2017 Global Wireless Summit (GWS)最新文献

筛选
英文 中文
Architecture and security considerations for Internet of Things 物联网的架构和安全考虑
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300477
M. Gomba, B. Nleya
{"title":"Architecture and security considerations for Internet of Things","authors":"M. Gomba, B. Nleya","doi":"10.1109/GWS.2017.8300477","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300477","url":null,"abstract":"The current IP and other networks such as Power Smart Grids are fast evolving thus resulting in diverse connectivity methodologies. This has led to the emergence of \"the Internet of Things (IoT) methodology whose goal is to transform the current IP and related networks to Machine-to-Machine (M-2-M) basis. It will seamlessly interconnect the globe and cyberspace via physical objects that embed with intelligent sensors of varying types, this resulting in voluminous generation and exchange of data by an excess of 20 billion Internet-connected objects and sensors (things) soon (by 2020), [1]. The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned of beneficial services. In this paper, we overview both IoT architecture as well as security for IoT associated objects and devices. We will commence with a description of a generalized IoT and security architecture as well as how the various elements constituting them interact. We describe an approach that allows the protection of both constrained and unconstrained IoT devices through robust encryption as well as authentication, so that both can equally leverage from the same security framework, but still maintaining low computational loads, by avoiding excessive computational operations.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117256268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Continuous knowledge sharing in the third phase of a critical and risky network-based business model innovation project 在一个关键且有风险的基于网络的商业模式创新项目的第三阶段持续知识共享
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300505
P. Lindgren
{"title":"Continuous knowledge sharing in the third phase of a critical and risky network-based business model innovation project","authors":"P. Lindgren","doi":"10.1109/GWS.2017.8300505","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300505","url":null,"abstract":"Continuous joint action and knowledge sharing are fundamental aspects of business model innovation (BMI) for businesses to meet the complex BMI agenda of today; 12 independent businesses initially joint innovating on the establishment of a new business model concept of a balanced energy plant project in 2013, where the businesses had to work in symbioses from the very first moment. They and the Greenlab Skive business model innovation project have now in the summer 2017 reached the third critical BMI phase of this high risk BMI project — \"letting go\"-, the prototyping and implementation phase. The new established management with now a formal CEO and board have an important task related to achieve a long term sustainable GLS business — beyond phase 3 and phase 4. The paper address how GLS can create sustainable knowledge creation and exchange to insure that the GLS business will survive beyond implementation and initial operation phase and still be attractive as knowledge partner/Zone when the GLS begins operating.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shifted constellation-based detection of pilot contamination attacks 移位的基于星座的飞行员污染攻击检测
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300473
D. Mihaylova, Z. Valkova-Jarvis, G. Iliev, V. Poulkov
{"title":"Shifted constellation-based detection of pilot contamination attacks","authors":"D. Mihaylova, Z. Valkova-Jarvis, G. Iliev, V. Poulkov","doi":"10.1109/GWS.2017.8300473","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300473","url":null,"abstract":"In this paper a new method for the detection of pilot contamination attacks is proposed. The approach relies on the use of legitimate pilots from a shifted constellation and successfully overcomes all the problems related to the detection capabilities of a recently-developed method using two random training pilots. Our proposed method deals with the values of pilot offsets and the relation between legitimate constellations.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128703814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quantifying the effect of incomplete information in denial of service detection 量化不完全信息在拒绝服务检测中的影响
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300502
Mohamed Wasim Lorgat, Alireza Baghai-Wadji, A. McDonald
{"title":"Quantifying the effect of incomplete information in denial of service detection","authors":"Mohamed Wasim Lorgat, Alireza Baghai-Wadji, A. McDonald","doi":"10.1109/GWS.2017.8300502","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300502","url":null,"abstract":"The performance loss due to incomplete information in denial of service (DoS) detection is quantified in this paper. Volumetric DoS detection is formulated as a signal detection problem. Two detectors are defined: the first operates without knowledge of the attack model and the second operates as if the attack model were known. The performance loss is quantified by comparing the two detectors. Simulation results demonstrate that the performance loss is greatest for low intensity attacks and slowly diminishes as the attack intensity increases.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133708333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity analysis of FBMC over OFDM in cognitive radio systems 认知无线电系统中FBMC over OFDM的容量分析
