Loading...
  • Home
  • Search Results
2277-2278 of 4327 Papers

HARDWARE IMPLEMENTATION OF A TURBO CODE WITH 3 DIMENSIONS ON FPGA

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): AAROUD ABDESSADEK , ALI EL HORE , MENSOURI MOHAMMED

Abstract: Recent wireless communication standards such as 3GPP-LTE, WiMax, DVB-SH, HSPA and LTE / LTE advanced incorporate turbo code for their excellent performance. In this paper, we present a new 3 dimensional turbo decoder including bit error rate (BER) is much better than the 2 dimensional turbo decoder used by LTE / LTE advanced, as is illustrated by simulation. We also address the issue of the implementation of the 3 dimensional turbo decoder on FPGA using the environment QUARTUS II. In this work, we also present the implementation on FPGA of 3 dimensional Turbo encoder using two interleavers QPP (Quadratic Permutation Polynomial) and ARP (Almost Regular Rotation). In decoding scheme, the core of the iterative decoding structure is a soft-input soft-output (SISO) decoder. The MAP algorithm, which is used for SISO decoders, embodies complex mathematical operations such as division, exponential and logarithm calculations. Therefore, MAP algorithm was avoided and the sub-optimal derivatives

  • Publication Date: 11-Oct-2015
  • DOI: 10.15224/978-1-63248-064-4-24
  • Views: 0
  • Downloads: 0

DETECTING AND FOCALIZING SPOOFING ATTACKS IN WIRELESS NETWORKS

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): NEELAVATHY PARI S , NEELAVATHY PARI S , SIVA KUMAR G R

Abstract: An important problem in wireless network security is node authentication. The existing schemes for node authentication are based on IP and MAC address which can be easily spoofed by the adversaries. Wireless spoofing attacks are easy to establish and significantly affects the functionality of the network. In the proposed approach, log files are used for authenticating each node which is hard to falsify and difficult to modify or delete the contents. The proposed system determines the spoofing attacks and localize the adversaries using spatial correlation of received signal strength (RSS). In this paper, the problem of identifying the number of attackers is determined by Partitioning Around Mediods (PAM), a cluster-based analysis method and Euclidean distance between successive packets. The simulation results show that the proposed approach over performs all other existing approaches with high detection ratio

  • Publication Date: 11-Oct-2015
  • DOI: 10.15224/978-1-63248-064-4-25
  • Views: 0
  • Downloads: 0