Peng YUE Qian-nan LI Xiang YI Tuo WANG Zeng-ji LIU Geng CHEN Hua-xi GU
A novel and compact electro-optic modulator implemented by a combination of a 12 multimode interference (MMI) coupler and an integrated Mach-Zehnder interferometer (MZI) modulator consisting of a microring and a phase modulator (PM) is presented and analyzed theoretically. It is shown that the proposed modulator offers both ultra-linearity and high output RF gain simultaneously, with no requirements for complicated and precise direct current (DC) control.
Bernardo MACHADO DAVID Anderson C.A. NASCIMENTO Rafael T. DE SOUSA, JR.
We introduce an efficient fully simulatable construction of oblivious transfer based on the McEliece assumptions in the common reference string model. This is the first efficient fully simulatable oblivious protocol based on coding assumptions. Moreover, being based on the McEliece assumptions, the proposed protocol is a good candidate for the post-quantum scenario.
Norrarat WATTANAMONGKHOL Warakorn SRICHAVENGSUP Pisit VANICHCHANUNT Robithoh ANNUR Jun-ichi TAKADA Lunchakorn WUTTISITTIKULKIJ
In a shared medium communication system, mobile users contend for channel access according to a given set of rules to avoid collisions and achieve efficient use of the medium. If one or more users do not comply with the agree rules either due to selfish or malicious behaviours, they will cause some impacts on the system performance, especially to the well-behaved users. In this paper, we consider the problem of user misbehaviours on the performance of a wireless infrastructure-based network using reservation-based MAC protocols. Key misbehaving strategies possible in such a network are identified and explained. To quantify the impact of these misbehaviours upon the network performance, three different misbehaving scenarios are developed to allow a systematic investigation of each misbehaving strategy. For each scenario, we have derived mathematical formulations for evaluating and analyzing the key performance metrics, i.e., probabilities of success of well-behaved and misbehaved users and the fairness index. Numerical results show that the presence of misbehaviours can cause different levels of damage depending on the misbehavior strategy used. The combined multi-token and increasing permission probability strategies where the misbehaved user selfishly accesses the channel more times and with higher probabilities than allowed is shown to cause the most severe impairment of performance and fairness.
Reliable detection of the licensed user signal is a pre-requirement for avoiding interference to the licensed user in a CR network. Cooperative spectrum sensing (CSS) is able to offer improved sensing performance compared to individual sensing. In this paper, we propose a robust soft combination rule based on the Kullback-Leibler divergence (KL-divergence) for CSS. The proposed scheme is able to obtain a similar sensing performance compared to that of maximum gain combination (MGC) without requiring signal to noise ratio (SNR) information. In addition, the proposed scheme protects the sensing process against common types of malicious users without a malicious user identification step. The simulation results demonstrate the effectiveness of the proposed scheme.
Rafael DOWSLEY Jeroen van de GRAAF Jorn MULLER-QUADE Anderson C. A. NASCIMENTO
We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only. We present two different constructions for oblivious transfer, one based on cut-and-chose arguments and another one which is based on a novel generalization of Bennett-Rudich commitments which may be of independent interest. Finally, we also present a variant of our protocol which is based on the Niederreiter cryptosystem.
Yuanwang YANG Jingye CAI Haiyan JIN
In this letter, an improved triple-tunable frequency synthesizer structure to achieve both high frequency resolution and fast switching speed without degradation of spurious signals (spurs) level performance is proposed. According to this structure, a high performance millimeter-wave frequency synthesizer with low spurious, low phase noise, and fast switching speed, is developed. This synthesizer driven by the direct digital synthesizer (DDS) AD9956 can adjust the output of a DDS and frequency division ratios of two variable frequency dividers (VFDs) to move the spurious components outside the loop bandwidth of the phase-locked loop (PLL). Moreover, the ADF4252 based microwave PLL can further suppress the phase noise. Experimental results from the implemented synthesizer show that remarkable performance improvements have been achieved.
