2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)最新文献

筛选
英文 中文
Deterring traitor using double encryption scheme 使用双重加密方案威慑叛逆者
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870869
A. C. Prihandoko, H. Ghodosi, B. Litow
{"title":"Deterring traitor using double encryption scheme","authors":"A. C. Prihandoko, H. Ghodosi, B. Litow","doi":"10.1109/COMNETSAT.2013.6870869","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870869","url":null,"abstract":"Traitor is a legitimate user in a content distribution system who facilitates illegal content access to unauthorized party. Naturally, there are two strategies that are likely used by the traitors to do violations. Firstly, the traitors may attempt to extract the decryption keys to construct a pirate decoder. Secondly, they may legally decrypt the content and then illegally redistribute the decrypted content for their own benefits. We propose a content protection scheme to deter both piracy strategies. However, if a pirate decoder or content is discovered, the scheme is still able to identify the real traitors without incriminating innocent users. Thus, our scheme preserves security for the content provider and privacy for the users in the traitor tracing context.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"11 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120890090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of energy efficiency for Wi-Fi 802.11b multi-hop networks Wi-Fi 802.11b多跳网络的能效分析
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870862
Nasaruddin, Mira Andriani, Melinda, M. Irhamsyah
{"title":"Analysis of energy efficiency for Wi-Fi 802.11b multi-hop networks","authors":"Nasaruddin, Mira Andriani, Melinda, M. Irhamsyah","doi":"10.1109/COMNETSAT.2013.6870862","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870862","url":null,"abstract":"Wireless local area network (WLAN) is growing popularly day by day. A common WLAN application is Wi-Fi technology, where it is easy to find in public areas and has a great interest of internet access users, particularly those who use mobile devices (nodes) such as notebooks and mobile phones. The phenomenon has impact on the energy consumption in Wi-Fi networks. Nowadays, the consumption, management and energy efficiency of indoor wireless networks are important issues. Therefore, this paper analyses the energy efficiency for Wi-Fi 802.11b multi-hop networks. The Wifi 802.11b multi-hop network is simulated using Network Simulator 3 (NS-3), in which the network consists of a line sequence of 5 wireless nodes that are a source, three relays and a destination. In the simulation, several energy parameters are considered such as the number of nodes, grid spacing, packet size and data rate. Moreover, several important energy efficiency factors are analyzed including energy consumption, effective energy utilization, bit energy, throughput and energy efficiency. The simulation results show that the number of the packet size and throughput have impact on energy consumption and energy efficiency in the network. While effective energy utilization decreases as the throughput of the network increases. Therefore, the Wi-Fi 802.11b multi-hop network can be an alternative green communication method which has a higher energy efficiency.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127677661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Joint optimization of detection thresholds and power allocation in OFDM based cognitive femtocell networks 基于OFDM的认知飞蜂窝网络检测阈值与功率分配联合优化
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870863
Tanumay Manna, I. S. Misra
{"title":"Joint optimization of detection thresholds and power allocation in OFDM based cognitive femtocell networks","authors":"Tanumay Manna, I. S. Misra","doi":"10.1109/COMNETSAT.2013.6870863","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870863","url":null,"abstract":"Spectrum sensing in cognitive femtocells play an important role in detecting spectrum holes and to opportunistically use under-utilized frequency bands without causing harmful interference to macrocell users. In case of mass deployment of femtocells, interference management is essential to maximize the capacity and achievable data rates. In this paper, a novel algorithm is proposed, based on Lagrangian dual decomposition technique, for jointly optimizing the detection threshold and power allocation to maximize the total aggregated opportunistic throughput per unit bandwidth of a co-channel OFDM based femtocell network, densely deployed over a macrocell architecture, under a constraint of the total interference generated towards macrocell users. Simulation results show that the proposed algorithm is stable, attains convergence and achieves considerable rate gain.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving short-term fairness in WLAN with QoS support 通过QoS支持提高WLAN的短期公平性
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870851
W. Srichavengsup
