无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940856
Abhijit Das, S. Basu, A. Chaudhuri
{"title":"A novel security scheme for wireless adhoc network","authors":"Abhijit Das, S. Basu, A. Chaudhuri","doi":"10.1109/WIRELESSVITAE.2011.5940856","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940856","url":null,"abstract":"Wireless adhoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless adhoc environment is an important concern. In this paper we propose to use shared cryptography to secure message communication in adhoc network. In this approach we divide any information into multiple shares and transmit the different shares via multiple disjoint paths between any pair of communicating nodes and if possible at different point of time. At the receiving end the original information is reconstructed by combining the shares received via different paths at different point of time. We have also proposed to keep redundancy in the number of shares to withstand loss of some shares due to loss in transmission or security attacks. Compared to other available schemes, it has minimal computational complexity. That makes it more effective in energy saving distributed environment where battery driven low end processors are used and security is also a major challenge.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"68 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73413209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940890
C. Makaya, A. Dutta, S. Das, D. Chee, F. Lin, S. Komorita, H. Yokota, H. Schulzrinne
{"title":"Service continuity support in self-organizing IMS networks","authors":"C. Makaya, A. Dutta, S. Das, D. Chee, F. Lin, S. Komorita, H. Yokota, H. Schulzrinne","doi":"10.1109/WIRELESSVITAE.2011.5940890","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940890","url":null,"abstract":"With the increasing interest in deploying 4G/LTE networks, IMS has a potential to be deployed in a wide scale in order to support mobile Internet and value-added services over next-generation networks. Moreover, the effort to create an operator-controlled signaling infrastructure using IP-based protocols has resulted in a large number of functional components and interactions between core networks elements. Thus, the carriers are trying to explore alternative ways to deploy IMS that will allow them to manage their network in a cost effective manner while offering rich communications services. One of such approaches is self-organization of IMS (SOIMS). The self-organizing IMS can enable the IMS functional components to adapt dynamically based on the features like network load, number of users, node failures and available system resources. This paper proposes different mechanisms to handle self-organizing IMS with usage of load balancing paradigm. The proposed solution enables topology hiding, IMS nodes failure recovery, session continuity support, and IMS scalability.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"38 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79102205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940918
PadmaPriya Praveen Kumar, Rengarajan Amirtharajan, K. Thenmozhi, J. Rayappan
{"title":"Steg-OFDM blend for highly secure multi-user communication","authors":"PadmaPriya Praveen Kumar, Rengarajan Amirtharajan, K. Thenmozhi, J. Rayappan","doi":"10.1109/WIRELESSVITAE.2011.5940918","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940918","url":null,"abstract":"Gone are the days when machines were the world's \"prime movers\". Today, the \"prime mover\" of the world is information, particularly, secret information. It is also a commodity whose value perishes with time. This dual-quality of power and perish-ability makes information to be the wealth, most difficult to protect on the earth. Nevertheless, in order to protect the secret information, technology has given us methods which provide security, though not a fool-proof one. Steganography is one such method which incorporates security by hiding the very existence of the secret by camouflaging it inside an image. In addition to the enormous security provided by the steganographic algorithms, if we implement some security in the very methodology of transmission and reception of an image, it would prove to be an useful venture. Such an useful venture is proposed in this paper, where four different users can transmit secret messages through a single stego image by taking advantage of the OFDM-QPSK(Orthogonal Frequency Division Multiplexing-Quadrature Phase Shift Keying) duo, thereby imparting multiple-access and improving security in an otherwise normal stego image. Comparison of BER in AWGN and Random Noise channel has also been done in order to quantify the effectiveness of the proposed technique.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82808789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940833
Masoud Mohebbi Nia, T. Rahman
{"title":"High altitude platform system(HAPS) and co-existence with fixed satellite service(FSS) in frequency range 5850–7075 MHz","authors":"Masoud Mohebbi Nia, T. Rahman","doi":"10.1109/WIRELESSVITAE.2011.5940833","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940833","url":null,"abstract":"HAPS has cropped up as a neoteric technology in the wireless communications field in recent years. The straightforwardness with which HAPS gets along with a telephone network service provider or the Internet, has made it to a unique feature of future wireless networks. Most HAPS' criteria have been well circumscribed by the International Telecommunication Union (ITU) or subscribed to in World Radiocommunication Conferences (WRCs). This procedure will prolong to function the various frequency ranges in future, most notably in WRC-12. To curb and clarify assessment probe, it should be explicated that FSS links are sited in C-Band frequency range to condense overwhelming conceivable propagation attenuation attributable to disproportionate rain amount in tropical and subtropical regions. Consequently, FSS uplink is ranged between 5925 and 6725 MHz. Where as, HAPS gateway links' frequency range is delineated between 5850 and 7075 MHz. Hence, FSS uplink intervenes with HAPS frequency range partially. Accordingly, HAPS spectrum sharing with FSS uplink in the Frequency range 5850–7075 MHz is appraised at this juncture. HAPS spectrum implementing in alluded frequency range instigates interference renowned as Co-Channel Interference (CCI). CCI reckoning is based upon Spectrum Emission Masks (SEM), Antennas' Radiation Pattern and Clutter Loss. The co-channel frequency deployment prospects are delved at this article.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78675787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940929
Takuto Arai, Yunhan Wang, N. Kamiya, F. Maehara
