Call Request

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 69 Experts worldwide ranked by ideXlab platform

Jyhhorng Wen - One of the best experts on this subject based on the ideXlab platform.

  • packet construction for secure conference Call Request in ad hoc network systems
    Information Sciences, 2007
    Co-Authors: Hsingchung Chen, Shiuhjeng Wang, Jyhhorng Wen
    Abstract:

    In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference Call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one's own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference Call. Furthermore, due to the mobility of nodes in an ad hoc network environment, it is likely that some nodes quit or join during the operation of this conference. To solve these problems, we employ an information exchange table for each participant node in order to manage a secure conference Call in an ad hoc network system. In addition, our scheme employs only one cryptographic algorithm of the secret-key system. The extraction of the secure sub-packets associated with each intended receiver is protected on the basis of the Diffie-Hellman key exchange protocol with the trusted public-key exchange. Therefore, the subsequent message recovery is successfully accomplished. This provides a new and feasible solution for a secure conference Call in an ad hoc network system.

Hsingchung Chen - One of the best experts on this subject based on the ideXlab platform.

  • packet construction for secure conference Call Request in ad hoc network systems
    Information Sciences, 2007
    Co-Authors: Hsingchung Chen, Shiuhjeng Wang, Jyhhorng Wen
    Abstract:

    In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference Call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one's own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference Call. Furthermore, due to the mobility of nodes in an ad hoc network environment, it is likely that some nodes quit or join during the operation of this conference. To solve these problems, we employ an information exchange table for each participant node in order to manage a secure conference Call in an ad hoc network system. In addition, our scheme employs only one cryptographic algorithm of the secret-key system. The extraction of the secure sub-packets associated with each intended receiver is protected on the basis of the Diffie-Hellman key exchange protocol with the trusted public-key exchange. Therefore, the subsequent message recovery is successfully accomplished. This provides a new and feasible solution for a secure conference Call in an ad hoc network system.

Yunghan Chen - One of the best experts on this subject based on the ideXlab platform.

  • utility and game theory based network selection scheme in heterogeneous wireless networks
    Wireless Communications and Networking Conference, 2009
    Co-Authors: Chungju Chang, Tsungli Tsai, Yunghan Chen
    Abstract:

    The paper proposes a utility function and game theory (UGT) based network selection scheme to maximize accommodated number of Calls, minimize handoff occurrence frequency, and fulfill quality of service (QoS) requirements in heterogeneous wireless networks. When a new Call or a handoff Call arrives, UGT would calculate the utility value and preference value for each candidate network based on the QoS satisfaction of the Call Request and the cooperative game computation. Finally, the network, which has the maximum result of linearly combined utility value and preference value, would be selected as the most suitable network for the Call Request. Simulation results show that UGT has good QoS satisfaction. It also allows system to accommodate more Calls than iterative TOPSIS scheme. In addition, UGT can reduce the handoff occurrence frequency by about 30% as compared to iterative TOPSIS.

Sehyun Oh - One of the best experts on this subject based on the ideXlab platform.

  • Performance analysis of channel assignment methods for multiple carrier CDMA cellular systems
    1999 IEEE 49th Vehicular Technology Conference (Cat. No.99CH36363), 1999
    Co-Authors: Bongyong Song, Sehyun Oh
    Abstract:

    We analyze performance of two channel assignment methods applicable to multiple carrier CDMA cellular systems. They are ICCA (independent carrier channel assignment) method and CCCA (combined carrier channel assignment) method. In ICCA, traffic channels of each carrier are handled independently so that each MS (mobile station) is allocated a traffic channel of the same carrier as is used in its idle state. In contrast, CCCA scheme combines all traffic channels in a system. When a BS (base station) receives a new Call Request, a BS searches least occupied carrier and allocates a traffic channel in that carrier. For the smooth handoff (soft handoff), carrier transition is not allowed for a handoff Call. Performance measures considered are Erlang capacity, H/W resource utilization and cell coverage stability. It is shown that CCCA outperforms ICCA in each performance measure.

Shiuhjeng Wang - One of the best experts on this subject based on the ideXlab platform.

  • packet construction for secure conference Call Request in ad hoc network systems
    Information Sciences, 2007
    Co-Authors: Hsingchung Chen, Shiuhjeng Wang, Jyhhorng Wen
    Abstract:

    In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference Call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one's own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference Call. Furthermore, due to the mobility of nodes in an ad hoc network environment, it is likely that some nodes quit or join during the operation of this conference. To solve these problems, we employ an information exchange table for each participant node in order to manage a secure conference Call in an ad hoc network system. In addition, our scheme employs only one cryptographic algorithm of the secret-key system. The extraction of the secure sub-packets associated with each intended receiver is protected on the basis of the Diffie-Hellman key exchange protocol with the trusted public-key exchange. Therefore, the subsequent message recovery is successfully accomplished. This provides a new and feasible solution for a secure conference Call in an ad hoc network system.