2019 IEEE Wireless Communications and Networking Conference (WCNC)最新文献

筛选
英文 中文
A Scalable Performance-Complexity Trade-off for Full Duplex Beamforming 全双工波束形成的可扩展性能复杂度权衡
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-10-31 DOI: 10.1109/WCNC.2019.8885674
M. T. Kabir, Muhammad R. A. Khandaker, C. Masouros
{"title":"A Scalable Performance-Complexity Trade-off for Full Duplex Beamforming","authors":"M. T. Kabir, Muhammad R. A. Khandaker, C. Masouros","doi":"10.1109/WCNC.2019.8885674","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885674","url":null,"abstract":"In this paper, we consider a multiuser single-cell transmission facilitated by a full duplex (FD) base station (BS). We formulate two multi-objective optimization problems (MOOPs) via the weighted Tchebycheff method to jointly minimize the two desirable system design objectives namely the total downlink and uplink transmit power. In the first MOOP, multiuser interference is suppressed while in the second MOOP, multiuser interference is rather exploited. In order to solve the non-convex MOOPs, we propose a two-step iterative algorithm to optimize jointly the receive beamformer, transmit beamformer and uplink transmit power, respectively. Simulation results show the proposed scheme achieves a scalable performance-complexity trade-off that allows performance improvements compared to existing solutions.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed SIP DDoS Defense with P4 基于P4的分布式SIP DDoS防御
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-10-31 DOI: 10.1109/WCNC.2019.8885926
Aldo Febro, Hannan Xiao, Joseph Spring
{"title":"Distributed SIP DDoS Defense with P4","authors":"Aldo Febro, Hannan Xiao, Joseph Spring","doi":"10.1109/WCNC.2019.8885926","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885926","url":null,"abstract":"SIP DDoS attack is growing and has a real threat to crippling public communication infrastructure. The standard approach to building the defense is at or near the attack destination (i.e. victim's location). This approach is struggling to keep up with the growing volume and attack sophistication. To be better prepared for future attacks, the workload needs to be distributed, and the attack needs to be mitigated as close to the attack source as possible. This paper experiments with data plane programming (P4) and control plane programming of Ethernet switches to provide first-hop detection and mitigation capability for SIP INVITE DDoS attack at every switchport. This approach creates a distributed or source-based defense component which could be added to the existing destination-based components to create a more comprehensive overall solution that is extensible, economical, and scalable against SIP DDoS attack of the future.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"25 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131520229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Efficient Transmission in Multi-user Relay Networks with Node Clustering and Network Coding 基于节点聚类和网络编码的多用户中继网络的高效传输
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-10-31 DOI: 10.1109/WCNC.2019.8885629
Xun Li, Chao Wang, Ping Wang, Fuqiang Liu
{"title":"Efficient Transmission in Multi-user Relay Networks with Node Clustering and Network Coding","authors":"Xun Li, Chao Wang, Ping Wang, Fuqiang Liu","doi":"10.1109/WCNC.2019.8885629","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885629","url":null,"abstract":"This paper investigates the communication problem in a class of multi-user dual-hop networks in which multiple source terminals desire to distribute their independent messages to multiple destinations through the assistance of multiple relay terminals. We consider an efficient transmission strategy that combines network coding and non-orthogonal transmission techniques to balance the achievability of spatial diversity and channel utilization. Specifically, in addition to applying a class of finite-field network codes in the relays, we divide the sources and the relays into clusters such that terminals within each cluster can access the same channel resource. The achievable error performance under Nakagami-m fading environment is derived and is shown to significantly outperform the conventional transmission methods.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offset Tolerant Demodulator for Frequency/Phase Modulation in Time-Varying Channel 时变信道中频率/相位调制的偏置容限解调器
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-10-31 DOI: 10.1109/WCNC.2019.8886086
Siavash Safapourhajari, A. Kokkeler
