ieice communications express, vol.4, no.11, 317 320 ... · structure is the multiple assignment...

29
Optimal multiple assignment scheme for strongly secure ramp secret sharing schemes with general access structures* Ryutaroh Matsumoto a) Dept. of Communications and Computer Engineering, Tokyo Institute of Technology, Meguro-ku, Tokyo 1528550, Japan a) [email protected] Abstract: Iwamoto et al. proposed the strong security denition for ramp secret sharing schemes with general access structures, and also proposed an integer optimization approach to construct a secret sharing with the smallest share size and general access structure, based on a threshold secret sharing scheme. This note proves that if the underlying threshold scheme is strongly secure then the constructed multiple assignment scheme gives a strongly secure secret sharing scheme. Keywords: secret sharing, access structure, strong security Classication: Fundamental Theories for Communications References [1] A. Shamir, How to share a secret,Commun. ACM, vol. 22, no. 11, pp. 612613, Nov. 1979. DOI:10.1145/359168.359176 [2] D. R. Stinson, Cryptography Theory and Practice, 3rd ed., Chapman & Hall/ CRC, 2006. [3] G. R. Blakley and C. Meadows, Security of ramp schemes,Advances in CryptologyCRYPTO84, Lecture Notes in Computer Science, vol. 196, pp. 242269, Springer-Verlag, 1985. DOI:10.1007/3-540-39568-7_20 [4] H. Yamamoto, Secret sharing system using (k, l, n) threshold scheme,Electronics and Communications in Japan (Part I: Communications), vol. 69, no. 9, pp. 4654, 1986 (the original Japanese version published in 1985). DOI:10.1002/ecja.4410690906 [5] W. Ogata, K. Kurosawa, and S. Tsujii, Nonperfect secret sharing schemes,Advances in Cryptology AUSCRYPT 92, Lecture Notes in Computer Science, vol. 718, pp. 5666, Springer-Verlag, 1993. DOI:10.1007/3-540- 57220-1_52 [6] M. Iwamoto and H. Yamamoto, Strongly secure ramp secret sharing schemes for general access structures,Inf. Process. Lett., vol. 97, no. 2, pp. 5257, Jan. 2006. DOI:10.1016/j.ipl.2005.09.012 [7] M. Ito, A. Saito, and T. Nishizeki, Multiple assignment scheme for sharing secret,J. Cryptol., vol. 6, no. 1, pp. 1520, March 1993. DOI:10.1007/ + The same manuscript was submitted to an unrefereed domestic conference 38th Symposium on Information Theory and its Applications (SITA2015) Kojima, Okayama, Japan, Nov. 2427, 2015. © IEICE 2015 DOI: 10.1587/comex.4.317 Received September 15, 2015 Accepted October 6, 2015 Published November 4, 2015 317 IEICE Communications Express, Vol.4, No.11, 317320

Upload: others

Post on 18-Jun-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

Optimal multiple assignmentscheme for strongly secureramp secret sharing schemeswith general accessstructures*

Ryutaroh Matsumotoa)

Dept. of Communications and Computer Engineering, Tokyo Institute of Technology,

Meguro-ku, Tokyo 152–8550, Japan

a) [email protected]

Abstract: Iwamoto et al. proposed the strong security definition for ramp

secret sharing schemes with general access structures, and also proposed an

integer optimization approach to construct a secret sharing with the smallest

share size and general access structure, based on a threshold secret sharing

scheme. This note proves that if the underlying threshold scheme is strongly

secure then the constructed multiple assignment scheme gives a strongly

secure secret sharing scheme.

Keywords: secret sharing, access structure, strong security

Classification: Fundamental Theories for Communications

References

[1] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11,pp. 612–613, Nov. 1979. DOI:10.1145/359168.359176

[2] D. R. Stinson, Cryptography Theory and Practice, 3rd ed., Chapman & Hall/CRC, 2006.

