scispace - formally typeset
Search or ask a question

Showing papers in "IEICE Transactions on Communications in 2010"


Journal ArticleDOI
TL;DR: The proposed mechanism sets the sleep period according to traffic conditions, which greatly improves the power saving effect, and the validity of the proposed mechanism is confirmed by numerical simulations.
Abstract: This paper proposes a power saving mechanism with variable sleep period to reduce the power consumed by optical network units (ONUs) in passive optical network (PON) systems. In the PON systems based on time division multiplexing (TDM), sleep and periodic wake-up (SPW) control is an effective ONU power saving technique. However, the effectiveness of SPW control is fully realized only if the sleep period changes in accordance with the traffic conditions. This paper proposes an SPW control mechanism with variable sleep period. The proposed mechanism sets the sleep period according to traffic conditions, which greatly improves the power saving effect. In addition, the protocols needed between an optical line terminal (OLT) and ONUs are described on the assumption that the proposed mechanism is applied to 10 Gigabit (10G) class PON systems, i.e. IEEE 802.3av 10G-EPON and FSAN/ITU-T 10G-PON systems. The validity of the proposed mechanism is confirmed by numerical simulations.

74 citations


Journal ArticleDOI
TL;DR: This paper presents the Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation (HIMALIS) architecture for the New Generation Network, which includes a new naming scheme for generating host names and IDs and uses such information to manage network dynamism and heterogeneity in network layer protocols.
Abstract: The current Internet is not capable of meeting the future communication requirements of society, i.e., reliable connectivity in a ubiquitous networking environment. The shortcomings of the Internet are due to the lack of support for mobility, multihoming, security and heterogeneous network layer protocols in the original design. Therefore, to provide ubiquitous networking facilities to the society for future innovation, we have to redesign the future Internet, which we call the New Generation Network. In this paper, we present the Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation (HIMALIS) architecture for the New Generation Network. The HIMALIS architecture includes a new naming scheme for generating host names and IDs. It also includes a logical control network to store and distribute bindings between host names, IDs, locators and other information useful for providing support for network operation and control. The architecture uses such information to manage network dynamism (i.e., mobility, multihoming) and heterogeneity in network layer protocols. We verify the basic functions of the architecture by implementing and testing them using a testbed system.

63 citations


Journal ArticleDOI
TL;DR: The simulation results show that QLAODV can efficiently handle unicast applications in VANETs and is favored by its dynamic route change mechanism, which makes it capable of reacting quickly to network topology changes.
Abstract: In Vehicular Ad hoc Networks (VANETs), general purpose ad hoc routing protocols such as AODV cannot work efficiently due to the frequent changes in network topology caused by vehicle movement. This paper proposes a VANET routing protocol QLAODV (Q-Learning AODV) which suits unicast applications in high mobility scenarios. QLAODV is a distributed reinforcement learning routing protocol, which uses a Q-Learning algorithm to infer network state information and uses unicast control packets to check the path availability in a real time manner in order to allow Q-Learning to work efficiently in a highly dynamic network environment. QLAODV is favored by its dynamic route change mechanism, which makes it capable of reacting quickly to network topology changes. We present an analysis of the performance of QLAODV by simulation using different mobility models. The simulation results show that QLAODV can efficiently handle unicast applications in VANETs.

53 citations


Journal ArticleDOI
TL;DR: This paper states its strong belief in that the future network should adopt a form of a meta-architecture that accommodates multiple competing multiple architectures, and to identify challenges to achieving this architecture.
Abstract: Network virtualization has become a common research topic that many researchers consider a basis for defining a new generation network architectures. In this paper, we attempt to clarify the concept of network virtualization with its brief history, to introduce the benefit of network virtualization for the future network, to posit our strong belief in that the future network should adopt a form of a meta-architecture that accommodates multiple competing multiple architectures, and to identify challenges to achieving this architecture.

52 citations


Journal ArticleDOI
TL;DR: The design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites and can investigate malicious web Sites comprehensively and support countermeasures is introduced.
Abstract: Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, and a clarification of their methods and countermeasures is urgently needed. In this paper, we introduce the design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites. On the basis of the problems of existing client honeypots, we enumerate the requirements of a client honeypot: 1) detection accuracy and variety, 2) collection variety, 3) performance efficiency, and 4) safety and stability. We improve our system with regard to these requirements. The key features of our developed system are stepwise detection focusing on exploit phases, multiple crawler processing, tracking of malware distribution networks, and malware infection prevention. Our evaluation of our developed system in a laboratory experiment and field experiment indicated that its detection variety and crawling performance are higher than those of existing client honeypots. In addition, our system is able to collect information for countermeasures and is secure and stable for continuous operation. We conclude that our system can investigate malicious web sites comprehensively and support countermeasures.

