Order Print Issue

Order PDf Issue

Download This Issue PDF

Volume 11, No. 2, April 2015 ISSN: 1744-2397

A SPECIAL ISSUE ON

Communication Systems, Networks and Digital Signal Processing

Guest Editor:


Prof. Michael D. Logothetis
University of Patras, Patras, Greece

Prof. Krishna Busawon
Northumbria University, Newcastle Upon Tyne, UK

Prof. Erich Leitgeb
Technical University of Graz, Graz, Austria

Title: THOROUGH ANALYSIS OF BRUTE-FORCE ATTACKS ON STATELESS FORWARDING IN INFORMATION CENTRIC NETWORKS
Authors: Bander A. Alzahrani, Vassilios G. Vassilakis,........................................pp. 381-389
Abstract:Information-centric networking (ICN) is an emerging revolutionary technology that has recently gained lots of interest in the research community. ICN aims at solving the inefficiencies of the current Internet by promoting the information objects into the first class citizens. Information-aware routing, caching, and other network functions are expected to boost the network performance and to enable new, advanced services. Nevertheless, the ICN solutions proposed so far are not very mature for the security viewpoint. It has been demonstrated, that the basic ICN mechanisms are vulnerable to bruteforce and denial-of-service (DoS) attacks. In this paper, we first perform a thorough security analysis of one of the most popular ICN Bloom-filter based forwarding mechanisms. Next, we propose a mitigation technique that provides a sufficient level of security against brute-force attacks.
Keywords: Information centric networks; Bloom filter; Brute force attacks.

Order this article Download Article PDF

Title: PACKET LOSS OPTIMIZATION BY APPLYING EFFICIENT HANDOFF ALGORITHMS IN HIGH-MOBILITY RADIO-OVER-FIBER NETWORKS: A MATHEMATICAL ANALYSIS
Authors: Nikolaos D. Tselikas, Evangelos A. Kosmatos, and Nikos C. Sagias....pp. 390-399
Abstract: The paper analyzes three handoff algorithms which are used in Radio-over-Fiber (RoF) networks at 60 GHz. Specifically, the Virtual Cellular Zone (VCZ) and the Moving Extended Cell (MEC), are presented, against the Traditional Handoff (THO) algorithm, which is the simplest proposed solution in such networks. The mathematical analysis regarding packet losses for all three handoff algorithms is presented and it is verified by the corresponding simulation study. The result is that both VCZ and, especially, MEC could be two strong candidate handoff algorithms for packet loss minimization in high-mobility RoF networks at 60 GHz.
Keywords: Radio-over-Fiber networks, handoff algorithms, moving extended cell, high-mobility end-users, performance evaluation.

Order this article Download Article PDF

Title: BIT-ERROR-RATE PERFORMANCE OF A CAR-TO-CAR VLC SYSTEM USING 2×2 MIMO
Authors: Pengfei Luo, Zabih Ghassemlooy, Hoa Le Minh, Edward Bentley, Andrew Burton, Xuan Tang............................................................................................................pp. 400-407
Abstract:Visible light communications (VLC) for car-to-car (C2C)
communications is an alternative and complementary solution to the radio frequency based C2C especially in high vehicle density environments. In this paper, a mathematical model for C2C VLC system under different communication geometries is presented. A market-weighted headlamp beam pattern model is employed. Both line-of-sight and non-line-of-sight links are considered. By employing a pair of headlamps and photodetectors (PD), a 2×2 multiple-input multiple-output
(MIMO) link is established to increase the data rate. The received optical power at three different vertical planes are calculated, and the bit error rate performance of the C2C VLC system using 2×2 MIMO under different PD arrangement situations are simulated. The simulated results show that the communication’s coverage range can reach up to 40 m at a data rate of 4 Mbps when the separation distance and the mounting height of a pair of PDs is 1.2 m and 0.2-0.4 m, respectively.
Keywords: car-to-car communication; visible light communication; multiple-input multiple-output; road reflection; LED; bit error rate.

Order this article Download Article PDF


Title: MODELLING SYSTEMS WITH OVERFLOW TRAFFIC USING TWO-DIMENSIONAL CONVOLUTION ALGORITHM WITH REDUCED COMPLEXITY
Authors: Adam Kaliszan, Mariusz Glabowski, Maciej Stasiak.............................pp. 408-422
Abstract: This article proposes a new method for a determination of two-dimensional occupancy distribution and blocking probability in systems with traffic overflow mechanisms. The proposedmethod introduces simplifications leading to the lower computational complexity order as compared to two-dimensional convolution methods hitherto proposed (ensuring almost the same level of accuracy). The article describes thoroughly all steps of the proposed method. The method is based on a determination of the twodimensional distribution in the system with traffic overflow
on the basis of the one-dimensional distributions.
Keywords: Convolution algorithm, Overflow system, Multi-rate traffic.

Order this article Download Article PDF

Title: AN OUTPUT FEEDBACK-BASED SECURE COMMUNICATION SCHEME USING 3D DISCRETE GENERALIZED HÉNON MAPS
Authors: Sonia HAMMAMI, Mohamed DJEMAÏ, Krishna BUSAWON............pp.423-436
Abstract: In this paper, a framework for the synchronization of two discrete hyperchaotic systems, namely the 3D generalized Hénon maps, based on the use of output feedback concept and aggregation techniques is proposed and applied to a two-channel secure communication design. New sufficient conditions for synchronization are obtained by the use of Borne and Gentina practical stability criterion associated to the forced arrow form matrix for system description. The application of the proposed approach to hyperchaotic Hénon maps, considered as symmetric encryption and decryption keys, proves the efficiency of the proposed communication system to confidentially recover transmitted messages. Numerical simulations are carried out to assess the performance and the efficiency of the proposed contributions in the important field of secure information encryption.
Keywords: 3D Generalized Hénon map; Output feedback; Aggregation techniques; Forced arrow form matrix; Synchronization; Secure cryptosystem.

Order this article Download Article PDF