267 research outputs found

    Sprouting SEAD: Exploring Youth Southeast Asian Leadership Towards Abolitionist Futures

    Get PDF
    After a whirlwind summer with the Southeast Asian Diaspora Project, I reflect on my experiences there as a young Southeast Asian woman who is in youth work. Through analyzing the potential of queer activism, the history of Asian activism, the Stop AAPI Hate movement, and Asian solidarity with other BIPOC specifically right after the murder of George Floyd, I aim to provide suggestions for how Southeast Asian youth organizing could look like in the future to maintain an abolitonist vision and a strong dedication to the community. I emphasize the importance of grounding future activism outside of identity, the potential of horizontal leadership, and why youth must be the leaders of these future movements. I also provide examples of current Southeast Asian or BIPOC and queer organizations like PrYSM and Freedom Inc that are youth led that are good signs for the future. This is only the beginning of a much longer conversation and I intend to take my findings from this paper to apply to my own curriculum building for youth leadership programming

    Opportunistic secure transmission for wireless relay networks with modify-and-forward protocol

    Get PDF
    This paper investigates the security at the physical layer in cooperative wireless networks (CWNs) where the data transmission between nodes can be realised via either direct transmission (DT) or relaying transmission (RT) schemes. Inspired by the concept of physical-layer network coding (PNC), a secure PNC-based modify-and-forward (SPMF) is developed to cope with the imperfect shared knowledge of the message modification between relay and destination in the conventional modify-and-forward (MF). In this paper, we first derive the secrecy outage probability (SOP) of the SPMF scheme, which is shown to be a general expression for deriving the SOP of any MF schemes. By comparing the SOPs of various schemes, the usage of the relay is shown to be not always necessary and even causes a poorer performance depending on target secrecy rate and quality of channel links. To this extent, we then propose an opportunistic secure transmission protocol to minimise the SOP of the CWNs. In particular, an optimisation problem is developed in which secrecy rate thresholds (SRTs) are determined to find an optimal scheme among various DT and RT schemes for achieving the lowest SOP. Furthermore, the conditions for the existence of SRTs are derived with respect to various channel conditions to determine if the relay could be relied on in practice

    A physical layer network coding based modify-and-forward with opportunistic secure cooperative transmission protocol

    Get PDF
    This paper investigates a new secure relaying scheme, namely physical layer network coding based modify-and-forward (PMF), in which a relay node linearly combines the decoded data sent by a source node with an encrypted key before conveying the mixed data to a destination node. We first derive the general expression for the generalized secrecy outage probability (GSOP) of the PMF scheme and then use it to analyse the GSOP performance of various relaying and direct transmission strategies. The GSOP performance comparison indicates that these transmission strategies offer different advantages depending on the channel conditions and target secrecy rates, and relaying is not always desirable in terms of secrecy. Subsequently, we develop an opportunistic secure transmission protocol for cooperative wireless relay networks and formulate an optimisation problem to determine secrecy rate thresholds (SRTs) to dynamically select the optimal transmission strategy for achieving the lowest GSOP. The conditions for the existence of the SRTs are derived for various channel scenarios

    On the handover security key update and residence management in LTE networks

    Get PDF
    In LTE networks, key update and residence management have been investigated as an effective solution to cope with desynchronization attacks in mobility management entity (MME) handovers. In this paper, we first analyse the impacts of the key update interval (KUI) and MME residence interval (MRI) on the handover performance in terms of the number of exposed packets (NEP) and signaling overhead rate (SOR). By deriving the bounds of the NEP and SOR over the KUI and MRI, it is shown that there exists a tradeoff between the NEP and the SOR, while our aim is to minimise both of them simultaneously. This accordingly motivates us to propose a multiobjective optimisation problem to find the optimal KUI and MRI that minimise both the NEP and SOR. By introducing a relative importance factor between the SOR and NEP along with their derived bounds, we further transform the proposed optimisation problem into a single-objective optimisation problem which can be solved via a simple numerical method. In particular, the results show that a higher accuracy of up to 1 second is achieved with the proposed approach while requiring a lower complexity compared to the conventional approach employing iterative searches

    An optimal power allocation for D2D communications over multi-user cellular uplink channels

    Get PDF
    Device-to-Device (D2D) communications has emerged as a promising technology for optimizing spectral efficiency, reducing latency, improving data rate and increasing system capacity in cellular networks. Power allocation in D2D communication to maintain Quality-of-Service (QoS) remains as a challenging task. In this paper, we investigate the power allocation in D2D underlaying cellular networks with multi-user cellular uplink channel reuse. Specifically, this paper aims at minimizing the total transmit power of D2D users and cellular users (CUs) sub- ject to QoS requirement at each user in terms of the required signal-to- interference-plus-noise ratio (SINR) at D2D users and base station (BS) over uplink channel as well as their limited transmit power. We first derive expressions of SINR at the D2D users and BS based on which an optimization framework for power allocation is developed. We then propose an optimal power allocation algorithm for all D2D users and CUs by taking into account the property of non-negative inverse of a Z- matrix. The proposed algorithm is validated through simulation results which show the impacts of noise power, distance between D2D users, the number of D2D pairs and the number of CUs on the power allocation in the D2D underlaying cellular networks