49 citations


Journal ArticleDOI
TL;DR: The experimental results confirm that the RMS loaded MPAs achieve high-gain as well as bandwidth improvement.
Abstract: Bandwidth and gain enhancement of microstrip patch antennas (MPAs) is proposed using reflective metasurface (RMS) as a superstrate. Two different types of the RMS, namely- the double split-ring resonator (DSR) and double closed-ring resonator (DCR) are separately investigated. The two antenna prototypes were manufactured, measured and compared. The experimental results confirm that the RMS loaded MPAs achieve high-gain as well as bandwidth improvement. The desinged antenna using the RMS as a superstrate has a high-gain of over 9.0dBi and a wide impedance bandwidth of over 13%. The RMS is also utilized to achieve a thin antenna with a cavity height of 6 mm, which is equivalent to λ/21 at the center frequency of 2.45GHz. At the same time, the cross polarization level and front-to-back ratio of these antennas are also examined.

47 citations


Journal ArticleDOI
TL;DR: This paper extends the theoretical deduction of optimal hop number and proposes the Hop-based Energy Aware Routing (HEAR) algorithm which is totally distributed and localized and can reduce the average energy consumption about 10 times compared to the direct transmission algorithm and 2 to 10 times than other algorithms under various network topologies.
Abstract: Energy efficient routing is one of the key design issues to prolong the lifetime of wireless sensor networks (WSNs) since sensor nodes can not be easily re-charged once they are deployed. During routing process, the routes with only few hops or with too many hops are not energy efficient. Hop-based routing algorithms can largely improve the energy efficiency of multi-hop routing in WSNs because they can determine the optimal hop number as well as the corresponding intermediate nodes during multi-hop routing process under medium or high density network. In this paper, we not only focus on studying the relationship between energy consumption and hop number from theoretical point of view but also provide a practical selection criterion of the sub-optimal hop number under practical sensor network so as to minimize the energy consumption. We extend the theoretical deduction of optimal hop number and propose our Hop-based Energy Aware Routing (HEAR) algorithm which is totally distributed and localized. Simulation results show that our HEAR algorithm can reduce the average energy consumption about 10 times compared to the direct transmission algorithm and 2 to 10 times than other algorithms like LEACH and HEED under various network topologies.

41 citations


Journal ArticleDOI
TL;DR: Simulation and analytical results demonstrate that the proposed preamble design with ICI cancellation method outperforms the conventional one in term of channel estimation accuracy in OFDM/OQAM system.
Abstract: In conventional preamble based channel estimation in OFDM/offset QAM (OFDM/OQAM) system, both the even index subcarriers and the odd index subcarriers are with identical value selected from {±1} respectively to avoid inter-carrier interference (ICI), if and only if channel frequency response in neighbor few subcarriers remain invariable. However, it requires larger coherent bandwidth. In this paper, we propose an effective preamble design with ICI cancellation for channel estimation in OFDM/OQAM system. With this structure, we only utilize even (or odd) index of subcarriers as reference signal to avoid ICI, and then the channel information of remaining subcarriers can be estimated by the interpolation approach. Based on the sampling theorem, the mean square error (MSE) performance of the proposed preamble design is analyzed, where channel estimation performance is same for all subcarriers. Simulation and analytical results demonstrate that the proposed preamble design with ICI cancellation method outperforms the conventional one in term of channel estimation accuracy in OFDM/OQAM system.

