Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirem...Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirement of high sampling rate which leads to complicated signal processing and expensive hardware. In this paper, we present a novel UWB signal sampling method called UWB signal sampling via temporal sparsity (USSTS). Its sampling rate is much lower than Nyquist rate. Moreover, it is implemented in one step and no extra processing unit is needed. Simulation results show that USSTS can not recover the signal precisely, but for the use in localization, the accuracy of TOA estimation is the same as that in traditional methods. Therefore, USSTS gives a novel and effective solution for the use of UWB signals in localization.展开更多
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation...In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.展开更多
As a core technology of Intemet of Things (loT), Wireless Sensor Network (WSN) has become a research hotspot recently. More and more WSNs are being deployed in highly mobile environments. The fast moving sensor no...As a core technology of Intemet of Things (loT), Wireless Sensor Network (WSN) has become a research hotspot recently. More and more WSNs are being deployed in highly mobile environments. The fast moving sensor nodes bring significant challenges for the routing decision. In this paper, we propose an efficient logical location method, and designe a mobility estimating metric and derive a novel Green Mobility Estirmtion- based Routing protocol (G-MER) for WSNs. We also set up a full framework to evaluate its per- formance. Simulation results illustrate that G-MER achieves a fairly better perforrmnce in terrm of broadcast times and link failures than AODV. What's more, it decreases the mean hops by about 0.25 and reduces energy consumption by about 10% during the whole experiment. All the results show that G-MER can be effectively used in fast- moving and limited resource scenarios.展开更多
In order to investigate the enhancement of data privacy by distributing data packets via multiple paths, this paper fommlates a security model and analyzes the privacy problem in mul- tipath scenarios leveraging infor...In order to investigate the enhancement of data privacy by distributing data packets via multiple paths, this paper fommlates a security model and analyzes the privacy problem in mul- tipath scenarios leveraging inforrmtion theoretic concept. Based on proposed model, a privacy function related to the path number is discussed. We heuristically recommend the optin^al path num- ber and analyze the tradeoff among the perform- ance, resource consumption and privacy. For re- ducing the inforlmtion leakage, the data schedule algorithms are also proposed. The analytical model can provide guidelines for the multipath protocol design.展开更多
Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary rece...Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary receivers. Insufficient information of primary users would result in inaccurate spectrum detecting result. To deliver the information of primary users, Receiver Detection Employing Semaphore (ReDES) is proposed in this paper. Primary receiver informs secondary users of its licensed receive frequency according to semaphore architecture directly in ReDES. The semaphore is used to determine the spectrum holes by secondary users. Frequency mapping method is come up with as a realization of ReDES. The procedure and the detailed techniques are illustrated to make ReDES scheme reasonable and feasible. Simulation results show that the proposed scheme can effectively detect the frequencies of primary receivers, and improve the accuracy of spectrum detection.展开更多
Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover man...Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover management architecture containing four modules is proposed and the multihoming technology is adopted to achieve Make-Before-Break vertical handover. Then the paper presents the performance analysis of the architecture and simulation in ns-2. The results substantiate the effi cacy of the architecture in improving the handover performance signifi cantly compared with the traditional Mobile IPv6 (MIPv6) based vertical handover. Besides, we design and implement this handover management architecture in our test-bed. The experimental results in a real network environment show that our proposed architecture can not only support the Make-before-break handover, but also guarantee the scalability because of the modulized design.展开更多
基金supported by National science foundation(No. 60772035): Key technique study on heterogeneous network convergenceDoctoral grant(No.20070004010)s: Study on cross layer design for heterogeneous network convergence+1 种基金National 863 Hi-Tech Projects(No.2007AA01Z277): Pa-rameter design based electromagnetic compatibility study in cognitive radio communication systemNational science foundation(No. 60830001): Wireless communication fundamentals and key techniuqes for high speed rail way control and safety data transmission
文摘Ultra-wide-band (UWB) signals are suitable for localization, since their high time resolution can provide precise time of arrival (TOA) estimation. However, one major challenge in UWB signal processing is the requirement of high sampling rate which leads to complicated signal processing and expensive hardware. In this paper, we present a novel UWB signal sampling method called UWB signal sampling via temporal sparsity (USSTS). Its sampling rate is much lower than Nyquist rate. Moreover, it is implemented in one step and no extra processing unit is needed. Simulation results show that USSTS can not recover the signal precisely, but for the use in localization, the accuracy of TOA estimation is the same as that in traditional methods. Therefore, USSTS gives a novel and effective solution for the use of UWB signals in localization.
