Matching Items (3)
152767-Thumbnail Image.png
Description
Voice and other circuit switched services in a LTE deployment can be based on a Circuit Switched Fall Back mechanism or on the upcoming Voice Over LTE option. Voice Over LTE option can be used with its SIP based signaling to route voice calls and other circuit switched services over

Voice and other circuit switched services in a LTE deployment can be based on a Circuit Switched Fall Back mechanism or on the upcoming Voice Over LTE option. Voice Over LTE option can be used with its SIP based signaling to route voice calls and other circuit switched services over the LTE's packet switched core. The main issue that is faced though is the validation of this approach before the deployment over commercial network. The test strategy devised as a result of this work will be able to visit corner scenarios and error sensitive services, so that signaling involved can be verified to ensure a robust deployment of the Voice Over LTE network. Signaling test strategy is based on the observations made during a simulated Voice Over LTE call inside the lab in a controlled environment. Emergency services offered are carefully studied to devise a robust test strategy to make sure that any service failure is avoided. Other area were the service is routed via different protocol stack layer than it normally is in a legacy circuit switched core are identified and brought into the scope of the test strategy.
ContributorsThotton Veettil, Vinayak (Author) / Reisslein, Martin (Thesis advisor) / Ying, Lei (Committee member) / McGarry, Michael (Committee member) / Arizona State University (Publisher)
Created2014
154873-Thumbnail Image.png
Description
Wireless communication technologies have been playing an important role in modern society. Due to its inherent mobility property, wireless networks are more vulnerable to passive attacks than traditional wired networks. Anonymity, as an important issue in mobile network environment, serves as the first topic that leads to all the research

Wireless communication technologies have been playing an important role in modern society. Due to its inherent mobility property, wireless networks are more vulnerable to passive attacks than traditional wired networks. Anonymity, as an important issue in mobile network environment, serves as the first topic that leads to all the research work presented in this manuscript. Specifically, anonymity issue in Mobile Ad hoc Networks (MANETs) is discussed with details as the first section of research.



To thoroughly study on this topic, the presented work approaches it from an attacker's perspective. Under a perfect scenario, all the traffic in a targeted MANET exhibits the communication relations to a passive attacker. However, localization errors pose a significant influence on the accuracy of the derived communication patterns. To handle such issue, a new scheme is proposed to generate super nodes, which represent the activities of user groups in the target MANET. This scheme also helps reduce the scale of monitoring work by grouping users based on their behaviors.



The first part of work on anonymity in MANET leads to the thought on its major cause. The link-based communication pattern is a key contributor to the success of the traffic analysis attack. A natural way to circumvent such issue is to use link-less approaches. Information Centric Networking (ICN) is a typical instance of such kind. Its communication pattern is able to overcome the anonymity issue with MANET. However, it also comes with its own shortcomings. One of them is access control enforcement. To tackle this issue, a new naming scheme for contents transmitted in ICN networks is presented. This scheme is based on a new Attribute-Based Encryption (ABE) algorithm. It enforces access control in ICN with minimum requirements on additional network components.



Following the research work on ABE, an important function, delegation, exhibits a potential security issue. In traditional ABE schemes, Ciphertext-Policy ABE (CP-ABE), a user is able to generate a subset of authentic attribute key components for other users using delegation function. This capability is not monitored or controlled by the trusted third party (TTP) in the cryptosystem. A direct threat caused from this issue is that any user may intentionally or unintentionally lower the standards for attribute assignments. Unauthorized users/attackers may be able to obtain their desired attributes through a delegation party instead of directly from the TTP. As the third part of work presented in this manuscript, a three-level delegation restriction architecture is proposed. Furthermore, a delegation restriction scheme following this architecture is also presented. This scheme allows the TTP to have full control on the delegation function of all its direct users.
ContributorsLi, Bing (Author) / Huang, Dijiang (Thesis advisor) / Xue, Guoliang (Committee member) / Ahn, Gail-Joon (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2016
149303-Thumbnail Image.png
Description
To establish reliable wireless communication links it is critical to devise schemes to mitigate the effects of the fading channel. In this regard, this dissertation analyzes two types of systems: point-to-point, and multiuser systems. For point-to-point systems with multiple antennas, switch and stay diversity combining offers a substantial complexity reduction

To establish reliable wireless communication links it is critical to devise schemes to mitigate the effects of the fading channel. In this regard, this dissertation analyzes two types of systems: point-to-point, and multiuser systems. For point-to-point systems with multiple antennas, switch and stay diversity combining offers a substantial complexity reduction for a modest loss in performance as compared to systems that implement selection diversity. For the first time, the design and performance of space-time coded multiple antenna systems that employ switch and stay combining at the receiver is considered. Novel switching algorithms are proposed and upper bounds on the pairwise error probability are derived for different assumptions on channel availability at the receiver. It is proved that full spatial diversity is achieved when the optimal switching threshold is used. Power distribution between training and data codewords is optimized to minimize the loss suffered due to channel estimation error. Further, code design criteria are developed for differential systems. Also, for the special case of two transmit antennas, new codes are designed for the differential scheme. These proposed codes are shown to perform significantly better than existing codes. For multiuser systems, unlike the models analyzed in literature, multiuser diversity is studied when the number of users in the system is random. The error rate is proved to be a completely monotone function of the number of users, while the throughput is shown to have a completely monotone derivative. Using this it is shown that randomization of the number of users always leads to deterioration of performance. Further, using Laplace transform ordering of random variables, a method for comparison of system performance for different user distributions is provided. For Poisson users, the error rates of the fixed and random number of users are shown to asymptotically approach each other for large average number of users. In contrast, for a finite average number of users and high SNR, it is found that randomization of the number of users deteriorates performance significantly.
ContributorsBangalore Narasimhamurthy, Adarsh (Author) / Tepedelenlioğlu, Cihan (Thesis advisor) / Duman, Tolga M. (Committee member) / Spanias, Andreas S (Committee member) / Reisslein, Martin (Committee member) / Papandreou-Suppappola, Antonia (Committee member) / Arizona State University (Publisher)
Created2010