2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)最新文献

筛选
英文 中文
Performance comparison of RLS and LMS channel estimation techniques with optimum training sequences for MIMO-OFDM systems 基于最优训练序列的RLS和LMS信道估计技术在MIMO-OFDM系统中的性能比较
M. Mohammadi, M. Ardabilipour, B. Moussakhani, Z. Mobini
{"title":"Performance comparison of RLS and LMS channel estimation techniques with optimum training sequences for MIMO-OFDM systems","authors":"M. Mohammadi, M. Ardabilipour, B. Moussakhani, Z. Mobini","doi":"10.1109/WOCN.2008.4542543","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542543","url":null,"abstract":"Channel compensation has been considered as a major problem from the advent of wireless communications, but recent progresses in this realm has made the old problem more challenging. Especially by introducing Space-Time codes and using Array Antennas exploiting an equalization method which can track the changing channel condition with higher accuracy and lower computations is a challenging demand. This paper analyses a suggested new method for channel estimation in a MIMO-OFDM Receiver. In the proposed method, optimum training sequences are derived base on calculated MSE for LS channel estimation, utilizing these training sequences adaptive methods based on LMS and RLS are applied to estimate the channel for a system which emits independent data streams from transmitter antennas. Proposed method is capable of computing all sub-channel coefficients between a receiver antenna and all transmitters. Finally, performances of RLS and LMS algorithms are simulated and compared with LS algorithm.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
H264/AVC features & functionalities suitable for wireless video transmission 适用于无线视频传输的H264/AVC特性和功能
Y. Baguda, N. Fisal, S. H. Syed, S. Yusof, R. Rashid
{"title":"H264/AVC features & functionalities suitable for wireless video transmission","authors":"Y. Baguda, N. Fisal, S. H. Syed, S. Yusof, R. Rashid","doi":"10.1109/WOCN.2008.4542517","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542517","url":null,"abstract":"There has been an alarming increase in demand for multimedia applications due to explosive growth in communication, commerce and entertainment services. Nowadays devices such PDA, laptops and phone have more processing and computing capability. Consequently, this will eventually allow more effective and efficient video streaming and mobile applications over wireless network. Perhaps the development of H.264/AVC has had tremendous impact on the multimedia industry such that it will continue to play an integral role in future and next generation wireless systems due its remarkable features and functionalities which are exceptional. Perhaps it is very important to note that using it alone would not have much profound impact on the video quality unless good parameters and features are selected to enhance the performance. This paper critically examines and explores the features of the H.264/AVC which can significantly improve the perceived video quality in a wireless network. More importantly, the significance of some parameters has been experimented to clearly demonstrate the capability and potential application of H.264/AVC.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115330238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new timing estimation and compensation scheme for ultra-wideband MB-OFDM communications 一种新的超宽带MB-OFDM通信时序估计与补偿方案
D. Sen, S. Chakrabarti, R. R. Raja Kumar
{"title":"A new timing estimation and compensation scheme for ultra-wideband MB-OFDM communications","authors":"D. Sen, S. Chakrabarti, R. R. Raja Kumar","doi":"10.1109/WOCN.2008.4542538","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542538","url":null,"abstract":"A low-complexity correlation based symbol timing synchronization (CBTS) algorithm for UWB MB-OFDM systems is presented here. The scheme attempts to locate the start of the fast Fourier transformation (FFT) window during frame synchronization (FS) sequence of the received preamble by firstly correlating the received samples with known training samples and then identifying the first significant multi-path component by comparing the correlated samples of two consecutive OFDM symbols against a predefined threshold. The algorithm is tested by computer simulation over all UWB channel models (CM), CM1-CM4; each for 100,000 noisy channel realizations under 17 dB signal-to-noise ratio (SNR). Performance of the proposed algorithm is measured through mean-squared error (MSE) of timing estimation and probability of synchronization.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122358600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security enhancement for real-time routing protocol in wireless sensor networks 无线传感器网络中实时路由协议的安全性增强
A. Ali, N. Fisal
