Institute for Infocomm Research

Displaying 1-40 of 53 results

  • White Papers // Aug 2013

    Leakage Resilient Proofs of Ownership in Cloud Storage

    Cloud storage service (e.g Dropbox, Skydrive, Google Drive, iCloud, and Amazon S3) is becoming more and more popular in recent years. The volume of personal or business data stored in cloud storage keeps increasing. In face to the challenge of rapidly growing volume of data in cloud, de-duplication technique is...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2013

    Optimality of Separate Network-Channel Coding for Three Messages

    The authors study the optimality of separate network-channel coding (SJNC) for three independent sources on the orthogonal access scheme. By SJNC, they mean that the network coded messages are formed from the binary XOR of the sources' messages, followed by channel encoding which is independent of the network coding. Decoding...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2012

    Distributed Relay Scheduling for Maximizing Lifetime in Clustered Wireless Sensor Networks

    Clustering and relaying techniques are important approaches towards mitigating the problem of finite network lifetime in wireless sensor networks. To this end, given a clustered Wireless Sensor Network (WSN) (with defined cluster heads and their associated clusters) and a given relay node placement, the authors present a distributed service allocation...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2012

    Opportunistic Routing With Adaptive Harvesting-Aware Duty Cycling in Energy Harvesting WSN

    With recent advances, the trend has shifted from battery-powered Wireless Sensor Networks towards ones powered by ambient energy harvesters (WSN-HEAP). In such networks, operability of the node is dependent on the harvesting rate which is usually stochastic in nature. Therefore, it is necessary to devise routing protocols with energy management...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2012

    How Many RF Chains Are Optimal for Large-Scale MIMO Systems When Circuit Power Is Considered?

    Multiple antennas at the transmitter and the receiver can increase the channel capacity significantly. However, this is at the expense of linearly increasing circuit power consumption due to the use of multiple Radio Frequency (RF) chains to support the antennas, which is quite significant for large-scale MIMO systems but is...

    Provided By Institute for Infocomm Research

  • White Papers // Oct 2012

    Green Wireless Communications: A Power Amplifier Perspective

    In this paper, the authors survey two essential and practical characteristics of radio-frequency Power Amplifier (PA), namely, linearity and efficiency. Non-linear amplification yields significant distortion of the transmit signals and strong interference for co-channel users. Imperfect efficiency of the PA causes an overhead of the systems resulting in Energy Efficiency...

    Provided By Institute for Infocomm Research

  • White Papers // Aug 2012

    Leakage-Resilient Client-Side Deduplication of Encrypted Data in Cloud Storage

    Cloud storage service is gaining popularity. To reduce resource consumption in network bandwidth and storage, many cloud storage services including Dropbox and Wuala employs client-side deduplication. That is, when a user tries to upload a file to the server, the server checks whether this particular file is already in the...

    Provided By Institute for Infocomm Research

  • White Papers // Jul 2012

    Joint Network-Channel Code Design for Block Fading Cooperative Multiple Access Channel

    In this paper, the authors consider the half-duplex Cooperative Multiple-Access Channel (CMAC). They seek to design multiple turbo codes to minimize the information outage in the block fading channel. Since, they consider an outage to occur even if the message of one of the sources fails to be decoded successfully,...

    Provided By Institute for Infocomm Research

  • White Papers // Jun 2012

    Enhancing Location Privacy for Electric Vehicles (At The Right Time)

    An electric vehicle is a promising and futuristic automobile propelled by electric motor(s), using electrical energy stored in batteries or another energy storage device. Due to the need of battery recharging, the cars will be required to visit recharging infrastructure very frequently. This may disclose the users' private information, such...

    Provided By Institute for Infocomm Research

  • White Papers // May 2012

    Probabilistic Polling for Multi-Hop Energy Harvesting Wireless Sensor Networks

    In this paper, the authors propose a Medium Access Control protocol (EH-MAC) for multi-hop Energy Harvesting Wireless Sensor Networks (EH-WSNs). In EH-WSNs, the main goal is to match energy consumption with the energy harvesting rate which is different from minimizing energy consumption in battery operated WSNs. Unlike most existing MAC...

