obtain useful knowledge. This latter will be used for feeding a sophisticated handover decision algorithm in order to pick the most appropriate access network. We have developed a real testbed to evaluate and validate our solution unlike most proposed works analyzed only by simulations and thus avoid practical problems encountered in real environment. Above this real platform we performed an experimentation in 802.11 wireless networks that shows promising results.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131218191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Experimental validation of a 2-level social mobility model in opportunistic networks 机会主义网络中两层次社会流动模型的实验验证
2008 1st IFIP Wireless Days Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812850
S. Gaito, G. Grossi, F. Pedersini, G. P. Rossi
{"title":"Experimental validation of a 2-level social mobility model in opportunistic networks","authors":"S. Gaito, G. Grossi, F. Pedersini, G. P. Rossi","doi":"10.1109/WD.2008.4812850","DOIUrl":"https://doi.org/10.1109/WD.2008.4812850","url":null,"abstract":"The aim of this paper is to validate a synthetic trace generator by means of a local campus experiment based on opportunistic networking. We employed pocket trace recorder (PTR) devices in order to explore human mobility and to make real connectivity available for reproducing its statistical features by artificial model simulations.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信