M. Ricardo, G. Carneiro, Pedro Fortuna, F. Abrantes, J. Dias
{"title":"WiMetroNet A Scalable Wireless Network for Metropolitan Transports","authors":"M. Ricardo, G. Carneiro, Pedro Fortuna, F. Abrantes, J. Dias","doi":"10.1109/AICT.2010.51","DOIUrl":"https://doi.org/10.1109/AICT.2010.51","url":null,"abstract":"This paper addresses Wireless Networks for Metropolitan Transports (WNMT), a class of moving or vehicle to- infrastructure networks that may be used by public transportation systems to provide broadband access to their vehicles, stops, and passengers. We propose the WiMetroNet, a WNMT that is auto-configurable and scalable. It is based on a new Ad hoc routing protocol, the Wireless Metropolitan Routing Protocol (WMRP), which, coupled with data plane optimizations, was designed to be scalable to thousands of nodes.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Theoretic approach to Synchronization: The OFDM Carrier Frequency Offset Example","authors":"Romain Couillet, M. Debbah","doi":"10.1109/AICT.2010.21","DOIUrl":"https://doi.org/10.1109/AICT.2010.21","url":null,"abstract":"In practical mobile communication systems, data-aided synchronization is performed before actual data exchanges, and synchronization methods are tailored to the pilot sequence. In this paper, we propose a framework for initial synchronization that works independently of the pilot sequence. We show that classical data-aided and blind techniques are particular cases of this general framework. We thoroughly study the specific problem of OFDM data-aided carrier frequency offset estimation. For the latter, we provide theoretical expressions of performance upper-bounds. Also, a practical thin CFO estimator for OFDM is provided under the form of a novel algorithm which is shown by simulations to perform better than classical pilot based methods.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129454032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HybridLQI: Hybrid MultihopLQI for Improving Asymmetric Links in Wireless Sensor Networks","authors":"Ashish Gupta, M. Sharma, M. Marot, M. Becker","doi":"10.1109/AICT.2010.58","DOIUrl":"https://doi.org/10.1109/AICT.2010.58","url":null,"abstract":"The article proposes HybridLQI to improve the performance of MultihopLQI in the asymmetrical wireless links sensor networks. Every node can maintain the number of messages it sends to each of its neighbours and how many of them are acknowledged, the packet loss percentage over the links can be calculated. Link Quality Indicator (LQI) is used to estimate the downlink channel. Therefore, without adding any extra cost to the network, the bi-directional channel quality can be calculated. Asymmetrical links are created by setting the Base Station transmitting at higher power than the other nodes. This approach in a dense network improves message received percentage by up to 20% for the whole network. For sparse asymmetrical links networks with nodes in straight line and having direct line of sight, this approach improves the packet reception percentage by up to 350% for the node which is 3 hops away from the Base Station. All the results are based on the experiments performed on the real platform.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130231483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Avijit Gupta, Vineet Chaudhary, Vivek Kumar, Bharat Nishad, S. Tapaswi
{"title":"VD4: Vehicular Density-Dependent Data Delivery Model in Vehicular Ad Hoc Networks","authors":"Avijit Gupta, Vineet Chaudhary, Vivek Kumar, Bharat Nishad, S. Tapaswi","doi":"10.1109/AICT.2010.80","DOIUrl":"https://doi.org/10.1109/AICT.2010.80","url":null,"abstract":"In this paper, we present the VD4 model for effective delivery of data packets in vehicular ad hoc networks. The major challenges in such networks are disconnections, high mobility and resource poor environment. For providing data delivery under such constraints we adopt the method of carry and forward in which a vehicle transfers its data to another vehicle if it is moving towards the destination. For optimizing performance in such situations, we can make a probabilistic estimation as to which path the packet should follow when there are multiple options available. One such estimation can be based on road density and the average packet delay on the selected road. The paper focuses on the development of such a model that can act as a solution to reduce the packet delivery delay and improve the data delivery ratio.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125769508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Performance Study of One Way Link Characteristics in an IEEE 802.16d TDD System","authors":"Maik Wodarz, James P. Taisie, T. Schmidt","doi":"10.1109/AICT.2010.25","DOIUrl":"https://doi.org/10.1109/AICT.2010.25","url":null,"abstract":"WiMAX systems are beginning to spread as a wide-area wireless access technology that provides QoS support for future multimedia applications. Vendors have started to ship off-the-shelf hardware that addresses the market of broadband Internet coverage in sparsely populated areas. Facing a potentially large deployment of 802.16-based end-system connectivity, it is of vital interest to experimentally evaluate the capabilities of WiMAX systems in real-world setups. The main objective of our current paper is to quantify QoS performance of the one way wireless service flows in a 3.5 GHz band carrier utilizing the time division duplexing mode of the IEEE802.16 standard. We evaluate performance dependencies of the time division duplexing system on modulation and load, and show that the link latency is asymmetric.