    Provided By Institute for Infocomm Research

  • White Papers // May 2012

    Adaptive Opportunistic Routing Protocol for Energy Harvesting Wireless Sensor Networks

    Using Energy Harvesting WSNs (EH-WSNs) are attractive as they can be solely powered by ambient energy sources. Multi-hop routing is important to achieve wide coverage as the transmission range of each node is limited. In this paper, the authors propose an Adaptive Opportunistic Routing (AOR) protocol for multi-hop EH-WSNs that...

    Provided By Institute for Infocomm Research

  • White Papers // May 2012

    Optimal Cooperative Sensing for Sensors Equipped With Multiple Antennas

    This paper considers multi-sensor multi-antenna spectrum sensing. First, it is assumed that all users are able to send their raw data to the fusion center. In this case the global optimal solution is the Likelihood Ratio Test (LRT) using all the raw data. A simple closed-form expression for the LRT...

    Provided By Institute for Infocomm Research

  • White Papers // May 2012

    Relaying Over Multiple Slots With Causal CSI: Optimal Power Allocation for Energy Minimization

    In this paper, the authors employ a relay to assist in transmission from a source to a destination over a fixed number of time slots. They seek to minimize the expected sum transmission energy used by the source and relay, by choosing the transmission power of each node dynamically slot...

    Provided By Institute for Infocomm Research

  • White Papers // May 2012

    A Dynamic Wavelength Resource Allocation Capable Passive Optical Network With Shared Transceivers

    The paper proposes a new PON architecture that applies an Optical Broadcast capable Router (OBR) to route a wavelength to a set of selected PON branches and thus enables the transceivers in the Central Office (CO) to be shared among them. The OBR is built on fiber splitters and switching...

    Provided By Institute for Infocomm Research

  • White Papers // May 2012

    Channel Estimation and Training Design for MIMO-OFDM Two-Way Relay Systems

    Communication based on relaying has been drawn a lot of attentions due to the potentials of extending the communication coverage, enhancing communication qualities. In conventional one-way relay systems, four time slots are needed to accomplish one information exchange process between two users. However, in two-way relay systems, only two time...

    Provided By Institute for Infocomm Research

  • White Papers // Mar 2012

    Cooperative MAC Relaying with Multi-Rate Transmissions and Network Coding

    In this paper, the authors propose a novel scheme that combines both cooperative relaying and network coding for further performance improvement. The proposed scheme considers two challenges of network-coded cooperative MAC operating in a realistic wireless network. First, links in realistic networks inherently operate with different data rates due to...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2012

    Relaying With Deadline Constraint: Energy Minimization With Full Channel State Information

    The authors consider a time-slotted source-relay-destination network where data is to be delivered by a deadline. Their goal is to minimize the sum transmission energy by power allocation for each node and time slot, with knowledge of full Channel State Information (CSI) in the form of the SNRs of all...

    Provided By Institute for Infocomm Research

  • White Papers // Dec 2011

    On Tractability Aspects of Optimal Resource Allocation in OFDMA Systems

    Joint channel and rate allocation with power minimization in Orthogonal Frequency Division Multiple Access (OFDMA) has attracted extensive attention. Most of the research has dealt with the development of sub-optimal but low-complexity algorithms. In this paper, the contributions comprise new insights from revisiting tractability aspects of computing optimum. Previous complexity...

    Provided By Institute for Infocomm Research

  • White Papers // Jul 2011

    A Preliminary Study on Lifetime Maximization in Clustered Wireless Sensor Networks With Energy Harvesting Nodes

    Clustering is used extensively in wireless sensor networks to optimize lifetime. Within clustering, the optimization of Cluster Head (CH) location is critical since CHs consume energy faster and have greater influence on lifetime than Non-Cluster Head (NCH) sensors. Energy Harvesting Wireless Sensor Networks (EH-WSNs) use energy harvesting devices to harvest...

