{"title":"A round-trip-time based concurrent transmission scheduling for MPTCP","authors":"R. Chen, Wennai Wang, Jingning Zhu, Bing Wang","doi":"10.1109/WCSP.2014.6992036","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992036","url":null,"abstract":"Multipath Transmission Control Protocol (MPTCP) promises to aggregate concurrent and multiple communications interfaces to improve data transmission rate. There is, however, an open issue of flow management under highly asymmetric condition where the throughput may degrade. This paper proposes an algorithm for flow scheduling in the sender to minimize the degree of out-of-order packets arriving in the receiver. The Round Trip Times (RTTs) of each path of a MPTCP connection are taken into traffic allocation over subflows. Simulations are conducted by extending the MPTCP open source modules for the NS2 tool set. It is found that the proposed algorithm is superior to a traditional Round-Robin (RR) technique in both buffer size and effective throughput.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An anonymous payment system to protect the privacy of electric vehicles","authors":"Tianyu Zhao, C. Chen, Lingbo Wei, Mengke Yu","doi":"10.1109/WCSP.2014.6992208","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992208","url":null,"abstract":"Electric vehicle is the automobile that powered by electrical energy stored in batteries. Due to the frequent recharging, vehicles need to be connected to the recharging infrastructure while they are parked. This may disclose drivers' privacy, such as their location that drivers may want to keep secret. In this paper, we propose a scheme to enhance the privacy of the drivers using anonymous credential technique and Trusted Platform Module(TPM). We use anonymous credential technique to achieve the anonymity of vehicles such that drivers can anonymously and unlinkably recharge their vehicles. We add some attributes to the credential such as the type of the battery in the vehicle in case that the prices of different batteries are different. We use TPM to omit a blacklist such that the company that offer the recharging service(Energy Provider Company, EPC) does not need to conduct a double spending detection.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bin Gu, Tiecheng Song, Dafei Sun, Lei Zhang, Ming Wu, Jie Guo
{"title":"A set of closed form approximate formulae for optimal sensing duration of cognitive radio","authors":"Bin Gu, Tiecheng Song, Dafei Sun, Lei Zhang, Ming Wu, Jie Guo","doi":"10.1109/WCSP.2014.6992136","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992136","url":null,"abstract":"In a cognitive radio system, proper configuration of sensing duration enables maximization of the data throughput. However, no existing straightforward formula is available, which is desirable in the mobile context due to tightness of computation time. A set of closed-form approximate formulae of optimal sensing duration for cognitive radio are derived under different signal to noise ratio (SNR). The approximation errors are perfectly small except within a certain SNR range, where the error is still less than 5%.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A conflict-free access method for parallel turbo decoder","authors":"Chen Gong, Xiaoyang Li, Zhenzhi Wu, Dake Liu","doi":"10.1109/WCSP.2014.6992119","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992119","url":null,"abstract":"Parallel Turbo decoding encounters conflicts during parallel data accesses because of the sequential data interleaving, and the conflicts lead to a serious decrease of throughput. Traditional conflict-free memory mapping schemes often require a huge cost of hardware, such as the area of memory, which is also a bottleneck in practical implementations. In this work, DSATUR (Degree of Saturation) coloring algorithm is presented to solve the memory mapping problem and a memory subsystem with multiple memory banks is designed to achieve conflict-free data accesses during parallel Turbo decoding. To reduce the area of memory, an optimization for DSATUR coloring algorithm and an optimization for data addresses are proposed. The results of multiple experiments show that the conflicts of data access never occurs for using our memory mapping scheme. The two optimizations reduce 42% of the total area of memory compared with the original DSATUR algorithm without optimizations.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An automatic approach to fingerprint construction of indoor localization by crowd paths","authors":"Jun Xia, Zhengyong Huang, Hui Yu, Xiaoying Gan","doi":"10.1109/WCSP.2014.6992160","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992160","url":null,"abstract":"In typical indoor position system employing location fingerprints model, received signal strength indications (RSSI) from a set of Wi-Fi access points are used as an unique fingerprint to identify a specific position. This type position systems need abundant Wi-Fi fingerprints, generally implemented by trained experts, which extends labor costs and restricts heir promotion. In his paper, a novel approach to construct intelligently Wi-Fi fingerprint database based on crowd paths triggered by lots of ordinary users holding onto smartphone is proposed. As existing drift errors in inertial measurement unit (IMU) and Wi-Fi module and the knowledge that crowd paths involve massive similar or crossing positions, we defined a concept: thin landmarks, and employ a fuzzy voter scheme to locating each thin landmark. Then rectifying the position of each sample point in every thin landmark's candidate set with corresponding thin landmark's coordinate and simultaneously utilizing particle filter (PF) algorithm to smooth each sample point on each crowd path. We implemented the approach on off-he-shelf smartphones and evaluate he performance in our campus. Experimental result indicates that the approach can availably construct Wi-Fi fingerprint database in tolerable errors.