{"title":"Block-Wise MIMO Detection with Near-Optimal Performance and Low Complexity","authors":"Rongrong Qian, Tao Peng, Yuan Qi, Wenbo Wang","doi":"10.1109/CMC.2010.55","DOIUrl":"https://doi.org/10.1109/CMC.2010.55","url":null,"abstract":"A block-wise MIMO detection scheme which reduces the search space greatly comparing with the ML detection but still achieves the near-optimal performance is proposed. The specific feature of the proposed detection scheme is that, the search space is reduced as much as possible before performing the exhaustive search, in other words, the required search space that is large enough to guarantee the acceptable performance is obtained in a search space pre-determination stage. Based on the output of ZF equalization, the metrics used for determining the reduced search space, which are the posterior probabilities in this paper, can be computed. According to the simulation results, the near-optimal performance can be obtained while the detection complexity is far less than that of the ideal ML detection.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted Channels with Password-Based Authentication and TPM-Based Attestation","authors":"Lingli Zhou, Zhenfeng Zhang","doi":"10.1109/CMC.2010.232","DOIUrl":"https://doi.org/10.1109/CMC.2010.232","url":null,"abstract":"Trusted channels establish trust of endpoint by linking endpoint configuration information to secure channels. Many trusted channels for client-server applications are established based on Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. Two existing solutions for building trusted channels are shown to be vulnerable to collusion attacks in this paper. Then we propose a protocol to establish trusted channels using password-based authenticated key exchange and TPM-based attestation. Our protocol uses an efficient but different binding approach to resist the proposed collusion attack. Furthermore, we propose an extended protocol to achieve enhanced privacy for clients.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient User Scheduling Scheme for MU-MIMO Systems with Limited Feedback","authors":"Fang Liang, Yang Maofan, Gong Ping, Wu Weiling","doi":"10.1109/CMC.2010.148","DOIUrl":"https://doi.org/10.1109/CMC.2010.148","url":null,"abstract":"On the MU-MIMO broadcast channel, Per-User Unitary and Rate Control (PU2RC) as a practical design is proposed for emerging cellular standards in 3GPP LTE. Unfortunately, when the number of users is small, the performance of PU2RC would be degraded with the increase of codebook size. In this paper, we propose an efficient user scheduling scheme to overcome this defect in PU2RC by enlargement of user scheduling space. The key feature of the proposed scheme is that at the BS each user is associated with at least one codebook vectors with the help of a predetermined threshold value. Simulation results show that the proposed scheme can be efficient to solute the problem of conventional scheme in PU2RC at the small number of users.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Caidan Zhao, Liang Xie, Xueyuan Jiang, Lianfeng Huang, Yan Yao
{"title":"A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks","authors":"Caidan Zhao, Liang Xie, Xueyuan Jiang, Lianfeng Huang, Yan Yao","doi":"10.1109/CMC.2010.36","DOIUrl":"https://doi.org/10.1109/CMC.2010.36","url":null,"abstract":"Cognitive radio (CR) was proposed as the key technologies to achieve the secondary usage of the spectrum. The security problems of CR networks have not been intensively studied, such as the primary user emulation (PUE) attacks. In this paper, we study the non-interactive security issues for wireless networks and propose a physical layer authentication approach to prevent PUE attacks in CR networks. We extract transmitter location fingerprints from the wireless medium in the multipath propagation environment. Wavelet transform is used to extract the characteristics of these fingerprints. Simulation and experiment results show that our approach can identify the PUE attackers and the legitimate primary users effectively.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Wireless Mesh Network Protocol Research Platform","authors":"Hui Zhong, B. Zhang, Jiwei Cheng","doi":"10.1109/CMC.2010.116","DOIUrl":"https://doi.org/10.1109/CMC.2010.116","url":null,"abstract":"Study of the wireless mesh network protocol, it be constructed that embedded Linux operating system platform which dedicated to the wireless mesh network protocols. The performance parameters and indexes of OLSR protocol can be experimental in different environment. Using of NET4526 embedded development board, build Linux operating system and various service needed for OLSR environment, transplant Madwifi wireless drivers and olsr services as well as routing protocols of OLSR, edit and compile the program of OLSR to achieve running wireless mesh network protocol research platform. Experimental results achieve the wireless mesh network as well as configure it in web. Multiple wireless mesh network protocol debugging platforms can be created. The use of more than 486 desktop configured to run the built Linux operating system instead of simulated experimental platform to compensate for the deficiencies caused by the deficiencies in the number of embedded platform for routing protocol.