scispace - formally typeset
Search or ask a question
Conference

International Conference on Advanced Communication Technology 

About: International Conference on Advanced Communication Technology is an academic conference. The conference publishes majorly in the area(s): Computer science & The Internet. Over the lifetime, 5003 publications have been published by the conference receiving 30693 citations.


Papers
More filters
Proceedings ArticleDOI
01 Jan 2017
TL;DR: This work proposes using blockchain to build IoT system, which can control and configure IoT devices and build key management system, and chooses Ethereum because it can manage the system in a more fine-grained way.
Abstract: Since the start of Bitcoin in 2008[1], blockchain technology emerged as the next revolutionary technology. Though blockchain started off as a core technology of Bitcoin, its use cases are expanding to many other areas including finances, Internet of Things (IoT), security and such[2]. Currently, many private and public sectors are diving into the technology[3]. Aside from that, as software and hardware improve, we would see the beginning of IoT. And those IoT devices need to communicate and synchronize with each other. But in situations where more than thousands or tens of thousands of IoT devices connected, we expect that using current model of server-client may have some limitations and issues while in synchronization. So, we propose using blockchain to build IoT system. Using blockchain, we can control and configure IoT devices. We manage keys using RSA public key cryptosystems where public keys are stored in Ethereum and private keys are saved on individual devices. Specifically, we choose Ethereum as our blockchain platform because using its smart contract, we can write our own Turing-complete code to run on top of Ethereum. Thus, we can easily manage configuration of IoT devices and build key management system. Even though we can simply use account as a key management system, which most of blockchain platform supports, we decide to use Ethereum because we can manage the system in a more fine-grained way. For the proof of a concept, we use a few IoT devices instead of a full system of IoT system, which consists of thousands of IoT devices. But in our later study, we would like to build a fully scaled IoT system using blockchain.

735 citations

Proceedings ArticleDOI
22 Apr 2008
TL;DR: This paper introduces CHEF - cluster head election mechanism using fuzzy logic, and proves efficiency of CHEF compared with LEACH using the matlab, showing that CHEF is about 22.7% more efficient than LEACH.
Abstract: In designing the wireless sensor networks, the energy is the most important consideration because the lifetime of the sensor node is limited by the battery of it. To overcome this demerit many research have been done. The clustering is the one of the representative approaches. In the clustering, the cluster heads gather data from nodes, aggregate it and send the information to the base station. In this way, the sensor nodes can reduce communication overheads that may be generated if each sensor node reports sensed data to the base station independently. LEACH is one of the most famous clustering mechanisms. It elects a cluster head based on probability model. This approach may reduce the network lifetime because LEACH does not consider the distribution of sensor nodes and the energy remains of each node. However, using the location and the energy information in the clustering can generate big overheads. In this paper we introduce CHEF - cluster head election mechanism using fuzzy logic. By using fuzzy logic, collecting and calculating overheads can be reduced and finally the lifetime of the sensor networks can be prolonged. To prove efficiency of CHEF, we simulated CHEF compared with LEACH using the matlab. Our simulation results show that CHEF is about 22.7% more efficient than LEACH.

480 citations

Proceedings ArticleDOI
08 May 2006
TL;DR: The security threats are identified, proposed security mechanisms are reviewed and the holistic view of security for ensuring layered and robust security in wireless sensor networks is discussed.
Abstract: Wireless sensor network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future The inclusion of wireless communication technology also incurs various types of security threats The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks We identify the security threats, review proposed security mechanisms for wireless sensor networks We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks

467 citations

Proceedings ArticleDOI
08 May 2006
TL;DR: In this paper, the spectral correlation function is used for spectrum sensing in IEEE 802.22 wireless RAN systems and peak detection in the high SNR environment together with contour figure based unique patterns search method in the low SNR scenario is proposed for the primary user signal detection.
Abstract: In this paper, signal detection methods for spectrum sensing in IEEE 802.22 wireless RAN systems are discussed. As most of the manmade signals can be treated as a cyclostationary random process, the spectral correlation function is effective for the detection of these signals. In WRAN systems, due to the specific detection environment, the computational complexity of the spectral correlation based method is significantly reduced. Peak detection in the high SNR environment together with contour figure based unique patterns search method in the low SNR environment are proposed for the primary user signal detection.

207 citations

Proceedings Article
07 Feb 2010
TL;DR: Simulation results show that proposed interference management scheme in the LTE femtocell systems using Fractional Frequency Reuse enhances total/edge throughputs and reduces the outage probability in overall network, especially for the cell edge users.
Abstract: Recently, Long Term Evolution (LTE) has developed a femtocell for indoor coverage extension. However, interference problem between the femtocell and the macrocell should be solved in advance. In this paper, we propose an interference management scheme in the LTE femtocell systems using Fractional Frequency Reuse (FFR). Under the macrocell allocating frequency band by the FFR, the femtocell chooses sub-bands which are not used in the macrocell sub-area to avoid interference. Simulation results show that proposed scheme enhances total/edge throughputs and reduces the outage probability in overall network, especially for the cell edge users.

203 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
2023113
2022193
202156
2020130
2019143
2018148