    Provided By Institute for Infocomm Research

  • White Papers // Apr 2011

    Identity-Based Server-Aided Decryption

    Identity-based cryptosystem plays an important role in the modern cryptography world, due to the elimination of the costly certificate. However, all practical identity-based encryption schemes require pairing operation in the decryption stage. Pairing is a heavy mathematical algorithm, especially for resource-constrained devices such as smart cards or wireless sensors. In...

    Provided By Institute for Infocomm Research

  • White Papers // Apr 2011

    Opportunistic XOR Network Coding for Multihop Data Delivery in Underwater Acoustic Networks

    This paper proposes XOR-BiDO, a Data Delivery Scheme (DDS) suited for multi-hop underwater acoustic networks characterized by regular bidirectional traffic streams. DDSs for multi-hop underwater networks usually assume a single-sink configuration, where most of the transmissions flow in a single direction. Throughput performance decreases and fairness suffers when such DDSs...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2011

    AES Variants Secure Against Related-Key Differential and Boomerang Attacks

    In this paper, the authors summarize the recent related-key differential and boomerang attacks on AES by Biryukov et al. and present a framework for protection against these attacks. Then they study an alter-native AES key schedule proposed by May et al. at ACISP 2002 as a possible candidate to protect...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2011

    Short and Efficient Certificate-Based Signature

    In this paper, the authors propose a short and efficient Certificate-Based Signature (CBS) scheme. Certificate-based cryptography proposed by entry combines the merit of traditional Public Key cryptography (PKI) and identity based cryptography, without use of the costly certificate chain verification process and the removal of key escrow security concern. Under...

    Provided By Institute for Infocomm Research

  • White Papers // Jan 2011

    Failure of a Mix Network

    A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantages in security and efficiency are compromised. The analysis in this paper illustrates that although the first two failures may be mixed by modifying the shuffling protocol, the last one is too serious to x at...

    Provided By Institute for Infocomm Research

  • White Papers // Dec 2010

    On Two-Way Communications for Cooperative Multiple Source Pairs Through a Multi-Antenna Relay

    The authors study Amplified-and-Forward (AF)-based Two-Way Relaying (TWR) with multiple source pairs, which are exchanging information through the relay. Each source has single antenna and the relay has multi-antenna. The optimal beamforming matrix structure that achieves maximum Signal-to-Interference-plus-Noise Ratio (SINR) for TWR with multiple source pairs is derived. They then...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2010

    On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes

    In response to calling for versatile security services, more and more public key cryptographic algorithms are being implemented on small devices. However, one of the big challenges one has to face in implementing public key cryptographic algorithms on small devices, is the resource constraints prevailing in such devices. Consequently, designing...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2010

    A Survey of Techniques and Challenges in Underwater Localization

    Underwater Wireless Sensor Networks (UWSNs) are expected to support a variety of civilian and military applications. Sensed data can only be interpreted meaningfully when referenced to the location of the sensor, making localization an important problem. While Global Positioning System (GPS) receivers are commonly used in terrestrial WSNs to achieve...

    Provided By Institute for Infocomm Research

  • White Papers // Oct 2010

    A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments

    Recently, numerous service discovery protocols have been introduced in the open literature. Unfortunately, many of them did not consider security issues, and for those that did, many security and privacy problems still remain. One important issue is to protect the privacy of a service provider while enabling an end-user to...

    Provided By Institute for Infocomm Research

  • White Papers // Sep 2010

    An Empirical Study of Harvesting-Aware Duty Cycling in Sustainable Wireless Sensor Networks

    In sustainable wireless sensor networks powered by ambient energy harvesting, node operation highly depends on the energy availability and harvesting rate. For them to support existing wireless sensor network applications, duty-cycling schemes need to adapt the nodes' sleep-wake schedules according to energy harvesting and consumption rates. In this paper, the...

    Provided By Institute for Infocomm Research

  • White Papers // Apr 2010

    Optimal Energy Allocation for Wireless Communications Powered by Energy Harvesters

    The authors consider the use of energy harvesters, in place of conventional batteries with fixed energy storage, for point-to-point wireless communications. In addition to the challenge of transmitting in a channel with time selective fading, energy harvesters provide a perpetual but unreliable energy source. In this paper, they consider the...

