The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a no reference hybrid video-quality-estimation model for estimating video quality by using quality features derived from received packet headers and video signals. Our model is useful as a quality monitoring tool for estimating the video quality during use of an Internet protocol television service. It takes into account video quality dependence on video content and can estimate video quality...
Mobile location estimation via the use of a spatially-dependent signal database is of growing importance. However, this location estimation method usually requires an a priori experimental measurement campaign. To overcome this drawback we propose here a new method of location estimation via the real-time creation of a virtual signal database. The virtual database is created on-demand by an optimized...
The Voice over IP (VoIP) application utilizes the Internet to provide voice service; thus it is susceptible to various security issues common on the IP networks, such as the flooding attack. Moreover, VoIP uses the Session Initiation Protocol (SIP) for session control and management. The transactional nature of SIP makes flooding attack an even severer threat, which can consequentially lead to denial...
Frequently appeared sensor faults greatly reduce the usability and reliability of sensor networks. Distributed automatous faulty sensor detection is critical for self-managed and sustainable sensor networks. A number of detection methods have been proposed for specific fault types. In this paper, we propose a general approach for detecting arbitrary types of faults. The approach includes a new general...
A detailed characterization of interference power statistics in CDMA systems is of considerable practical and theoretical interest. Such a characterization for uplink inter-cell interference has been difficult because of transmit power control, randomness in the number of interfering mobile stations, and randomness in their locations. We develop a new method to model the uplink inter-cell interference...
The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for fingerprints may either be too weak to offer enough security or suffer from the performance limitations. In this paper, a new fuzzy cryptographic technique without use of chaff data, Randomized Dissolvent Template (RDT), is proposed...
Fingerprinting localization techniques provide reliable location estimates and enable the development of location aware applications especially for indoor environments, where satellite based positioning is infeasible. In our approach we utilize received signal strength (RSS) fingerprints collected in known locations and employ a radial basis function (RBF) neural network to approximate the function...
We propose a method for detecting Distributed Denial of Service (DDoS) traffic in real-time inside the network. For this purpose, we borrow the concepts of Moving Average Convergence Divergence, Rate of Change, and Relative Strength Index, which are used for technical analysis in the stock market. Due to the fact that the method is based on a quantitative, rather than a heuristic, detection level,...
To make a mobile sensor network allow better coverage of its sensable area, each mobile sensor node needs to recognize the locations of other nodes in a set of coordinates autonomously generated and shared in the network. To uniquely determine the location of a node on a plane, at least three pivot nodes should be selected from all nodes in the network and the scheme of selecting pivot nodes affects...
Developing algorithms to detect anomalies in network traffic is an important goal to achieve secure and efficient operation of the Internet. To evaluate different algorithms, it is crucial to have a set of standardized test cases. We propose a benchmark suite called "AnomBench" that consists of sixteen different traffic scenarios that contain various different traffic anomalies. We describe...
The paper presents results from a field trial of the adaptive enhanced cell ID (AECID) fingerprinting positioning method that has been implemented by Ericsson AB for the GSM cellular system. The algorithm exploits own and neighbor cell global identities (CGIs), measured timing advance (TA) and quantized signal strength measurements to derive the radio fingerprint. The algorithm operates by collection...
In this paper, we study the anonymous cardinality estimation problem in radio frequency identification (RFID) systems. To preserve privacy and anonymity, each tag only transmits a portion of its ID to the reader when it is being queried. To achieve complete system coverage and increase the accuracy of measurement, multiple readers with overlapping interrogation zones are deployed. The cardinality...
Locating hosts with large connection degree is very important for monitoring anomalous network traffics. The in-degree (out-degree), defined as the number of distinct sources (destinations) that a network host is connected with (connects) during a given time interval. Due to massive amount of data in high speed network traffics and limit on processing capability, it is difficult to accurately locate...
Available bandwidth in important performance criterion for performance. In this paper, we propose a new algorithm called Single Burst (SB) for measuring the available bandwidth between end hosts. Additionally, we provide mathematical analysis to derive approximate upper bounds on amount of exchanged data and measurement latency for SB. Finally, we present a comparison of measurement latency, accuracy,...
Based on the requirements of low energy consumption and high bandwidth efficiency, a primary area of study is how to improve the estimation accuracy and tracking performance for target localization in wireless sensor networks. In this paper, we propose a weighted sign algorithm (WSA) for positioning and tracking in wireless sensor networks. In terms of the reliability of distance estimation, the location...
One of the most common and important applications of wireless sensor networks is target tracking. We study it in its most basic form, assuming the binary sensing model in which each sensor can return only information regarding target's presence or absence within its sensing range. However, unlike most of traditional approaches to binary sensing, we allow sensors to recognize not only target's range...
Classifying network traffic is very challenging and is still an issue yet to be solved due to the increase of new applications and traffic encryption. In this paper, we propose a novel hybrid approach for the network flow classification, in which we first apply the payload signature based classifier to identify the flow applications and unknown flows are then identified by a decision tree based classifier...
The combination of wideband transmission and cooperative techniques enables high-precision location-awareness. Wideband transmission provides fine delay resolution and multipath resolvability, while cooperation among nodes can yield significant performance benefit in harsh or infrastructure-limited environments. In this paper, we propose to exploit the geometric relationship inherent in multipath...
This paper develops highly accurate numerical techniques for evaluating the mgf/ chf of a single lognormal variable and for computing the lognormal sum cdf. Complex integration techniques based on the steepest-descent integration are thus developed for evaluating the lognormal mgf/ chf. The saddlepoint of the integrand is explicitly expressed using the Lambert-W function. The optimal steepest-descent...
This paper describes an effective method for vehicle positioning estimation for range-based wireless network. The problem of locating a mobile terminal has received significant attention in the field of wireless communications. Time of arrival (TOA), received signal strength (RSS), time difference of arrival (TDOA) and angle-of-arrival (AOA) are commonly used measurements for estimating the position...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.