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved K-best algorithm for low-complexity MIMO detector","authors":"Junmei Yang, Chuan Zhang, X. You, Shugong Xu","doi":"10.1109/WCSP.2014.6992213","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992213","url":null,"abstract":"In this paper, an improved K-best algorithm, which is suitable for low-complexity MIMO detector implementation is proposed. In order to balance the detector's bit-error-rate (BER) performance and computation complexity, several techniques, such as empirical path expansion and relaxed sorting have been proposed. Simulation results have shown that the proposed algorithm can achieve better computation efficiency while keep similar BER performance compared to the state-of-the-art ones. Furthermore, the corresponding detector MIMO architecture is also proposed.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chip design of a 10-MHz switched capacitor low-pass filter for wireless application","authors":"Jhin-Fang Huang, J. Wen, Yen-Jung Lin","doi":"10.1109/WCSP.2014.6992004","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992004","url":null,"abstract":"By using bilinear transformation to a 5th-order elliptic low pass ladder filter, a 10 MHz switched capacitor filter (SFC) is presented. The proposed SC filter is fabricated with tsmc 0.18 μm CMOS process over WiFi, WiMAX and WCDMA wireless applications. With a sampling rate of 80 MHz, measured results achieve filter cutoff frequency of 10.2 MHz, spurious free dynamic range (SFDR) of 47 dB, stop band attenuation greater than 35 dB and power consumption of 18 mW from a 1.8 V voltage supply. Including pads, the chip area is 0.412 (0.782×0.527) mm2.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116433417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Wang, Haitao Xue, Guoping Jiang, B. Zheng, Jingwu Cui
{"title":"Energy efficiency analysis for cognitive radio network with data collision","authors":"Lei Wang, Haitao Xue, Guoping Jiang, B. Zheng, Jingwu Cui","doi":"10.1109/WCSP.2014.6992212","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992212","url":null,"abstract":"In the practical application of cognitive radio network, it is especially important to improve the energy efficiency for those energy-constrained cognitive users. From the perspective of maximizing the energy efficiency in cognitive radio networks, this paper considers the case that the sudden appearance of the primary user can lead to data collision when the cognitive user is transmitting data. Then the optimization mathematical model of energy efficiency is given by using frame period and sensing time. The optimization problem is analyzed theoretically and verified by computer simulations. The theoretical analysis and computer simulation results show that the energy efficiency firstly increases and then decreases with the increase of the sensing time as well as the frame period, and there is an optimal combination of optimal sensing time and frame period to maximize the energy efficiency.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pengfei Luo, Zabih Ghassemlooy, H. L. Minh, Xuan Tang, Hsin-Mu Tsai
{"title":"Undersampled phase shift ON-OFF keying for camera communication","authors":"Pengfei Luo, Zabih Ghassemlooy, H. L. Minh, Xuan Tang, Hsin-Mu Tsai","doi":"10.1109/WCSP.2014.6992043","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992043","url":null,"abstract":"In this paper, an optical camera communication system utilizing the under-sampled phase shift ON-OFF keying modulation is proposed to support non-flickering visible light communication. This system sends three types of light symbols through light emitting diode (LED) lamps, which are recorded by a camera. By employing a dual LED lamp with a designated mapping and framing method, the data rate can reach up to 3 times of the camera's frame rate. The experiment results show that the proposed camera communication system can achieve 150 bps error-free communications for a range up to 12 m.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security analysis of mobile QQ","authors":"Fei Yu, Xinyu Zhao, Qingbing Ji, Lijun Zhang","doi":"10.1109/WCSP.2014.6992183","DOIUrl":"https://doi.org/10.1109/WCSP.2014.6992183","url":null,"abstract":"Mobile QQ is the smartphone version of the most popular IM software QQ in China. This paper studies the encipher system and communication protocol of mobile QQ and analyzes its security flaws. We found some security risks of mobile QQ and some of which are fatal especially in a weak wireless environment: Any attacker who could access the communication channel could easily recover the encrypted message packet during the communication without the knowledge of the user's password; the user's password is vulnerable by brute-force attack or rainbow table attack in the protocol; the complicated encryption mode of TEA used in mobile QQ could be bypassed.","PeriodicalId":412971,"journal":{"name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127956559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}