    Provided By Institute for Infocomm Research

  • White Papers // Apr 2010

    Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network

    In this paper, the authors present an online/offline identity-based signature scheme for the Wireless Sensor Network (WSN). The authors argue that due to significant reduction in costs of computation and storage, the scheme is particularly suitable for the WSN environment with severely constrained resources. One of the interesting features of...

    Provided By Institute for Infocomm Research

  • White Papers // Apr 2010

    Iterative Detection in a Multi-User Cooperative OFDM System With Carrier Frequency Offsets

    The problem of multi-user cooperation to achieve cooperative diversity for single-antenna terminals is considered. A cooperative strategy is proposed which divides multiple users into groups with each group having two users as partners. The two users alternately transmit their own information first, then simultaneously amplify and forward the partner's data...

    Provided By Institute for Infocomm Research

  • White Papers // Mar 2010

    Opportunistic ARQ With Bidirectional Overhearing for Reliable Multihop Underwater Networking

    As reliable data delivery over a long-range single-hop underwater acoustic link is considerably challenging due to severe channel impairments, multi-hop data transmission schemes over one or more relay nodes have been proposed. In this paper, the authors propose a data delivery scheme using a fully-opportunistic ARQ that employs bidirectional overhearing,...

    Provided By Institute for Infocomm Research

  • White Papers // Mar 2010

    Cooperative Covariance and Eigenvalue Based Detections for Robust Sensing

    Spectrum sensing is a fundamental problem in cognitive radio. As a result, it has been reborn as a very active research area in recent years despite its long history. Although various sensing methods have been proposed, their robustness at very low Signal-to-Noise Ratio (SNR) and uncertain noise/interference environment is generally...

    Provided By Institute for Infocomm Research

  • White Papers // Jan 2010

    Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study

    In the offshore engineering community, reliable deep-water anchor performance is critical for mooring floating platforms such as mobile offshore drilling units. In a typical installation, an anchor is fully embedded into the seabed (up to 100 m). This has to be done with high fidelity as anchor failure can cause...

    Provided By Institute for Infocomm Research

  • White Papers // Sep 2009

    Three-Time-Slot Quasi-Orthogonal Space-Time Block Codes

    In this paper, a class of Quasi-orthogonal Space-Time Block Codes (Q-STBC) is proposed for systems with 2 antennas and 3 time slots, where the orthogonal Alamouti code can not be applied due to the odd, known also as Orphan, symbol problem inherited in the 3GPP frame structure. The proposed codes...

    Provided By Institute for Infocomm Research

  • White Papers // Aug 2009

    An Enhanced Underwater Positioning System to Support Deepwater Installations

    In the offshore engineering community, deep underwater construction activities such as installation of mooring systems for oil and gas extraction require payloads such as subsea templates, Christmas trees and manifolds to be installed accurately. In this paper, the authors consider a recently proposed Underwater Positioning System (UPS) to support deepwater...

    Provided By Institute for Infocomm Research

  • White Papers // Jul 2009

    HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing

    Honeypots are valuable tools for detecting and analyzing malicious activity on the Internet. Successful and time-critical detection of such activity often depends on large-scale deployment. However, commercial organizations usually do not share honeypot data, and large, open honeypot initiatives only provide read-only alert feeds. As a result, while large and...

    Provided By Institute for Infocomm Research

  • White Papers // Jul 2009

    Harnessing the Power of P2P Systems for Fast Attack Signature Validation

    Attack signature validation plays a key role in intrusion detection and prevention technologies. Usually, when new attacks, particularly worms, appear, security software analyzes and generates signatures for these attacks. Since inaccurate signatures may block legitimate traffic that is similar to the attack traffic (false positives), security software is reluctant to...

    Provided By Institute for Infocomm Research

  • White Papers // Jun 2009

    Cooperative Retransmissions Using Markov Decision Process With Reinforcement Learning

    In cooperative retransmissions, nodes with better channel qualities help other nodes in retransmitting a failed packet to its intended destination. In this paper, the authors propose a cooperative retransmission scheme where each node makes local decision to cooperate or not to cooperate at what transmission power using a Markov decision...

