{"title":"Deterring traitor using double encryption scheme","authors":"A. C. Prihandoko, H. Ghodosi, B. Litow","doi":"10.1109/COMNETSAT.2013.6870869","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870869","url":null,"abstract":"Traitor is a legitimate user in a content distribution system who facilitates illegal content access to unauthorized party. Naturally, there are two strategies that are likely used by the traitors to do violations. Firstly, the traitors may attempt to extract the decryption keys to construct a pirate decoder. Secondly, they may legally decrypt the content and then illegally redistribute the decrypted content for their own benefits. We propose a content protection scheme to deter both piracy strategies. However, if a pirate decoder or content is discovered, the scheme is still able to identify the real traitors without incriminating innocent users. Thus, our scheme preserves security for the content provider and privacy for the users in the traitor tracing context.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"11 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120890090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of energy efficiency for Wi-Fi 802.11b multi-hop networks","authors":"Nasaruddin, Mira Andriani, Melinda, M. Irhamsyah","doi":"10.1109/COMNETSAT.2013.6870862","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870862","url":null,"abstract":"Wireless local area network (WLAN) is growing popularly day by day. A common WLAN application is Wi-Fi technology, where it is easy to find in public areas and has a great interest of internet access users, particularly those who use mobile devices (nodes) such as notebooks and mobile phones. The phenomenon has impact on the energy consumption in Wi-Fi networks. Nowadays, the consumption, management and energy efficiency of indoor wireless networks are important issues. Therefore, this paper analyses the energy efficiency for Wi-Fi 802.11b multi-hop networks. The Wifi 802.11b multi-hop network is simulated using Network Simulator 3 (NS-3), in which the network consists of a line sequence of 5 wireless nodes that are a source, three relays and a destination. In the simulation, several energy parameters are considered such as the number of nodes, grid spacing, packet size and data rate. Moreover, several important energy efficiency factors are analyzed including energy consumption, effective energy utilization, bit energy, throughput and energy efficiency. The simulation results show that the number of the packet size and throughput have impact on energy consumption and energy efficiency in the network. While effective energy utilization decreases as the throughput of the network increases. Therefore, the Wi-Fi 802.11b multi-hop network can be an alternative green communication method which has a higher energy efficiency.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127677661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint optimization of detection thresholds and power allocation in OFDM based cognitive femtocell networks","authors":"Tanumay Manna, I. S. Misra","doi":"10.1109/COMNETSAT.2013.6870863","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870863","url":null,"abstract":"Spectrum sensing in cognitive femtocells play an important role in detecting spectrum holes and to opportunistically use under-utilized frequency bands without causing harmful interference to macrocell users. In case of mass deployment of femtocells, interference management is essential to maximize the capacity and achievable data rates. In this paper, a novel algorithm is proposed, based on Lagrangian dual decomposition technique, for jointly optimizing the detection threshold and power allocation to maximize the total aggregated opportunistic throughput per unit bandwidth of a co-channel OFDM based femtocell network, densely deployed over a macrocell architecture, under a constraint of the total interference generated towards macrocell users. Simulation results show that the proposed algorithm is stable, attains convergence and achieves considerable rate gain.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving short-term fairness in WLAN with QoS support","authors":"W. Srichavengsup","doi":"10.1109/COMNETSAT.2013.6870851","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870851","url":null,"abstract":"This paper presents a method that can be employed with IEEE 802.11 backoff schemes. Objective of the paper is to obtain a high short-term fairness performance and support different QoS requirements without any saturation throughput degradation. From the result, it illustrates that the mathematical analysis of this paper is valid and precise. Moreover, the suggested mechanism can enhance the short-term transmission fairness of the IEEE 802.11 DCF schemes while sustaining high efficiency of bandwidth usage.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"7 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy consumption evaluation of low energy adaptive clustering hierarchy routing protocol for wireless sensor network","authors":"V. Mahyastuti, A. A. Pramudita","doi":"10.1109/COMNETSAT.2013.6870850","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870850","url":null,"abstract":"Wireless sensor network (WSN) is widely studied to be applied on the monitoring and control systems in various fields such as industrial, security, medical, and environmental monitoring. Constraints on the use of WSN is the limited power of every sensor node, so energy consumption efficiency become important issue in WSN. Routing is a function in WSN which consume enough energy. Routing protocols with the aim of achieving high Quality of Service (QoS) is generally not suitable for WSN. Without specific routing protocols with low energy consumption, WSN connectivity will be degraded. In this research, the energy consumption of Low-Energy Adaptive Clustering Hierarchy (LEACH) routing protocols for WSN system has evaluated by performing simulations using the software Network Simulator 2 (NS-2). Simulation results show that the number of clusters affect the level of energy consumption. Appropriate cluster number should be determined for achieving minimum energy consumption.