无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940853
A. Sahana, I. S. Misra
{"title":"Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis","authors":"A. Sahana, I. S. Misra","doi":"10.1109/WIRELESSVITAE.2011.5940853","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940853","url":null,"abstract":"Application of Wireless sensor network (WSN) is increasing in a rapid speed. As sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that security concern be addressed from the beginning of the system. But sensor networks also introduce severe resource constraints due to their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor network. There has to be some compromise between the security and the energy. Asymmetric protocol like RSA has not been implemented due to high power constrain and for memory issue. In this paper, we have shown that RSA can be implemented for sensor in an efficient manner by using optimized computation. We have simulated the protocol in NS2.34 platform. The energy requirement gives an optimistic result quite similar to symmetric protocol energy requirement for sensor.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82860042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940908
S. Hald, J. Pedersen, N. Prasad, R. Prasad
{"title":"A novel model for security evaluation for compliance","authors":"S. Hald, J. Pedersen, N. Prasad, R. Prasad","doi":"10.1109/WIRELESSVITAE.2011.5940908","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940908","url":null,"abstract":"With the increasing focus on security in information systems, it is becoming necessary to be able to describe and compare security attributes for different technologies. Existing are well-described and comprehensive, but expensive and resource demanding to apply. The Security Evaluation for Compliance (SEC) model offers a lightweight alternative for use by decision makers to get a quick overview of the security attributes of different technologies for easy comparison and requirement compliance evaluation. The scientific contribution is this new approach to security modelling as well as a comparison with existing methods.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84809167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940858
A. Furuskar, J. Rao, Mats Blomgren, P. Skillermark
{"title":"LTE and HSPA for fixed wireless broadband: Datarates, coverage, and capacity in an Indian rural scenario","authors":"A. Furuskar, J. Rao, Mats Blomgren, P. Skillermark","doi":"10.1109/WIRELESSVITAE.2011.5940858","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940858","url":null,"abstract":"Fixed wireless systems are candidate solutions to connect billions of users not yet connected to the Internet. In this paper the capabilities of HSPA and LTE fixed wireless systems in terms of coverage, datarates, and capacity are discussed and evaluated. Results indicate that in an Indian rural scenario with an inter-site distance of 40km, monthly data volumes of 200MB per user together with a cell-edge datarate of 5Mbps are supported by HSPA on 10MHz (downlink, 1×2). For LTE monthly volumes of 430MB per user are reached in both downlink and uplink, together with cell-edge datarates of 5Mbps in downlink and 2Mbps in uplink. A key enabler is the use of directional rooftop terminal antennas.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78038594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940825
Basak Oztas, F. Alagoz
{"title":"A modified gossip algorithm for clustered ad hoc networks","authors":"Basak Oztas, F. Alagoz","doi":"10.1109/WIRELESSVITAE.2011.5940825","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940825","url":null,"abstract":"Gossip based algorithms, which constitute an important group among many other techniques for broadcasting in ad hoc networks, are inefficient on clustered networks. There is a trade off between the total load on the network and guaranteed delivery on the cluster connecting nodes. This paper introduces a modified gossip algorithm for broadcasting in clustered ad hoc networks. Additionally, a novel graph generation method for creating clustered networks is proposed for the simulations.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75605777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940889
P. di Nardo, M. Minieri
{"title":"Governing stem cell fate through inert materials","authors":"P. di Nardo, M. Minieri","doi":"10.1109/WIRELESSVITAE.2011.5940889","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940889","url":null,"abstract":"A decade of intensive research has not produced consistent results able to allow a safe and cost-effective use of stem cells in the clinical setting. Among the different causes, the vision that the stem cell rejuvenating potential could overwhelm all the other biological cues has demonstrated to be very weak. Instead, it is now clear that stem cell fate is governed by a complex array of multi-parametric signals whose symmetry is fundamental to confine stem sells in a determined state. The modulation of the level of symmetry along the time-scale drives stem cells towards a specific phenotype. Attempts at reproducing in vitro this mechanism has demonstrated that scaffolds made of inert materials but endowed with appropriate topology and physical characteristics can release signals sensed as biologically relevant by stem cells. Exploiting this concept could allow to reproduce in vitro the physiological conditions usually governing cell fate in order to achieve a more complete control of stem cell differentiation for clinical applications.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73332367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940926
P. Tripathi, A. Chandra
