{"title":"Capacity of Cellular CDMA Systems with Integrated Voice and Data Services","authors":"Zikuan Liu, J. Almhana, R. McGorman, Changle Li","doi":"10.1109/CNSR.2007.20","DOIUrl":"https://doi.org/10.1109/CNSR.2007.20","url":null,"abstract":"In this paper we analyze the capacity of a CDMA system supporting integrated voice and data services. The bit energy-to-interference ratios for voice and data services are each modeled using lognormal distributions, and an integrated capacity formula based on a lognormal approximation is proposed. The capacity formula defines an admission scheme to guarantee with a predefined probability the total interference is less than the maximum acceptable interference. Under the assumption of Poisson arrivals for voice and data services, Kaufman's method is applied to calculate the blocking probabilities for voice and data services. Numerical results are provided to illustrate the proposed procedure.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133627264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection","authors":"Farnaz Gharibian, A. Ghorbani","doi":"10.1109/CNSR.2007.22","DOIUrl":"https://doi.org/10.1109/CNSR.2007.22","url":null,"abstract":"Intrusion detection is an effective approach for dealing with various problems in the area of network security. This paper presents a comparative study of using supervised probabilistic and predictive machine learning techniques for intrusion detection. Two probabilistic techniques Naive Bayes and Gaussian and two predictive techniques decision tree and random forests are employed. Different training datasets constructed from the KDD99 dataset are employed for training. The ability of each technique for detecting four attack categories (DoS,Probe,R2L and U2R) have been compared. The statistical results to show the sensitivity of each technique to the population of attacks in a dataset have also been reported. We compare the performance of the techniques and also investigate the robustness of each technique by calculating their standard deviations with respect to the detection rate of each attack category.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srinivasan T, Vijayalakshmi D, Azeezunnisa A A, Assistant Professor
{"title":"PTSPM: A Novel PTS Based Prefix Matching Scheme with Reduced Collision for IPv6 Routers","authors":"Srinivasan T, Vijayalakshmi D, Azeezunnisa A A, Assistant Professor","doi":"10.1109/CNSR.2007.53","DOIUrl":"https://doi.org/10.1109/CNSR.2007.53","url":null,"abstract":"Internet address lookup is a challenging problem because of the increasing routing table sizes, increased traffic, higher speed links, and the migration to 128 bit IPv6 addresses. Routing lookup involves computation of best matching prefix for which existing solutions scale poorly when router traffic increases or when employed for IPv6 address lookup. Our paper describes a novel parallel ternary search based prefix matching (PTSPM) scheme with reduced collision for IPv6 routers. This approach employs multiple hashing on reduced number of hash tables on which parallel ternary search (PTS) on levels is applied. This scheme handles large number of prefixes generated by controlled prefix expansion by reducing collision and distributing load fairly in the hash buckets thus providing faster worst case and average case lookups. The approach we describe is fast, simple, scalable, parallelizable, and flexible.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114493823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Scenario for Identity Management in Daidalos","authors":"Zhikui Chen","doi":"10.1109/CNSR.2007.6","DOIUrl":"https://doi.org/10.1109/CNSR.2007.6","url":null,"abstract":"Digital Identity corresponds to the electronic information associated generally with an individual in a particular identity system. This is used by online service providers to authenticate and authorize users for services protected by access policies. Having good identity systems can enable individuals to use effectively and extensively electronic transactions in a secure yet privacy preserving manner. In order to match the above purpose, this paper introduces an identity scenario, a user-centric identity management, in terms of VID - virtual identity, which concept is designed to protect a user's privacy and secure communication data, which contemplates the multitude of identities and roles we take on each time we turn on our computer, mobile phone or PDA.. Simultaneously, the associated identity management system with its related infrastructure is described. A key component, the ID broker, of the proposed infrastructure is also detailed including some interfaces and their related components. Furthermore, a method that allows a user to manage his/her service via the VID is introduced.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public Key Multi-Message Signcryption (PK-MMS) Scheme For Secure Communication Systems","authors":"H. Elkamchouchi, A. Emarah, E. Hagras","doi":"10.1109/CNSR.2007.54","DOIUrl":"https://doi.org/10.1109/CNSR.2007.54","url":null,"abstract":"In this paper, a new and efficient public key multi-message signcryption (PK-MMS) scheme for provable secure communications has been proposed. The proposed scheme simultaneously signcrypts the multiple messages in a logical single step by using a multi-key generator which introduce a great deal of redundancy, efficient cost and low processing time for multi-message signcryption. The proposed PK-MMS has an efficient computation time and communication overhead compared with Zheng signcryption scheme. More specifically, it has been shown that for the minimum security parameters recommended for use in current practice, the numerical value for the saving in communication overhead using the proposed scheme are 27.7 % and 41.7 % for two and four signcrypted message over Zheng signcryption scheme. The proposed scheme costs 50 % and 75 % less in computation cost for two and four signcrypted message than does Zheng signcryption scheme.