The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, due to the popularity and convenience of wireless communications, people communicate with others by using mobile phones almost every day, as one of their important daily activities. Currently, LTE-4G is the mainstream of mobile communication. Recent studies on the upcoming LTE-5G wireless environments employ AES to protect delivered messages. However, using this cryptography standard to encrypt/decrypt...
A self-optimization function called mobility robustness optimization (MRO) is to gradually find-tune the handover configuration parameters by analyzing handover history. It is expected that the smart antenna can help the MRO function to further decrease the number of radio link failures. However, current MRO function does not take smart antenna into consideration. This paper proposes an enhanced MRO...
In this paper, we propose the wireless shopping scheme, called the Secure Mobile Shopping System (SMoSS for short), which is a secure and convenient wireless shopping environment, and in which we can safely create and perform our credit-card transaction by coordinating the cash flow of a trading system and credit card entities, without requiring additional restrictions and resources on the cash flow...
In broadband wireless technology, due to having many salient advantages, such as high data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one of the trends of wireless system development. This system provides several sophisticated authentication and encryption techniques to enhance its system security. However, LTE-A still suffers from various attacks, like...
Noncoherent pulse-position modulation (PPM) with simple channel codes has the potential to realize ultra-low power (ULP) wireless design. In this paper, we develop a Wagnerlike decoding rule for single-parity-check and high-rate Reed-Solomon (RS) coded PPM schemes by simply ‘flipping’ the most unreliable received PPM symbol(s) to obtain a good balance between performance and coding complexity. The...
In this paper, we propose a novel security scheme, called the security system with RSA and Diffie-Hellman algorithms for a 4G environment (Se4GE for short), which as an LTE-based system integrates the RSA and Diffie-Hellman algorithms to solve some of the security drawbacks of current 4G broadband wireless transmission. The Se4GE is an end-to-end ciphertext transfer mechanism which dynamically changes...
In recent years, LTE (Long Term Evolution) has been one of the mainstreams of current wireless communication systems. But when its HSS authenticates UEs, the random number RAND generated by HSS for creating other keys during its delivery from HSS to UE is unencrypted. Also, many parameters are generated by invoking a function with only one input key, thus very easily to be cracked. So in this paper,...
In a wireless system, the L2 and L3 often have their own individual security mechanisms used to authenticate users and system entities, and protect delivered keys and messages. When a mobile device hands over from one BS to another, the handover latency is usually one of the key factors affecting wireless service QoS. However, a strict security scheme often requires a longer handover delay. Also,...
In this paper, we propose a new symmetric key exchange system, named the Wireless Security System with Data Connection Core (WiSDC for short), which can not only verify whether a user is a legitimate one or not, but also produce internally used parameters, named internal keys, and speed up the key exchange process for a wireless session as well. Moreover, the WiSDC adopts a pseudo random number generator,...
The wide range of wireless body area network (WBAN) applications gives rise to different system requirements for the carrier frequencies and data rates. In order to accommodate various standards in WBAN applications, a universal receiver system with good performance and low power is highly desirable. The subsampling receiver architecture is one of the promising receiver architectures that might fulfill...
Rapid developments of energy harvesting in the past decade have significantly increased the efficiency of devices in converting ambient free energy into usable electrical energy, thus offering opportunities to design energy autonomous systems nowadays. To achieve such energy autonomous systems, a good understanding of the harvesting capability from the source side strongly motivates the design of...
The main bottleneck to achieve energy autonomy in body area networks (BAN) is the design of an ultra low power yet reliable wireless system. In this paper, we first demonstrate the feasibility of an ultra low power receiver by presenting our implemented receiver chip that could operate on a total power of 479.5 uW, which is more than one order of magnitude lower than commercially available low power...
The world is approaching a crisis: unprecedented population aging, rising chronic disease, and escalating health care cost. This calls for a new health care paradigm that embraces the wireless technologies. However, the integration of wireless technologies, such as IEEE 802.15.4 based ZigBee and IEEE 802.11b based Wireless Local Area Network (WLAN) in the wearable health monitoring system is aggravated...
The increasing number of sensors deployed in cars calls for new design approaches in intra-vehicle electronic control unit (ECU) networks. ZigBee wireless sensor networks are seen as a good candidate technology, since they can provide high-performance short-range communication with low power consumption, as well as mesh networking capabilities. One of the main questions to answer before adoption of...
In this paper, we proposed a new scheme of cooperative relaying scheme base on orthogonal superposition modulation and soft demodulation which is similar with multiuser detection. The new scheme can be considered as a different way to achieve a similar purpose with superposition modulation [6]. We optimized the parameter in order to achieve the best performance. Simulation results show that our new...
The IEEE 802.1 le standard allows an admission control (AC) criteria based on medium time calculation for contention-based wireless access. In this standard, medium time is derived from minimum physical layer (PHY) rate and static surplus bandwidth allocation (SBA) parameters. However, a pessimistic minimum PHY rate and fixed SBA would result in channel underutilization. Therefore, we propose an efficient...
Historically, speed is the main concern of wireless communication. However the need for low power has become increasingly important as wireless networking technologies become pervasive on the mobile platform. Thinner, lighter and sophisticated mobile handheld devices continue to grow as we move into the era of "anytime anywhere" computing. The main idea of this paper is to provide useful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.