{"title":"Design and development of non data aided estimation algorithm for carrier frequency-offset and I/Q imbalancing in OFDM-based systems","authors":"Reema Sharma, H. Lalitha, Navin Kumar","doi":"10.1109/WOCN.2013.6616177","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616177","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) systems are particularly sensitive to carrier frequency offset (CFO) and Inphase and Quadrature (I/Q) imbalance. These parameters degrade the performance of OFDM-based system as they destroy the orthogonality between sub-carriers. In this paper, we designed an estimation algorithm which is based on non data aided technique for the CFO and I/Q imbalance by taking advantage of the inherent orthogonal structure in the OFDM signal. We particularly analyze the different standards of 802.11, the wireless local area network (WLAN) that are OFDM based to evaluate the performance of this algorithm. The simulation results show the improvement of new estimator over the existing one in the presence of I/Q Imbalance.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114508323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiband channel restoration scheme for opportunistic spectrum access in cognitive radio","authors":"Bharti Modi, Sangeeta Singh","doi":"10.1109/WOCN.2013.6616227","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616227","url":null,"abstract":"Cognitive Radio (CR) is an approach for efficient spectrum utilization by the secondary user. But as the channel quality degrades due to environmental effects such as fading or the primary users' reaccess of the channel, the secondary user has to vacate the channel. After that secondary user has to start restoration by searching and sensing other channels. Restoration is done with an objective of finding the best channel in shortest possible time to enhance the CR users' throughput. In this paper, we propose a multiband restoration scheme so that the throughput of the CR is increased and the number of channels to be sensed get reduced to a great extent as compared to single channel restoration scheme and the Threshold First (TF) scheme as well. In this scheme, two or more channels are sensed at a time for the implementation of restoration scheme. Simulation results are showing the improvements in throughput as well as the reduction of the number of channels to be sensed with the multiband restoration scheme.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127964312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed task allocation and coordination scheme for a multi-UAV sensor network","authors":"S. Simi, R. Kurup, Sethuraman N. Rao","doi":"10.1109/WOCN.2013.6616189","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616189","url":null,"abstract":"Unmanned Aerial Vehicle (UAV) networks require successful mission execution, which is dependent on task planning and control. In this paper, we propose a distributed task allocation algorithm for a multi-UAV sensor network for sensing thorium intensities in the coastal areas of India. A power-aware coordination and planning approach is used to coordinate the activities of multiple UAVs. Depending on the availability of resources in each sensing UAV unit, each UAV initiates a task-scheduling algorithm and distributes its remaining tasks dynamically to other UAVs. The control station sends control information to the UAVs and receives the sensed parameters along with the location information from each UAV. The task allocation algorithm was simulated successfully using a network of static motes. The network was more effective and efficient with the use of this task allocation algorithm, thus contributing to improved mission execution in UAV networks.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132765806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A sequence number based WLAN authentication scheme for reducing the MIC field overhead","authors":"R. Singh, T. P. Sharma","doi":"10.1109/WOCN.2013.6616215","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616215","url":null,"abstract":"Authentication and integrity per frame is an implicit necessity for security in Wireless LANs (Local Area Networks). The existing security frameworks (WPA, 802.11i) provide message integrity code (MIC) for maintaining the integrity and authentication for each data frame. MIC is kept in separate field in the frame and hence adds to the communication overhead. We propose a novel sequence number based scheme to reduce the MIC overhead in the WLANs. The scheme provides per frame message integrity and authentication. It requires only trivial operations like hash evaluation, XOR and addition. It does not require extra bits or extra frame for this purpose and also no change in the existing frame format is required.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131568035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A DPC based MMSE beamforming design for a MIMO system with interference","authors":"Prateek Rathore, A. Trivedi","doi":"10.1109/WOCN.2013.6616178","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616178","url":null,"abstract":"In this paper, a Dirty Paper Coding (DPC) based Minimum Mean Square Error (MMSE) beamforming design for a MIMO interference channel has been introduced. It includes signal leakage and linear transmit filters. At each transmitter, MMSE approach has been used comprising the signal with the interference. The simulation results show that the proposed design achieves significant reduction in mean square error (MSE) value as compared to leakage based MMSE approach. An optimal DPC strategy has been used for cancelling causal interference.