2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)最新文献

筛选
英文 中文
Security and privacy of future aircraft wireless communications with offboard systems 未来飞机与机载系统无线通信的安全性和隐私性
K. Sampigethaya, R. Poovendran
{"title":"Security and privacy of future aircraft wireless communications with offboard systems","authors":"K. Sampigethaya, R. Poovendran","doi":"10.1109/COMSNETS.2011.5716527","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716527","url":null,"abstract":"Modern global aviation must rise up to the challenge of safely, securely and efficiently managing increasingly crowded skies under growing passenger, business and societal demands. The “e-enabled aircraft” plays a central role in overcoming this grand challenge. Aeronautical-specific and commercial wireless data links as well as Internet standards will tightly integrate this aircraft with off-board systems in space, air and ground for revolutionizing air traffic control, flight operations and passenger services. However, potential vulnerabilities of these new technologies present risks to performance, user acceptance and deployment cost of future airspace systems. In this paper, we focus on these vulnerabilities and their mitigation. We discuss security and privacy threats and challenges that emerge with wireless-enabled air traffic control and flight operations.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128003891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Interference planning for multicell OFDM downlink 多小区OFDM下行链路干扰规划
N. Vaidhiyan, Renu Subramanian, R. Sundaresan
{"title":"Interference planning for multicell OFDM downlink","authors":"N. Vaidhiyan, Renu Subramanian, R. Sundaresan","doi":"10.1109/COMSNETS.2011.5716499","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716499","url":null,"abstract":"In this paper we consider the downlink of an OFDM cellular system. The objective is to maximise the system utility by means of fractional frequency reuse and interference planning. The problem is a joint scheduling and power allocation problem. Using gradient scheduling scheme, the above problem is transformed to a problem of maximising weighted sum-rate at each time slot. At each slot, an iterative scheduling and power allocation algorithm is employed to address the weighted sum-rate maximisation problem. The power allocation problem in the above algorithm is a nonconvex optimisation problem. We study several algorithms that can tackle this part of the problem. We propose two modifications to the above algorithms to address practical and computational feasibility. Finally, we compare the performance of our algorithm with some existing algorithms based on certain achieved system utility metrics. We show that the practical considerations do not affect the system performance adversely.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121793112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Impact of prefix hijacking on payments of providers 前缀劫持对供应商支付的影响
Pradeep Bangera, Sergey Gorinsky
{"title":"Impact of prefix hijacking on payments of providers","authors":"Pradeep Bangera, Sergey Gorinsky","doi":"10.1109/COMSNETS.2011.5716486","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716486","url":null,"abstract":"Whereas prefix hijacking is usually examined from security perspectives, this paper looks at it from a novel economic angle. Our study stems from an observation that a transit AS (Autonomous System) has a financial interest in attracting extra traffic to the links with its customers. Based on real data about the actual hijacking incident in the Internet, we conduct simulations in the real AS-level Internet topology with synthetic demands for the hijacked traffic. Then, we measure traffic on all inter-AS links and compute the payments of all providers. The analysis of our results from technical, business, and legal viewpoints suggests that hijacking-based traffic attraction is a viable strategy that can create a fertile ground for tussles between providers. In particular, giant top-tier providers appear to have the strongest financial incentives to hijack popular prefixes and then deliver the intercepted traffic to the proper destinations. We also discuss directions for future research in the area of hijacking-based traffic attraction.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130641489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Exploring system parameters for viability of energy harvesting technologies 探索能量收集技术可行性的系统参数
T. V. Prabhakar, Prakruthi Keshavamurthy, S. Devasenapathy, H. Jamadagni, R. V. Prasad, I. Niemegeers
{"title":"Exploring system parameters for viability of energy harvesting technologies","authors":"T. V. Prabhakar, Prakruthi Keshavamurthy, S. Devasenapathy, H. Jamadagni, R. V. Prasad, I. Niemegeers","doi":"10.1109/COMSNETS.2011.5716526","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716526","url":null,"abstract":"Powering wireless sensors with harvested energies is coming of age due to the sources providing higher power densities and the electronics performing efficient energy conversion. However, to ensure energy harvesting as a viable option, several system parameters have to be tuned. In this work, we identify these key system parameters and show that by suitably tuning them, one can drive wireless sensor networks (WSNs) with harvested energies. Some of the parameters include system's operating voltage & frequency, transceiver's Automatic Gain Control (AGC) block fine tuning, clear channel assessment and finally capacity values of energy storage buffers. Our measurements show that there are several possibilities to save energy by trading one system feature for another.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124288308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mirage: Mitigating illicit inventorying in a RFID enabled retail environment 幻影:在RFID支持的零售环境中减少非法库存
Jonathan White, N. Banerjee
{"title":"Mirage: Mitigating illicit inventorying in a RFID enabled retail environment","authors":"Jonathan White, N. Banerjee","doi":"10.1109/COMSNETS.2011.5716498","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716498","url":null,"abstract":"Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is corporate espionage, where attackers through illicit inventorying infer sales and restocking trends for products. In this paper, we first present plausible aftermaths of corporate espionage using real data from online sources. Second, to mitigate corporate espionage in a retail store environment, we present a simple low-cost system called Mirage. Mirage uses additional programmable low cost passive RFID tags called honeytokens to inject noise in retail store inventorying. Using a simple history based algorithm that controls activation and de-activation of honeytokens, Mirage randomizes sales and restocking trends. We evaluate Mirage in a real warehouse environment using a commercial off-the-shelf Motorola MC9090 handheld RFID reader and over 450 Gen2 low cost RFID tags. We show that Mirage successfully flattens and randomizes sales and restocking trends while adding minimal cost to inventory control.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125032759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信