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300298
Amakan Elisha Agoni, M. Dlodlo, H. Ohize
{"title":"Capacity analysis of FBMC over OFDM in cognitive radio systems","authors":"Amakan Elisha Agoni, M. Dlodlo, H. Ohize","doi":"10.1109/GWS.2017.8300298","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300298","url":null,"abstract":"We present a performance analysis between two different multi-carrier transmission techniques: the OFDM, with cyclic prefix (CP) addition; and the FBMC (Filter-Bank Multicarrier), which is based on a filter-bank architecture. For both schemes, we propose a comparative analysis to be applied in a Cognitive Radio system (CR). The paper addresses the need for an adaptive, intelligent and reconfigurable communication system, capable of intuitively studying the requirements of an end user as well as the band spectrum and thereby assigning the requisite resources. We comparatively studied the channel capacity for a CR. The resource allocation algorithm uses subcarrier assignment. Power allocation was carried out sequentially. We formulated the rate of the total information under an uplink scenario with Rayleigh fading and path loss, subject to the mutual interference constraint existing between the primary user (PU) and the secondary user (SU) as well as the power constraint.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PLP scheduling schemes for MPLP transmission of SVC services in DVB-T2 DVB-T2中SVC业务MPLP传输的PLP调度方案
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300474
Reitumetse N.C. Khalanyane, F. Takawira, O. Oyerinde
{"title":"PLP scheduling schemes for MPLP transmission of SVC services in DVB-T2","authors":"Reitumetse N.C. Khalanyane, F. Takawira, O. Oyerinde","doi":"10.1109/GWS.2017.8300474","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300474","url":null,"abstract":"This paper proposes two new scheduling schemes in Digital Video Broadcasting Second Generation Terrestrial (DVB-T2) for delivery of scalable video traffic. The growing demand for video services poses a major challenge in resource management. Efficient video coding and scheduling scheme are of paramount importance in ensuring that the limited bandwidth is utilized effectively. Efficient video coding reduces the bit rate of a video without too much loss in quality. H.264/Scalable Video Coding (SVC) allows different versions of the same video to be represented in one bit-stream as opposed to simulcast which encodes the different versions separately. A good scheduling scheme improves system performance without compromising the Quality of Service (QoS) requirements of varying services. The aim of this paper is to propose new scheduling schemes adopted from packet scheduling schemes in other wireless communication systems called Modified Largest Weighted Buffer Occupancy First (MLWBOF) and Exponential/Proportional Fair (EXP/PF) which provide a good trade-off between QoS, fairness and throughput. The performance of the proposed schemes is compared with an existing scheme through simulations. The evaluation is conducted in terms of system throughput, fairness and Baseband Frame (BB) loss.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"44 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perceptive realisation of the hepta-dimensional business modelling framework through ambient environmental attributes for the end-to-end digitilisation 通过环境属性感知实现七维业务建模框架的端到端数字化
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300489
Ambuj Kumar, P. Lindgren
{"title":"Perceptive realisation of the hepta-dimensional business modelling framework through ambient environmental attributes for the end-to-end digitilisation","authors":"Ambuj Kumar, P. Lindgren","doi":"10.1109/GWS.2017.8300489","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300489","url":null,"abstract":"A Business Model (BM) is a function that maps a business enterprise to its customers and/ or stakeholders. The success of a business idea depends significantly on the comprehensive development, durability, and mapping of the parameters of the applied BM. It is very much evident that a successful BM has strong strings linked to rigorously scrutinized and established BMs. Anticipating the significance of the inter-relations among the established BMs in creating newer BMs for better value to customers, a Hepta-dimensional Business Modelling Framework (HBF) was coined and developed by the Multi-Business Model Innovation and Technology (MBIT) group in Aarhus University (AU), Denmark. The unique concept is being exploited for various BMs till date. The uniqueness of this concept is its conducive workspace, which is a fabricated room encapsulating all the Business Modelling processes fostering in a particular location. This fabricated room is termed as B-LAB and the accessories involved for designing a BM, are termed as B-LAB components. In this paper, we will discuss that why the sense of environmental attributes are crucial for B-LABs, how the B-LAB's environment can affect the modelling process, and how can we realize environmental attributes of a B-LAB.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133045610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bit level implementation of the PTA algorithm for reed-solomon codes reed-solomon码的PTA算法的位级实现
