In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chanc...In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.展开更多
In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral efficiency.We,in this paper,prop...In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral efficiency.We,in this paper,propose an efficient three-phase framework and corresponding algorithms for dealing with this problem.Firstly,a greedy scheduling algorithm based on the lower bound of the ergodic rate is performed for generating an elementary cluster in the first phase.And then the elementary cluster is divided into many small clusters according to the following proposed algorithms based on the short term instantaneous information in the second phase.In the end,based on the limited feedback two zero-forcing(ZF) precoding strategies are adopted for reducing the intra-cluster interference in the third phase.The provided Monte Carlo simulations show the effectiveness of our proposed algorithms in the respect of system spectral efficiency and average user rate.展开更多
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1078)the Key Program of NSFC-Guangdong Union Foundation (U1135002)+3 种基金the Major national S&T program(2012ZX03002003)the Fundamental Research Funds for the Central Universities(JY10000903001)the National Natural Sci ence Foundation of China (Grant No. 61363068, 61100233)the Natural Science Foundation of Shaanxi Province (Grant No. 2012JM8030, 2011JQ8003)
文摘In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
基金supported by the National Natural Science Foundation of China(NSFC) under Grant(No. 61461136001)
文摘In limited feedback-based CloudRAN(C-RAN) systems,the inter-cluster and intra-cluster interference together with the quantification error can seriously deteriorates the system spectral efficiency.We,in this paper,propose an efficient three-phase framework and corresponding algorithms for dealing with this problem.Firstly,a greedy scheduling algorithm based on the lower bound of the ergodic rate is performed for generating an elementary cluster in the first phase.And then the elementary cluster is divided into many small clusters according to the following proposed algorithms based on the short term instantaneous information in the second phase.In the end,based on the limited feedback two zero-forcing(ZF) precoding strategies are adopted for reducing the intra-cluster interference in the third phase.The provided Monte Carlo simulations show the effectiveness of our proposed algorithms in the respect of system spectral efficiency and average user rate.