In this paper, we propose two new attacks against stream cipher RC4 which can recover the secret key in different length with practical computational amount. However, we have to point out that the proposed attacks are performed under relatively strong related key models. The same as the usual related key models, the adversary can specify the key differentials without knowing the target key information. However, in our attacks, only the relation between two keystream outputs or the two final internal states are required for the attacker. In addition, we discover a statistical bias of RC4 which is the key point to one of the attacks. Besides the inappropriate usage during the WEP environment, RC4 is still considered to be secure with the proper setting, and we believe the result of this paper will add to the understanding of RC4 and how to use it correctly and safely.
Youngjin KIM Hyun Joon SHIN Jung-Ju CHOI Youngcheul WEE
We introduce an entropy coding method to enhance the compression efficiency of JPEG. Because run-length coding and early-termination work more effectively for longer zero sequences, we extract ones and negative ones from the coefficients and reduce the magnitude of all coefficients by one. The extracted coefficients are encoded with a designated entropy coding method. The proposed method can transmit images in two parts progressively, where the first contains JPEG-compatible image with a small amount of degradation and the second is used to add fine details. Our method improves the compression ratio by more than 5% without sacrificing the efficiency of JPEG.
Akira AKAISHI Takashi TAKAHASHI Yoshiyuki FUJINO Mitsugu OHKAWA Toshio ASAI Ryutaro SUZUKI Tomohiro AKIYAMA Hirofumi MATSUZAWA
NICT has developed a test model of an optically controlled beam-forming network (OBF) for a future multiple-beam antenna. The OBF test model consists of an electro-optic converter unit, an OBF unit, and an optoelectronic converter unit. A Ka-band OBF test model was manufactured to demonstrate the OBF. Radiation patterns obtained from the measured OBF data confirmed agreement between the expected and calculated results. Communication tests of the bit error rate (BER) for the digital communication link were performed. The results confirmed the OBF had no serious degradation below 1 dB of Eb/N0 on BER performance at 110-8.
Jaehyun PARK Yunju PARK Sunghyun HWANG Byung Jang JEONG
In this paper, low-complexity generalized singular value decomposition (GSVD) based beamforming schemes are proposed for a cognitive radio (CR) network in which multiple secondary users (SUs) with multiple antennas coexist with multiple primary users (PUs). In general, optimal beamforming, which suppresses the interference caused at PUs to below a certain threshold and maximizes the signal-to-interference-plus-noise ratios (SINRs) of multiple SUs simultaneously, requires a complicated iterative optimization process. To overcome the computational complexity, we introduce a signal-to-leakage-plus-noise ratio (SLNR) maximizing beamforming scheme in which the weight can be obtained by using the GSVD algorithm, and does not require any iterations or matrix squaring operations. Here, to satisfy the leakage constraints at PUs, two linear methods, zero forcing (ZF) preprocessing and power allocation, are proposed.
In this letter, we propose a channel-aware scheduling algorithm to support real-time applications in wireless multimedia sensor networks. Multimedia streams are sensitive to real-time delivery but can tolerate some packet loss. Therefore, this specific application is modelled as an (m,k)-firm stream. To satisfy the real-time requirements, a scheduling scheme that provides packet partitioning and real-time delivery is proposed. Packet partitioning combines static assignment and dynamic adjustment while considering the channel state. The scheme is designed to minimize the number of mandatory packets delivered in a bad channel state to avoid dynamic failure. In addition, automatic repeat request technology is introduced to enhance the reliability of real-time delivery. Simulations and analyses show that the proposed scheme has a good ability to withstand a bad channel status.
Jiamin LI Dongming WANG Pengcheng ZHU Lan TANG Xiaohu YOU
All points on the Pareto boundary can be obtained by solving the weighted sum rate maximization problem for some weighted coefficients. Unfortunately, the problem is non-convex and difficult to solve without performing an exhaustive search. In this paper, we propose an optimal distributed beamforming strategy for the two-user multiple-input single-output (MISO) interference channel (IC). Through minimizing the interference signal power leaked to the other receiver for fixed useful signal power received at the intended receiver, the original non-convex optimization problem can be converted into a family of convex optimization problems, each which can be solved in distributed manner with only local channel state information at each transmitter. After some conversion, we derive the closed-form solutions to all Pareto optimal points based on a game-theoretic viewpoint which indicates that linear combinations of the maximum-ratio transmit (MRT) and zero-forcing (ZF) beamforming strategies can achieve any point on the Pareto boundary of the rate region for the two-user MISO interference channel, and the only computation involved is to solve a basic quadratic equation. Finally, the result is validated via numerical simulations.
