IET International Conference on Wireless Communications and Applications最新文献

筛选
英文 中文
Image compression with short-term visual encryption using the burrow wheeler transform and keyed transpose 利用洞惠勒变换和键控转置进行短期视觉加密的图像压缩
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2112
J. Kong, K. Seng, L. Yeong, L. Ang
{"title":"Image compression with short-term visual encryption using the burrow wheeler transform and keyed transpose","authors":"J. Kong, K. Seng, L. Yeong, L. Ang","doi":"10.1049/cp.2012.2112","DOIUrl":"https://doi.org/10.1049/cp.2012.2112","url":null,"abstract":"In some wireless sensor network image processing applications, visual data such as the surveillance imagery or video streaming might contain high commercial value but devalues over time. For such multimedia, the security requirement is usually low or just sufficient to disguise and protect the value of the payload for a short-term period. Multimedia compression is a necessity for these large-sized data and the unification of security and compression properties would greatly increase the practicality of the image processing algorithm. In this paper, we are presenting the image results of using the BWCA (Burrow Wheeler Compression Algorithm) on images with the proposed conditional transposition methodology (keyed transpose) for a short-term visual protection and the results for subjective metric perceptual assessment of the quality and the BWT effects on the images. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved look-ahead re-synchronization window for HMAC-based one-time password 改进了基于hmac的一次性密码的预检重新同步窗口
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2111
Alireza Beikverdi, I. Tan
{"title":"Improved look-ahead re-synchronization window for HMAC-based one-time password","authors":"Alireza Beikverdi, I. Tan","doi":"10.1049/cp.2012.2111","DOIUrl":"https://doi.org/10.1049/cp.2012.2111","url":null,"abstract":"With the abundance of mobile wireless devices ranging from notebooks to smart phones, it has become convenient for One-Time Passwords (OTP) mechanism to be used for authentication. OTP are generated for single use purposes only and are generally generated on demand and have a limited usable shelf life. Upon usage, the password will be invalidated on both the client and the server side of the authentication system. A popular and standardized OTP system is the Hashed Message Authentication Code (HMAC) Based OTP (HOTP). In the HOTP system, the OTP is generated on the client side by firstly generating an encryption key that is derived from a shared secret key and incrementing a counter value. The final value generated is then truncated to the number of digits as per required by the OTP. On the server side, the same computation is generated and the OTP generated are compared for authentication. Signal interruptions in wireless environments may cause the need to regenerate a new OTP on the client side and hence causes the dynamic counter value to be desynchronized with the server. In the event that a mismatch occurs during the authentication process, the server increases the counter value within a look-ahead window for s times. This resynchronization parameter, s, determines the tolerance level of being desynchronized. However, larger s values (better tolerance) come with a trade-off of higher computational needs and can be a source of malicious attacks. This paper introduces an improved method to the HOTP standard in order to increase the computational efficiency for a larger s window. The introduced method doubles the s window size through negligible computational overheads. Furthermore, the method described in this paper can be easily implemented in the current standard implementation of the HOTP standards. (5 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121811518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Joint carrier frequency offset and channel parameters estimation for MIMO-OFDM systems MIMO-OFDM系统的联合载波频偏和信道参数估计
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2066
Meng-Chuan Mah, Heng-Siong Lim, A. Tan
{"title":"Joint carrier frequency offset and channel parameters estimation for MIMO-OFDM systems","authors":"Meng-Chuan Mah, Heng-Siong Lim, A. Tan","doi":"10.1049/cp.2012.2066","DOIUrl":"https://doi.org/10.1049/cp.2012.2066","url":null,"abstract":"Joint channel and frequency offset tracking based on an autoregressive (AR) model are often performed by either assuming the knowledge of the state transition matrix and state noise or obtaining the state transition matrix and state noise via the Yule Walker equations. In this paper, we propose a joint carrier frequency offset (CFO) and channel parameters tracking algorithm for MIMO-OFDM system which is capable of tracking the channel parameters without requirements of additional information such as maximum Doppler frequency and maximum delay spread. The Extended Kalman Filter is proposed for the joint tracking process. Simulation results show that the performance of the proposed method is close to the case when channel parameters are known. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133259131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time application session transfer over IP Multimedia Subsystem (IMS) network 通过IP多媒体子系统(IMS)网络实时传输应用会话