{"title":"Security enhancement for real-time routing protocol in wireless sensor networks","authors":"A. Ali, N. Fisal","doi":"10.1109/WOCN.2008.4542492","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542492","url":null,"abstract":"Wireless sensor network is a wireless ad hoc network that consists of very large number of tiny sensor nodes communicating with each other with limited power and memory constrain. WSN demands real-time routing which requires messages to be delivered within their end-to-end deadlines (packet lifetime). Since many sensor networks will be deployed in critical applications, security is essential. Recently, many real-time routing protocols have been proposed, but none is designed with security as a goal. This paper proposes a novel secure enhancement for real-time routing protocol that provides secure real time data in WSN. The proposed security countermeasures HELLO flooding and selective forwarding attacks. It ensures high packet throughput and minimized power consumption in the present of adversary nodes. The proposed security has been successfully studied through simulation work.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A novel ID-based authenticated group key agreement protocol using bilinear pairings 使用双线性对的基于id的认证组密钥协议
Lung-Chung Li, Yao-Pin Tsai, Ru-Sheng Liu
{"title":"A novel ID-based authenticated group key agreement protocol using bilinear pairings","authors":"Lung-Chung Li, Yao-Pin Tsai, Ru-Sheng Liu","doi":"10.1109/WOCN.2008.4542546","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542546","url":null,"abstract":"Recently, several ID-based authenticated group key agreement (AGKA) crytosystems based on bilinear pairings have been proposed. It is an increasingly active research area because of the simplicity of the public key management and the efficiency. However most of the group key agreement protocols have the security and performance weakness. In this paper, we propose an authenticated group key agreement protocol with perfect forward secrecy that requires only one round without verifying signatures. We show that our scheme satisfies all known security requirements, and therefore it is more secure and efficient than other protocols.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115917317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Pseudo Random Number Based authentication to counter denial of service attacks on 802.11 基于伪随机数认证,对抗802.11拒绝服务攻击
M. A. Khan, A. Hasan
{"title":"Pseudo Random Number Based authentication to counter denial of service attacks on 802.11","authors":"M. A. Khan, A. Hasan","doi":"10.1109/WOCN.2008.4542545","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542545","url":null,"abstract":"Wireless networks have gained unmatched popularity as compared to the wired network access technologies due to expedient deployment, flexibility and low cost. However, the security aspects in wireless local area networks (WLANs) is an active research area. The inherent security weaknesses of the wireless medium pose a much more stern threat as compared to the wired networks. Even with the ratification of 802.11i, WLANs based on 802.11 Standard remain vulnerable to denial of service (DoS) attacks due to unprotected and unauthenticated Management and Control Frames. Different types of defense techniques and protocols have been proposed to counter these threats. These either possess certain deficiencies or have implementation complexities. Moreover, no solution encompassing all DoS attacks based on Management and Control Frames has yet been proposed. The paper proposes a robust solution to effectively counter all Management and Control Frame based DoS attacks by using Pseudo Random Number Based authentication. The mechanism involves replacement of Cyclic Redundancy Checksum 32 (CRC32) in the frame check sequence field (FCS) with CRC16 and using the spared 16 bits for authentication. The proposed scheme is easily deployable without any implementation complexities and does not require any additional infrastructure or hardware for its employment.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122028346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Statistical of rain rates for wireless channel communication in Surabaya 泗水无线信道通信的雨率统计
M. Yadnya, A. Mauludiyanto, G. Hendrantoro