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114113038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Interconnection and Correspondence Between Relational Database and Embedded Database SQLite","authors":"Yang Xu, Hai-Yang Li","doi":"10.1109/CMC.2010.188","DOIUrl":"https://doi.org/10.1109/CMC.2010.188","url":null,"abstract":"Considering agricultural product’s feature and the current sale status of China's agricultural products, our system aims to use the Heterogeneous Database Synchronization technology to achieve the goal of Synchronous communication of Embedded Database SQLite and Relational Database MySQL. The system use JDBC technology connecting to the database and use an improved method of Change Capture Technology (Triggered Scanning Method) to accelerate the speed of scanning logs and improve the rate of data synchronization. The combination of Heterogeneous Database Synchronization technology and embedded technology can promote the application of the network of agricultural products marketing information.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114266362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Online Kannada Text Transliteration System for Mobile Phones","authors":"R. Aravindhan, G. Rathna, Vipin Gupta","doi":"10.1109/CMC.2010.307","DOIUrl":"https://doi.org/10.1109/CMC.2010.307","url":null,"abstract":"Transliteration system for mobile phone is an area that is always in demand given the difficulties and constraints we face in its implementation. In this paper we deal with automatic transliteration system for Kannada which has a non-uniform geometry and inter-character spacing unlike non-oriental language text like English. So it is even more a challenging problem. Working model consists of part of the process taking place on a mobile with remaining on a server. Good results are achieved.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114359975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zaisheng Dai, Liusheng Huang, Youwen Zhu, Wei Yang
{"title":"Privacy Preserving Density-Based Outlier Detection","authors":"Zaisheng Dai, Liusheng Huang, Youwen Zhu, Wei Yang","doi":"10.1109/CMC.2010.274","DOIUrl":"https://doi.org/10.1109/CMC.2010.274","url":null,"abstract":"Outlier detection can find its tremendous applications in areas such as intrusion detection, fraud detection, and image processing. Among many outlier detection algorithms, LOF is a very important density-based algorithm in which one critical step is to find the k-distance neighbors. In some privacy preserving circumstances, the cooperation between data holders is necessary while the privacy of the participators should be guaranteed. In this paper, we focus on privacy preserving LOF. We propose a novel algorithm for privacy preserving k-distance neighbors search. Combining it with other secure multiparty computation techniques, we detect outliers by LOF in a privacy preserving way.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123207688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SINR or SLNR: In Successive User Scheduling in MU-MIMO Broadcast Channel with Finite Rate Feedback","authors":"Xin Xia, Gang Wu, Shu Fang, Shaoqian Li","doi":"10.1109/CMC.2010.295","DOIUrl":"https://doi.org/10.1109/CMC.2010.295","url":null,"abstract":"In this paper, an SLNR-based scheduling method is proposed in the MU-MIMO broadcast channel with finite rate feedback. In the proposed scheme, a user's leakage power to others is an important factor to determine whether the user should be selected. The sum rate of the proposed SLNR scheme and the traditional SINR-based scheme are compared with different system parameter settings. Simulation results shows that the SLNR scheme is preferred mainly in the case of larger feedback bits, lower SNR region and smaller number of active users. These observations are useful in practical system design.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind Identification and Digital Compensation of Memory Nonlinearities for Multiband Systems","authors":"Jiang Jin, Juan Peng","doi":"10.1109/CMC.2010.59","DOIUrl":"https://doi.org/10.1109/CMC.2010.59","url":null,"abstract":"Memory nonlinearities exist in electronic devices or transmission links. A blind identification method is proposed to estimate the Volterra inverse of memory nonlinearities for multiband system by minimizing the strong out-of-band spurs above the preset threshold based on domain transformation and spur classification. The inverse model is employed to recover the noisy sampled signal or improve the spurious-free dynamic range of memory nonlinear system by applying post-distortion or pre-distortion compensation. It can also used as multiband digital filter with varying intermediate frequency or bandwidth. In time-varying system, the filter coefficients can be updated adaptively by iterate search. The experiment results demonstrate the effectiveness.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123640826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}