Helena RIFA-POUS Mercedes JIMENEZ BLASCO Jose Carlos MUT ROJAS
Cognitive radio is a wireless technology aimed at improving the efficient use of the radio-electric spectrum, thus facilitating a reduction in the load on the free frequency bands. Cognitive radio networks can scan the spectrum and adapt their parameters to operate in the unoccupied bands. To avoid interfering with licensed users operating on a given channel, the networks need to be highly sensitive, which is achieved by using cooperative sensing methods. Current cooperative sensing methods are not robust enough against occasional or continuous attacks. This article outlines a Group Fusion method that takes into account the behaviour of users over the short and long term. On fusing the data, the method is based on giving more weight to user groups that are more unanimous in their decisions. Simulations of a dynamic environment with interference are performed. Results prove that when attackers are present (both reiterative or sporadic), the proposed Group Fusion method has superior sensing capability than other methods.
Yoshimitsu TAKAMATSU Ryuichi FUJIMOTO Tsuyoshi SEKINE Takaya YASUDA Mitsumasa NAKAMURA Takuya HIRAKAWA Masato ISHII Motohiko HAYASHI Hiroya ITO Yoko WADA Teruo IMAYAMA Tatsuro OOMOTO Yosuke OGASAWARA Masaki NISHIKAWA Yoshihiro YOSHIDA Kenji YOSHIOKA Shigehito SAIGUSA Hiroshi YOSHIDA Nobuyuki ITOH
This paper presents a single-chip RF tuner/OFDM demodulator for a mobile digital TV application called “1-segment broadcasting.” To achieve required performances for the single-chip receiver, a tunable technique for a low-noise amplifier (LNA) and spurious suppression techniques are proposed in this paper. Firstly, to receive all channels from 470 MHz to 770 MHz and to relax distortion characteristics of following circuit blocks such as an RF variable-gain amplifier and a mixer, a tunable technique for the LNA is proposed. Then, to improve the sensitivity, spurious signal suppression techniques are also proposed. The single-chip receiver using the proposed techniques is fabricated in 90 nm CMOS technology and total die size is 3.26 mm 3.26 mm. Using the tunable LNA and suppressing undesired spurious signals, the sensitivities of less than -98.6 dBm are achieved for all the channels.
We study the use of the additive white Gaussian noise channel to achieve a cryptographic primitive that is important in secure multiparty computation. A protocol for unconditionally secure oblivious transfer is presented. We show that channel input alphabets with a certain algebraic structure and their partitions are useful in achieving the requirements on the primitive. Signal design for a protocol with high information rate is discussed.
Jungsuk SONG Hiroki TAKAKURA Yasuo OKABE Daisuke INOUE Masashi ETO Koji NAKAO
Intrusion Detection Systems (IDS) have been received considerable attention among the network security researchers as one of the most promising countermeasures to defend our crucial computer systems or networks against attackers on the Internet. Over the past few years, many machine learning techniques have been applied to IDSs so as to improve their performance and to construct them with low cost and effort. Especially, unsupervised anomaly detection techniques have a significant advantage in their capability to identify unforeseen attacks, i.e., 0-day attacks, and to build intrusion detection models without any labeled (i.e., pre-classified) training data in an automated manner. In this paper, we conduct a set of experiments to evaluate and analyze performance of the major unsupervised anomaly detection techniques using real traffic data which are obtained at our honeypots deployed inside and outside of the campus network of Kyoto University, and using various evaluation criteria, i.e., performance evaluation by similarity measurements and the size of training data, overall performance, detection ability for unknown attacks, and time complexity. Our experimental results give some practical and useful guidelines to IDS researchers and operators, so that they can acquire insight to apply these techniques to the area of intrusion detection, and devise more effective intrusion detection models.
A new comprehensive method to suppress the spurious modes in a BPF is proposed taking the multi-strip resonator BPF as an example. It consists of disturbing the resonant frequency, coupling coefficient and external Q of the higher-order modes at the same time. The designed example has shown an extraordinarily good out-of-band response in the computer simulation.
We consider the use of the additive white Gaussian noise channel to achieve information theoretically secure oblivious transfer. A protocol for this primitive that ensures the correctness and privacy for players is presented together with the signal design. We also study the information theoretic efficiency of the protocol, and some more practical issues where the parameter of the channel is unknown to the players.
