Third International Conference on Communications and Networking最新文献

筛选
英文 中文
Matching Pursuit versus threshold-based approach for channel estimation in OFDM systems OFDM系统中信道估计的匹配跟踪与基于阈值的方法
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217738
Zakia Jellali, L. N. Atallah
{"title":"Matching Pursuit versus threshold-based approach for channel estimation in OFDM systems","authors":"Zakia Jellali, L. N. Atallah","doi":"10.1109/ComNet.2012.6217738","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217738","url":null,"abstract":"Channels exhibiting a sparse impulse response arise in a number of communication applications. In this paper, we address the problem of sparse channel estimation in Orthogonal Frequency Division Multiplexing (OFDM) systems. Our goal is to compare the accuracy of the Matching Pursuit (MP) [1] approach to an optimized threshold-based approach, named the Probabilistic Framework Estimator (PFE) [2]. The comparison of the two considered approaches is carried in the two scenarios of a priori and no priori knowledge about the channel degree of sparsity (CDS). To this end, the PFE algorithm is extended to the case of known probability of active taps. Also, an adapted version of the MP, to the case of unknown number of paths, is proposed.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121602184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation and comparison of resource allocation strategies for new streaming services in wireless cellular networks 无线蜂窝网络中新型流媒体服务资源分配策略的评价与比较
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217734
M. Karray, Yasir Khan
{"title":"Evaluation and comparison of resource allocation strategies for new streaming services in wireless cellular networks","authors":"M. Karray, Yasir Khan","doi":"10.1109/ComNet.2012.6217734","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217734","url":null,"abstract":"Since a long time wireless networks have been offering two types of services: variable bit-rate such as mail and constant bit-rate such as voice. Recently they also offer service for streaming calls such as mobile television. The objective of the present paper is to study the problem of allocating (and sharing) the resources for this new type of calls and to compare the performance of different allocation strategies. The allocation strategy implemented in real networks is an iterative time-sharing strategy. We build an explicit formulation of this strategy which permits not only a faster implementation, but also an analytical evaluation of its performance. Moreover we describe an optimal allocation strategy consisting of assigning the resources in priority to the least consuming ones. A cornerstone to evaluate and compare the different allocation strategies is the so-called outage probability defined for each location as the probability that a user in this location doesn't get his required bit-rate. We compare the efficiency of different numerical methods to calculate it; and show that the inverse Laplace method is rapid and efficient. We also calculate the increase of the outage probability of the time-sharing strategy compared to the optimal one. Finally, we validate a method permitting to calculate analytically the average of the outage probabilities over the different locations.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125482507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Simulation and performance evaluation of DAG construction with RPL 基于RPL的DAG结构仿真与性能评价
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217747
Olfa Gaddour, A. Koubâa, S. A. Chaudhry, M. Tezeghdanti, Rihab Chaâri, M. Abid
{"title":"Simulation and performance evaluation of DAG construction with RPL","authors":"Olfa Gaddour, A. Koubâa, S. A. Chaudhry, M. Tezeghdanti, Rihab Chaâri, M. Abid","doi":"10.1109/ComNet.2012.6217747","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217747","url":null,"abstract":"In this paper, we simulate and analyze the performance of the network formation process with the RPL (IPv6 Routing Protocol for Low Power and Lossy Networks), which is a routing protocol specifically designed for Low power and Lossy Networks (LLN) compliant with 6LoWPAN (IPv6 Low power Wireless Personal Area Networks). One motivation behind this work is that RPL is the first prospective candidate routing protocol for low-power and lossy networks, which are a main component in the next generation Internet-of-Things. RPL is still under development, although having gained maturity, and is open to improvements. Indeed, there is a need to understand well its behavior, and investigate its relevance. Our analysis is based on the ContikiRPL accurate and realistic simulation model developed under Contiki operating system. The performance of RPL is evaluated and analyzed for different network settings to understand the impact of the protocol attributes on the network formation performance, namely in terms energy, storage overhead, communication overhead, network convergence time and the maximum hop count. We argue through simulation that RPL provides several features that make it suitable to large scale networks.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Spectrum sensing based on STBC higher order statistics for cognitive radio systems 基于STBC高阶统计量的认知无线电系统频谱感知