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122412638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simplified Method for Optimising Sequentially Processed Access Control Lists","authors":"V. Grout, John N. Davies","doi":"10.1109/AICT.2010.8","DOIUrl":"https://doi.org/10.1109/AICT.2010.8","url":null,"abstract":"Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing the ACL rules in sequential order. Although such an approach leads to variable processing times for each packet matched against the ACL, it also offers the opportunity to reduce this time by reordering its rules in response to changing traffic characteristics. A number of heuristics exist for optimising rule order in sequentially processed ACLs and the most efficient of these can be shown to have a beneficial effect in a majority of cases and for ACLs with relatively small numbers of rules. This paper presents an enhancement to this algorithm by reducing part of its complexity. Although the simplification involved leads to an instantaneous lack of accuracy, the long-term trade-off between processing speed and performance can be seen, through experimentation, to be positive. This improvement, though small, is consistent and worthwhile and can be observed in the majority of cases.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121482179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Saliency Detection Based on Human Perception of Visual Information","authors":"C. Oprea, C. Paleologu, I. Pirnog, R. Udrea","doi":"10.1109/AICT.2010.64","DOIUrl":"https://doi.org/10.1109/AICT.2010.64","url":null,"abstract":"This paper proposes an algorithm for accurate detection of salient areas from a given scene. We used a complex model for the human visual system, in order to simulate the visual perception mechanisms. Human visual system modelling requires accurate knowledge about the entire visual pathways. This work focuses on the following features of the human vision: the color perception mechanism, the perceptual decomposition of visual information in multiple processing channels, contrast sensitivity, pattern masking and detection/pooling mechanism present in the primary visual cortex. Pattern masking is considered within a complex approach, combining data from distinct dimensions. The results are also shown to correlate with the subjective results obtained for several test sequences.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions","authors":"L. Francis, G. Hancke, K. Mayes, K. Markantonakis","doi":"10.1109/AICT.2010.52","DOIUrl":"https://doi.org/10.1109/AICT.2010.52","url":null,"abstract":"With the recent technological advances of Near Field Communication (NFC) enabled mobile phones it is now possible to introduce additional transactions of value, including those originating from contact-based security tokens within the existing infrastructure. We propose a low cost security framework including a PKI based security protocol, which can be used to integrate transactions involving external contact-based smart cards, for the purposes of e-identification, e-payment, e-ticketing, and communication services. We then designed and implemented a secure Communications Protocol Translator Interface (CPTI), which allows an NFC enabled mobile phone to access and use, over a contact less interface, any additional smart cards (or secure elements (SE)) which are externally available on a contact based interface and vice-versa. By using CPTI, it is now possible to have communication and interaction between passive security tokens as well as to use external contact based security tokens in the NFC environment, such as a contact based payment smart card.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Distributed and Adaptive Detection and Localisation of Network Faults","authors":"Rebecca Steinert, D. Gillblad","doi":"10.1109/AICT.2010.65","DOIUrl":"https://doi.org/10.1109/AICT.2010.65","url":null,"abstract":"We present a statistical probing-approach to distributed fault-detection in networked systems, based on autonomous configuration of algorithm parameters. Statistical modelling is used for detection and localisation of network faults. A detected fault is isolated to a node or link by collaborative fault-localisation. From local measurements obtained through probing between nodes, probe response delay and packet drop are modelled via parameter estimation for each link. Estimated model parameters are used for autonomous configuration of algorithm parameters, related to probe intervals and detection mechanisms. Expected fault-detection performance is formulated as a cost instead of specific parameter values, significantly reducing configuration efforts in a distributed system. The benefit offered by using our algorithm is fault-detection with increased certainty based on local measurements, compared to other methods not taking observed network conditions into account. We investigate the algorithm performance for varying user parameters and failure conditions. The simulation results indicate that more than 95% of the generated faults can be detected with few false alarms. At least 80% of the link faults and 65% of the node faults are correctly localised. The performance can be improved by parameter adjustments and by using alternative paths for communication of algorithm control messages.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124834756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks","authors":"F. Lee, Weihan Goh, C. Yeo","doi":"10.1109/AICT.2010.78","DOIUrl":"https://doi.org/10.1109/AICT.2010.78","url":null,"abstract":"Probabilistic routing protocols in Delay Tolerant Networks (DTN) make use of the mobility history in its prediction when making a forwarding decision. However, the predictive property can expose DTN to more advanced security threats. One security threat is enhanced flooding attack which can be more penetrative if properly planned as malicious nodes have prior knowledge of their victims. However, through the investigation of various flooding techniques, we propose to capitalize this very probabilistic feature to confine and mitigate flooding attacks through a queuing mechanism based on this probabilistic feature. To demonstrate our concept, we formulated a solution for Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET), which is a routing protocol in DTN. The PRoPHET protocol along with our proposed queuing policy does not require global knowledge about the network, and hence is a distributed scheme suitable for DTN.","PeriodicalId":339151,"journal":{"name":"2010 Sixth Advanced International Conference on Telecommunications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121901948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}