38 citations


Journal ArticleDOI
TL;DR: A positioning estimation scheme, namely Switching Estimated Receiver Position (SwERP) yields high accuracy even with wide FOV configuration and defines two words to justify the characteristic of the proposed system, which are Field-of-View Limit and Sensitivity Limit.
Abstract: The authors focus on the improvement of Visible Light Communication Identification (VLID) system that provides positioning information via LED light bulb, which is a part of Visible Light Communication (VLC) system. The conventional VLID system provides very low positioning estimation accuracy at room level. In our approach, neither additional infrastructure nor modification is required on the transmitter side. On the receiver side, 6-axis sensor is embedded to provide 3-axis of Azimuth and 3-axis of Tilt angulations information to perform positioning estimation. We verify the proposed system characteristics by making both empirical and numerical analysis, to confirm the effectiveness of proposed system. We define two words to justify the characteristic of the proposed system, which are Field-of-View (FOV: ψc) Limit and Sensitivity (RXS) Limit. Both FOV and Sensitivity Limits have crucial impact on positioning estimation accuracy. Intuitively, higher positioning accuracy can be achieved with smaller FOV configuration in any system that has FOV. Conversely, based on system characteristics of VLID, we propose a positioning estimation scheme, namely Switching Estimated Receiver Position (SwERP) yields high accuracy even with wide FOV configuration. Cumulative Distribution Function (CDF) of error distance and Root Mean Square of Error Distance (RMSED) between experimental positions and estimated receiver positions are used to indicate the system performance. We collected 440 samples from 3 receivers' FOV configurations altogether 1320 samples within the experimental area of 1200mm × 5000mm × 2050mm. The results show that with the proposed scheme, the achievable RMSEDs are in the range of 298 and 463mm under different FOV configurations, which attained the maximum accuracy improvement over 80% comparing to the one without positioning estimation scheme. The proposed system's achievable accuracy does not depend on transmitters' orientation; only one transmitter is required to perform positioning estimation.

35 citations


Journal ArticleDOI
TL;DR: It could be concluded that OFDM AF relaying systems may switch from the BTB SCP to BTW SCP in order to achieve optimum BER performance, using the derived end-to-end SNR probability density functions.
Abstract: We perform error probability analysis of the uncoded OFDM fixed gain Amplify-and-Forward (AF) relaying system with subcarrier permutation (SCP). Two SCP schemes, named: the best-to-best SCP (BTB SCP) and the best-to-worst SCP (BTW SCP) are considered. Closed-form expressions for the bit error rate (BER) of the above SCP methods are derived. Numerical results manifest that these SCP schemes may outperform one another, depending on the average channel conditions of the links involved. That is, BTB SCP is better at low signal-to-noise ratio (SNR) values, while BTW SCP prevails in the medium and high SNR regime. Thus, it could be concluded that OFDM AF relaying systems may switch from the BTB SCP to BTW SCP in order to achieve optimum BER performance. Moreover, using the derived end-to-end SNR probability density functions (PDF), tight upper bounds for the ergodic capacities of both SCP schemes are obtained.

33 citations


Journal ArticleDOI
TL;DR: In this article, a new technique for electromagnetic immunity modeling of integrated circuits (ICs), compliant with industrial requirements and valid up to 3 GHz, is introduced, which makes it possible to predict the conducted immunity of an IC according to a given criterion, whatever its external environment.
Abstract: This paper introduces a new technique for electromagnetic immunity modeling of integrated circuits (ICs), compliant with industrial requirements and valid up to 3 GHz. A specific modeling flow is introduced, which makes it possible to predict the conducted immunity of an IC according to a given criterion, whatever its external environment. This methodology was validated through measurements performed on several devices.

Journal ArticleDOI
TL;DR: The main hypothesis is that the Future Internet must be designed for the environment of applications and transport media of the 21st century, vastly different from the initial Internet's life space.
Abstract: In this paper, we describe several approaches to address the challenges of the network of the future. Our main hypothesis is that the Future Internet must be designed for the environment of applications and transport media of the 21st century, vastly different from the initial Internet's life space. One major requirement is the inherent support for mobile and wireless usage. A Future Internet should allow for the fast creation of diverse network designs and paradigms and must also support their co-existence at run-time. We detail the technical and business scenarios that lead the development in the EU FP7 4WARD project towards a framework for the Future Internet.

Journal ArticleDOI
TL;DR: An indoor positioning and communication platform using Fluorescent Light Communication employing a newly developed nine-channel receiver is proposed, and a new location estimation method using FLC is discussed that involves a simulation model and coordinate calculation formulae.
Abstract: The need for efficient movement and precise location of robots in intelligent robot control systems within complex buildings is becoming increasingly important. This paper proposes an indoor positioning and communication platform using Fluorescent Light Communication (FLC) employing a newly developed nine-channel receiver, and discusses a new location estimation method using FLC, that involves a simulation model and coordinate calculation formulae. A series of experiments is performed. Distance errors of less than 25cm are achieved. The enhanced FLC system yields benefits such as greater precision and ease of use.