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129847504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of RoF GPON performance for different modulation schemes","authors":"Priya Dane, H. Kaushal","doi":"10.1109/WOCN.2013.6616211","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616211","url":null,"abstract":"Radio over Fibre (RoF) technology provides distribution of broadband signals to base station using an optical access network. This technology reduces the complexity at base station. On the other hand, giga bit passive optical network (GPON) has gained much of the interest in today's network due to its high data rate (1.2 GHz-2.4 GHz), simplicity, flexibility and low costs. The combination of GPON with RoF technology provides high capacity and high data rate solution. This paper provides characterization of RoF GPON by various simulations performed on OPTSIM software. The statistical analysis of simulation results are based on received signal strength and eye pattern obtained for various modulation schemes at different distances.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132909318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STESA: Self Transmission Energy Saving Algorithm for road surveillance","authors":"R. Kudale, R. Satao","doi":"10.1109/WOCN.2013.6616230","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616230","url":null,"abstract":"In wireless sensor & actor network (WSAN), sensors are used to sense data from environment and send this data to the actor to take appropriate action. In semi automated architecture sensed data is forwarded to the actor and then to sink. This sensor network is used for road surveillance. There are many algorithms and protocols designed to reduce energy consumption. Because of different coordination pattern and topology dependency these algorithms and protocols cannot be used directly for road surveillance application. Our proposed STESA (Self Transmission Energy Saving Algorithm) is efficient than existing one. In this algorithm, we have used only sensors for forwarding data to sink directly so as to reduce energy consumption, packet loss and delay. This is proved with simulation result.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized cluster head selection & rotation for cooperative spectrum sensing in Cognitive Radio Networks","authors":"Pulkit Sharma, V. Abrol","doi":"10.1109/WOCN.2013.6616260","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616260","url":null,"abstract":"In Cognitive Radio Networks secondary users are aware of their surroundings and can use free primary spectrum opportunistically. Higher spectrum sensing efficiency is needed to implement Cognitive Radio Networks. Thus cluster based topology is used to increase sensing efficiency. The secondary users are divided into groups or clusters which have a cluster head and the decision of the spectrum sensing taken by all the secondary users is controlled by these cluster heads in their respective region. This paper proposes a new optimized cluster head rotation and selection scheme. Practical environmental scenarios for mobile communication like fading and shadowing are taken into consideration. The comparative analysis with previous known techniques confirms that the proposed approach performs better for cooperative cognitive radio networks.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125813792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhishek N. Tripathi, Utkarsh Sharma, Deepak Simaiya
{"title":"Hardware implementation of GPRS enabled embedded server for remote access terminal","authors":"Abhishek N. Tripathi, Utkarsh Sharma, Deepak Simaiya","doi":"10.1109/WOCN.2013.6616228","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616228","url":null,"abstract":"Wireless Packet Data Networks, such as GPRS, hold great promise for applications that rely on machine to machine (M2M) communication. The rapidly advancing mobile communication technology and the decrease in costs make it possible to incorporate mobile technology into home automation systems. Based on an SMS/GPRS (Short Message Service/General Packet Radio Service) mobile cell module and a microcontroller, a home automation server can be established, Powerful microcontrollers are used as parts of most home and office appliances of today. Integrating web servers to these intelligent devices will aid in controlling them over the Internet and also in creating effective user interfaces in the form of web pages. This paper presents the development of AT modem driver, text based command processing software, output for an Atmel micro-controller to facilitate in sending and receiving data via the cell module. The proposed design is implemented using SMS(commonly known as text messages) and GPRS (Internet based protocol) as the main communication protocol.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127040469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security enabled DSR for establishing symmetric key and security in MANETS","authors":"A. Khubalkar, L. Ragha","doi":"10.1109/WOCN.2013.6616208","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616208","url":null,"abstract":"In recent years, MANETs have been developing rapidly and are increasingly being used in many applications, ranging from military to civilian and commercial uses. The security has become one of the primary concerns as MANETS are being used widely. To achieve security goals like: authentication, integrity, non-repudiation, privacy, a secret key is necessary to be shared between the sender and the receiver. Some popular key exchange protocols have some demerits in case of MANETs which are due to mainly the requirement of high computational capability. In this paper, we proposed security enhancements to DSR for providing an on-demand secure routing protocol. We also proposed an algorithm to exchange shared / session key between the source and the destination during the route creation itself. For the performance evaluation, NS2 simulator have been used and comparisons are made with the basic DSR protocol. This Security Enabled DSR (SEDSR) ensures security goals and can withstand against single node compromise.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}