{"title":"Nonlinear suppression scheme employing transmit power control for MIMO-OFDM systems","authors":"Takuto Arai, Yunhan Wang, N. Kamiya, F. Maehara","doi":"10.1109/WIRELESSVITAE.2011.5940929","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940929","url":null,"abstract":"This paper proposes a deterministic nonlinear distortion suppression scheme employing transmit power control for MIMO-OFDM systems. The feature of the proposed scheme is to suppress the nonlinear distortion by adjusting the transmit power level of each transmit antenna to be the maximum signal-to-noise-plus-distortion ratio (SNDR) and to perform MIMO signal detection using the appropriate transmit power levels notified to the receiver. In the proposed scheme, since the transmit power tends to be lowered to satisfy the maximum theoretical SNDR, the transmit power as well as the bit error rate (BER) can be fortunately reduced in comparison with the traditional constant power transmission scheme, which consequently leads to alleviating the out-of-band radiation. The effectiveness of the proposed scheme is demonstrated compared with the traditional scheme with constant transmit power by means of computer simulations.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"87 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81226331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940861
G. Auer, V. Giannini, M. Olsson, Manuel J. González, C. Desset
{"title":"Framework for energy efficiency analysis of wireless networks","authors":"G. Auer, V. Giannini, M. Olsson, Manuel J. González, C. Desset","doi":"10.1109/WIRELESSVITAE.2011.5940861","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940861","url":null,"abstract":"In order to quantify the energy savings in wireless networks, the power consumption of the entire system needs to be captured and an appropriate energy efficiency evaluation framework must be defined. In this paper, the necessary enhancements over existing performance evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising component, node and network level contributions can be quantified. This includes a sophisticated power model for various base station (BS) types, which maps the RF output power radiated at the antenna elements to the total supply power of a BS site. The proposed evaluation framework is applied to quantify the energy efficiency of the downlink of a 3GPP LTE radio access network.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"17 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87293278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940919
Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit
{"title":"A jamming defending data-forwarding scheme for delay sensitive applications in WSN","authors":"Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit","doi":"10.1109/WIRELESSVITAE.2011.5940919","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940919","url":null,"abstract":"Wireless sensor network (WSN) has emerged as an important application area where nodes are generally placed in an unattended environment and therefore are vulnerable to attack by adversaries. Moreover in real time application domains delay even by fraction of a second may deceive the purpose of the application. Therefore, designing an attack-defending scheme for WSN without involving any additional delay in data-forwarding is an important challenge in this domain. The present work proposes a data-forwarding scheme having no additional delay to defend jamming attack in WSN. The scheme considers a multilayer architecture where the layers are made up of hexagonal cells each containing sensor nodes in the form of clusters. The nodes are randomly deployed throughout the network and clusters are formed so that every cell hosts two sets of clusters operating in two different predefined frequencies. We have provided design guideline to determine cell size in terms of network parameters. This guideline ensures that for a cluster head there is at least another cluster head at one-hop distance towards the sink and thereby ensures data-forwarding in shortest path. During data-forwarding, if a frequency is jammed, the cluster operating in that frequency becomes inoperative and the other cluster acts as back-up. We claim that the scheme defends jamming attack without incurring any additional delay and the claim is substantiated through simulation.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"52 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84672537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940880
Valentin Andrei, E. Popovici, O. Fratu, S. Halunga, Mihai Gavrilescu
{"title":"Considerations over implementing IEEE 802.21 on a device powered by a mobile operating system","authors":"Valentin Andrei, E. Popovici, O. Fratu, S. Halunga, Mihai Gavrilescu","doi":"10.1109/WIRELESSVITAE.2011.5940880","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940880","url":null,"abstract":"During the last years, software applications performing scenarios related to vertical handovers were revealed. However, the great majority of these demonstrators were designed and optimized for multimode notebooks, having a fair amount of processing power. This article aims to describe on how to implement and optimize the main components of the IEEE 802.21 standard on a device like a smartphone powered by a mobile operating system. Performance evaluations were made in this purpose showing reasonable delays, taking us one step closer to achieving a seamless vertical handover on a mobile terminal.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"18 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84424494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940820
P. Seethalakshmi, M. Gomathi, G. Rajendran
{"title":"Path selection in wireless Mobile Ad Hoc Network using fuzzy and rough set theory","authors":"P. Seethalakshmi, M. Gomathi, G. Rajendran","doi":"10.1109/WIRELESSVITAE.2011.5940820","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940820","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes that dynamically forms a network. Many routing protocols exist to find the shortest path using various resources. A novel approach based on fuzzy and rough set theory is described in this work for the selection of effective routing paths using minimum number of resources. This paper shows the rough set technique that can be employed to generate simple rules and to remove irrelevant attributes (resources) for evaluating the best routing paths. An example is also given to illustrate the efficiency of the proposed method.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85574305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940905
K. Kagoshima, S. Obote, A. Kagaya, K. Nishimura, N. Endo
{"title":"An array antenna for MIMO systems with a decoupling network using bridge susceptances","authors":"K. Kagoshima, S. Obote, A. Kagaya, K. Nishimura, N. Endo","doi":"10.1109/WIRELESSVITAE.2011.5940905","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940905","url":null,"abstract":"Decoupling and matching feeding networks are considerably interested in small wireless terminals to enhance their abilities for MIMO systems. In various proposals of DMFN's, the feeding networks composed of bridge susceptances and transmission lines are simple. However, this DMFN has only been applied to the limited array with special characteristics. This paper presents general design formulas of the DMFN for the two elements and three elements arrays and fundamental numerical data are presented to assure the validity of the design formulas.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90359979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}