{"title":"Improving short-term fairness in WLAN with QoS support","authors":"W. Srichavengsup","doi":"10.1109/COMNETSAT.2013.6870851","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870851","url":null,"abstract":"This paper presents a method that can be employed with IEEE 802.11 backoff schemes. Objective of the paper is to obtain a high short-term fairness performance and support different QoS requirements without any saturation throughput degradation. From the result, it illustrates that the mathematical analysis of this paper is valid and precise. Moreover, the suggested mechanism can enhance the short-term transmission fairness of the IEEE 802.11 DCF schemes while sustaining high efficiency of bandwidth usage.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"7 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy consumption evaluation of low energy adaptive clustering hierarchy routing protocol for wireless sensor network 无线传感器网络低能量自适应聚类分层路由协议的能耗评估
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870850
V. Mahyastuti, A. A. Pramudita
{"title":"Energy consumption evaluation of low energy adaptive clustering hierarchy routing protocol for wireless sensor network","authors":"V. Mahyastuti, A. A. Pramudita","doi":"10.1109/COMNETSAT.2013.6870850","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870850","url":null,"abstract":"Wireless sensor network (WSN) is widely studied to be applied on the monitoring and control systems in various fields such as industrial, security, medical, and environmental monitoring. Constraints on the use of WSN is the limited power of every sensor node, so energy consumption efficiency become important issue in WSN. Routing is a function in WSN which consume enough energy. Routing protocols with the aim of achieving high Quality of Service (QoS) is generally not suitable for WSN. Without specific routing protocols with low energy consumption, WSN connectivity will be degraded. In this research, the energy consumption of Low-Energy Adaptive Clustering Hierarchy (LEACH) routing protocols for WSN system has evaluated by performing simulations using the software Network Simulator 2 (NS-2). Simulation results show that the number of clusters affect the level of energy consumption. Appropriate cluster number should be determined for achieving minimum energy consumption.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114891726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and implementation of linear precoding LTE downlink based on fpga 基于fpga的线性预编码LTE下行链路设计与实现
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870859
Nur Chaeriyah, R. P. Astuti, Denny Darlis, S. Si
{"title":"Design and implementation of linear precoding LTE downlink based on fpga","authors":"Nur Chaeriyah, R. P. Astuti, Denny Darlis, S. Si","doi":"10.1109/COMNETSAT.2013.6870859","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870859","url":null,"abstract":"The problem that often occur in multi-antenna wireless communication is how to maximize the throughput. Precoding is a generalization of beamforming to support multi-layer transmission in multi-antenna wireless communications. Beamforming is a signal processing technique used in sensor arrays for directional signal transmission or reception. In conventional single-layer beamforming, the same signal is emitted from each of the transmit antennas with appropriate weighting such that the signal power is maximized at the receiver output. When the receiver has multiple antennas, single-layer beamforming cannot simultaneously maximize the signal level at all of the receive antennas. Thus, in order to maximize throughput in a receiving antenna system, integrated precoding in multi-layer beamforming is required. LTE linear precoding system for the transmitter side is built in this research. The precoding system will be built in VHDL code and will be implemented on FPGA. In this research, the precoding sistem consists of 64-QAM Mapper as input system, and will be connected to OFDM (IFFT) block. The precoding is built based on Transmission Mode (TM) 6 of LTE release 9 and will be using 3GPP codebook standard as the precoding matrix for TM 6 for 2x2 MIMO. The research shows that by the used of linear precoding system in transmission, it decreases the complexion of detection system in precoding block on the receiver side. The implementation process shows that the research is implementable on hardware and will use 62% occupied slices, 11% slice register, and 27% of bounded IOBs resources of FPGA. with 2021 clock in total process, 121 clock in delay process and 1900 clocks to produce one OFDM symbol. The bitrate of the system is 161.68 Mbps.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Per block pre-distortion of a multi-carrier non-linear satellite communication channel 多载波非线性卫星通信信道的每块预失真
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870865
T. Deleu, M. Dervin, F. Horlin