Takenori YASUZUMI Nayuta KAMIYA Ryosuke SUGA Osamu HASHIMOTO Yukinori MATSUSHITA Yasuyuki MATSUDA
This paper presents a compact metal plate lens antenna for evaluating a wave absorber placed on ceiling of the ETC gate. The focal distance of the lens was derived to be 129 cm by the geometrical optics procedure. By arranging the lens in front of a horn antenna, the gain and beamwidth characteristics were improved from 18 dBi to 26 dBi and from 22 degrees to 7 degrees, respectively. Then the antenna characteristics were evaluated when the distance between the antenna and the lens was changed in order to miniaturize the lens antenna. As the result, the changes in beamwidth were held to within 1 dB when the lens came close to the horn antenna. Scattering, phase and electric field intensity of electromagnetic wave were evaluated to clarify the foundation of the given characteristics. It was found that the field intensity for the miniaturized lens antenna is stronger than that for GO designed one though the phase uniformity is worse. The distance between the horn antenna and lens can be reduced to 80 cm. The absorption characteristics for the arranged absorbers which have different absorptions were measured, and it was shown that the proposed method was suitable for specifying the deteriorated absorber in the ETC system.
A wideband beamformer with mainlobe control is proposed. To make the beamformer robust against pointing errors, inequality rather than equality constraints are used to restrict the mainlobe response, thus more degrees of freedom are saved. The constraints involved are nonconvex, therefore are linearly approximated so that the beamformer can be obtained by iterating a second-order cone program. Moreover, the response variance element is introduced to achieve a frequency invariant beamwidth. The effectiveness of the technique is demonstrated by numerical examples.
Chen-Hua SHIH Jun-Li KUO Yaw-Chung CHEN
Establishing peer-to-peer (P2P) live streaming for mobile ad hoc network (MANET) requires an efficient scheme to deliver the real-time data in the infrastructure-less disaster environment. However, P2P membership management is difficult in the dynamic mobility and resource limited MANET. In this paper, we present a cross-layer design for P2P-MANET which integrates P2P DHT-based routing protocol and IPv6 routing protocol. Therefore, the proposed scheme can manage and recover the P2P overlay as well as selecting efficient routing path to multicast video streaming. The simulation results demonstrate that the proposed scheme performs relatively better than the layered approach or the off-the-shelf design in terms of the playback continuity and signaling overhead.
This paper proposes an easy-to-design, theory-consistent compact feeding circuit, with a single input and four outputs, being comprised of two hybrid circuits that are capable of switching a beam in three directions. The circuits that determine the phase differences between the antennas are present on the same single layer, and thus there is no effect of vias and the design agrees well with the underlying theory. In addition, the vertically and horizontally symmetrical circuit pattern contributes to a substantial reduction in design time. The circuit is designed for use in the ISM band and its properties are evaluated using an RF circuit simulator. A prototype is fabricated and evaluated. The results of the simulation and measurement agree well with the theoretical values. The dimensions of the feeding circuit are 75 (H)55 (W)3.0 (T) mm.
Zhihua NIU Zhe LI Zhixiong CHEN Tongjiang YAN
The linear complexity and its stability of periodic sequences are of fundamental importance as measure indexes on the security of stream ciphers and the k-error linear complexity reveals the stability of the linear complexity properly. Recently, Zhou designed an algorithm for computing the k-error linear complexity of 2pn periodic sequences over GF(q). In this paper, we develop a genetic algorithm to confirm that one can't get the real k-error linear complexity for some sequenes by the Zhou's algorithm. Analysis indicates that the Zhou's algorithm is unreasonable in some steps. The corrected algorithm is presented. Such algorithm will increase the amount of computation, but is necessary to get the real k-error linear complexity. Here p and q are odd prime, and q is a primitive root (mod p2).
