无线互联科技最新文献

筛选
英文 中文
A novel security scheme for wireless adhoc network 一种新的无线自组网安全方案
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940856
Abhijit Das, S. Basu, A. Chaudhuri
{"title":"A novel security scheme for wireless adhoc network","authors":"Abhijit Das, S. Basu, A. Chaudhuri","doi":"10.1109/WIRELESSVITAE.2011.5940856","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940856","url":null,"abstract":"Wireless adhoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless adhoc environment is an important concern. In this paper we propose to use shared cryptography to secure message communication in adhoc network. In this approach we divide any information into multiple shares and transmit the different shares via multiple disjoint paths between any pair of communicating nodes and if possible at different point of time. At the receiving end the original information is reconstructed by combining the shares received via different paths at different point of time. We have also proposed to keep redundancy in the number of shares to withstand loss of some shares due to loss in transmission or security attacks. Compared to other available schemes, it has minimal computational complexity. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"68 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73413209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Service continuity support in self-organizing IMS networks 自组织IMS网络中的服务连续性支持
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940890
C. Makaya, A. Dutta, S. Das, D. Chee, F. Lin, S. Komorita, H. Yokota, H. Schulzrinne
{"title":"Service continuity support in self-organizing IMS networks","authors":"C. Makaya, A. Dutta, S. Das, D. Chee, F. Lin, S. Komorita, H. Yokota, H. Schulzrinne","doi":"10.1109/WIRELESSVITAE.2011.5940890","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940890","url":null,"abstract":"With the increasing interest in deploying 4G/LTE networks, IMS has a potential to be deployed in a wide scale in order to support mobile Internet and value-added services over next-generation networks. Moreover, the effort to create an operator-controlled signaling infrastructure using IP-based protocols has resulted in a large number of functional components and interactions between core networks elements. Thus, the carriers are trying to explore alternative ways to deploy IMS that will allow them to manage their network in a cost effective manner while offering rich communications services. One of such approaches is self-organization of IMS (SOIMS). The self-organizing IMS can enable the IMS functional components to adapt dynamically based on the features like network load, number of users, node failures and available system resources. This paper proposes different mechanisms to handle self-organizing IMS with usage of load balancing paradigm. The proposed solution enables topology hiding, IMS nodes failure recovery, session continuity support, and IMS scalability.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"38 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79102205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Steg-OFDM blend for highly secure multi-user communication 用于高度安全的多用户通信的Steg-OFDM混合
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940918
PadmaPriya Praveen Kumar, Rengarajan Amirtharajan, K. Thenmozhi, J. Rayappan
{"title":"Steg-OFDM blend for highly secure multi-user communication","authors":"PadmaPriya Praveen Kumar, Rengarajan Amirtharajan, K. Thenmozhi, J. Rayappan","doi":"10.1109/WIRELESSVITAE.2011.5940918","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940918","url":null,"abstract":"Gone are the days when machines were the world's \"prime movers\". Today, the \"prime mover\" of the world is information, particularly, secret information. It is also a commodity whose value perishes with time. This dual-quality of power and perish-ability makes information to be the wealth, most difficult to protect on the earth. Nevertheless, in order to protect the secret information, technology has given us methods which provide security, though not a fool-proof one. Steganography is one such method which incorporates security by hiding the very existence of the secret by camouflaging it inside an image. In addition to the enormous security provided by the steganographic algorithms, if we implement some security in the very methodology of transmission and reception of an image, it would prove to be an useful venture. Such an useful venture is proposed in this paper, where four different users can transmit secret messages through a single stego image by taking advantage of the OFDM-QPSK(Orthogonal Frequency Division Multiplexing-Quadrature Phase Shift Keying) duo, thereby imparting multiple-access and improving security in an otherwise normal stego image. Comparison of BER in AWGN and Random Noise channel has also been done in order to quantify the effectiveness of the proposed technique.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82808789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
High altitude platform system(HAPS) and co-existence with fixed satellite service(FSS) in frequency range 5850–7075 MHz 高空平台系统(HAPS)和在5850-7075 MHz频率范围内与固定卫星业务(FSS)共存
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940833