[3] G. R. Blakley and C. Meadows, “Security of ramp schemes,” Advances inCryptology–CRYPTO’84, Lecture Notes in Computer Science, vol. 196,pp. 242–269, Springer-Verlag, 1985. DOI:10.1007/3-540-39568-7_20

[4] H. Yamamoto, “Secret sharing system using (k, l, n) threshold scheme,”Electronics and Communications in Japan (Part I: Communications), vol. 69,no. 9, pp. 46–54, 1986 (the original Japanese version published in 1985).DOI:10.1002/ecja.4410690906

[5] W. Ogata, K. Kurosawa, and S. Tsujii, “Nonperfect secret sharing schemes,”Advances in Cryptology – AUSCRYPT ’92, Lecture Notes in ComputerScience, vol. 718, pp. 56–66, Springer-Verlag, 1993. DOI:10.1007/3-540-57220-1_52

[6] M. Iwamoto and H. Yamamoto, “Strongly secure ramp secret sharing schemesfor general access structures,” Inf. Process. Lett., vol. 97, no. 2, pp. 52–57,Jan. 2006. DOI:10.1016/j.ipl.2005.09.012

[7] M. Ito, A. Saito, and T. Nishizeki, “Multiple assignment scheme for sharingsecret,” J. Cryptol., vol. 6, no. 1, pp. 15–20, March 1993. DOI:10.1007/

+The same manuscript was submitted to an unrefereed domestic conference 38th Symposium on InformationTheory and its Applications (SITA2015) Kojima, Okayama, Japan, Nov. 24–27, 2015.

© IEICE 2015DOI: 10.1587/comex.4.317Received September 15, 2015Accepted October 6, 2015Published November 4, 2015

317

IEICE Communications Express, Vol.4, No.11, 317–320

Page 2: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

BF02620229[8] M. Iwamoto, H. Yamamoto, and H. Ogawa, “Optimal multiple assignments

based on integer programming in secret sharing schemes with general accessstructures,” IEICE Trans. Fundamentals, vol. E90-A, no. 1, pp. 101–111, Jan.2007. DOI:10.1093/ietfec/e90-a.1.101

[9] M. Nishiara and K. Takizawa, “Strongly secure secret sharing scheme withramp threshold based on Shamir’s polynomial interpolation scheme,” Trans.IEICE, vol. J92-A, no. 12, pp. 1009–1013, Dec. 2009. http://ci.nii.ac.jp/naid/110007483234/en

[10] R. J. McEliece and D. V. Sarwate, “On sharing secrets and Reed-Solomoncodes,” Commun. ACM, vol. 24, no. 9, pp. 583–584, Sept. 1981. DOI:10.1145/358746.358762

1 Introduction

Secret sharing (SS) [1] is a cryptographic scheme to encode a secret to multiple

shares being distributed to participants, so that only qualified sets of participants

can reconstruct the original secret from their shares. A set of participants is called

forbidden if the set has absolutely no information about the secret. A secret sharing

scheme is called perfect [2] if every set of participants is always qualified or

forbidden. If a set is neither qualified or forbidden in a secret sharing scheme, the

scheme is said to be ramp or non-perfect. A set is said to be intermediate if it is

neither qualified nor forbidden. A merit of the ramp schemes is to reduce share

size (the number of bits) while keeping the secret size [3, 4, 5]. A drawback of

ramp schemes is that part of the secret can be known to an intermediate set of

participants. To exclude such a possibility, Yamamoto and Iwamoto [4, 6] defined

the notion of strong security for the ramp schemes.

On the other hand, traditionally, the access structure called the threshold

structure has been the most focused one, where a set of participants is qualified

if and only if the number of participants is �t. A scheme with a threshold structure

is called a threshold scheme. A well-known method to realize an arbitrary access

structure is the multiple assignment scheme proposed by Shamir [1] and named by

Ito et al. [7]. It assigns multiple shares of a threshold scheme to single participant,

and a single share can be assigned to multiple participants.

Ito et al. [7] did not consider to minimize the share size. Later, Iwamoto et al.

[8] proposed an integer optimization approach to construct a secret sharing scheme

with the minimum share size based on a threshold scheme. Despite they proposed

the strong security criterion, they did not considered the strong security property of

their proposal [8]. This note shows that if the underlying threshold scheme is

strongly secure in the sense of [6] then the scheme constructed by [8] is also

strongly secure.