{"title":"Radio spectrum monitoring for cognitive radio","authors":"P. Tripathi, A. Chandra","doi":"10.1109/WIRELESSVITAE.2011.5940926","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940926","url":null,"abstract":"It is commonly believed that there is a crisis of spectrum availability due to tremendous growth in the wireless based services and evolution of new radio communication technologies. In fact, there are many areas of the radio spectrum which are not fully utilized. Cognitive radio (CR) has been proposed to enhance utilization of spectrum in opportunistic manner. The first and most important requirement for deployment of CR technology is identification of primary user, which is not an easy job. A spectrum user data bank is need to be established for identification of primary users. This paper provides an overview of spectrum monitoring requirement for maintaining of database for deployment of cognitive radio technology based services.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74466783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940817
A. Yamakita, Akira Kamiyama, Yuichiro Goto, F. Maehara
{"title":"Simple series from formula of BER performance for M-ary QAM/OFDM signals with MRC diversity reception over nonlinear fading channels","authors":"A. Yamakita, Akira Kamiyama, Yuichiro Goto, F. Maehara","doi":"10.1109/WIRELESSVITAE.2011.5940817","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940817","url":null,"abstract":"This paper proposes the theoretical derivation method of the bit error rate (BER) for M-ary QAM/OFDM signals using maximal ratio combining (MRC) reception under nonlinear fading channels. Since the BER performance especially in the presence of nonlinear fading channels is mostly obtained by time-consuming computer simulations, we provide the simple analytical tool in order to prevent its computational cost. The feature of the proposed formula is to be represented by the simple series form formula without any integral calculation and to be applicable to arbitrary modulation schemes. The validity of the proposed approach is confirmed by the agreement with the computer simulation results under various kinds of system parameters such as the input back-off (IBO) and the number of branches.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90688131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940883
Jin-Woo Jung, Wensi Wang, M. A. Ingram
{"title":"Cooperative transmission range extension for duty cycle-limited wireless sensor networks","authors":"Jin-Woo Jung, Wensi Wang, M. A. Ingram","doi":"10.1109/WIRELESSVITAE.2011.5940883","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940883","url":null,"abstract":"In this paper, we discuss how cooperative transmission (CT) can provide better services and/or lower the initial cost compared to non-CT in wireless sensor networks. To see the performance of CT and non-CT in both battery operated and energy harvesting networks, we look at the duty cycle instead of the energy and convert the conventional non-CT and CT routing protocols to their duty cycle versions. We calculate the duty cycle limit, which is used as a performance bound in our network simulation, based on a building management application. Through the network simulation, we show that when CT is used appropriately, it allows more sensor nodes to be supported by a single gateway node, thereby lowering initial cost, and it can provide more frequent data gathering.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86147395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940917
I. Oluwafemi, S. Mneney
{"title":"Performance of super-orthogonal space-time trellis codes over Nakagami fading channels","authors":"I. Oluwafemi, S. Mneney","doi":"10.1109/WIRELESSVITAE.2011.5940917","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940917","url":null,"abstract":"Super-orthogonal space-time trellis codes (SOSTTC) have recently been proposed as an efficient method to provide both diversity and coding gain for wireless communications. In this paper, the performance of SOSTTC over Nakagami fading channel is investigated. Simulation results with various fading parameter shows that the SOSTTCs designed for Rayleigh fading channels based on the rank, minimum determinant and trace criterion, are also suitable for Nakagami fading channels.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/WIRELESSVITAE.2011.5940917","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72402775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
无线互联科技Pub Date : 2011-07-05DOI: 10.1109/WIRELESSVITAE.2011.5940925
Irfan Siddavatm
{"title":"Mapping of cognitive radio as intelligent agent architecture","authors":"Irfan Siddavatm","doi":"10.1109/WIRELESSVITAE.2011.5940925","DOIUrl":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940925","url":null,"abstract":"Next generation wireless communication look forward for intelligent access for communication. This intelligence is incorporated through intelligent agent for telecommunication. Cognitive radio is one of such approach for being intelligent agent for communication. Intelligence in reference to cognitive radio is to acquire knowledge about environment and apply it to take decision. Software defined radio which is proposed to handles radio function through software adapts cognitive radio as key candidate for intelligent agent for wireless communication system. Artificial intelligent approaches are applied to implementation of cognitive radio network architecture. In this paper we map basic agent terminology of artificial intelligence to cognitive radio architecture.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74124467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}