    Provided By Institute for Infocomm Research

  • White Papers // Aug 2012

    Leakage-Resilient Client-Side Deduplication of Encrypted Data in Cloud Storage

    Cloud storage service is gaining popularity. To reduce resource consumption in network bandwidth and storage, many cloud storage services including Dropbox and Wuala employs client-side deduplication. That is, when a user tries to upload a file to the server, the server checks whether this particular file is already in the...

    Provided By Institute for Infocomm Research

  • White Papers // Jun 2012

    Enhancing Location Privacy for Electric Vehicles (At The Right Time)

    An electric vehicle is a promising and futuristic automobile propelled by electric motor(s), using electrical energy stored in batteries or another energy storage device. Due to the need of battery recharging, the cars will be required to visit recharging infrastructure very frequently. This may disclose the users' private information, such...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2010

    A Survey of Techniques and Challenges in Underwater Localization

    Underwater Wireless Sensor Networks (UWSNs) are expected to support a variety of civilian and military applications. Sensed data can only be interpreted meaningfully when referenced to the location of the sensor, making localization an important problem. While Global Positioning System (GPS) receivers are commonly used in terrestrial WSNs to achieve...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2012

    Distributed Relay Scheduling for Maximizing Lifetime in Clustered Wireless Sensor Networks

    Clustering and relaying techniques are important approaches towards mitigating the problem of finite network lifetime in wireless sensor networks. To this end, given a clustered Wireless Sensor Network (WSN) (with defined cluster heads and their associated clusters) and a given relay node placement, the authors present a distributed service allocation...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2012

    Opportunistic Routing With Adaptive Harvesting-Aware Duty Cycling in Energy Harvesting WSN

    With recent advances, the trend has shifted from battery-powered Wireless Sensor Networks towards ones powered by ambient energy harvesters (WSN-HEAP). In such networks, operability of the node is dependent on the harvesting rate which is usually stochastic in nature. Therefore, it is necessary to devise routing protocols with energy management...

    Provided By Institute for Infocomm Research

  • White Papers // Jul 2011

    A Preliminary Study on Lifetime Maximization in Clustered Wireless Sensor Networks With Energy Harvesting Nodes

    Clustering is used extensively in wireless sensor networks to optimize lifetime. Within clustering, the optimization of Cluster Head (CH) location is critical since CHs consume energy faster and have greater influence on lifetime than Non-Cluster Head (NCH) sensors. Energy Harvesting Wireless Sensor Networks (EH-WSNs) use energy harvesting devices to harvest...

    Provided By Institute for Infocomm Research

  • White Papers // Apr 2011

    Opportunistic XOR Network Coding for Multihop Data Delivery in Underwater Acoustic Networks

    This paper proposes XOR-BiDO, a Data Delivery Scheme (DDS) suited for multi-hop underwater acoustic networks characterized by regular bidirectional traffic streams. DDSs for multi-hop underwater networks usually assume a single-sink configuration, where most of the transmissions flow in a single direction. Throughput performance decreases and fairness suffers when such DDSs...

    Provided By Institute for Infocomm Research

  • White Papers // Sep 2010

    An Empirical Study of Harvesting-Aware Duty Cycling in Sustainable Wireless Sensor Networks

    In sustainable wireless sensor networks powered by ambient energy harvesting, node operation highly depends on the energy availability and harvesting rate. For them to support existing wireless sensor network applications, duty-cycling schemes need to adapt the nodes' sleep-wake schedules according to energy harvesting and consumption rates. In this paper, the...

    Provided By Institute for Infocomm Research

  • White Papers // Mar 2010

    Opportunistic ARQ With Bidirectional Overhearing for Reliable Multihop Underwater Networking

    As reliable data delivery over a long-range single-hop underwater acoustic link is considerably challenging due to severe channel impairments, multi-hop data transmission schemes over one or more relay nodes have been proposed. In this paper, the authors propose a data delivery scheme using a fully-opportunistic ARQ that employs bidirectional overhearing,...