Journal ArticleDOI
TL;DR: This protocol operates based on the Time Division Multiple Access slot assignments and the power control mechanism, which can improve the QoS provision and network throughput.
Abstract: In this letter, we propose a Throughput-aimed MAC Protocol with Quality of Service (QoS) provision (T-MAC) for cognitive Ad Hoc networks. This protocol operates based on the Time Division Multiple Access (TDMA) slot assignments and the power control mechanism, which can improve the QoS provision and network throughput. Our simulation results show that the T-MAC protocol can efficiently increase the network throughput and reduce the access delay.


Journal ArticleDOI
TL;DR: Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.
Abstract: With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

Journal ArticleDOI
TL;DR: This paper addresses closed-loop cooperative transmit beamforming using multiple base stations grouped into a wireless distributed network (WDN), which is denoted as coordinated multi-point joint transmission in the 3GPP LTE-Advanced standardization.
Abstract: SUMMARY Todays cellular systems reach their limits for data rate due to the continuously increasing amount of subscribers using wireless service for business purposes or in leisure time (smartphone effect). Thus, recent research focuses on concepts for interference management for cellular OFDMA systems. This paper addresses various techniques related to this topic, while considering the concepts with lowest complexity and backhaul costs as promising candidates to be applied first. Starting from interference canceling receivers over multi-user MIMO using fixed precoding to multicell interference estimation, which improves the precision of link adaptation, we discuss closed-loop cooperative transmit beamforming using multiple base stations grouped into a wireless distributed network (WDN), which is denoted as coordinated multi-point joint transmission in the 3GPP LTE-Advanced standardization. It is obvious, the more sophisticated these techniques are, the higher the demands for feedback and backhaul become. Performance results are provided by employing multi-cell simulations according to recommendations from 3GPP. In addition, feasibility of coordinated multi-point joint transmission is demonstrated in a real-time prototype setup, i.e. in the Berlin LTE-Advance Testbed.

Journal ArticleDOI
TL;DR: To cope with the bandwidth narrowing effects due to long line effects associated with the series fed operation, authors have introduced partially corporate feed embedded in the single layer waveguide.
Abstract: Design of high gain and high efficiency antennas is one of the key challenges in antenna engineering and especially in millimeter wave communication systems. Various types of planar waveguide arrays with series-fed traveling wave operation have been developed in Tokyo Tech with the special focus upon efficiency enhancement as well as reduction of fabrication cost. In this review, four kinds of single layer waveguide arrays characterized with the series fed travelling wave operation are surveyed first. To cope with the bandwidth narrowing effects due to long line effects associated with the series fed operation, authors have introduced partially corporate feed embedded in the single layer waveguide. They further extended the study to cover fully corporate feed arrays with multiple layer waveguide as well; a new fabrication technique of diffusion bonding of laminated thin plates has the potential to realize the low cost mass production of multi-layer structures for the millimeter wave application. Secondly, the novel methods for loss evaluation of copper plate substrate are established for the design of post-wall waveguide arrays where dielectric loss and conductor loss is determined in wide range of millimeter wave band, by using the Whispering gallery mode resonator. This enables us to design the planar arrays with the loss taken into account. Finally, the planar arrays are now applied to two kinds of systems in the Tokyo Tech millimeter wave project; the indoor short range file-transfer systems and the outdoor communication systems for the medium range backhaul links. The latter has been field-tested in the model network built in Tokyo Tech Ookayama campus. Early stage progress of the project including unique propagation data is also reported.

Journal ArticleDOI
TL;DR: A novel modeling methodology that is based on the physics-based equivalent circuit model will be introduced, and an example of multiple layer PCB circuits will be modeled and validated with good accuracy and the trade/offs of all these structures will be discussed.
Abstract: Noise coupling on the power distribution networks (PDN) or between PDN and signal traces is becoming one of the main challenges in designing above GHz high-speed digital circuits. Developing an efficient and accurate modeling method is essential to understand the noise coupling mechanism and then solve the problem afterwards. In addition, development of new noise mitigation technology is also important for future high-speed circuit systems. In this invited paper, a novel modeling methodology that is based on the physics-based equivalent circuit model will be introduced, and an example of multiple layer PCB circuits will be modeled and validated with good accuracy. Based on the periodic structure concept, several new electromagnetic bandgap structures (EBG), such as coplanar EBG, photonic crystal power layer (PCPL), and ground surface perturbation lattice (GSPL), will be introduced for the mitigation of power/ground noise. The trade/offs of all these structures will be discussed.