{"title":"Offset Tolerant Demodulator for Frequency/Phase Modulation in Time-Varying Channel","authors":"Siavash Safapourhajari, A. Kokkeler","doi":"10.1109/WCNC.2019.8886086","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8886086","url":null,"abstract":"Carrier frequency offset (CFO) and time-varying fading channels are two problems that emerging ultra-narrowband solutions for Internet of Things and Wireless Sensor Networks need to tackle. Previously, an offset tolerant demodulator for Double Differential PSK (DDPSK) has been proposed to overcome CFO. To combat channel distortion, time or frequency diversity together with coding techniques can be utilized. However, these necessitate transmitting extra bits and leads to an increase in packet time. A longer packet time corresponds to longer on-time of the RF front-end and more power consumption. To avoid longer packet for the same symbol rate, a higher order modulation is required which considerably degrades BER performance. In this work, instead of higher order DDPSK, hybrid frequency/phase modulation is used. An offset tolerant demodulator for hybrid modulation is proposed which provides the same robustness against CFO as DDPSK. Besides, it provides higher order of modulation with less performance loss compared to higher order DDPSK. Simulation results show that a combination of BFSK and QPSK using the proposed demodulator can achieve almost 4 dB improvement at BER=0.001 in a Rayleigh channel compared to Double Differential 8PSK (DD8PSK) which can provide the same modulation order.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Factors Affecting Inverse Beacon Fingerprinting Using Route Prediction Algorithm 基于路由预测算法的信标逆指纹识别影响因素评估
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-04-19 DOI: 10.1109/WCNC.2019.8885945
M. Sridharan, J. Bigham, Paul Michael Campbell, E. Bodanese
{"title":"Evaluation of Factors Affecting Inverse Beacon Fingerprinting Using Route Prediction Algorithm","authors":"M. Sridharan, J. Bigham, Paul Michael Campbell, E. Bodanese","doi":"10.1109/WCNC.2019.8885945","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885945","url":null,"abstract":"Conventional Radio Frequency (RF) based fingerprinting still remains one of the most popular methods amongst other indoor positioning techniques due to its inherent accuracy and reliability. However, not much prominence has been shown in analyzing certain factors that may affect the outcome of the fingerprinting method while designing the localization system. In this paper, we conduct a study to infer if a reduced number of receivers equipped with higher gain antennas can provide improved Bluetooth Low Energy (BLE) fingerprinting performance in a complex indoor environment. The evaluation is performed in a standard domestic apartment with an activity centric approach using a single wearable beacon and multiple receivers. A rank based route selection algorithm is used to list the candidate positions or routes that indicate the most likely path on which the subject was travelling. Furthermore, we discuss the benefits of implementing the inverse fingerprinting method with a trajectory based prediction model and also examine the effect of surrounding electrical interference. Experimental results indicate that an increased antenna gain in addition to deploying an adequate number of receivers have a positive effect on the overall ranking accuracy.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Access Point Selection and Resource Allocation in Multi-Technology Wireless Network 多技术无线网络中的动态接入点选择与资源分配
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-04-19 DOI: 10.1109/WCNC.2019.8885438
Iaad Ben Dhia, M. Bouhtou, T. En-Najjary, S. Lahoud, X. Lagrange
{"title":"Dynamic Access Point Selection and Resource Allocation in Multi-Technology Wireless Network","authors":"Iaad Ben Dhia, M. Bouhtou, T. En-Najjary, S. Lahoud, X. Lagrange","doi":"10.1109/WCNC.2019.8885438","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885438","url":null,"abstract":"Heterogeneous Network (HetNet) is among the most important challenges for the upcoming cellular wireless networks. In this paper, we propose a method to optimize the Radio Access Technologies (RATs) selection and resource allocation in multitechnology wireless networks during a time period. We optimized on a realistic topology of Base Stations (BS) with overlaps of the cellular coverage and dynamic users traffic (arrival and departure). The optimization takes into account the requested services, different users' contract, and user satisfaction. Furthermore, in the proposed approach, we add constraints to ban the session drops and handovers for static users. For each instance, we formulate the problem as a linear optimization problem and we optimize it successively. The aim of the optimization is to jointly maximize the overall user satisfaction and the number of users connected. Compared with a legacy approach, numerical results show that our solution outperforms in terms of user satisfaction.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis 物联网设备指纹:基于机器学习的加密流量分析
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-04-19 DOI: 10.1109/WCNC.2019.8885429
Nizar Msadek, R. Soua, T. Engel
