2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)最新文献

筛选
英文 中文
Knowledge-based update of primary exclusive region for database-driven spectrum sharing towards 5G 面向5G的数据库驱动频谱共享主专用区的知识更新
2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 1900-01-01 DOI: 10.1109/WCNC.2016.7564713
S. Yamashita, Koji Yamamoto, T. Nishio, M. Morikura
{"title":"Knowledge-based update of primary exclusive region for database-driven spectrum sharing towards 5G","authors":"S. Yamashita, Koji Yamamoto, T. Nishio, M. Morikura","doi":"10.1109/WCNC.2016.7564713","DOIUrl":"https://doi.org/10.1109/WCNC.2016.7564713","url":null,"abstract":"To realize high-speed and high-capacity 5G mobile networks, secondary users (SUs) may opportunistically use licensed spectrum allocated to primary users (PUs). This paper presents a framework to deal with the situation that occurs when a PU suffers harmful interference caused by the secondary use of the spectrum allocated to it. Here, the PU is assumed to be a radar system. In our proposed framework, the PU informs the database that it is suffering harmful interference. Receiving this information, the database updates the primary exclusive region (PER), where SUs are prohibited from using the licensed spectrum. The updated PER depends on the current knowledge of the SUs, which is stored in the database. We assume a circular PER centered at the primary receiver (PR) and derive its optimal radius using stochastic geometry. For each type of SU knowledge stored in the database, we evaluate the optimal PER radius for a target probability at which the PU suffers harmful interference. The results show that more detailed knowledge of the SU density and transmission powers leads to a smaller updated PER radius. Hence, a more efficient spatial reuse of the licensed spectrum is achieved.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114541943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient CGA algorithm against DoS attack on Duplicate Address Detection process 重复地址检测过程中抗DoS攻击的有效CGA算法
2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 1900-01-01 DOI: 10.1109/WCNCW.2016.7552745
Cui Zhang, Jinbo Xiong, Qiong Wu
{"title":"An efficient CGA algorithm against DoS attack on Duplicate Address Detection process","authors":"Cui Zhang, Jinbo Xiong, Qiong Wu","doi":"10.1109/WCNCW.2016.7552745","DOIUrl":"https://doi.org/10.1109/WCNCW.2016.7552745","url":null,"abstract":"Neighbor Discovery Protocol (NDP) is significant in mobile network, which enables mobile node randomly access to foreign network by Stateless Link Address Autoconfiguration (SLAAC). However, the NDP initially offers no protection mechanism and is prone to address spoofing and Denial of Service (DoS). Secure Neighbor Discovery Protocol (SeNDP) is proposed to solve these NDP threats. Recently there are many solutions presented in SeNDP which relies on special IPv6 addresses named Cryptographically Generated Address (CGA). But there is little work to defend DoS attack on Duplicate Address Detection (DAD). In our paper, we focus on the problems of CGA and propose a novel time-based monitoring DoS attack. The conventional DoS defense mechanisms are realized by monitoring the packet rating and observing connection delay to analyze various DoS attack. Hence, we adopt a delay as an indication to distinct the DoS attack. We set a timer to control the address generation for monitoring abnormal attack to protect each address configuration. In addition, we adopt SHA-224 hash function instead of SHA-1 to improve the security of address generation. Considering the computation overhead, we decrease the hash matching factor from 16 bits to 8 bits. We develop our scheme using the Network Simulator (NS2) and the OpenSSL library. Finally, experiment results prove our scheme can provide more efficient IP generation. Compared with the CGA algorithm in SeNDP, our time consumption decreases to 10%. From the view of defense attack, our scheme can control DoS attack.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User-centric network selection in multi-RAT systems 多rat系统中以用户为中心的网络选择
2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 1900-01-01 DOI: 10.1109/WCNC.2016.7564653
Alaa Awad, Amr M. Mohamed, C. Chiasserini
{"title":"User-centric network selection in multi-RAT systems","authors":"Alaa Awad, Amr M. Mohamed, C. Chiasserini","doi":"10.1109/WCNC.2016.7564653","DOIUrl":"https://doi.org/10.1109/WCNC.2016.7564653","url":null,"abstract":"Rising numbers of mobile devices and wireless access technologies motivate network operators to leverage spectrum across multiple radio access networks, in order to significantly enhance quality of service as well as network capacity. However, there is a substantial need to develop innovative network selection mechanisms that consider energy efficiency while meeting application quality requirements. In this context, this paper proposes an efficient network selection mechanism over heterogeneous wireless networks. We consider different performance aspects, as well as network characteristics and application requirements, so as to obtain an efficient solution that grasps the conflicting nature of the various objectives and addresses this ultimate tradeoff. The proposed methodology advocates a user-centric approach toward the utilization of heterogeneous wireless networks to enhance system performance and support reliable connectivity.","PeriodicalId":436094,"journal":{"name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信