Masoud Mohebbi Nia, T. Rahman
{"title":"High altitude platform system(HAPS) and co-existence with fixed satellite service(FSS) in frequency range 5850–7075 MHz","authors":"Masoud Mohebbi Nia, T. Rahman","doi":"10.1109/WIRELESSVITAE.2011.5940833","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940833","url":null,"abstract":"HAPS has cropped up as a neoteric technology in the wireless communications field in recent years. The straightforwardness with which HAPS gets along with a telephone network service provider or the Internet, has made it to a unique feature of future wireless networks. Most HAPS' criteria have been well circumscribed by the International Telecommunication Union (ITU) or subscribed to in World Radiocommunication Conferences (WRCs). This procedure will prolong to function the various frequency ranges in future, most notably in WRC-12. To curb and clarify assessment probe, it should be explicated that FSS links are sited in C-Band frequency range to condense overwhelming conceivable propagation attenuation attributable to disproportionate rain amount in tropical and subtropical regions. Consequently, FSS uplink is ranged between 5925 and 6725 MHz. Where as, HAPS gateway links' frequency range is delineated between 5850 and 7075 MHz. Hence, FSS uplink intervenes with HAPS frequency range partially. Accordingly, HAPS spectrum sharing with FSS uplink in the Frequency range 5850–7075 MHz is appraised at this juncture. HAPS spectrum implementing in alluded frequency range instigates interference renowned as Co-Channel Interference (CCI). CCI reckoning is based upon Spectrum Emission Masks (SEM), Antennas' Radiation Pattern and Clutter Loss. The co-channel frequency deployment prospects are delved at this article.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78675787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Nonlinear suppression scheme employing transmit power control for MIMO-OFDM systems 基于发射功率控制的MIMO-OFDM系统非线性抑制方案
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940929
Takuto Arai, Yunhan Wang, N. Kamiya, F. Maehara
{"title":"Nonlinear suppression scheme employing transmit power control for MIMO-OFDM systems","authors":"Takuto Arai, Yunhan Wang, N. Kamiya, F. Maehara","doi":"10.1109/WIRELESSVITAE.2011.5940929","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940929","url":null,"abstract":"This paper proposes a deterministic nonlinear distortion suppression scheme employing transmit power control for MIMO-OFDM systems. The feature of the proposed scheme is to suppress the nonlinear distortion by adjusting the transmit power level of each transmit antenna to be the maximum signal-to-noise-plus-distortion ratio (SNDR) and to perform MIMO signal detection using the appropriate transmit power levels notified to the receiver. In the proposed scheme, since the transmit power tends to be lowered to satisfy the maximum theoretical SNDR, the transmit power as well as the bit error rate (BER) can be fortunately reduced in comparison with the traditional constant power transmission scheme, which consequently leads to alleviating the out-of-band radiation. The effectiveness of the proposed scheme is demonstrated compared with the traditional scheme with constant transmit power by means of computer simulations.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"87 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81226331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for energy efficiency analysis of wireless networks 无线网络能源效率分析框架
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940861
G. Auer, V. Giannini, M. Olsson, Manuel J. González, C. Desset
{"title":"Framework for energy efficiency analysis of wireless networks","authors":"G. Auer, V. Giannini, M. Olsson, Manuel J. González, C. Desset","doi":"10.1109/WIRELESSVITAE.2011.5940861","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940861","url":null,"abstract":"In order to quantify the energy savings in wireless networks, the power consumption of the entire system needs to be captured and an appropriate energy efficiency evaluation framework must be defined. In this paper, the necessary enhancements over existing performance evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising component, node and network level contributions can be quantified. This includes a sophisticated power model for various base station (BS) types, which maps the RF output power radiated at the antenna elements to the total supply power of a BS site. The proposed evaluation framework is applied to quantify the energy efficiency of the downlink of a 3GPP LTE radio access network.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87293278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A jamming defending data-forwarding scheme for delay sensitive applications in WSN 无线传感器网络中时延敏感应用的抗干扰数据转发方案
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940919
Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit
{"title":"A jamming defending data-forwarding scheme for delay sensitive applications in WSN","authors":"Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit","doi":"10.1109/WIRELESSVITAE.2011.5940919","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940919","url":null,"abstract":"Wireless sensor network (WSN) has emerged as an important application area where nodes are generally placed in an unattended environment and therefore are vulnerable to attack by adversaries. Moreover in real time application domains delay even by fraction of a second may deceive the purpose of the application. Therefore, designing an attack-defending scheme for WSN without involving any additional delay in data-forwarding is an important challenge in this domain. The present work proposes a data-forwarding scheme having no additional delay to defend jamming attack in WSN. The scheme considers a multilayer architecture where the layers are made up of hexagonal cells each containing sensor nodes in the form of clusters. The nodes are randomly deployed throughout the network and clusters are formed so that every cell hosts two sets of clusters operating in two different predefined frequencies. We have provided design guideline to determine cell size in terms of network parameters. This guideline ensures that for a cluster head there is at least another cluster head at one-hop distance towards the sink and thereby ensures data-forwarding in shortest path. During data-forwarding, if a frequency is jammed, the cluster operating in that frequency becomes inoperative and the other cluster acts as back-up. We claim that the scheme defends jamming attack without incurring any additional delay and the claim is substantiated through simulation.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"52 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84672537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Considerations over implementing IEEE 802.21 on a device powered by a mobile operating system 在移动操作系统驱动的设备上实现IEEE 802.21的考虑
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940880
Valentin Andrei, E. Popovici, O. Fratu, S. Halunga, Mihai Gavrilescu
{"title":"Considerations over implementing IEEE 802.21 on a device powered by a mobile operating system","authors":"Valentin Andrei, E. Popovici, O. Fratu, S. Halunga, Mihai Gavrilescu","doi":"10.1109/WIRELESSVITAE.2011.5940880","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940880","url":null,"abstract":"During the last years, software applications performing scenarios related to vertical handovers were revealed. However, the great majority of these demonstrators were designed and optimized for multimode notebooks, having a fair amount of processing power. This article aims to describe on how to implement and optimize the main components of the IEEE 802.21 standard on a device like a smartphone powered by a mobile operating system. Performance evaluations were made in this purpose showing reasonable delays, taking us one step closer to achieving a seamless vertical handover on a mobile terminal.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"18 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84424494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Path selection in wireless Mobile Ad Hoc Network using fuzzy and rough set theory 基于模糊和粗糙集理论的无线移动自组网路径选择
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940820
P. Seethalakshmi, M. Gomathi, G. Rajendran
{"title":"Path selection in wireless Mobile Ad Hoc Network using fuzzy and rough set theory","authors":"P. Seethalakshmi, M. Gomathi, G. Rajendran","doi":"10.1109/WIRELESSVITAE.2011.5940820","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940820","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes that dynamically forms a network. Many routing protocols exist to find the shortest path using various resources. A novel approach based on fuzzy and rough set theory is described in this work for the selection of effective routing paths using minimum number of resources. This paper shows the rough set technique that can be employed to generate simple rules and to remove irrelevant attributes (resources) for evaluating the best routing paths. An example is also given to illustrate the efficiency of the proposed method.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85574305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An array antenna for MIMO systems with a decoupling network using bridge susceptances 一种基于电桥电纳解耦网络的MIMO系统阵列天线
无线互联科技 Pub Date : 2011-07-05 DOI: 10.1109/WIRELESSVITAE.2011.5940905
K. Kagoshima, S. Obote, A. Kagaya, K. Nishimura, N. Endo
{"title":"An array antenna for MIMO systems with a decoupling network using bridge susceptances","authors":"K. Kagoshima, S. Obote, A. Kagaya, K. Nishimura, N. Endo","doi":"10.1109/WIRELESSVITAE.2011.5940905","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940905","url":null,"abstract":"Decoupling and matching feeding networks are considerably interested in small wireless terminals to enhance their abilities for MIMO systems. In various proposals of DMFN's, the feeding networks composed of bridge susceptances and transmission lines are simple. However, this DMFN has only been applied to the limited array with special characteristics. This paper presents general design formulas of the DMFN for the two elements and three elements arrays and fundamental numerical data are presented to assure the validity of the design formulas.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90359979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信