{"title":"A framework for privacy-preserving data sharing in the Smart Grid","authors":"Khalid Alharbi, Xiaodong Lin, Jun Shao","doi":"10.1109/ICCCHINA.2014.7008274","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008274","url":null,"abstract":"Distributed energy resources, featured with small-scale power generation technologies and renewable energy sources, have been considered as a necessary supplement for the smart grid. In order to make the merged power grid to be still smart, the data generated at the consumer side should be shared among the energy resources. However, this approach brings difficulties on how to protect consumers' privacy. To deal with the problem, in this paper, we propose a new framework for data sharing in the smart grid by using a combination of homomorphic encryption and proxy re-encryption techniques. The proposed framework allows the energy resources to be able to analyze the consumers' data while keeping the consumers' privacy. Another good property of our proposed framework is that the consumers' data is transmitted over the smart grid only once. To the best of our knowledge, our framework is first attempt to consider an important problem concerning data sharing in the smart grid.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haiyang Ding, D. B. D. Costa, Wu-Lin Liu, J. Ge, F. Gong
{"title":"Two-way relaying with distributed role selection","authors":"Haiyang Ding, D. B. D. Costa, Wu-Lin Liu, J. Ge, F. Gong","doi":"10.1109/ICCCHINA.2014.7008361","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008361","url":null,"abstract":"It is well known that for classical analog network coding (ANC) protocol, the maximum achievable diversity gain is one according to previous investigations. Nonetheless, the pursuit of higher diversity gain, as an eternal topic in the field of cooperative diversity, calls for cooperative strategies with a higher diversity order. In this paper, we attempt to break this durance by designing cooperative strategies with an improved diversity gain. Specifically, assuming a two-way relaying scenario, we incorporate an opportunistic role decision mechanism into ANC protocol and propose a distributed role selection (ROSE) strategy (a.k.a. d-ROSE) to designate the cooperative role of each node in a fully dynamic manner. It is proved that the proposed d-ROSE strategy can make exactly the same role decision with the counterpart of the optimal ROSE strategy, achieving therefore the outage-optimal transmission robustness. In particular, both theoretical analysis and numerical results demonstrate that besides maintaining a low signaling overhead to make role decision, the d-ROSE strategy can achieve a diversity order of two, i.e., one order higher than that of classical ANC protocol.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115301040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matrix reordering techniques for memory conflict reduction for pipelined QC-LDPC decoder","authors":"Zhenzhi Wu, Dake Liu, Yanjun Zhang","doi":"10.1109/ICCCHINA.2014.7008301","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008301","url":null,"abstract":"Layered Decoding (LD) algorithm is widely applied in high throughput QC-LDPC decoders. Among all check node update algorithms in LD, Turbo-Decoding Message-Passing (TDMP) is adopted by many proposals. A-posteriori memory access conflict under pipelined TDMP decoder incurs serious throughput decline. In this paper, several matrix reordering techniques are introduced to reduce the conflict occurrences without incurring the performance loss, which includes Row Exchange method, element Sequence Reordering method, and a conflict detector with pipeline stall insertion. They are integrated in a joint recursive deep-first searching procedure. Test results show that the efficiency improvement reaches up to 60% compared to non-optimized scenarios for 802.11n and 802.16e standards.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed beamforming design of the Pareto boundary for MISO interference channels","authors":"Cong-gai Li, Chen He, Ling-ge Jiang","doi":"10.1109/ICCChina.2014.7008375","DOIUrl":"https://doi.org/10.1109/ICCChina.2014.7008375","url":null,"abstract":"This paper considers a two-cell multiple-input single-output (MISO) interference channel, where the Pareto boundary of the achievable rate region is computed through linear beamforming design. A distributed beamforming strategy is provided by solving the signal-to-leakage-plus-noise (SLNR) maximization problem with per base station (BS) power constraints. After some conversion, a single real-valued parameter per BS is derived to achieve all points on the Pareto boundary with local channel state information (CSI), where the points on the Pareto boundary corresponds to beamforming vectors that are linear combinations of the zero forcing (ZF) and maximum-ratio transmission (MRT) beamformers. The proposed algorithm can be extended to multi-cell MISO interference channels. Simulation results demonstrate that the proposed distributed algorithm is Pareto optimal and has lower computational complexity than the iterative algorithms.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116083950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On stochastic model for underwater wireless optical links","authors":"Huihui Zhang, Yuhan Dong, Xuedan Zhang","doi":"10.1109/ICCCHINA.2014.7008263","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008263","url":null,"abstract":"Light beam suffers attenuation due to absorbtion and multiple scattering when propagating through underwater environment especially in turbid water. The spatial and temporal distribution of photons after propagation can quantify this channel attenuation and therefore is a key issue for underwater wireless optical communications (UWOC). Typically, the spatial distribution of photons consists two key factors which are the moving distance and scattering angle for each photon before and after interacting with a particle, respectively. In this paper, we present a stochastic model for UWOC links by adopting the Henyey-Greenstein (HG) function as probability density function (PDF) of scattering angle and deriving the PDF of step distance for each photon. The proposed stochastic model can be used to evaluate the spatial and temporal distribution of photons, which fits well with Monte Carlo simulation result in turbid seawater such as coastal water.