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive FEC-based Packet Loss Recovery Scheme Using RZ Turbo Codes","authors":"A. Al-Shaikhi, J. Ilow, X. Liao","doi":"10.1109/CNSR.2007.11","DOIUrl":"https://doi.org/10.1109/CNSR.2007.11","url":null,"abstract":"Packet-level forward error correction (FEC) is a packet loss recovery technique which does not require retransmissions and allows packet delivery with bounded delay and controllable reliability. This makes packet-level FEC attractive in networks running real-time applications like video and audio streaming. Current packet level FEC schemes are either based on simple parity check codes or Reed-Solomon codes with erasure decoding, whereas this paper considers the application of more powerful turbo codes to recover from lost packets. In particular, we investigate the capability of a newly designed Return to Zero (RZ) turbo code to reduce the packet loss rate (PLR) between the source and the destination. In the proposed implementation of the RZ turbo code packet loss recovery scheme, when a packet is lost, a burst of erasures, i.e., lost bits, is introduced into the turbo code codeword, and these erasures are recovered using the soft-decision RZ turbo decoder. Because of the RZ interleaver, the RZ turbo decoder randomizes erasure positions and recovers them quite well. Our simulations indicate that the PLR performance of the proposed RZ turbo code packet loss recovery scheme benefits from adjusting the interleaver size to accommodate the changes in the raw link PLR.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121296785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Two-step TOA Estimation Method for IR-UWB Ranging Systems","authors":"Shaohua Wu, Qinyu Zhang, Naitong Zhang","doi":"10.1109/CNSR.2007.8","DOIUrl":"https://doi.org/10.1109/CNSR.2007.8","url":null,"abstract":"To design a low-calculation and high-precision TOA estimation algorithm for IR-UWB ranging systems, a two-step TOA estimation method which jointly employs energy-detection (ED) and match- filtering (MF) is proposed. Based on analyzing the principles of the two-step method, it was pointed out that the success rate of DP block detection in the first step and the setting of MF-threshold-factor in the second step were the key issues that affect the performance of the method. Algorithm selection of the first step and setting of the energy integration interval, which are the two factors that affects the success rate of DP block detection, were discussed through simulations. The idea of DMR (DP to minimum energy sample ratio) based MF-threshold-factor selection was proposed. Results show that the proposed two-step method greatly outperforms the one-step energy-detection based non-coherent method, while largely decreases the computational complexity compared to the one-step match-filtering based coherent method.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115107764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Non-Orthogonal Pulse Position Modulation for Time-Hopping UWB Transmission","authors":"Hao Zhang, Wei Li, T. Gulliver","doi":"10.1109/CNSR.2007.49","DOIUrl":"https://doi.org/10.1109/CNSR.2007.49","url":null,"abstract":"In this paper, we study the performance of non- orthogonal pulse position modulation (NPPM) for ultra-wideband (UWB) communication. Error probability and performance bounds are derived for a multi-user environment. It is shown that with proper selection of the pulse waveform and modulation index, NPPM can achieve better performance than orthogonal PPM with the same throughput.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Perspective Optimization of GEANTInter-domain Traffic","authors":"M. Pedro, E. Monteiro, F. Boavida","doi":"10.1109/CNSR.2007.44","DOIUrl":"https://doi.org/10.1109/CNSR.2007.44","url":null,"abstract":"Interdomain traffic engineering is a key issue when resource optimization across autonomous systems boundaries is concerned. Mapping interdomain traffic flows into existing service level agreements is, in general, a complex problem, for which an optimization tool is needed. Th is work aims at demonstrating the advantages of using such a tool to perform offline interdomain traffic optimization, using a multiperspective approach. This optimization approach was applied to GEANT, the European Research and Educational Network. The paper presents optimization solutions from various perspectives, namely bandwidth, monetary cost and routing trustworthiness. Results show the costs of the original GEANT traffic engineering solution and the costs of the optimized solutions side by side. This case study also shows the advantages of being able to select between the perspectives that best fit the domain management policies.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol","authors":"H. Rifà-Pous, J. Herrera-Joancomartí","doi":"10.1109/CNSR.2007.57","DOIUrl":"https://doi.org/10.1109/CNSR.2007.57","url":null,"abstract":"This paper describes the state of the art of secure ad hoc routing protocols and presents SEDYMO, a mechanism to secure a dynamic multihop ad hoc routing protocol. The proposed solution defeats internal and external attacks using a trustworthiness model based on a distributed certification authority. Digital signatures and hash chains are used to ensure the correctness of the protocol. The protocol is compared with other alternatives in terms of security strength, energy efficiency and time delay. Both computational and transmission costs are considered and it is shown that the secure protocol overhead is not a critical factor compared to the high network interface cost.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}