    Provided By Institute for Infocomm Research

  • White Papers // Jan 2010

    Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study

    In the offshore engineering community, reliable deep-water anchor performance is critical for mooring floating platforms such as mobile offshore drilling units. In a typical installation, an anchor is fully embedded into the seabed (up to 100 m). This has to be done with high fidelity as anchor failure can cause...

    Provided By Institute for Infocomm Research

  • White Papers // Aug 2009

    An Enhanced Underwater Positioning System to Support Deepwater Installations

    In the offshore engineering community, deep underwater construction activities such as installation of mooring systems for oil and gas extraction require payloads such as subsea templates, Christmas trees and manifolds to be installed accurately. In this paper, the authors consider a recently proposed Underwater Positioning System (UPS) to support deepwater...

    Provided By Institute for Infocomm Research

  • White Papers // Mar 2009

    Implementation and Evaluation of Multihop ARQ for Reliable Communications in Underwater Acoustic Networks

    Underwater acoustic networking is an emerging technology platform for oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications. Design of reliable and efficient communications protocols is challenging due to the unique characteristics of underwater acoustic channels. In this paper, the authors present a modular and lightweight implementation of...

    Provided By Institute for Infocomm Research

  • White Papers // Oct 2008

    An In-Situ Measurement Approach for IEEE 802.11 Wireless Multihop Networks

    A wireless multi-hop network is a communications network composed of nodes equipped with wireless interfaces and organized in an ad hoc manner. It has become an attractive and practical solution for providing flexible and extended wireless coverage over large areas. Measurement of physical layer quantities can provide useful information for...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2012

    How Many RF Chains Are Optimal for Large-Scale MIMO Systems When Circuit Power Is Considered?

    Multiple antennas at the transmitter and the receiver can increase the channel capacity significantly. However, this is at the expense of linearly increasing circuit power consumption due to the use of multiple Radio Frequency (RF) chains to support the antennas, which is quite significant for large-scale MIMO systems but is...

    Provided By Institute for Infocomm Research

  • White Papers // Dec 2011

    On Tractability Aspects of Optimal Resource Allocation in OFDMA Systems

    Joint channel and rate allocation with power minimization in Orthogonal Frequency Division Multiple Access (OFDMA) has attracted extensive attention. Most of the research has dealt with the development of sub-optimal but low-complexity algorithms. In this paper, the contributions comprise new insights from revisiting tractability aspects of computing optimum. Previous complexity...

    Provided By Institute for Infocomm Research

  • White Papers // Jul 2012

    Joint Network-Channel Code Design for Block Fading Cooperative Multiple Access Channel

    In this paper, the authors consider the half-duplex Cooperative Multiple-Access Channel (CMAC). They seek to design multiple turbo codes to minimize the information outage in the block fading channel. Since, they consider an outage to occur even if the message of one of the sources fails to be decoded successfully,...

    Provided By Institute for Infocomm Research

  • White Papers // Oct 2012

    Green Wireless Communications: A Power Amplifier Perspective

    In this paper, the authors survey two essential and practical characteristics of radio-frequency Power Amplifier (PA), namely, linearity and efficiency. Non-linear amplification yields significant distortion of the transmit signals and strong interference for co-channel users. Imperfect efficiency of the PA causes an overhead of the systems resulting in Energy Efficiency...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2012

    Relaying With Deadline Constraint: Energy Minimization With Full Channel State Information

    The authors consider a time-slotted source-relay-destination network where data is to be delivered by a deadline. Their goal is to minimize the sum transmission energy by power allocation for each node and time slot, with knowledge of full Channel State Information (CSI) in the form of the SNRs of all...

    Provided By Institute for Infocomm Research

  • White Papers // Apr 2010

    Iterative Detection in a Multi-User Cooperative OFDM System With Carrier Frequency Offsets

    The problem of multi-user cooperation to achieve cooperative diversity for single-antenna terminals is considered. A cooperative strategy is proposed which divides multiple users into groups with each group having two users as partners. The two users alternately transmit their own information first, then simultaneously amplify and forward the partner's data...

