{"title":"Efficiently managing location information with privacy requirements in Wi-Fi networks: a middleware approach","authors":"P. Bellavista, Antonio Corradi, Carlo Giannelli","doi":"10.1109/ISWCS.2005.1547662","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547662","url":null,"abstract":"The growing availability of wireless portable devices is leveraging the diffusion of location based services (LBSs) that provide service contents depending on the current position of clients, servers, and involved distributed resources. When a wide public of final users use LBSs, two primary issues are crucial: how to guarantee the proper level of user privacy given the need to disclose, to some extent, client location information; how to effectively manage the exchange of positioning information (and of its variations) notwithstanding the high heterogeneity of connectivity technologies and device hardware/software capabilities. The paper presents the privacy-related extension of our proxy-based mobile agent middleware to support personalized service provisioning to Wi-Fi portable devices, in particular, our middleware prototype adopts a two-level proxy-based architecture to provide LBSs with middleware-mediated effective access to location data, which are exposed at the proper level of granularity depending on privacy/efficiency requirements dynamically negotiated between clients and LBSs.","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference Rejection and Equalization for DS/CDMA Multiuser Communication","authors":"Hsin-Chang Chen, Li-Der Jeng, Chung-hsuan Wang","doi":"10.1109/ISWCS.2005.1547705","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547705","url":null,"abstract":"In direct-sequence code division multiple access (DS/CDMA) mobile communication systems with time-varying multipath channels, both intersymbol interference (ISI) and multiple-access interference (MAI) must be considered. It has been shown that iterative equalization and decoding method is an efficient technique to combat ISI. Based on this approach, we propose a turbo equalization-like receiver for multiuser DS/CDMA systems in multipath channels. The proposed MAI-rejection/ISI suppression filter is based on a cost function evaluated at the PN code despreader's and data detector's output. Besides, our scheme does not require a training signal. Simulation results show that the proposed iterative receiver performs better than that of non-iterative scheme, and the BER decreases with the number of iteration increases","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121457640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of Channel Inversion Schemes for Multi-User OFDMA","authors":"N. Bonneau, M. Debbah, A. Hjørungnes, E. Altman","doi":"10.1109/ISWCS.2005.1547710","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547710","url":null,"abstract":"A novel multi-user diversity scheme for OFDMA (orthogonal frequency division multiplexing access) is described which alleviates the need of feedback and provides substantial improvements in non-cooperative environments. The algorithm exploits the reciprocity of the channel and enables a user to send reliably data at a prescribed rate knowing only its channel. Moreover, analytical expressions of the cell spectral efficiency are derived in the asymptotic regime (high number of carriers) for two filter types: matched filter and optimum filter. Discussions are also provided for various channel models","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of rotated phase shift keying modulation over Ricean fading channels","authors":"S. Özyurt, O. Kucur, I. Altunbas","doi":"10.1109/ISWCS.2005.1547685","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547685","url":null,"abstract":"The performance of PSK modulation over fading channels can be improved by resorting diversity techniques such as space, time, frequency, and modulation diversity. In this paper, the modulation diversity is used to improve the performance of PSK modulation over fading channels, modulation diversity can be achieved by rotating the signal constellation and using component interleaving. We show that rotated signal constellations with the component interleaving improve the performance of M-PSK modulation (M=2,4,8) significantly as compared to the unrotated ones over Ricean fading channels. For example, when the ratio of the direct path lower to the multipath signal power, K is 0 and 10, 9 dB and 2 dB gains are obtained respectively at a symbol error probability of 10/sup -3/ for 8PSK modulation. We also show that as K gets larger, the gain obtained by the rotation rapidly decreases.","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Erasure Codes on Channels from HAPs to Vehicular and Pedestrian Users","authors":"P. Barsocchi, C. Tzaras","doi":"10.1109/ISWCS.2005.1547795","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547795","url":null,"abstract":"In this work, we investigate the application, at transport level, of erasure codes (also called FZC) on a link between a HAP (high altitude platform) and ground users. We simulated a 480 Kbps channel in the 2 GHz band, characterized by multipath fading, for a typical vehicular and a typical pedestrian case. In this scenario, we compared the performance, in terms of packet error rate, between vehicular and pedestrian