Spectrum sensing is a key technology within Cognitive Radio (CR) systems. Cooperative spectrum sensing using a distributed model provides improved detection for the primary user, which opens the CR system to a new security threat. This threat is the decrease of the cooperative sensing performance due to the spectrum sensing data falsification which is generated from malicious users. Our proposed scheme, based on robust statistics, utilizes only available past sensing nodes' received power data for estimating the distribution parameters of the primary signal presence and absence hypotheses. These estimated parameters are used to perform the Dempster-Shafer theory of evidence data fusion which causes the elimination of malicious users. Furthermore, in order to enhance performance, a node's reliability weight is supplemented along with the data fusion scheme. Simulation results indicate that our proposed scheme can provide a powerful capability in eliminating malicious users as well as a high gain of data fusion under various cases of channel condition.
Jechan HAN Beomjoon KIM Jaiyong LEE
This letter proposes a new retransmission persistence management scheme for selective repeat automatic repeat request (SR-ARQ). By considering the overall traffic load that has to be managed by SR-ARQ, the proposed scheme arbitrates the retransmission persistence to prevent an abrupt delay increment due to excessive link-level local retransmissions. OPNET simulations show that SR-ARQ performs better with the proposed scheme than with a fixed value of retransmission persistence in terms of the throughput of transmission control protocol (TCP).
Kazunori YAMANAKA Kazuaki KURIHARA Akihiko AKASEGAWA Masatoshi ISHII Teru NAKANISHI
We report on the spurious suppression effect in low-microwave power transmitters by high temperature superconducting (HTS) bandpass filters (BPFs) which are promising for devices requiring BPFs with high-frequency selectivity. Some of the major issues on the power BPFs with HTS planar circuits for wireless communication applications are reviewed. As a case study for the HTS filter and its spurious suppression effect, this paper describes an example of the measured power spectrum density (PSD) on the suppression effect by one of our developed power BPFs with YBCO films for the 5 GHz band. It was designed with equivalent cascade resonators of 16 poles. We demonstrated the effect by HTS power filter in a power amplifier for the 5 GHz band.
This paper analyzes the spurious sources in DDS synthesizers and deduces the simple model of DDS output signal. The method of feeding pseudo-random noise into the phase accumulator for spurious reduction is discussed. A new method for spurious reduction by compensating for DAC integer nonlinearity is proposed with two DACs and a power combiner. One DAC generates the error signal to compensate for the other DAC INL. The factor how the amplitude error and the phase error between the two combined signals affect the spurious level is also analyzed. The experiment shows that the spurious reduction can be improved by at least 18 dB, which proves the validity of the DAC INL compensation method for the spurious reduction.
This paper proposes a new charge pump to suppress spurious noise of phase-locked loops. The spurious noise is induced by charge injection generated from the parasitic capacitors associated with switches and the current-mismatch between the charging and discharging currents of the charge pump. A new charge pump is configured by adding an operational amplifier, a sample-and-hold circuit, and switches to a basic charge pump. During the idling time of the charge pump, the currents of the current sources are adjusted and the current-mismatch are reduced to 0.3%. Applying the proposed charge pump to a phase-locked loop, we can suppress the spurious noise by 18 dB compared with a PLL using a basic one.
Ikuo AWAI Osamu MIZUE Arun Kumar SAHA
A microwave resonator is fabricated by a lump of spherical metal particles for the first time. It is the evidence that those particles constitute artificial dielectrics. The effective permittivity is calculated numerically together with the permeability. Resonant mode frequencies in the experiment are compared with the theoretical result obtained by the effective material constants above. Their reasonable agreement indicates the validity of material constant extraction. The unique diamagnetism of spherical particles could be utilized for improvement of spurious property of a resonator.
In this paper, we show that each of the special cases of strong conditional oblivious transfer can be obtained from only one instance of its inverse. Each of our constructions is simple and efficient, and preserves the same security level of its inverse.
Yo YAMAGUCHI Takana KAHO Kazuhiro UEHARA
A highly integrated frequency quadrupler MMIC that uses three-dimensional MMIC (3D-MMIC) technology is presented. It consists of four driver amplifiers, two doublers, and a 2-band elimination filter. These seven circuits are integrated in only a 2.36 mm2 area. The filter sufficiently suppresses spurious output components. The third and fifth harmonic components, which are the spurious components nearest to the desired component, are well suppressed. The desired/undesired ratio is about 40 dB. The driver amplifiers make the quadrupler output a constant power of the desired multiplied signal under low input power. The MMIC supplies +5 dBm of the fourth harmonic component in the input power range from -10 dBm to +5 dBm. The power dissipation of the MMIC is only 160 mW.