{"title":"Statistical of rain rates for wireless channel communication in Surabaya","authors":"M. Yadnya, A. Mauludiyanto, G. Hendrantoro","doi":"10.1109/WOCN.2008.4542527","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542527","url":null,"abstract":"This paper present an initial result of research on channel modeling of millimeter wave wireless channel in Indonesia considering the impact of rain rate of rainfall due to microwave attenuation, fading and wave polarization propagations millimeter in 30 GHz.. The channel model developed in time series (time domain) by assuming channel as a random variable. The rain data is based on retrieval result from Parsivel equipment with software ASDO recorded data in online manner. The statistical value of rain, i.e. mean, Varian, autocorrelation, and auto ovarian from rainfall is modeled. For goodness-of-fit test used Kolmogorov-Smirnov (K- S) test for continuous distributions and to generate long-term rain- rate model, the of Autoregressive (AR) method, Moving Average (MA), and Autoregressive Moving Average (ARMA) are applied on rainfall data measured in ITS Surabaya.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122136032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Statistical multiplexing strategies for self-similar traffic 自相似流量的统计复用策略
Linawati, Nyoman Putra Sastra
{"title":"Statistical multiplexing strategies for self-similar traffic","authors":"Linawati, Nyoman Putra Sastra","doi":"10.1109/WOCN.2008.4542551","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542551","url":null,"abstract":"Traffic-shifting and shuffle methods are proposed as statistical multiplexing strategies for self-similar traffic sources. The purpose of these strategies is to decrease the burstiness of the traffic. This paper explores the Hurst parameter, and autocorrelation of the homogenous and heterogenous traffic. The simulation initially investigates the traffic with and without strategies implementation. Finally the comparisons between both methods are explored. The simulation results show that the strategies can decline the burstiness of the traffic. When contrasting the traffic performances achieved by both strategies, no large differences of H-parameters and autocorrelation coefficients of the traffic are observed.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128029248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forward-Secure proxy Signature scheme for Cellphone service providers 手机服务提供商前向安全代理签名方案
N. Sunitha, B. B. Amberker
{"title":"Forward-Secure proxy Signature scheme for Cellphone service providers","authors":"N. Sunitha, B. B. Amberker","doi":"10.1109/WOCN.2008.4542522","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542522","url":null,"abstract":"Everyday cellphone service providers are growing like mushrooms after rain providing reliable facilities for customers to meet their budget. In view of the growing demand, service providers require the services of various local agents all over the world. The service providers must delegate the power to these agents to execute the services and monitor their performance. If found efficient the agents can continue to operate else they may need to be revoked. We propose to provide this facility using Forward-Secure proxy Signature scheme. A proxy signature scheme allows one user to delegate his/her signing capability to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. After verification the verifier is convinced of the original signer's agreement on the signed message. Forward-Secure signatures enable the signer to guarantee the security of messages signed in the past even if his secret key is exposed today. We have come up with a forward secure proxy signature scheme which meets the basic requirements of a proxy signature scheme along with proxy revocation.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117343288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of security and fault tolerance in mobile agents 移动代理的安全性和容错性评估
A. Nilchi, A. Vafaei, H. Hamidi
{"title":"Evaluation of security and fault tolerance in mobile agents","authors":"A. Nilchi, A. Vafaei, H. Hamidi","doi":"10.1109/WOCN.2008.4542509","DOIUrl":"https://doi.org/10.1109/WOCN.2008.4542509","url":null,"abstract":"The reliable execution of a mobile agent is a very important design issue in building a mobile agent system and many fault-tolerant schemes have been proposed so far. Security is a major problem of mobile agent systems, especially when money transactions are concerned . Security for the partners involved is handled by encryption methods based on a public key authentication mechanism and by secret key encryption of the communication. In this paper, we examine qualitatively the security considerations and challenges in application development with the mobile code paradigm. We identify a simple but crucial security requirement for the general acceptance of the mobile code paradigm, and evaluate the current status of mobile code development in meeting this requirement. We find that the mobile agent approach is the most interesting and challenging branch of mobile code in the security context. Therefore, we built a simple agent- based information retrieval application, the Traveling Information Agent system, and discuss the security issues of the system in particulars.","PeriodicalId":363625,"journal":{"name":"2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124150723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信