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114891726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of linear precoding LTE downlink based on fpga","authors":"Nur Chaeriyah, R. P. Astuti, Denny Darlis, S. Si","doi":"10.1109/COMNETSAT.2013.6870859","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870859","url":null,"abstract":"The problem that often occur in multi-antenna wireless communication is how to maximize the throughput. Precoding is a generalization of beamforming to support multi-layer transmission in multi-antenna wireless communications. Beamforming is a signal processing technique used in sensor arrays for directional signal transmission or reception. In conventional single-layer beamforming, the same signal is emitted from each of the transmit antennas with appropriate weighting such that the signal power is maximized at the receiver output. When the receiver has multiple antennas, single-layer beamforming cannot simultaneously maximize the signal level at all of the receive antennas. Thus, in order to maximize throughput in a receiving antenna system, integrated precoding in multi-layer beamforming is required. LTE linear precoding system for the transmitter side is built in this research. The precoding system will be built in VHDL code and will be implemented on FPGA. In this research, the precoding sistem consists of 64-QAM Mapper as input system, and will be connected to OFDM (IFFT) block. The precoding is built based on Transmission Mode (TM) 6 of LTE release 9 and will be using 3GPP codebook standard as the precoding matrix for TM 6 for 2x2 MIMO. The research shows that by the used of linear precoding system in transmission, it decreases the complexion of detection system in precoding block on the receiver side. The implementation process shows that the research is implementable on hardware and will use 62% occupied slices, 11% slice register, and 27% of bounded IOBs resources of FPGA. with 2021 clock in total process, 121 clock in delay process and 1900 clocks to produce one OFDM symbol. The bitrate of the system is 161.68 Mbps.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Per block pre-distortion of a multi-carrier non-linear satellite communication channel","authors":"T. Deleu, M. Dervin, F. Horlin","doi":"10.1109/COMNETSAT.2013.6870865","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870865","url":null,"abstract":"In this paper, we propose a pre-distortion algorithm for a two carriers non-linear satellite communication channel. In the considered scenario, two linearly modulated carriers are amplified by the same non-linear power amplifier aboard the satellite. Due to the presence of the shaping filter at the transmitter side and the receiver filter (and possibly interference with filters aboard the satellite), the received signal is affected by non-linear intersymbol interference (ISI) but also non-linear adjacent channel interference (ACI). We consider the case where the two signals are transmitted from the same gateway, so that joint pre-distortion of the two signals is possible. Simulations for the 8PSK modulation show that the algorithm is able to greatly reduce the impact of the non-linear interference.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of denial-of-service attacks in Garbled Routing (GR) network","authors":"Shaahin Madani, I. Khalil","doi":"10.1109/COMNETSAT.2013.6870870","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870870","url":null,"abstract":"Garbled Routing network is the first generic anonymous communication framework that hosts other anonymous networks as plug-ins, and provides relatively higher anonymity and network unobservability. This paper focuses on the existing vulnerabilities of this framework to Denial-of-Service (DoS) attacks on the circuit establishment process. The impacts of the DoS attacks are analysed and three techniques are proposed that significantly strengthens the circuit establishment against the identified DoS attacks.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"597 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123427358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Hybrid multihop clustering algorithm in wireless sensor networks","authors":"A. Patra, Sonali Chouhan","doi":"10.1109/COMNETSAT.2013.6870861","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870861","url":null,"abstract":"In wireless sensor networks, clustering approach provides an efficient method for minimizing energy utilization and maximizing system lifetime. The issue of identifying appropriate cluster heads (CHs), forming energy efficient clusters and transmitting data packets to base station (BS) by direct or multi hop are important problems. This paper presents two approaches for two different scenarios. First, Energy Efficient Hybrid Clustering Scheme (EEHCS) is for direct hop communication to the BS when BS is situated within the sensing region and second, Energy Efficient Hybrid Multi-hop Clustering Scheme (EEHMCS) is for multi-hop communication to the BS using other CHs when BS is situated far away from the deployment region. In both the approaches, BS selects energy efficient CHs depending on remaining energy and number of member nodes by a centralized CH election method and broadcasts the selected CH message to all the nodes to reduce the control messages overhead required for distributed clustering approach. Simulation results show that EEHCS prolong the network lifetime upto 27:63% over LEACH-C, whereas, EEHMCS performs 2 times better than LEACH-C for first node die in certain network setting.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VoIP based two-tier Cognitive Radio Network: Developing implementation techniques","authors":"T. Chakraborty, I. S. Misra","doi":"10.1109/COMNETSAT.2013.6870853","DOIUrl":"https://doi.org/10.1109/COMNETSAT.2013.6870853","url":null,"abstract":"Cognitive Radio Network (CRN) ensures higher utilization of spectrum by allowing secondary users to transmit in licensed frequency bands in absence of primary users. In order to reduce interference among these users, CRN imposes a maximum limit on total number of users that can be admitted in CRN. The overall user capacity is further increased by implementing VoIP based 2-tier CRN that allows another group of secondary users to transmit by exploiting silence suppression characteristics of secondary users involved in VoIP communication. The practical issues involved in designing VoIP based 2-tier CRN are discussed in this paper as it provides novel implementation design models for 2-tier CRN. Two algorithms based on message passing policy are proposed for deploying VoIP based 2-tier CRN with the aim of increasing system capacity while reducing interference among users. Detailed mathematical formulation establishes superiority of 2-tier CRN over basic CRN with 77% improvement in spectrum utilization. Performance analysis in simulation model validates the inferences drawn from mathematical model.","PeriodicalId":378333,"journal":{"name":"2013 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133148043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}