Journal ArticleDOI
TL;DR: This paper assesses the effect of transmission methods on QoE at Multi-View Video and Audio IP transmission in which multiple servers transmit the data to a user, and finds that the requested viewpoint transmission method and the all viewpoints at the requested server transmission method achieve higherQoE than theall viewpoints at all the servers transmission method.
Abstract: SUMMARY In this paper, we discuss QoE (Quality of Experience) requirements for MVV (Multi-View Video) and audio transmission over IP networks and study the effect of the playout buffering time, contents and viewpoint change interfaces on the QoE and user’s behavior Unlike previous works, which mainly discuss MVV transmission from aspects of video codecs, we study MVV and audio transmission under various IP traffi ca nd delay conditions by experiment We compare two schemes: a scheme that the user watches from a single viewpoint and the one that he/she can choose one viewpoint from many ones As a result, we show that the users prefer the scheme where they can choose one viewpoint from many ones We have found that when using proper buffering time, the users feel faster viewpoint changes; it improves their satisfaction compared to that when they watch on a single viewpoint We have also noticed that the user pays more attention to the degradation of the video when watching on a single viewpoint We have observed that the users tend to change the viewpoint more frequently in light traffic and low delay

Journal ArticleDOI
TL;DR: A novel feeding technique is proposed to feed a printed rectangular ring patch antenna that attains high gain in two bands simultaneously and exhibits good impedance bandwidths satisfying ISM 2.45/5.8 GHz achieving maximum gain of 9.56 dBi.
Abstract: In this paper, a novel feeding technique is proposed to feed a printed rectangular ring patch antenna that attains high gain in two bands simultaneously. The prototype antenna exhibits good impedance bandwidths satisfying ISM 2.45/5.8 GHz achieving maximum gain of 9.56 and 10.17 dBi, respectively, with a stable radiation pattern.

Journal ArticleDOI
TL;DR: The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks, which can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.
Abstract: In wireless sensor networks, adversaries can easily launch application layer attacks, such as false data injection attacks and false vote insertion attacks. False data injection attacks may drain energy resources and waste real world response efforts. False vote insertion attacks would prevent reporting of important information on the field. In order to minimize the damage from such attacks, several prevention based solutions have been proposed by researchers, but may be inefficient in normal condition due to their overhead. Thus, they should be activated upon detection of such attacks. Existing detection based solutions, however, does not address application layer attacks. This paper presents a scheme to adaptively counter false data injection attacks and false vote insertion attacks in sensor networks. The proposed scheme consists of two sub-units: one used to detect the security attacks and the other used to select efficient countermeasures against the attacks. Countermeasures are activated upon detection of the security attacks, with the consideration of the current network status and the attacks. Such adaptive countering approach can conserve energy resources especially in normal condition and provide reliability against false vote insertion attacks.

Journal ArticleDOI
TL;DR: This work presents a statistical model for the radiated susceptibility (RS) of an unshielded twisted-wire pair running above ground, illuminated by a random electromagnetic field.
Abstract: This work presents a statistical model for the radiated susceptibility (RS) of an unshielded twisted-wire pair (TWP) running above ground, illuminated by a random electromagnetic field. The incident field is modeled as a superposition of elemental plane waves with random angular density, phase, and polarization. The statistical properties of both the differential-mode (DM) and the common-mode (CM) noise voltages induced across the terminal loads are derived and discussed.

Journal ArticleDOI
TL;DR: This paper proposes and analyzes a cooperative transmission method, called Cooperative-Aided Skipping multi-Hop protocol (CASH), for multi-hop wireless networks with Rayleigh fading environments, and verifies the results of the theoretical analysis with theresults of simulations.
Abstract: Cooperative transmission protocols attract a great deal of attention in recent years as an efficient way to increase the capacity of multi-hop wireless networks in fading environments. In this paper, we propose and analyze a cooperative transmission method, called Cooperative-Aided Skipping multi-Hop protocol (CASH), for multi-hop wireless networks with Rayleigh fading environments. For performance evaluation, we compare and verify the results of the theoretical analysis with the results of simulations.

