Xiamen University

Displaying 1-10 of 10 results

  • White Papers // Nov 2011

    Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks

    Uncoordinated Frequency Hopping (UFH) and Collaborative UFH (CUFH) are viable countermeasures for jamming attacks without dependency on pre-shared secret keys. In this paper, the authors analytically evaluate their communication efficiency in large-scale networks, where the number of nodes n is large and may even exceed the number of channels C....

    Provided By Xiamen University

  • White Papers // Jul 2011

    Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks

    The authors propose in a collaborative broadcast scheme for wireless networks, which applies the Uncoordinated Frequency Hopping (UFH) technique to counteract jamming and exploits node cooperation to enhance broadcast efficiency. In this scheme, some nodes that already obtain the broadcast message are selected to relay the message to other nodes....

    Provided By Xiamen University

  • White Papers // Jul 2011

    Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks

    The authors propose a collaborative broadcast scheme for wireless networks, which is based on the Uncoordinated Frequency Hopping (UFH) technique and exploits the node cooperation to achieve higher communication efficiency and stronger jamming resistance. In the collaborative broadcast, nodes that already obtain the broadcast message help forward the message to...

    Provided By Xiamen University

  • White Papers // Feb 2011

    A Group Tracing and Filtering Tree for REST DDos in Cloud Computing

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from denial of service attacks, especially HTTP or REST-based denial of service attacks. Because mainly...

    Provided By Xiamen University

  • White Papers // Dec 2010

    A Cloud Tracing and Filtering Framework for Defensing Against Denial of Service Attacks

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from denial of service attacks, especially HTTP or XML-Based denial of service attacks. These types...

    Provided By Xiamen University

  • White Papers // Dec 2010

    Analysis and Optimization on Jamming-Resistant Collaborative Broadcast in Large-Scale Networks

    Uncoordinated Frequency Hopping (UFH) is a viable anti-jamming solution without dependency on pre-shared secret keys, which nonetheless suffers from low communication efficiency. The Collaborative UFH (CUFH) scheme proposed recently in dramatically improves both communication efficiency and jamming resistance of UFH with the help of relays. In this paper, the authors...

    Provided By Xiamen University

  • White Papers // Dec 2010

    An Evolutionary MAC Protocol Based on FPRP for Decreasing Delay

    Five-Phase Reservation Protocol (FPRP) is a single channel, Time Division Multiplex Access (TDMA) based broadcast scheduling protocol for Ad Hoc network. A modified Medium Access Control (MAC) protocol based on FPRP for decreasing packet delay is proposed in this paper. In FPRP, there are quite a lot of reservation cycles...

    Provided By Xiamen University

  • White Papers // Aug 2010

    Design and Implementation of Multi-Mode QC-LDPC Decoder

    Low-Density Parity-Check (LDPC) codes are one of the most effective error controlling methods, which now are widely used in multiple communication systems, for example, DVB-S2, 802.16e, etc. In these communication standards, the adopted LDPC codes are all Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes. The parity-check matrices of QC-LDPC codes consist of...

    Provided By Xiamen University

  • White Papers // Aug 2010

    On User Data Protocol of SMS in Remote Monitoring System

    This paper looks into the features of SMS (Short Message Service) relevant to building a remote monitoring system. Based on the analysis of SMS, a set of guidelines for customizing the user data protocol of short messages are presented. The paper brings forward a method for encapsulating a Modbus message...

    Provided By Xiamen University

  • White Papers // Aug 2009

    A Detailed Implementation and Analysis of Data Center of GPRS DTU

    This paper gives an overview of the architecture of the telecontrol system based on GPRS. The objectives of this paper are two fold. One is to present the design and implement of the data center of GPRS DTU. The other is to investigate its performance. According to the features of...

    Provided By Xiamen University

  • White Papers // Dec 2010

    Analysis and Optimization on Jamming-Resistant Collaborative Broadcast in Large-Scale Networks

    Uncoordinated Frequency Hopping (UFH) is a viable anti-jamming solution without dependency on pre-shared secret keys, which nonetheless suffers from low communication efficiency. The Collaborative UFH (CUFH) scheme proposed recently in dramatically improves both communication efficiency and jamming resistance of UFH with the help of relays. In this paper, the authors...

    Provided By Xiamen University

  • White Papers // Jul 2011

    Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks

    The authors propose in a collaborative broadcast scheme for wireless networks, which applies the Uncoordinated Frequency Hopping (UFH) technique to counteract jamming and exploits node cooperation to enhance broadcast efficiency. In this scheme, some nodes that already obtain the broadcast message are selected to relay the message to other nodes....

    Provided By Xiamen University

  • White Papers // Aug 2010

    On User Data Protocol of SMS in Remote Monitoring System

    This paper looks into the features of SMS (Short Message Service) relevant to building a remote monitoring system. Based on the analysis of SMS, a set of guidelines for customizing the user data protocol of short messages are presented. The paper brings forward a method for encapsulating a Modbus message...

    Provided By Xiamen University

  • White Papers // Aug 2009

    A Detailed Implementation and Analysis of Data Center of GPRS DTU

    This paper gives an overview of the architecture of the telecontrol system based on GPRS. The objectives of this paper are two fold. One is to present the design and implement of the data center of GPRS DTU. The other is to investigate its performance. According to the features of...

    Provided By Xiamen University

  • White Papers // Nov 2011

    Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks

    Uncoordinated Frequency Hopping (UFH) and Collaborative UFH (CUFH) are viable countermeasures for jamming attacks without dependency on pre-shared secret keys. In this paper, the authors analytically evaluate their communication efficiency in large-scale networks, where the number of nodes n is large and may even exceed the number of channels C....

    Provided By Xiamen University

  • White Papers // Jul 2011

    Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks

    The authors propose a collaborative broadcast scheme for wireless networks, which is based on the Uncoordinated Frequency Hopping (UFH) technique and exploits the node cooperation to achieve higher communication efficiency and stronger jamming resistance. In the collaborative broadcast, nodes that already obtain the broadcast message help forward the message to...

    Provided By Xiamen University

  • White Papers // Feb 2011

    A Group Tracing and Filtering Tree for REST DDos in Cloud Computing

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from denial of service attacks, especially HTTP or REST-based denial of service attacks. Because mainly...

    Provided By Xiamen University

  • White Papers // Dec 2010

    A Cloud Tracing and Filtering Framework for Defensing Against Denial of Service Attacks

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from denial of service attacks, especially HTTP or XML-Based denial of service attacks. These types...

    Provided By Xiamen University

  • White Papers // Aug 2010

    Design and Implementation of Multi-Mode QC-LDPC Decoder

    Low-Density Parity-Check (LDPC) codes are one of the most effective error controlling methods, which now are widely used in multiple communication systems, for example, DVB-S2, 802.16e, etc. In these communication standards, the adopted LDPC codes are all Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes. The parity-check matrices of QC-LDPC codes consist of...

    Provided By Xiamen University

  • White Papers // Dec 2010

    An Evolutionary MAC Protocol Based on FPRP for Decreasing Delay

    Five-Phase Reservation Protocol (FPRP) is a single channel, Time Division Multiplex Access (TDMA) based broadcast scheduling protocol for Ad Hoc network. A modified Medium Access Control (MAC) protocol based on FPRP for decreasing packet delay is proposed in this paper. In FPRP, there are quite a lot of reservation cycles...

    Provided By Xiamen University