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300462
Yuval Genga, O. Oyerinde, J. Versfeld
{"title":"Bit level implementation of the PTA algorithm for reed-solomon codes","authors":"Yuval Genga, O. Oyerinde, J. Versfeld","doi":"10.1109/GWS.2017.8300462","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300462","url":null,"abstract":"The Parity check Transformation Algorithm (PTA) is a symbol level decoder that was recently developed for Reed-Solomon (RS) codes. The algorithm is a soft decision iterative decoder that uses the reliability information to decode by transforming the parity check matrix based on the same soft information. The PTA algorithm has been shown in literature to outperform widely used RS decoders like the Berlekamp-Massey algorithm and Koetter-Vardy algorithm. Work done in this paper investigates the effect of the PTA algorithm working on a sparse matrix by implementing it on a bit level. Modifications are made to the algorithm, to suit the bit level implementation, that significantly improve the overall performance. Simulations run show that the algorithm compares favorably to the high performance Adoptive Belief Propagation (ABP) decoder, that also works on a bit level, while providing a significant gain when compared to the symbol level implementation of the PTA.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
5G network slicing: A multi-tenancy scenario 5G网络切片:多租户场景
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300476
S. Oladejo, O. Falowo
{"title":"5G network slicing: A multi-tenancy scenario","authors":"S. Oladejo, O. Falowo","doi":"10.1109/GWS.2017.8300476","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300476","url":null,"abstract":"The 5G mobile network is expected to meet increasing user demands. The increase in number of users is accompanied by varying user requirements in different network scenarios. Hence the 5G mobile network should be as flexible as possible. Network slicing offers a promising solution to the flexibility need of the 5G mobile network. Network slicing is the logical partitioning of a physical network into independent virtual mobile networks which enables the multi-tenancy paradigm. However, realising independent virtual mobile networks via network slicing in multi-tenancy requires efficient resource allocation. This is important to ensure that multi-tenancy enhances network capacity. In this paper, we investigate the resource allocation problem of achieving maximum capacity with the transmit power, allocated bandwidth as part of the constraints in a sliced multi-tenant network. Through our simulations, we demonstrate (i) how the number of users in a slice affects the capacity of an MVNO, (ii) how the transmit power improves the capacity of the MVNO and also how the number of slices affects the capacity.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Artificial intelligence and deep learning in a world of humans and persuasive business models 人工智能和深度学习在人类世界和有说服力的商业模式
2017 Global Wireless Summit (GWS) Pub Date : 2017-10-01 DOI: 10.1109/GWS.2017.8300487
Per Valter, P. Lindgren, R. Prasad
{"title":"Artificial intelligence and deep learning in a world of humans and persuasive business models","authors":"Per Valter, P. Lindgren, R. Prasad","doi":"10.1109/GWS.2017.8300487","DOIUrl":"https://doi.org/10.1109/GWS.2017.8300487","url":null,"abstract":"Integration of Communications, Navigation, Sensing and Services (CONANSENSE) [10] has made the possibilities to develop disruptive and persuasive technologies that are increasing with exponential speed and are coursing disruption of businesses, business models (BM) [5], [6] and even Business Model Ecosystems (BMES) [4] every day. Businesses have classically put emphasis on human bonds related to their BM's — but by the fast development of more sensoring and persuasive BMs increasingly run autonomously by machines, businesses have to know how these BM's can be innovated and how they can be operated to ensure their full business potential and survival. BMES and BM's have for a longtime been based and built up with human bond communication, but this can vanish within split seconds when these new technologies very much based on machine to human communication evolves. How is and will this change the bonds between humans, humans and machines and machines to machines. How will this evolvement influence humans and machines ability to \"sense\", \"relate\" and \"communicate\" each other. The paper addresses the exponential development of artificial intelligence technologies, persuasive technologies and persuasive BMs in Business model innovation and introduce a conceptual model to future business model innovation and operation.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125614040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信