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123303755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed energy beamforming and information transfer: A case study for multiway relay channels","authors":"Z. Fang, Xiaojun Yuan, Xin Wang","doi":"10.1109/ICCCHINA.2014.7008360","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008360","url":null,"abstract":"This paper proposes a novel distributed energy beamforming and information transfer (DEBIT) scheme for simultaneous information and power transfer in wireless networks. We focus on the design of the DEBIT scheme over multiway relay channels (MWRCs), where multiple users exchange information with an energy-harvesting amplify-and-forward relay node. We develop the optimal transmission strategy to maximize the achievable sum-rate of the proposed DEBIT scheme. A low-complexity time-switching based suboptimal DEBIT scheme (DEBIT-TS) is also proposed, and its achievable sum-rate performance is analyzed. Simulation results demonstrate that the proposed DEBIT and DEBIT-TS schemes significantly outperform the conventional power-splitting based energy-harvesting schemes.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel measurements and modelling for cognitive radio devices with low-height antennas","authors":"Yiqi Hu, Youping Zhao, Jinxing Li, Songpeng Li, Chen Sun, Xin Guo","doi":"10.1109/ICCCHINA.2014.7008378","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008378","url":null,"abstract":"Cognitive radio (CR) technology has been proposed as an effective approach to increase the spectrum utilization. In this work, considering that most, if not all, existing channel models are not applicable to the typical CR application scenarios due to the low transmit/receive antenna height, the short communication/interference distance, and/or the frequency range, extensive channel measurements have been carried out on a downtown campus in Beijing, China. Channel models have been developed specifically for CR devices with low-height antennas in the television (TV) and 2.4 GHz industrial, scientific and medical (ISM) radio bands. It shows that for the measured scenarios, the proposed channel model results in significantly reduced path loss prediction error and less standard deviation, as compared to some existing propagation models. The proposed channel model can be exploited to improve the performance of CR networks by offering more reliable knowledge about the expected desired signal power and/or the interference power between the secondary users (SUs) and the primary users (PUs).","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123695831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Xue, Meng Zhang, Hui Yu, Han-wen Luo, Xiaoying Gan
{"title":"Dynamic time-domain resource allocation in heterogeneous small cell networks based on bursty traffic","authors":"R. Xue, Meng Zhang, Hui Yu, Han-wen Luo, Xiaoying Gan","doi":"10.1109/ICCCHINA.2014.7008351","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008351","url":null,"abstract":"To further improve spectrum efficiency, small cell is regarded as a promising approach by the Third Generation Partnership Project (3GPP) framework. However, when small cells are co-channel deployed with macro cells, interference is an inevitable problem and severely restricts the system performance. In order to maximize the offloading benefits of small cells and mitigate the interference from the macro cell tier to the small cell tier, cell range expansion (CRE) and almost blank subframes (ABS) have been designed for small cells and macro cells, respectively. In this paper, a reference signal received quality (RSRQ) based offloading strategy is investigated. Based on bursty traffic load, each macro cell decides its ABS pattern distributedly. Moreover, a new scheduling policy is proposed to deal with staggered ABS patterns in adjacent macro cells. System-level simulation results could verify that compared with traditional fixed CRE bias and ABS operations, our proposed scheme can achieve superior performance gains in terms of downlink (DL) and uplink (UL) packet throughput.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126063863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WeChat traffic profile and impact on mobile networks","authors":"Shunliang Zhang, Yi Wu, Xuejun Cai","doi":"10.1109/ICCCHINA.2014.7008297","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008297","url":null,"abstract":"WeChat is a social networking application developed by Tencent and has attracted more than 600 million users in China and other countries. To better understand the traffic characteristics of WeChat and potential impact on mobile networks, we proposed an analysis methodology and set up an experiment network. Extensive experiments on typical WeChat services with different smartphone terminals are conducted in an experimental 3G mobile network system. The traffic profile of typical WeChat service in mobile network environment is analyzed. It is observed that the traffic pattern of WeChat is related with the type of smartphone operating system, application running status and the specific service type. Some special characteristics of WeChat traffic pattern do have negative impact on mobile networks. Potential issues introduced by WeChat traffic to mobile networks are identified and possible optimization measures are discussed.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-aware cloud-based input method editor","authors":"Junpei Kawamoto, K. Sakurai","doi":"10.1109/ICCCHINA.2014.7008273","DOIUrl":"https://doi.org/10.1109/ICCCHINA.2014.7008273","url":null,"abstract":"Cloud services are useful but privacy concerns are the most important problems of them. In this paper, we focus cloud-based input method editors and introduce a privacy-aware framework of them. Input method editor (IME) is a kind of software to help us to input Japanese, Chinese, Korean, etc. It receives input words consists of alphabets and returns transformed words consists of Kanji in Japanese, etc. We assume to deploy this IME on a cloud server. In this case, input words received IME may include people's sensitive information e.g. credit card number. We employ a seachable encryption scheme and introduce a framework that people send encrypted inputs and IME computes transformed words without decrypting them.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}