2 Notation and the main lemma

Let q be a prime power, and Fq the finite field with q elements. In this note we

assume that secret and all shares are vectors over Fq. We will define the access

structure when there are n participants and secret consists of L symbols in Fq. Let Vi

© IEICE 2015DOI: 10.1587/comex.4.317Received September 15, 2015Accepted October 6, 2015Published November 4, 2015

318

IEICE Communications Express, Vol.4, No.11, 317–320

Page 3: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

be the random variable of the i-th share for i ¼ 1; . . . ; n, and S the random variable

of the secret. We assume the uniform probability distribution of S. The encoding

rule of a secret sharing scheme is a conditional joint probability distribution of

ðV1; . . . ; VnÞ given secret S. The encoding rule determines a joint probability

distribution of ðS; V1; . . . ; VnÞ. For a set T, 2T denotes its power set fT0 j T0 is a

subset of Tg, and we have j2T j ¼ 2jTj. For i ¼ 0; . . . ; L, we define Ai � 2f1;...;ng by

Ai ¼ fA � f1; . . . ; ng j IðS; ðVjÞj2AÞ ¼ ig;where Ið�; �Þ is the mutual information in logq. We assume

2f1;...;ng ¼[L

i¼0Ai:

The collection A0; . . . ;AL is called the access structure. Recall that secret S is a

random variable on FLq . Let Si be the i-th component of S. A given secret sharing

scheme is said to be strongly secure [6] when A 2 Ai, B � f1; . . . ; Lg and jBj ¼L � i implies IððSjÞj2B; ðVkÞk2AÞ ¼ 0.

The multiple assignment map was introduced in [1] and named in [7], which is

reviewed in the following. It constructs a secret sharing scheme with n participants

from that with m participants. Usually the underlying secret sharing scheme is a

threshold scheme. The original scheme and the constructed scheme have the same

secret denoted by a uniform random variable S on FLq . Let W1; . . . ; Wm be the shares

of the original scheme. A multiple assignment map is a map Φ from f1; . . . ; ng to

2f1;...;mg. In the new constructed secret sharing scheme, the i-th participant receives

fWj j j 2 �ðiÞg as his/her share, which is denoted by Vi. Denote the access

structure of the original scheme by Aold0 ; . . . ;Aold

L , and that of the new constructed

scheme by Anew0 ; . . . ;Anew

L .

Main Lemma: If the original secret sharing scheme generating W1; . . . ; Wm is

strongly secure then the constructed scheme is also strongly secure.

Proof: Let Vi be the i-th share of the new constructed scheme, and Anew �f1; . . . ; ng represent a set of shares Vi. Since Vi consists of W1; . . . ; Wm, the set

Aold ¼[

i2Anew

�ðiÞ

is the set of original shares corresponding to the set Anew of the new shares. For a

set B � f1; . . . ; Lg, we have the equality

IððViÞi2Anew ; ðSjÞj2BÞ ¼ IððWiÞi2Aold ; ðSjÞj2BÞ;which implies

Anew 2 Anewi , Aold 2 Aold

i : ð1ÞEquation (1) and the strong security of the original scheme generating W1; . . . ; Wm

imply the strong security of the new constructed scheme. ■

3 How to construct strongly secure optimal multiple assignment

scheme

Nishiara and Takizawa [9] proved that the McEliece-Sarwate ramp secret sharing

scheme [10] is strongly secure. The McEliece-Sarwate scheme satisfies the defi-

© IEICE 2015DOI: 10.1587/comex.4.317Received September 15, 2015Accepted October 6, 2015Published November 4, 2015

319

IEICE Communications Express, Vol.4, No.11, 317–320

Page 4: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

nition of ðt; L; mÞ-ramp secret sharing scheme required in [8 Section 5]. Therefore

one can apply Iwamoto et al.’s proposal [8] to the McEliece-Sarwate scheme.

Iwamoto et al.’s proposal [8] generates a multiple assignment scheme that is

optimal in the sense that it minimizes the share sizes. By the main lemma proved

in this note, one can see that the constructed ramp secret sharing scheme is strongly

secure.

Acknowledgment

The author would like to thank Prof. Mitsugu Iwamoto for helpful discussion. This

research is partly supported by the Japan Society for the Promotion of Science

Grant Nos. 23246071 and 26289116.