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217748
Asma Ben Hadj Hmida, S. Cherif, Hichem Besbes
{"title":"Spectrum sensing based on STBC higher order statistics for cognitive radio systems","authors":"Asma Ben Hadj Hmida, S. Cherif, Hichem Besbes","doi":"10.1109/ComNet.2012.6217748","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217748","url":null,"abstract":"In this paper, we treat the orthogonal space-time block coded signals. Those codes present a redundancy that can be exploited for the enhancement of the detection. We first study the classical energy detector based STBC and prove the benefits of spatial diversity in enhancing the capability of signal detection. Taking advantage of the Alamouti code structure, we propose two statistical metric tests based on high order moments and we evaluate their performances. Simulations results show that the proposed algorithms intend to offer better performance compared to the classical energy detector. Indeed, the first proposed metric test improves the performance in terms of the accuracy of the detection. In fact, the detection probability is improved by almost 18% at 1% false alarm. In the other hand, the second proposed metric offers better performance in terms of robustness to the noise uncertainty, 80% compared to the classical energy detector for an uncertainty level equal to 1 and 2dB.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Firewall packet matching optimization using network traffic behavior and packet matching statistics 防火墙报文匹配优化使用网络流量行为和报文匹配统计
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217735
Z. Trabelsi, Hishem El Sayed, S. Zeidan
{"title":"Firewall packet matching optimization using network traffic behavior and packet matching statistics","authors":"Z. Trabelsi, Hishem El Sayed, S. Zeidan","doi":"10.1109/ComNet.2012.6217735","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217735","url":null,"abstract":"In this paper, we present a mechanism that utilizes network traffic behavior and packet matching statistics to optimize dynamically the ordering of the firewall filtering rules. The proposed technique segments the traffic space, calculates the matching rate for each filtering rule and deduces statistics means and variances over a predefined window of segments. The means and variances are used to update the positions of the filtering rules in the security policy. Through experiments using simulated firewall and network traffic generator, the proposed mechanism is shown to be efficient and easy to deploy in practical firewall implementation. This work demonstrates that the use of dynamic rule-ordering improves the filtering processing time and allows firewall administrators to analyze further the network traffic behavior and accordingly adjust the initial order of the filtering rules.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"32 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Precoding for MIMO systems with Grassmannian codebooks 用格拉斯曼码本对MIMO系统进行预编码
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217744
Imen Turki, I. Kammoun, M. Siala
{"title":"Precoding for MIMO systems with Grassmannian codebooks","authors":"Imen Turki, I. Kammoun, M. Siala","doi":"10.1109/ComNet.2012.6217744","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217744","url":null,"abstract":"In this paper, we investigate limited feedback precoding for two single-user MIMO systems. The first one employs spatial diversity at the transmitter and Maximum Ratio Combining at the receiver. The second one uses spatial multiplexing at the transmitter and V-BLAST signal processing at the receiver. For both systems, the precoder is selected at the receiver among a codebook and its index is conveyed to the transmitter through an error free feedback channel. For the first system, we consider two Grassmannian precoding codebooks and show through simulation results that a small number of feedback bits can reach the theoretical performance. For the case of a single-user system based on spatial multiplexing, we propose a novel criterion for selecting among codebook matrices the optimum precoding matrix at the receiver which maximizes the minimum signal to interference and noise ratio over the transmitted substreams. Simulation results show that our proposed selection criterion outperforms three other criteria introduced in the literature for the spatial muliplexing MIMO system. They also show a significant enhancement over the unprecoded spatial multiplexing system.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124306541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ARQ protocols for MIMO systems MIMO系统的ARQ协议