    Provided By Institute for Infocomm Research

  • White Papers // Mar 2010

    Cooperative Covariance and Eigenvalue Based Detections for Robust Sensing

    Spectrum sensing is a fundamental problem in cognitive radio. As a result, it has been reborn as a very active research area in recent years despite its long history. Although various sensing methods have been proposed, their robustness at very low Signal-to-Noise Ratio (SNR) and uncertain noise/interference environment is generally...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2013

    Optimality of Separate Network-Channel Coding for Three Messages

    The authors study the optimality of separate network-channel coding (SJNC) for three independent sources on the orthogonal access scheme. By SJNC, they mean that the network coded messages are formed from the binary XOR of the sources' messages, followed by channel encoding which is independent of the network coding. Decoding...

    Provided By Institute for Infocomm Research

  • White Papers // Sep 2006

    Generic Non-Repudiation Protocols Supporting Transparent Off-Line TTP

    A non-repudiation protocol enables the fair exchange of an electronic message and an irrefutable digital receipt between two mistrusting parties over the internet. That is, at the end of any execution instance of such a protocol, either both parties obtain their expected items or neither party does. In this paper,...

    Provided By Institute for Infocomm Research

  • White Papers // Aug 2013

    Leakage Resilient Proofs of Ownership in Cloud Storage

    Cloud storage service (e.g Dropbox, Skydrive, Google Drive, iCloud, and Amazon S3) is becoming more and more popular in recent years. The volume of personal or business data stored in cloud storage keeps increasing. In face to the challenge of rapidly growing volume of data in cloud, de-duplication technique is...

    Provided By Institute for Infocomm Research

  • White Papers // Nov 2003

    Video Streaming Over Bluetooth: A Survey

    In recent years, wireless ad hoc networks have been a growing area of research. The advent of Bluetooth wireless technology makes it possible to transmit real-time video/audio in mobile and pervasive environments. In comparison with the other wireless standard such as 802.11x and IrDA, Bluetooth is more cost-efficient and power-efficient,...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2009

    A DINloop-Based Inter-Domain Multicast Using MPLS

    To overcome scalability and control overhead problems existing in inter-domain multicast, DINloop (Data-In-Network loop) based multicast with MPLS is proposed. DINloop is a special logical path formed using MPLS Label Switched Paths and it consists of multiple DIN Nodes which are core routers that connect to each intra-domain. DINloop is...

    Provided By Institute for Infocomm Research

  • White Papers // Mar 2009

    Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) - Survey and Challenges

    Wireless Sensor Networks (WSNs) research has predominantly assumed the use of a portable and limited energy source, viz. batteries, to power sensors. Without energy, a sensor is essentially useless and cannot contribute to the utility of the network as a whole. Consequently, substantial research efforts have been spent on designing...

    Provided By Institute for Infocomm Research

  • White Papers // Sep 2008

    Minimizing SSO Effort in Verifying SSL Anti-Phishing Indicators

    In an on-line transaction, a user sends her personal sensitive data (e.g., password) to a server for authentication. This process is known as Single Sign-On (SSO). Subject to phishing and pharming attacks, the sensitive data may be disclosed to an adversary when the user is allured to visit a bogus...

    Provided By Institute for Infocomm Research

  • White Papers // Jun 2008

    Antisocial Networks: Turning a Social Network Into a Botnet

    Antisocial Networks are distributed systems based on social networking Web sites that can be exploited by attackers, and directed to carry out network attacks. Malicious users are able to take control of the visitors of social sites by remotely manipulating their browsers through legitimate Web control functionality such as image-loading...

    Provided By Institute for Infocomm Research

  • White Papers // Apr 2010

    Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network

    In this paper, the authors present an online/offline identity-based signature scheme for the Wireless Sensor Network (WSN). The authors argue that due to significant reduction in costs of computation and storage, the scheme is particularly suitable for the WSN environment with severely constrained resources. One of the interesting features of...

    Provided By Institute for Infocomm Research

  • White Papers // Jan 2011

    Failure of a Mix Network

    A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantages in security and efficiency are compromised. The analysis in this paper illustrates that although the first two failures may be mixed by modifying the shuffling protocol, the last one is too serious to x at...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2011

    Short and Efficient Certificate-Based Signature

    In this paper, the authors propose a short and efficient Certificate-Based Signature (CBS) scheme. Certificate-based cryptography proposed by entry combines the merit of traditional Public Key cryptography (PKI) and identity based cryptography, without use of the costly certificate chain verification process and the removal of key escrow security concern. Under...