© IEICE 2015DOI: 10.1587/comex.4.317Received September 15, 2015Accepted October 6, 2015Published November 4, 2015

320

IEICE Communications Express, Vol.4, No.11, 317–320

Page 5: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

Receiver positioning usingreceived signal strength

Chuanxue Jin, Xiaoning Huanga), Zhi Chen, and Wanbin TangNational Communications Lab., University of Electronic Science and Technology

of China, Chengdu 611731, China

a) [email protected]

Abstract: In wireless positioning, estimating the location of a receiver is

extremely challenging since the receiver does not transmit signal and it is

invisible to sensors. To deal with the issue, we proposes a received signal

strength (RSS)-based method to position the receiver based on the signal

from the corresponding transmitter. Our results indicate that the proposed

method has about 20∼40 meters positioning error in average, which reaches

the same level of the positioning error as the conventional RSS-based Tx

positioning methods.

Keywords: estimation, receiver, RSS, wireless positioning

Classification: Sensing

References

[1] G. Mao and B. Fidan, Localization algorithms and strategies for wireless sensornetworks, 2009.

[2] X. Li, “RSS-based location estimation with unknown path loss model,” IEEETrans. Wireless Commun., vol. 5, no. 12, pp. 3626–3633, Dec. 2006. DOI:10.1109/TWC.2006.256985

[3] R. M. Vaghefi, M. R. Gholami, R. M. Buehrer, and E. G. Strom, “Cooperativereceived signal strength-based sensor localization with unknown transmitpowers,” IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1389–1403, Mar.2013. DOI:10.1109/TSP.2012.2232664

[4] R. Zhang, “On active learning and supervised transmission of spectrum sharingbased cognitive radios by exploiting hidden primary radio feedback,” IEEETrans. Commun., vol. 58, no. 10, pp. 2960–2970, Oct. 2010. DOI:10.1109/TCOMM.2010.082710.090412

[5] E. Azzouz and A. Nandi, Automatic modulation recognition of communicationsignals, 2010.

[6] B. Ramkumar, “Automatic modulation classification for cognitive radios usingcyclic feature detection,” IEEE Circuits Syst. Mag., vol. 9, no. 2, pp. 27–45,Jun. 2009. DOI:10.1109/MCAS.2008.931739

[7] A. H. Sayed, A. Tarighat, and N. Khajehnouri, “Network-based wirelesspositioning: challenges faced in developing techniques for accurate wirelesslocation information,” IEEE Signal Process. Mag., vol. 22, no. 4, pp. 24–40,Jul. 2005. DOI:10.1109/MSP.2005.1458275

[8] 3GPP TR 25.814, “Physical layer aspects for evolved universal terrestrial radioaccess (UTRA),” 2006.

© IEICE 2015DOI: 10.1587/comex.4.321Received June 12, 2015Accepted June 26, 2015Published November 11, 2015

321

IEICE Communications Express, Vol.4, No.11, 321–326

Page 6: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

1 Introduction

Positioning an unknown node has been extensively studied in the past decades [1],

which is the essential technique for location-aware applications. Fig. 1(a) provides

a conventional wireless positioning scenario: some fixed sensors with known

locations (called anchors) measure the transmitted signal from an unknown node

(called target), then they estimate the location of the target. In existing literatures,

positioning algorithms include received signal strength (RSS) [2, 3], time of arrival

(TOA), time difference of arrival (TDOA), angle of arrival (AOA), etc. However,

they all belong to transmitter positioning technique since they treat the unknown

transmitter as the target.

In contrast, few contributions discuss receiver positioning technique since the

receiver works in a passive way and it is invisible to sensors, i.e., the receiver does

not transmit signal during the reception1. Therefore, receiver positioning becomes

extremely challenging. This significantly impedes the development of the location-

aware applications.

In this paper, we proposes an RSS-based receiver positioning method under the

scenario2 that multiple transmitters communicate with a common receiver using

time division multiple access (TDMA) protocol. In the proposed method, we treat

the multiple transmitters as the anchors, and position the receiver by estimating the

transmitter-to-receiver (Tx-Rx) distances, i.e., Anchor-Rx distances. It is reason-

able to treat those transmitters as the anchors as the location of the transmitters can

be obtained using the conventional transmitter positioning methods [1]. Regarding

the Tx-Rx distance estimation, our method exploits the close-loop power control

Fig. 1. System model.

1Even though the receiver may feedback information to its transmitter, it goes through another frequency band infrequency division duplex (FDD) systems. Thus, the receiver is still invisible (or silent) to the sensors since thefeedback channel may not be known to the sensors.2Even though this letter considers the many-to-one scenario, the proposed method can also be used in the point-to-point scenario when the transmitter is moving. This is because during the geographic travel of the transmitter, thesensors can obtain multiple locations of the transmitter as well as the corresponding distances to the receiver.