    Secure information transmission and power transfer in cellular networks

    Get PDF
    This letter studies simultaneous data transmission and power transfer for multiple information receivers (IRs) and energy-harvesting receivers (ERs) in cellular networks. We formulate an optimization problem to minimize the total transmit power across the network subject to the following three sets of constraints: i) data reliability by maintaining the required level of signal to interference plus noise ratio (SINR) for all IRs; ii) information security by keeping all SINR levels of the intended IRs measured at each ER below a predefined value, which helps prevent possible eavesdroppers, i.e., ERs, from detecting information aimed for the IRs; and iii) energy harvesting by guaranteeing the required level of received power at each ER. Using semidefinite relaxation technique, the proposed problem is then transformed into a convex form which is proved to always yield rank-one optimal solution

    Beamforming in coexisting wireless systems with uncertain channel state information

    Get PDF
    This paper considers an underlay access strategy for coexisting wireless networks where the secondary system utilizes the primary spectrum to serve its users. We focus on the practical cases where there is uncertainty in the estimation of channel state information (CSI). Here the throughput performance of each system is limited by the interference imposed by the other, resulting in conflicting objectives. We first analyze the fundamental tradeoff between the tolerance interference level at the primary system and the total achievable throughput of the secondary users. We then introduce a beamforming design problem as a multiobjective optimization to minimize the interference imposed on each of the primary users while maximizing the intended signal received at every secondary user, taking into account the CSI uncertainty. We then map the proposed optimization problem to a robust counterpart under the maximum CSI estimation error. The robust counterpart is then transformed into a standard convex semi-definite programming. Simulation results confirm the effectiveness of the proposed scheme against various levels of CSI estimation error. We further show that in the proposed approach, the trade-off in the two systems modelled by Pareto frontier can be engineered by adjusting system parameters. For instance, the simulations show that at the primary system interference thresholds of -10 dBm (-5 dBm) by increasing number of antennas from 4 to 12, the secondary system throughput is increased by 3.3 bits/s/channel-use (5.3 bits/s/channel-use

    Optimising energy efficiency of non-orthogonal multiple access for wireless backhaul in heterogeneous cloud radio access network

    Get PDF
    This paper studies the downlink problem of a cloud-based central station (CCS) to multiple base stations (BSs) in a heterogeneous cellular network sharing the same time and frequency resources. We adopt non-orthogonal multiple access (NOMA) and propose power allocation for the wireless downlink in the heterogeneous cloud radio access network (HCRAN). Taking into account practical channel modelling with power consumptions at BSs of different cell types (e.g. macro-cell, micro-cell, etc.) and backhauling power, we analyse the energy efficiency (EE) of the practical HCRAN utilising NOMA. Simulation results indicate that the proposed NOMA for the HCRAN outperforms the conventional orthogonal frequency division multiple access (OFDMA) scheme in terms of providing higher EE of up to four times. Interestingly, the results reveal a fact that the EE of the NOMA approach is not always an increasing function of the number of BSs but varies as a quasiconcave function. This motivates us to further introduce an optimisation problem to find the optimal number of BSs that maximises the EE of the HCRAN. It is shown that, with a low power supply at the CCS, a double number of micro BSs can be served by HCRAN providing an improved EE of up to 1.6 times compared to the macro BSs and RRHs, while they achieve the same EE performance with high-power CCS

    On the nanocommunications at THz band in graphene-enabled wireless network-on-chip

    Get PDF
    One of the main challenges towards the growing computation-intensive applications with scalable bandwidth requirement is the deployment of a dense number of on-chip cores within a chip package. To this end, this paper investigates the Wireless Network-on-Chip (WiNoC), which is enabled by graphene- based nanoantennas (GNAs) in Terahertz frequency band. We first develop a channel model between the GNAs taking into account the practical issues of the propagation medium, such as transmission frequency, operating temperature, ambient pressure and distance between the GNAs. In the Terahertz band, not only dielectric propagation loss (DPL) but also molecular absorption attenuation (MAA) caused by various molecules and their isotopologues within the chip package constitute the loss of signal transmission. We further propose an optimal power allocation to achieve the channel capacity subject to transmit power constraint. By analysing the effects of the MAA on the path loss and channel capacity, the proposed channel model shows that the MAA significantly degrades the performance at certain frequency ranges, e.g. 1.21 THz, 1.28 THz and 1.45 THz, of up to 31.8% compared to the conventional channel model, even when the GNAs are very closely located of only 0.01 mm. More specifically, at transmission frequency of 1 THz, the channel capacity of the proposed model is shown to be much lower than that of the conventional model over the whole range of temperature and ambient pressure of up to 26.8% and 25%, respectively. Finally, simulation results are provided to verify the analytical findings

    A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks

    Get PDF
    As one of the most reliable technologies, network intrusion detection system (NIDS) allows the monitoring of incoming and outgoing traffic to identify unauthorised usage and mishandling of attackers in computer network systems. To this extent, this paper investigates the experimental performance of Snort-based NIDS (S-NIDS) in a practical network with the latest technology in various network scenarios including high data speed and/or heavy traffic and/or large packet size. An effective testbed is designed based on Snort using different muti-core processors, e.g., i5 and i7, with different operating systems, e.g., Windows 7, Windows Server and Linux. Furthermore, considering an enterprise network consisting of multiple virtual local area networks (VLANs), a centralised parallel S-NIDS (CPS-NIDS) is proposed with the support of a centralised database server to deal with high data speed and heavy traffic. Experimental evaluation is carried out for each network configuration to evaluate the performance of the S-NIDS in different network scenarios as well as validating the effectiveness of the proposed CPS-NIDS. In particular, by analysing packet analysis efficiency, an improved performance of up to 10% is shown to be achieved with Linux over other operating systems, while up to 8% of improved performance can be achieved with i7 over i5 processors
    corecore