cases, for different packet block lengths, Eb/N 0 values, and carrier-to-multipath (C/M) ratios","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134023677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Carrier CDMA MIMO in Arrayed Wireless Sensor Networks","authors":"G. Elissaios, A. Manikas","doi":"10.1109/ISWCS.2005.1547748","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547748","url":null,"abstract":"Arrayed wireless sensor networks are a novel type of wireless sensor networks involving a very large number of wireless nodes that are randomly distributed in a 3-dimensional space at unknown locations and are used for monitoring events of interest. When such events occur, some nodes are automatically self organized and grouped together to form wireless arrays of suitable, although random, geometries and then an ad-hoc wireless network of arrays operating in an infrastructureless environment. This paper focuses on the communication links involved in the operation of the arrayed wireless sensor network based on a multicarrier CDMA MIMO architecture","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Communication over Challenged Networks: Application of Error Control Schemes in the Delay Tolerant Network Architectures","authors":"Tomaso de Cola, H. Ernst, M. Marchese","doi":"10.1109/ISWCS.2005.1547817","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547817","url":null,"abstract":"Nowadays, the realization and the deployment of network infrastructures able to guarantee connectivity to geographical areas characterized by hazardous access conditions, such as remote sensor networks, disaster areas and interplanetary networks, are assuming great importance. Under this view, the large access latencies along with the high percentage of lost packets makes the applicability of TCP/IP protocol suite almost unfeasible. A promising solution counteracting TCP/IP shortcomings is represented by the delay tolerant network (DTN) architecture, which exploits the principle of the mail delivery service to guarantee the success of the information transfer. This paper applies the DTN concepts to data communications achieved in deep space environments and investigates the adoption of error control schemes implemented at the higher layers, in order to make the transmission more reliable without the need of a feedback link for the acknowledgment transportation","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Home Agent Placement Optimization for HAP-Based Network Mobility","authors":"A. Vilhar, R. Novak","doi":"10.1109/ISWCS.2005.1547836","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547836","url":null,"abstract":"High altitude platform (HAP) network is well suited to support mobile router on a vehicle, i.e. train, bus, ship or automobile. Mobile IP could provide transport layer connectivity in resource efficient way by employing route optimization mechanisms. In addition, careful selection of home agent location may significantly reduce network burden due to HAP wide coverage area and expected localized mobility. Placement optimization of mobile IP home agent entity in this particular access network is proposed and evaluated. Discontinuous line-of-sight (LOS) conditions were simulated. The optimization is most rewarding for communications that cannot bypass mobile router's home agent","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131063437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strong mobile authentication","authors":"M. Hassinen, Konstantin Hyppönen","doi":"10.1109/ISWCS.2005.1547663","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547663","url":null,"abstract":"Our main contribution is a protocol that provides strong mobile authentication with non-repudiation using SMS messages. For ensuring these properties, governmentally controlled PKI, and SIM cards with electronic identity application are used. Moreover, our protocol provides confidentiality and integrity of transferred content. An application that implements this protocol was developed and tested in a partly simulated environment. Furthermore, we developed a protocol for mobile payment for vending machines. In comparison to current systems, this protocol contains several enhancements in security, usability and cost both from the client as well as from the service provider point of view.","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum sum-rate linear beamforming strategies for downlink TDD MC-CDMA systems","authors":"N. Benvenuto, P. Bisaglia, F. Boccardi","doi":"10.1109/ISWCS.2005.1547758","DOIUrl":"https://doi.org/10.1109/ISWCS.2005.1547758","url":null,"abstract":"In this paper we derive an iterative joint preceding and power allocation method for downlink MC-CDMA systems with multiple transmit antennas at the base station, which solves the maximum sum-rate problem, i.e. maximizes the system throughput under a constraint on the overall transmit power. It is seen that the proposed joint preceding and power control solution gives a great performance advantage over suboptimal solutions based on the Moore-Penrose, when at the base station only one antenna is used","PeriodicalId":360395,"journal":{"name":"2005 2nd International Symposium on Wireless Communication Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123678226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}