© IEICE 2015DOI: 10.1587/comex.4.321Received June 12, 2015Accepted June 26, 2015Published November 11, 2015

322

IEICE Communications Express, Vol.4, No.11, 321–326

Page 7: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

(CLPC) between the transmitters and the receiver, which has been widely used in

modern wireless communication systems. Under CLPC, the power adjustment of

the transmitters actually carries the Tx-Rx distance information. Therefore, by

measuring the transmission power of the transmitters, the sensors are able to

estimate the Tx-Rx distances and then obtain the location of the corresponding

receiver.

2 System model

Fig. 1(b) provides the system model of this paper, where M transmitters (labeled as

Tx), a receiver (labeled as Rx), and N sensors are uniformly distributed on a disk

with the radius R. Here, we denote li as the distance between the i-th Tx (denoted as

Txi) and the receiver, and dij as the distance between the i-th Tx and the j-th sensor

(denoted as Sensorj). In particular, we assume that the Txi’s location and the

corresponding Txi-Sensorj distances dij are known to the sensors. Next, we provide

the signal models for the Tx-Rx and Tx-Sensor links, respectively.

• Tx-Rx Links: We denote gi and qiðkÞ as the path-loss and shadowing

coefficients between the Txi and the Rx, where the former is modeled as gi ¼ C=l�i(C is a constant and α is the path-loss coefficient) and the latter follows log-normal

distribution with the standard deviation of δ. Here, k (1 � k � K) is the index of

independent shadowing. In static scenarios, we have K ¼ 1 during the positioning.

In time-varying scenarios, the shadowing coefficient varies with time, and then the

Txi and the Rx experiences K > 1 independent shadowing coefficients during the

positioning.

Let pi as the transmission power of the Txi, then the average SNR of the Rx

served by the Txi can be expressed as �iðkÞ ¼ pigiqiðkÞ, where the variance of the

noise at the Rx is normalized. When we consider the system with CLPC3, the Txiautomatically adjusts the transmission power to meet a certain target SNR at the Rx,

denoted as Γ4. Then, the transmission power of Txi can be obtained by

pi ¼ �

giqiðkÞ : ð1Þ

• Tx-Sensor Links: Similarly, we denote g0ij and q0ijðkÞ as the path-loss and

shadowing coefficients between the Txi and the Sensorj, which follow the same

model as in Tx-Rx links, then the average SNR at the Sensorj can be expressed as

� 0ijðkÞ ¼ pig0ijq

0ijðkÞ; ð2Þ

where the variance of the noise at the Sensorj is normalized. When adopting the

path-loss model g0ij ¼ C=d�ij and substituting (1) into (2), we can rewrite (2) as

� 0ijðkÞ ¼ �q0ijðkÞqiðkÞ

lidij

� ��

: ð3Þ

3Since this paper focuses on proposing the basic idea of Rx positioning, we consider the perfect CLPC [4], wherethe quantization error and time delay are not considered.4Even though Γ is the target SNR of the Rx, it can still be obtained by the Sensorj using blind signal processingtechnique, e.g., recognizing the modulation level of the Txi’s signal and obtaining the corresponding target SNR[5, 6].

© IEICE 2015DOI: 10.1587/comex.4.321Received June 12, 2015Accepted June 26, 2015Published November 11, 2015

323

IEICE Communications Express, Vol.4, No.11, 321–326

Page 8: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

3 RSS-based receiver positioning

3.1 Estimate the Tx-Rx distance

In this subsection, we first design a ML estimator to let each sensor obtain the Txi-

Rx distance. To facilitate the derivation, we rewrite (3) using dB unit and then

obtain the average SNR at the Sensorj as

� 0ij½dB�ðkÞ ¼ 10� log10lidij

� �þ q0ij½dB�ðkÞ � qi½dB�ðkÞ þ �½dB�: ð4Þ

Here, li is the unknown Tx-Rx distance to be estimated. q0ij½dB�ðkÞ and qi½dB�ðkÞare independent shadowing coefficients, which follow normal distribution in dB

unit, i.e., q0ij½dB�ðkÞ � Nð0; �2Þ and qi½dB�ðkÞ � Nð0; �2Þ. Then, we have q0ij½dB�ðkÞ �qi½dB�ðkÞ � Nð0; 2�2Þ.