We consider wireless secure communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored: cooperative relaying (CR) and cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdropper's channel state information (ECSI). Then, for the case with ECSI, we derive the conditions under which CR achieves a higher secrecy rate than CJ; for the case without ECSI, we compare the secrecy rates of CR and CJ in high transmit power regimes. Building on this, we propose a novel hybrid scheme in which the relay utilizes both CR and CJ, and study the power allocation of the relay between CR and CJ for maximizing the secrecy rate under individual power constraints. Further, we study the case with imperfect channel state information (CSI) for both CR and CJ. At last, extensive numerical results are provided.
Random beamforming(RBF) is a simple and practical method that can realize multi-user multi-input multi-output (MU-MIMO) systems. In this letter, we analyze the average sum rate of RBF with minimum mean squared error (MMSE) receive beamforming. To this end, we exploit the empirical eigenvalue distribution [5] and extreme value theory. The numerical verification shows that the proposed analysis provides a good approximation of the average sum rate of RBF even for the small number of antennas.
Jun-Li KUO Chen-Hua SHIH Cheng-Yuan HO Ming-Ching WANG Yaw-Chung CHEN
In the infrastructure-less disaster environment, the application of the peer-to-peer (P2P) group conference over mobile ad hoc network (MANET) can be used to communicate with each other when the rescue crews search the survivors but work separately. However, there still are several problems of in-time multimedia delivery in P2P-MANET: (1) MANET mobility influences the maintenance of P2P overlay. (2) P2P overlay is not proximal to MANET topology, this leads to the inefficient streaming delivery. (3) The unreliable wireless connection leads to the difficulty of multi-source P2P group conferencing. Therefore, P2P conferencing cannot work well on MANET. To overcome the above disadvantages, in this paper, we present a cross-layer P2P group conferencing mechanism over MANET, called RING (Real-time Intercommunication Network Gossip). The RING uses the ring overlay to manage peers and utilizes the cross-layer mechanism to force the ring overlay to be proximal to MANET topology. Therefore, RING can lead efficient in-time multimedia streaming delivery. On the other hand, the ring overlay can deal with peer joining/leaving fast and simply, and improves the delivery efficiency with the minimum signaling overhead. Through mathematical theory and a series of experiments, we demonstrate that RING is workable and it can shorten the source-to-end delay with minimal signaling overhead.
This paper presents the basic characteristics of a beam tilting slot antenna element whose forced resonance is realized by reactance loading; its structure complements that of a dipole antenna element. The radiation pattern is tilted using a properly determined driving point position; a single loading reactance is used to obtain the forced resonance without great changes in the tilt angle. Numerical results show that the reactance element needs to be loaded near the driving point in order to obtain the forced resonance of the antenna and the minimum changes in the beam tilt angle at the same time. When the proposed forced resonant beam tilting slot antenna with a 0.8 λ length is driven at -0.2 λ from the center, the main beam tilt angle of 57.7 degrees and the highest power gain of 3.8 dB are obtained. This slot element has a broad bandwidth, unlike the complementary dipole element.
Yusaku KANETA Shingo YOSHIZAWA Shin-ichi MINATO Hiroki ARIMURA Yoshikazu MIYANAGA
In this paper, we propose a novel architecture for large-scale regular expression matching, called dynamically reconfigurable bit-parallel NFA architecture (Dynamic BP-NFA), which allows dynamic loading of regular expressions on-the-fly as well as efficient pattern matching for fast data streams. This is the first dynamically reconfigurable hardware with guaranteed performance for the class of extended patterns, which is a subclass of regular expressions consisting of union of characters and its repeat. This class allows operators such as character classes, gaps, optional characters, and bounded and unbounded repeats of character classes. The key to our architecture is the use of bit-parallel pattern matching approach, in which the information of an input non-deterministic finite automaton (NFA) is first compactly encoded in bit-masks stored in a collection of registers and block RAMs. Then, the NFA is efficiently simulated by a fixed circuitry using bitwise Boolean and arithmetic operations consuming one input character per clock regardless of the actual contents of an input text. Experimental results showed that our hardwares for both string and extended patterns were comparable to previous dynamically reconfigurable hardwares in their performances.