基金This work was supported by the National Basic Research Pro-gram of China under Crant No.2007CB311100 Funds of Key Lab of Fujlan Province University Network Security and Cryp- toll1009+3 种基金 the National Science Foundation for Young Scholars of China under Crant No.61001091 Beijing Nature Science Foundation under Crant No. 4122012 "Next-Generation Broad-band Wireless Mobile Communication Network" National Sci-ence and Technology Major Special Issue Funding under Grant No. 2012ZX03002003 Funding Program for Academic tturmn Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of Chi-na.
文摘In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones.
基金This paper was partially supported by the National Natural Science Foundation of China under Crants No. 61003283, No. 61001122 Beijing Natural Science Foundation of China under Crants No. 4102064+2 种基金 the Natural Science Foundation of Jiangsu Province under Crant No. BK2011171 the National High-Tech Research and Development Program of China under Crant No. 2011 AA010701 the Fundamental Research Funds for the Cen- tral Universities under Ccants No. 2011RC0507, No. 2012RO3603.
文摘As a core technology of Intemet of Things (loT), Wireless Sensor Network (WSN) has become a research hotspot recently. More and more WSNs are being deployed in highly mobile environments. The fast moving sensor nodes bring significant challenges for the routing decision. In this paper, we propose an efficient logical location method, and designe a mobility estimating metric and derive a novel Green Mobility Estirmtion- based Routing protocol (G-MER) for WSNs. We also set up a full framework to evaluate its per- formance. Simulation results illustrate that G-MER achieves a fairly better perforrmnce in terrm of broadcast times and link failures than AODV. What's more, it decreases the mean hops by about 0.25 and reduces energy consumption by about 10% during the whole experiment. All the results show that G-MER can be effectively used in fast- moving and limited resource scenarios.
基金This paper was partially supported by the National Basic Re-search Program of China under Grant No. 2007CB307100 the National Natural Science Foundation of China under Crant No 60972010 the Fundamental Research Funds for the Central U- niversities under Grant No. 2011JBM018.
文摘In order to investigate the enhancement of data privacy by distributing data packets via multiple paths, this paper fommlates a security model and analyzes the privacy problem in mul- tipath scenarios leveraging inforrmtion theoretic concept. Based on proposed model, a privacy function related to the path number is discussed. We heuristically recommend the optin^al path num- ber and analyze the tradeoff among the perform- ance, resource consumption and privacy. For re- ducing the inforlmtion leakage, the data schedule algorithms are also proposed. The analytical model can provide guidelines for the multipath protocol design.
基金supported by the National High Technology Research and Development Program of China ("863" Program, No.2009AA01Z242)National Natural Science Foundation of China (60972080)
文摘Interference from secondary users to primary users should be avoided in cognitive radio. However, it is difficult to solve the interference problem if the secondary users cannot get the information of the primary receivers. Insufficient information of primary users would result in inaccurate spectrum detecting result. To deliver the information of primary users, Receiver Detection Employing Semaphore (ReDES) is proposed in this paper. Primary receiver informs secondary users of its licensed receive frequency according to semaphore architecture directly in ReDES. The semaphore is used to determine the spectrum holes by secondary users. Frequency mapping method is come up with as a realization of ReDES. The procedure and the detailed techniques are illustrated to make ReDES scheme reasonable and feasible. Simulation results show that the proposed scheme can effectively detect the frequencies of primary receivers, and improve the accuracy of spectrum detection.
基金supported in part by National Basic Research Program of China ("973 program") under contract No. 2007CB307101National Natural Science Foundation of China under Grant No. 60870015 and No. 60674008
文摘Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover management architecture containing four modules is proposed and the multihoming technology is adopted to achieve Make-Before-Break vertical handover. Then the paper presents the performance analysis of the architecture and simulation in ns-2. The results substantiate the effi cacy of the architecture in improving the handover performance signifi cantly compared with the traditional Mobile IPv6 (MIPv6) based vertical handover. Besides, we design and implement this handover management architecture in our test-bed. The experimental results in a real network environment show that our proposed architecture can not only support the Make-before-break handover, but also guarantee the scalability because of the modulized design.