{"title":"Per block pre-distortion of a multi-carrier non-linear satellite communication channel","authors":"T. Deleu, M. Dervin, F. Horlin","doi":"10.1109/COMNETSAT.2013.6870865","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870865","url":null,"abstract":"In this paper, we propose a pre-distortion algorithm for a two carriers non-linear satellite communication channel. In the considered scenario, two linearly modulated carriers are amplified by the same non-linear power amplifier aboard the satellite. Due to the presence of the shaping filter at the transmitter side and the receiver filter (and possibly interference with filters aboard the satellite), the received signal is affected by non-linear intersymbol interference (ISI) but also non-linear adjacent channel interference (ACI). We consider the case where the two signals are transmitted from the same gateway, so that joint pre-distortion of the two signals is possible. Simulations for the 8PSK modulation show that the algorithm is able to greatly reduce the impact of the non-linear interference.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prevention of denial-of-service attacks in Garbled Routing (GR) network GR (Garbled Routing)网络中拒绝服务攻击的防范
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870870
Shaahin Madani, I. Khalil
{"title":"Prevention of denial-of-service attacks in Garbled Routing (GR) network","authors":"Shaahin Madani, I. Khalil","doi":"10.1109/COMNETSAT.2013.6870870","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870870","url":null,"abstract":"Garbled Routing network is the first generic anonymous communication framework that hosts other anonymous networks as plug-ins, and provides relatively higher anonymity and network unobservability. This paper focuses on the existing vulnerabilities of this framework to Denial-of-Service (DoS) attacks on the circuit establishment process. The impacts of the DoS attacks are analysed and three techniques are proposed that significantly strengthens the circuit establishment against the identified DoS attacks.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"597 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123427358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Hybrid multihop clustering algorithm in wireless sensor networks 无线传感器网络中的混合多跳聚类算法
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870861
A. Patra, Sonali Chouhan
{"title":"Energy Efficient Hybrid multihop clustering algorithm in wireless sensor networks","authors":"A. Patra, Sonali Chouhan","doi":"10.1109/COMNETSAT.2013.6870861","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870861","url":null,"abstract":"In wireless sensor networks, clustering approach provides an efficient method for minimizing energy utilization and maximizing system lifetime. The issue of identifying appropriate cluster heads (CHs), forming energy efficient clusters and transmitting data packets to base station (BS) by direct or multi hop are important problems. This paper presents two approaches for two different scenarios. First, Energy Efficient Hybrid Clustering Scheme (EEHCS) is for direct hop communication to the BS when BS is situated within the sensing region and second, Energy Efficient Hybrid Multi-hop Clustering Scheme (EEHMCS) is for multi-hop communication to the BS using other CHs when BS is situated far away from the deployment region. In both the approaches, BS selects energy efficient CHs depending on remaining energy and number of member nodes by a centralized CH election method and broadcasts the selected CH message to all the nodes to reduce the control messages overhead required for distributed clustering approach. Simulation results show that EEHCS prolong the network lifetime upto 27:63% over LEACH-C, whereas, EEHMCS performs 2 times better than LEACH-C for first node die in certain network setting.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
VoIP based two-tier Cognitive Radio Network: Developing implementation techniques 基于VoIP的两层认知无线网络:开发实现技术
2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) Pub Date : 2013-12-01 DOI: 10.1109/COMNETSAT.2013.6870853
T. Chakraborty, I. S. Misra
{"title":"VoIP based two-tier Cognitive Radio Network: Developing implementation techniques","authors":"T. Chakraborty, I. S. Misra","doi":"10.1109/COMNETSAT.2013.6870853","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870853","url":null,"abstract":"Cognitive Radio Network (CRN) ensures higher utilization of spectrum by allowing secondary users to transmit in licensed frequency bands in absence of primary users. In order to reduce interference among these users, CRN imposes a maximum limit on total number of users that can be admitted in CRN. The overall user capacity is further increased by implementing VoIP based 2-tier CRN that allows another group of secondary users to transmit by exploiting silence suppression characteristics of secondary users involved in VoIP communication. The practical issues involved in designing VoIP based 2-tier CRN are discussed in this paper as it provides novel implementation design models for 2-tier CRN. Two algorithms based on message passing policy are proposed for deploying VoIP based 2-tier CRN with the aim of increasing system capacity while reducing interference among users. Detailed mathematical formulation establishes superiority of 2-tier CRN over basic CRN with 77% improvement in spectrum utilization. Performance analysis in simulation model validates the inferences drawn from mathematical model.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133148043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信