Journal ArticleDOI
TL;DR: This paper expresses a propagation process of the distributed MIMO repeater system with amplify-and-forward method by the numerical formular, and optimize the position of each repeater to obtain an upper bound of the channel capacity.
Abstract: Multiple-input multiple-output (MIMO) repeater systems have been discussed in several published papers. When a repeater has only one antenna element, the propagation environment is called keyhole. In this kind of scenario the achievable channel capacity and link quality are decreased. Another limit is when the number of the antenna elements of a repeater is larger than that of a MIMO transceiver, the channel capacity cannot be increased. In this paper, in order to obtain an upper bound of the channel capacity, we express a propagation process of the distributed MIMO repeater system with amplify-and-forward method by the numerical formular, and optimize the position of each repeater.

Journal ArticleDOI
TL;DR: The National Institute of Information and Communications Technology (NICT) vision and five network targets of research and development (R&D) of the NeW-Generation Network (NWGN) are presented in this letter.
Abstract: The National Institute of Information and Communications Technology (NICT) vision and five network targets of research and development (R&D) of the NeW-Generation Network (NWGN) are presented in this letter. The NWGN is based on new design concepts that look beyond the next generation network (NGN). The NWGN will maintain the sustainability of our prosperous civilization and help resolve various social issues and problems by using information and communication technologies (ICTs). NICT's vision for NWGN is also presented in this letter. Based on this vision, 19 items concerning social issues and future social outlook are analyzed, and the functional requirements of the NWGN are extracted. The requirements are refined and categorized into five network targets that must be developed for realizing the vision.

Journal ArticleDOI
TL;DR: In order to provide transmission flexibility for various applications, the dynamic CFP allocation and opportunity period is presented and the proposed protocol achieves improved throughput and latency in WBAN environment compared with IEEE 802.15.4.
Abstract: WBANs provide communication services in the vicinity of the human body. Since WBANs utilize both MICS frequency band for implant medical applications and ISM frequency band for medical and consumer electronics (CE) applications, MAC protocols in WBAN should be designed considering flexibility between medical and CE applications. In this letter, we identify the requirements of WBAN MAC protocols and propose a WBAN MAC protocol which satisfies the requirements. In order to provide transmission flexibility for various applications, we present the dynamic CFP allocation and opportunity period. Extensive simulation results show that the proposed protocol achieves improved throughput and latency in WBAN environment compared with IEEE 802.15.4.

Journal ArticleDOI
TL;DR: A novel approach is proposed for miniaturizing the unit cell size of electromagnetic bandgap (EBG) structures that suppress power plane noise by introducing open stubs into the shunt circuits of these EBG structures.
Abstract: A novel approach is proposed for miniaturizing the unit cell size of electromagnetic bandgap (EBG) structures that suppress power plane noise. In this approach, open stubs are introduced into the shunt circuits of these EBG structures. Since the stub length determines the resonant frequencies of the shunt circuit, the proposed structures can maintain the bandgaps at lower frequencies without increasing the unit cell size. The bandgap frequencies were estimated by dispersion analysis based on the Bloch theorem and full-wave simulations. Sample boards of the proposed EBG structures were fabricated with a unit cell size of 2.1mm. Highly suppressed noise propagation over the estimated frequency range of 1.9-3.6GHz including the 2.4-GHz wireless-LAN band was experimentally demonstrated.

Journal ArticleDOI
TL;DR: This paper proposes a novel secure wake- up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers.
Abstract: Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

Journal ArticleDOI
TL;DR: This paper presents an anomaly detection method that uses a pattern recognition technique to identify anomalies in pictures representing traffic, which is able to detect attacks involving mice flows and is evaluated by analyzing six years of Internet traffic collected from a trans-Pacific link.
Abstract: The number of threats on the Internet is rapidly increasing, and anomaly detection has become of increasing importance. High-speed backbone traffic is particularly degraded, but their analysis is a complicated task due to the amount of data, the lack of payload data, the asymmetric routing and the use of sampling techniques. Most anomaly detection schemes focus on the statistical properties of network traffic and highlight anomalous traffic through their singularities. In this paper, we concentrate on unusual traffic distributions, which are easily identifiable in temporal-spatial space (e.g., time/address or port). We present an anomaly detection method that uses a pattern recognition technique to identify anomalies in pictures representing traffic. The main advantage of this method is its ability to detect attacks involving mice flows. We evaluate the parameter set and the effectiveness of this approach by analyzing six years of Internet traffic collected from a trans-Pacific link. We show several examples of detected anomalies and compare our results with those of two other methods. The comparison indicates that the only anomalies detected by the pattern-recognition-based method are mainly malicious traffic with a few packets.