{"title":"IoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis","authors":"Nizar Msadek, R. Soua, T. Engel","doi":"10.1109/WCNC.2019.8885429","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885429","url":null,"abstract":"Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users' privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type, by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic. Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133420361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
CRC-Aided Soft-Output Detection for Uplink Multi-User MIMO Systems With One-Bit ADCs 基于1位adc的上行多用户MIMO系统的crc辅助软输出检测
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-04-18 DOI: 10.1109/WCNC.2019.8885762
S. H. Song, Seung-Chan Lim, Girim Kwon, Hyuncheol Park
{"title":"CRC-Aided Soft-Output Detection for Uplink Multi-User MIMO Systems With One-Bit ADCs","authors":"S. H. Song, Seung-Chan Lim, Girim Kwon, Hyuncheol Park","doi":"10.1109/WCNC.2019.8885762","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8885762","url":null,"abstract":"In this paper, we propose a CRC-aided soft-output (CASO) detection for uplink multi-user multiple-input multiple-output systems with one-bit ADCs to improve the error rate while maintaining low latency. After CRC checking, the CASO detection constructs a refined subcode of a spatial-domain code by exploiting successfully decoded messages from the previous iteration. Based on the refined subcode, more reliable soft messages can be extracted to utilize in the rest decoding process. Since multiple messages can be successfully canceled with the aid of CRC checking, the CASO detection can prevent error propagation and suppress increment of latency. Simulation results demonstrate that the CASO detection can provide improved error rate compared to the conventional detections though increment of latency is insignificant for high SNR.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125195522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis on User Activity in Compressed Sensing based Random Access 基于压缩感知的随机访问中用户活动分析
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-04-17 DOI: 10.1109/WCNC.2019.8886126
Hyowoon Seo, Wan Choi
{"title":"Analysis on User Activity in Compressed Sensing based Random Access","authors":"Hyowoon Seo, Wan Choi","doi":"10.1109/WCNC.2019.8886126","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8886126","url":null,"abstract":"In Compressed Sensing based Random Access CHannel (CS-RACH) protocol, a base station leverages compressed sensing technique to detect the active users in the cell coverage and estimate the channel gain between the users and the base station. In a real communication scenario, activity of a specific user usually varies time to time and thus can be seen as a random variable following ON/OFF distribution. Meanwhile, the performance of compressed sensing technique is dependent on the sparsity of the estimating vector, which is closely related to the user activity in CS-RACH scenario. In this perspective, we analyze the condition of the user activity for the stable operation of the protocol. Particularly, we use the least absolute shrinkage and selection operator (LASSO) approach, which gives a closed form expressions of the sparsity condition for the successful active user detection in an asymptotic manner. As a result, we obtain the condition of the user activity for stable operation of CS-RACH and verify the result with numerical simulations.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Volunteer Dilemma Framework for Mobile Live Streaming 面向移动直播的志愿者困境框架
2019 IEEE Wireless Communications and Networking Conference (WCNC) Pub Date : 2019-04-15 DOI: 10.1109/WCNC.2019.8886088
Khadija Bouraqia, Essaid Sabir, H. E. Biaze, M. Sadik
{"title":"A Volunteer Dilemma Framework for Mobile Live Streaming","authors":"Khadija Bouraqia, Essaid Sabir, H. E. Biaze, M. Sadik","doi":"10.1109/WCNC.2019.8886088","DOIUrl":"https://doi.org/10.1109/WCNC.2019.8886088","url":null,"abstract":"Streaming service is continuously growing, which makes it the killer application of current 4G networks, as it demands more resources from mobile networks. The cellular network receives a large number of requests, most times for the same content, consuming the spectrum, energy, in addition to monetary costs inefficiently. In order to optimize spectrum utilization and reduce the induced costs, we propose a noncooperative game framework allowing to understand the user's behaviors. We observed a volunteer Dilemma-like situation when a mobile user could stream the requested video to its neighbors over a D2D link. Afterward, we provide a full description of both pure and mixed Nash equilibria (NE). Furthermore, to ensure convergence to NE points, we use linear reward-inaction and Gibbs Boltzmann learning algorithms. Finally, we show how our scheme could be exploited through extensive numerical simulation. Our framework capture the user's selfish behavior and provides a solution regarding setting and parameters allowing to reach high performance in terms of spectrum utilization, energy efficiency, and overall cost.","PeriodicalId":352128,"journal":{"name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信