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2088
C. Lee, K. Choong
{"title":"Real-time application session transfer over IP Multimedia Subsystem (IMS) network","authors":"C. Lee, K. Choong","doi":"10.1049/cp.2012.2088","DOIUrl":"https://doi.org/10.1049/cp.2012.2088","url":null,"abstract":"Living in a world surrounded by multiple devices such as smart phone, laptop, desktop PC and even tablet, it is important for the user to seamlessly transfer his/her session across these devices in a ubiquitous manner according to user preferences. While most of the systems either rely on realtime location tracking of the target device, or require users to remember the contact or IP address of the target device for the transfer, we propose in this paper an automated session transfer mechanism leveraging on the registration information which are readily found in the IP Multimedia Subsystem (IMS) core. We explain in this paper the system architecture and signaling flow of our prototype implementation. Results showed that our proposed mechanism for session transfer over both wired and wireless access network took 202ms and 388ms respectively, which stays within the ITU-T recommendation of 150ms to 400ms overall delay. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128787472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference analysis and reduction in cellular network 蜂窝网络中的干扰分析与减少
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2078
Ashagrie Getnet Flattie
{"title":"Interference analysis and reduction in cellular network","authors":"Ashagrie Getnet Flattie","doi":"10.1049/cp.2012.2078","DOIUrl":"https://doi.org/10.1049/cp.2012.2078","url":null,"abstract":"A fundamental problem in cellular network, as well as in many other disciplines (wireless communication), is finding a suitable interference reduction methods. Radio links cannot be created over infinite distances and will be limited in range by interference. In this study two special cases are considered: In the first scenario, varying the load factor and antenna tilt to reduce the Co-channel interference for GSM network and the second case optimizing the prediction model to minimized adjacent channel interference for WCDMA system has been addressed. The variability of different interference with the cellular system parameters has been investigated. The result shows that the ACI decreased (16%) after optimizing WINLOS models. The ACIR values reach 30 dB which is acceptable range to minimize the capacity loss. C/I  12 dB can be increased by 3% when changing mechanical tilt by 4 degree. All the interference reduction methods have an impact on the cell coverage area or capacity and therefore they need to be planned carefully. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133767697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of wireless Bluetooth heart rate remote monitoring system 无线蓝牙心率远程监测系统的研制
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2101
Basem Abu Izneid, Ibrahim Sukar, Malek Ali, M. Souiyah
{"title":"Development of wireless Bluetooth heart rate remote monitoring system","authors":"Basem Abu Izneid, Ibrahim Sukar, Malek Ali, M. Souiyah","doi":"10.1049/cp.2012.2101","DOIUrl":"https://doi.org/10.1049/cp.2012.2101","url":null,"abstract":"This paper presents design and development of a new heart rate remote monitoring device using Microcontroller and wireless Bluetooth that transmits and displays precise readings of the heart rate on laptop. However, the signal is basically the number of beats per minute of the heart and should be monitored from time to time to detect any abnormalities of the heart rate. This system consists of two phases; the integrated pulse rate measurement circuit to detect the pulses on the fingertip that include pulse detection, signal extraction, pulse amplification. Furthermore the microcontroller circuit which processes the detected signal via wireless Bluetooth device which is responsible of the heart rate transmitting readings. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134554563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Latency evaluation of authentication protocols in centralized 802.11 architecture 集中式802.11体系结构中认证协议的延迟评估