If the sensor can obtain K average SNR with independent shadowing coef-

ficients, then we can obtain the K-dimension conditional probability density

function (PDF) as

f � 0ij½dB�ð1Þ; . . . ; � 0ij½dB�ðKÞjli

� � ¼ YKk¼1

e��0 ij½dB�ðkÞ�10� log10

�lidij

���½dB�

4�2ffiffiffiffiffiffi4�

p�

: ð5Þ

Using the standard maximum likelihood distance estimator, then the Sensorjcan obtain the Txi-Rx distance as

li ¼ dij � 101

10K�

PKk¼1

ð� 0ij½dB�ðkÞ��½dB�Þ: ð6Þ

Like other RSS-based distance estimators, the estimation in (6) is biased, i.e.,

Eflig ¼ E dij � 101

10K�

PKk¼1

ð� 0ij½dB�ðkÞ��½dB�Þ8<:

9=; ¼ li � e

�2

K�2 ; ð7Þ

where � ¼ 10K�= ln 10. By modifying the estimator, we can obtain the unbiased

estimation as follows

li ¼ dij � e��2

K�2 � 101

10K�

PKk¼1

ð� 0ij½dB�ðkÞ��½dB�Þ: ð8Þ

3.2 Positioning the receiver

Once we obtain the Tx-Rx distance, positioning the receiver becomes easy. Here,

we adopt the conventional linear method to estimate the Rx location [7]. Specif-

ically, we first derive the positioning method for one sensor, denoted as Sensorj,

and then obtain the Rx location using N sensors.

Let ðx0; y0Þ and ðxi; yiÞ as the locations of the Rx and Txi, respectively, where

i ¼ 1; 2; . . . ; M. We further let Di ¼ xi2 þ yi

2, then we have

HX ¼ b; ð9Þwhere

H ¼ðx2 � x1Þ ðy2 � y1Þ

..

. ...

ðxM � x1Þ ðyM � y1Þ

264

375; X ¼ x0

y0

� �; b ¼ 0:5

D2 � D1 � ðl22 � l21Þ...

DM � D1 � ðl2M � l21Þ

264

375:© IEICE 2015

DOI: 10.1587/comex.4.321Received June 12, 2015Accepted June 26, 2015Published November 11, 2015

324

IEICE Communications Express, Vol.4, No.11, 321–326

Page 9: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

Once solving the equation (9), we can obtain the location of the Rx as

X ¼ x0

y0

" #¼ ðHTHÞ�1HTb: ð10Þ

When we consider N sensors that can share their distance estimations, they can

obtain the average Tx-Rx distance by

�li ¼ 1

N

XNj

lðjÞi : ð11Þ

Substituting �li into (10), we can obtain the Rx’s location more accurately.

4 Simulation results

In this section, we demonstrate the performance of the proposed RSS-based

receiver positioning method. Here, M Txs, a Rx, and N sensors are uniformly

distributed on the disk with the radius R ¼ 100m. In the simulation, the system

bandwidth is B ¼ 10MHz, the power spectrum density of the noise is N0 ¼�174 dBm, and the target SNR of the Rx is � ¼ 10 dB. In wireless channels,

C ¼ �128:1 dB and � ¼ 3:76 are adopted according to [8]. Furthermore, 104

Monte Carlo trails are conducted for each simulation curve.

To evaluate the positioning performance, we define the root-mean-square error

(RMSE) as RMSE ¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiðx0 � x0Þ2 þ ðy0 � y0Þ2

p.

In Fig. 2, we consider the static scenario, where K ¼ 1. We assume that the

number of Txs M ¼ 10 in Fig. 2(a) and the number of sensors N ¼ 10 in Fig. 2(b).

From the two figure, we find that the number of Txs (M) dominates the RMSE as

the number of sensors (N) is larger than 5, i.e., N � 5. This is because we treat the

Tx as anchor and more anchors result in a better performance. In addition, we

compare the curves with different standard deviations of the shadowing. The

RMSE reduces as the standard deviation δ decreases from 6 to 2. This is because

the small δ introduces less uncertainty into the wireless channel.