Tuan Anh LE Choong Seon HONG Sungwon LEE
Nowadays portable devices with multiple wireless interfaces and using multimedia services are becoming more popular on the Internet. This paper describes a family of multipath binomial congestion control algorithms for audio/video streaming, where a low variant of transmission rate is important. We extend the fluid model of binomial algorithms for single-path transmission to support the concurrent transmission of packets across multiple paths. We focus on the extension of two particular algorithms, SQRT and IIAD, for multiple paths, called MPSQRT and MPIIAD, respectively. Additionally, we apply the design technique (using the multipath fluid model) for multipath TCP (MPTCP) into the extension of SQRT and IIAD, called fbMPSQRT and fbMPIIAD, respectively. Both two approaches ensure that multipath binomial congestion control algorithms achieve load-balancing, throughput improvement, and fairness to single-path binomial algorithms at shared bottlenecks. Through the simulations and comparison with the uncoordinated protocols MPSQRT/MPIIAD, fbMPSQRT/fbMPIIAD and MPTCP, we find that our extended multipath transport protocols can preserve lower latency and transmission rate variance than MPTCP, fairly share with single-path SQRT/IIAD, MPTCP and TCP, and also can achieve throughput improvements and load-balancing equivalent to those of MPTCP under various scenarios and network conditions.
Yuanqiang HUANG Zhongzhi LUAN Depei QIAN Zhigao DU Ting CHEN Yuebin BAI
With the consideration of real-time stream processing technology, it's important to develop high availability mechanism to guarantee stream-based application not interfered by faults caused by potential anomalies. In this paper, we present a novel online prediction technique for predicting some anomalies which may occur in the near future. Concretely, we first present a value prediction which combines the Hidden Markov Model and the Mixture of Expert Model to predict the values of feature metrics in the near future. Then we employ the Support Vector Machine to do anomaly identification, which is a procedure to identify the kind of anomaly that we are about to alarm. The purpose of our approach is to achieve a tradeoff between fault penalty and resource cost. The experiment results show that our approach is of high accuracy for common anomaly prediction and low runtime overhead.
Laizhong CUI Yong JIANG Jianping WU Shutao XIA
Most large-scale Peer-to-Peer (P2P) live streaming systems are constructed as a mesh structure, which can provide robustness in the dynamic P2P environment. The pull scheduling algorithm is widely used in this mesh structure, which degrades the performance of the entire system. Recently, network coding was introduced in mesh P2P streaming systems to improve the performance, which makes the push strategy feasible. One of the most famous scheduling algorithms based on network coding is R2, with a random push strategy. Although R2 has achieved some success, the push scheduling strategy still lacks a theoretical model and optimal solution. In this paper, we propose a novel optimal pull-push scheduling algorithm based on network coding, which consists of two stages: the initial pull stage and the push stage. The main contributions of this paper are: 1) we put forward a theoretical analysis model that considers the scarcity and timeliness of segments; 2) we formulate the push scheduling problem to be a global optimization problem and decompose it into local optimization problems on individual peers; 3) we introduce some rules to transform the local optimization problem into a classical min-cost optimization problem for solving it; 4) We combine the pull strategy with the push strategy and systematically realize our scheduling algorithm. Simulation results demonstrate that decode delay, decode ratio and redundant fraction of the P2P streaming system with our algorithm can be significantly improved, without losing throughput and increasing overhead.
Jaekwang KIM KwangHo YOON Jee-Hyong LEE
Clickstreams in users' navigation logs have various data which are related to users' web surfing. Those are visit counts, stay times, product types, etc. When we observe these data, we can divide clickstreams into sub-clickstreams so that the pages in a sub-clickstream share more contexts with each other than with the pages in other sub-clickstreams. In this paper, we propose a method which extracts more informative rules from clickstreams for web page recommendation based on genetic programming and association rules. First, we split clickstreams into sub-clickstreams by contexts for generating more informative rules. In order to split clickstreams in consideration of context, we extract six features from users' navigation logs. A set of split rules is generated by combining those features through genetic programming, and then informative rules for recommendation are extracted with the association rule mining algorithm. Through experiments, we verify that the proposed method is more effective than the other methods in various conditions.