    Provided By Institute for Infocomm Research

  • White Papers // Feb 2011

    AES Variants Secure Against Related-Key Differential and Boomerang Attacks

    In this paper, the authors summarize the recent related-key differential and boomerang attacks on AES by Biryukov et al. and present a framework for protection against these attacks. Then they study an alter-native AES key schedule proposed by May et al. at ACISP 2002 as a possible candidate to protect...

    Provided By Institute for Infocomm Research

  • White Papers // Dec 2010

    On Two-Way Communications for Cooperative Multiple Source Pairs Through a Multi-Antenna Relay

    The authors study Amplified-and-Forward (AF)-based Two-Way Relaying (TWR) with multiple source pairs, which are exchanging information through the relay. Each source has single antenna and the relay has multi-antenna. The optimal beamforming matrix structure that achieves maximum Signal-to-Interference-plus-Noise Ratio (SINR) for TWR with multiple source pairs is derived. They then...

    Provided By Institute for Infocomm Research

  • White Papers // Jul 2009

    HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing

    Honeypots are valuable tools for detecting and analyzing malicious activity on the Internet. Successful and time-critical detection of such activity often depends on large-scale deployment. However, commercial organizations usually do not share honeypot data, and large, open honeypot initiatives only provide read-only alert feeds. As a result, while large and...

    Provided By Institute for Infocomm Research

  • White Papers // Jul 2009

    Harnessing the Power of P2P Systems for Fast Attack Signature Validation

    Attack signature validation plays a key role in intrusion detection and prevention technologies. Usually, when new attacks, particularly worms, appear, security software analyzes and generates signatures for these attacks. Since inaccurate signatures may block legitimate traffic that is similar to the attack traffic (false positives), security software is reluctant to...

    Provided By Institute for Infocomm Research

  • White Papers // May 2009

    Real-World Polymorphic Attack Detection

    As state-of-the-art attack detection technology becomes more prevalent, attackers have started to employ evasion techniques such as code obfuscation and polymorphism to defeat existing defenses. The authors have recently proposed network-level emulation, a heuristic detection method that scans network traffic to detect polymorphic attacks. The approach uses a CPU emulator...

    Provided By Institute for Infocomm Research

  • White Papers // Jan 2009

    Adaptive Response System for Distributed Denial-of-Service Attacks

    This dissertation presents a Distributed denial-of-service Adaptive ResponsE (DARE) system, capable of executing appropriate detection and mitigation responses automatically and adaptively according to the attacks. It supports easy integration of distributed modules for both signature-based and anomaly-based detection. Additionally, the innovative design of DARE's individual components takes into consideration the...

    Provided By Institute for Infocomm Research

  • White Papers // Oct 2010

    A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments

    Recently, numerous service discovery protocols have been introduced in the open literature. Unfortunately, many of them did not consider security issues, and for those that did, many security and privacy problems still remain. One important issue is to protect the privacy of a service provider while enabling an end-user to...

    Provided By Institute for Infocomm Research

  • White Papers // Jun 2008

    A Cooperative Retransmission Scheme for IR-UWB Networks

    The authors design a cooperative retransmission scheme in the MAC layer which utilizes the UWB unique properties such as fine ranging and immunity to small scale fading in order to exploit the multiuser diversity in UWB networks. They analyze the optimal cooperation strategy to maximize the system throughput in proactive...

    Provided By Institute for Infocomm Research

  • White Papers // Jun 2009

    Cooperative Retransmissions Using Markov Decision Process With Reinforcement Learning

    In cooperative retransmissions, nodes with better channel qualities help other nodes in retransmitting a failed packet to its intended destination. In this paper, the authors propose a cooperative retransmission scheme where each node makes local decision to cooperate or not to cooperate at what transmission power using a Markov decision...

    Provided By Institute for Infocomm Research