Fig. 3 illustrates the RMSE of the proposed method versus the number of

independent shadowing coefficients (K), where M ¼ 10 Txs and N ¼ 10 sensors

are considered. Here, when K > 1, it is the time-varying scenario, which means that

Fig. 2. Impact of N and M on the RMSE of Rx positioning.

© IEICE 2015DOI: 10.1587/comex.4.321Received June 12, 2015Accepted June 26, 2015Published November 11, 2015

325

IEICE Communications Express, Vol.4, No.11, 321–326

Page 10: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

each node experiences K independent shadowing coefficients during the Rx

positioning. From the figure, the RMSE reduces as K increases from 1 to 20.

The reason is that the uncertainty of the shadowing can be reduced by considering

multiple independent shadowing coefficients. In particular, the proposed method

has about 20∼40m positioning error, where the Rx is uniformly located on a disk

with the radius 100m. This means that the proposed Rx positioning method

actually reaches the same level of the positioning error as the conventional RSS-

based Tx positioning methods. For example, the method in [2] has about 6m

positing error, where the Tx is uniformly located on a disk with the radius 20m.

5 Conclusions

In this paper, we proposed an RSS-based receiver positioning method to estimate

the location of an unknown receiver. Different from existing RSS-based position-

ing, our method treated the associated transmitters as the anchors, and conducted

the positioning by estimating the distances between the anchors and the receiver.

The simulation results showed the effectiveness of the proposed method.

With our method, the location-aware applications can be extended to many

scenarios. For example, a scenario where multiple wireless networks may share the

same frequency band, the proposed method enables one system to locate the other

base stations. This provides the crucial information for co-channel interference

management.

Acknowledgments

This paper is supported in part by the grant from Science and Technology on

Information Transmission and Dissemination in Communication Networks Labo-

ratory and by the National Natural Science Foundation of China (NS-FC) under

Grants 61271169.

Fig. 3. Impact of K on the RMSE of Rx positioning.

© IEICE 2015DOI: 10.1587/comex.4.321Received June 12, 2015Accepted June 26, 2015Published November 11, 2015

326

IEICE Communications Express, Vol.4, No.11, 321–326

Page 11: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

A simultaneous conjugate-matching algorithm forN-element array antennas

Kazuhiro Hondaa), Kazuki Kaga, Kun Li, and Koichi OgawaGraduate School of Engineering, Toyama University,

3190 Gofuku, Toyama-shi, Toyama 930–8555, Japan

a) [email protected]

Abstract: This paper presents an automatic impedance-matching algorithm

that can sequentially realize a simultaneous conjugate-matching state for all

the elements in an N-element array antenna. The analytical results show that

the converged solution obtained from the proposed algorithm agrees well

with the solution calculated by the analytical deterministic equation, con-

firming the validity of the proposed method. The method can be applied to

MIMO array antennas.

Keywords: simultaneous conjugate-matching, sequential algorithm,

MIMO array antenna

Classification: Antennas and Propagation

References

[1] K. Ogawa, T. Hayashi, and A. Yamamoto, “An analysis of frequencycharacteristics of a parallel dipole MIMO antenna considering the effects ofimpedance matching circuit,” IEICE Trans. Commun., vol. J92-B, no. 9,pp. 1416–1430, Sep. 2009.

[2] B. K. Lau, J. B. Andersen, G. Kristensson, and A. F. Molisch, “Impact ofmatching network on bandwidth of compact antenna arrays,” IEEE Trans.Antennas Propag., vol. 54, no. 11, pp. 3225–3238, Nov. 2006. DOI:10.1109/TAP.2006.883984

[3] K. Kagoshima, S. Takeda, A. Kagaya, and K. Ito, “Design and analysis ofdecoupling and matching feeding networks for array antennas,” IEICE Trans.Commun., vol. J97-B, no. 9, pp. 699–713, Sep. 2014.

[4] K. Kagoshima, T. Tanaka, S. Obote, and Y. Ichikawa, “Determination methodfor matched load impedance of a receiving array antenna,” IEICE Trans.Commun., vol. J90-B, no. 5, pp. 543–546, May 2007.