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2113
M. H. Mazlan, S. Ariffin, Mohammed Balfaqih, S. N. Hasnan, S. Haseeb
{"title":"Latency evaluation of authentication protocols in centralized 802.11 architecture","authors":"M. H. Mazlan, S. Ariffin, Mohammed Balfaqih, S. N. Hasnan, S. Haseeb","doi":"10.1049/cp.2012.2113","DOIUrl":"https://doi.org/10.1049/cp.2012.2113","url":null,"abstract":"With the growing of telecommunication technology, people can connect to the Internet wirelessly anywhere and anytime. IEEE 802.11 Wireless Local Area Network (WLAN) became the preferred technology for providing Internet access in both indoors and outdoors environments for private and public usage. In order to establish the connection, users need to authenticate and associate with the Access Point (AP) to get access to the network. This was originally not a secured environment. For securing authentication process, many protocols had been introduced to protect the WLANs against unauthorized access from attackers. This paper aims to evaluate the performance of different authentication protocols in Centralized 802.11 Architecture by comparing the latency for Authentication and Association, 802.1x Authentication and Key Management phases. Experiments were performed on a centralized WLAN testbed consisting of Access Controller (AC), AP, RADIUS server and Client in neighbourhood AP environment. We analyse the authentication protocols in error free and error prone scenarios to study the effect of error during re-authentication process during handover. WPA2-Enterprise authentication methods cause the highest re-authentication latency compare with open-system authentication and WPA2-Personal authentication. In the re-authentication component for WPA2Enterprise, 802.1x authentication phase cause highest latency than authentication and association phase and key management phase. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114406072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UWB waveform set design using Löwdin's orthogonalization with Hermite Rodriguez functions UWB波形集设计使用Löwdin的正交与Hermite Rodriguez函数
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2067
M. A. Yusoff, Z. Zang
{"title":"UWB waveform set design using Löwdin's orthogonalization with Hermite Rodriguez functions","authors":"M. A. Yusoff, Z. Zang","doi":"10.1049/cp.2012.2067","DOIUrl":"https://doi.org/10.1049/cp.2012.2067","url":null,"abstract":"In this paper we design a set of spectrally efficient orthogonal waveforms based on Hermite Rodriguez functions. The design is formulated as a semi-infinite quadratic programming problem and subsequently Lowdin method is used to generate a set of orthogonal waveforms. This approach is able to produce many overlapping orthogonal waveforms with high spectral efficiency. (4 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123333460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An ns-3 HSPA network simulator with application to evaluating a base station removal algorithm 一个ns- 3hspa网络模拟器,用于评估一种基站移除算法
IET International Conference on Wireless Communications and Applications Pub Date : 1900-01-01 DOI: 10.1049/cp.2012.2080
Arash H. Matinrad, Vangelis Angelakis, D. Yuan
{"title":"An ns-3 HSPA network simulator with application to evaluating a base station removal algorithm","authors":"Arash H. Matinrad, Vangelis Angelakis, D. Yuan","doi":"10.1049/cp.2012.2080","DOIUrl":"https://doi.org/10.1049/cp.2012.2080","url":null,"abstract":"In this paper we present system modeling for HSPA networks, and the design and implementation of an ns-3 simulator for HSPA performance assessment. As a case study, the system model and simulator are integrated in the context of providing energy-saving solutions in cellular networks. Our simulator is a highly modular and scalable for studying how a given infrastructure deployment solution, along with its parameters and physical configuration characteristics, translates into the overall system performance. Based on HSPA system modeling, we introduce a simple, intuitive, and fast energy-saving algorithm for switching off NodeBs from a dense, low load system, subject to service coverage constraints. Numerical results demonstrate that the developed ns-3 HSPA system-level simulator is able to effectively deliver detailed HSPA performance assessment, and thereby enables accurate characterization of the performance trade-off of energy saving versus throughput and coverage. (6 pages)","PeriodicalId":383835,"journal":{"name":"IET International Conference on Wireless Communications and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信