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217727
Fatma Zouaidi, H. Boujemaa, M. Siala
{"title":"ARQ protocols for MIMO systems","authors":"Fatma Zouaidi, H. Boujemaa, M. Siala","doi":"10.1109/ComNet.2012.6217727","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217727","url":null,"abstract":"In this paper, we evaluate the performance of Automatic Repeat reQuest (ARQ) protocols for MIMO (Multiple In Multiple Out) Systems using fixed and adaptive Modulation based on the instantaneous Signal to Noise Ratio (SNR). Transmit Antenna Selection (TAS) or/and Space Time Block Coding (STBC) are used. At the receiver, Maximum Ration Combining (MRC), Selection Combining (SC), Generalized SC (GSC), Minimum Selection GSC (MSGSC) and Maximum Likeliood (ML) detection are used. We also propose a combination of TAS and STBC where STBC is performed over two selected best antennas. We provide an analysis of the throughput performance of ARQ for MIMO systems using different transmitting and receiving techniques. Simulation results are also provided to confirm the accuracy of the theoretical analysis.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124361054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure handoff protocol in 3GPP LTE networks 3GPP LTE网络中的安全切换协议
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217746
Imen Elbouabidi, Ikbel Daly, F. Zarai
{"title":"Secure handoff protocol in 3GPP LTE networks","authors":"Imen Elbouabidi, Ikbel Daly, F. Zarai","doi":"10.1109/ComNet.2012.6217746","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217746","url":null,"abstract":"To provide secure 3GPP LTE-WLAN interworking, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities such as disclosure of user identity, man-in-the-middle attack, Sequence Number (SQN) synchronization, and additional bandwidth consumption. Therefore, in this paper, we propose new re-authentication protocol for wireless 3GPP LTE. The proposed protocol guarantees stronger security, mutual authentication, and resistance against many attacks. The suggested solution proves its effectiveness following the studies of simulation which carried out according to different criteria handoff latency, loss and blocking rate.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121580519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Energy efficiency analysis of base station cooperation under limited backhaul capacity 有限回程容量下基站合作的能源效率分析
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217733
M. Sarkiss, M. Kamoun
{"title":"Energy efficiency analysis of base station cooperation under limited backhaul capacity","authors":"M. Sarkiss, M. Kamoun","doi":"10.1109/ComNet.2012.6217733","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217733","url":null,"abstract":"Recently, Energy Efficient (EE) communications have received increasing interest specially in cellular networks. Promising techniques, such as MIMO and Base Station (BS) Cooperation schemes, have been widely studied in the past to improve the spectral efficiency and the reliability. Nowadays, the purpose is to investigate how these techniques can reduce the energy consumption of the systems. In this paper, we address for a single user scenario the energy efficiency of two BSs cooperation under limited backhaul capacity. In order to evaluate the EE metric, we provide an information-theoretical analysis based on the outage probability. Then, we identify by numerical results the cooperation scenarios that can save energy depending on the backhaul capacity.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things TEX (HIP Tiny Exchange):一种基于HIP的物联网分布式密钥交换方案
Third International Conference on Communications and Networking Pub Date : 2012-06-14 DOI: 10.1109/ComNet.2012.6217736
Yosra Ben Saied, Alexis Olivereau
{"title":"HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things","authors":"Yosra Ben Saied, Alexis Olivereau","doi":"10.1109/ComNet.2012.6217736","DOIUrl":"https://doi.org/10.1109/ComNet.2012.6217736","url":null,"abstract":"Considering the global identification and security challenges in IoT, the Host Identity Protocol (HIP) emerges as the most suitable solution for key establishment between two peers, allowing secure and uninterrupted connections. However, the heterogeneous nature of IoT entities coupling resource-constrained networks and powerful Internet complicates the use of HIP on small devices due to its expensive cryptographic operations. In this paper we present the HIP Tiny EXchange, a distributed lightweight key exchange protocol designed to reduce the requirements of HIP Basic EXchange in order to be supported by resource-constrained nodes.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131919653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信