[5] J. W. Wallace and M. A. Jensen, “Termination-dependent diversity performanceof coupled antennas: network theory analysis,” IEEE Trans. Antennas Propag.,vol. 52, no. 1, pp. 98–105, Jan. 2004. DOI:10.1109/TAP.2003.822444

[6] K. Kaga, K. Li, K. Honda, and K. Ogawa, “A sequential automatic impedance-matching algorithm to achieve simultaneous complex-conjugate condition inmulti-element antennas,” IEEE International Workshop on Electromagnetics,Sapporo, Japan, PO1.12, pp. 24–25, Aug. 2014. DOI:10.1109/iWEM.2014.6963617

[7] K. Ogawa, T. Matsuyoshi, and K. Monma, “An analysis of the performance ofa handset diversity antenna influenced by head, hand and shoulder effects at© IEICE 2015

DOI: 10.1587/comex.4.327Received September 4, 2015Accepted October 15, 2015Published November 16, 2015

327

IEICE Communications Express, Vol.4, No.11, 327–332

Page 12: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

900MHz: part I— effective gain characteristics,” IEEE Trans. VehicularTechnol., vol. 50, no. 3, pp. 830–844, May 2001. DOI:10.1109/25.933316

1 Introduction

In mobile terminals, degradation of throughput occurs because of the bio-electro-

magnetic effects generated between the users and the terminal. In [1], it is reported

that the multiple-input multiple-output (MIMO) antenna applied to the conjugate-

matching, denoted as CM in [1], has a higher channel capacity compared with the

self-matching condition, denoted as Z11 in [1], when the bandwidth is less than

�1% with an antenna separation of 0:05� (see Figs. 16 and 17 in [1]). In the LTE

systems, the frequency bandwidth is 20MHz, which is 1% for the center frequency

of 2GHz. Therefore, the conjugate-matching is advantageous to the LTE MIMO

systems to increase the channel capacity.

In [2], it is reported that the matching efficiency of the multiport conjugate

match is higher than that of the input impedance match (see Fig. 10 in [2]), in

which the input impedance match is equivalent to the conjugate-matching intro-

duced in [1]. Therefore, the matching efficiency of the conjugate-matching will be

lower than that of the multiport conjugate match. However, the multiport conjugate

match needs to be applied to both transmitting and receiving sides simultaneously.

Thus, we use the conjugate-matching because it can be achieved only at receiving

side.

The methods described in [2, 3, 4, 5] must determine the analytical solution for

non-linear equation to achieve the conjugate-matching. However, it is difficult for a

MIMO mobile terminal to achieve the conjugate-matching using the analytical

method because self and mutual impedances are needed to analyze the non-linear

equation. Moreover, self and mutual impedances may be affected significantly

when the terminal is used in the vicinity of the human body or the metal object.

Therefore, a sequential method for achieving the conjugate-matching is required.

In this paper, we propose an optimum algorithm that can sequentially realize

simultaneous conjugate-matching state for all the elements in an N-element array

antenna [6]. The validity of the proposed method was verified, which indicates that

our algorithm can be applied to MIMO array antennas.

2 Automatic matching algorithm

Fig. 1 shows the structure of an N-element array antenna including an impedance

matching circuit (MC). In Fig. 1, ZLk and Zink (k ¼ 1 � N) indicate the complex

impedance at the load side and at the antenna side, respectively.

The purpose of the proposed method is to achieve a conjugate match ZLk ¼Zink

� in each element, where the asterisk (�) denotes the complex conjugate. The

following procedure demonstrates the proposed algorithm when N ¼ 2:

1. Determine Zin1 (ZL2 ¼ 50Ω as an initial value).

2. Make ZL1 ¼ Zin1� by adjusting MC1.

3. Determine Zin2.© IEICE 2015DOI: 10.1587/comex.4.327Received September 4, 2015Accepted October 15, 2015Published November 16, 2015

328

IEICE Communications Express, Vol.4, No.11, 327–332

Page 13: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

4. Make ZL2 ¼ Zin2� by adjusting MC2.

5. Back to the step 1 to determine Zin1.

Step 1 to Step 5 is repeated until jZLk � Zink�j < " (ε: Residual target).

Although the procedure mentioned above is exemplified for N ¼ 2, the proposed

method can be applied to any number of elements. For example, when N ¼ 3, the

algorithm can be used by adding the following two steps between Step 4 and

Step 5: Determine Zin3, Make ZL3 ¼ Zin3� by adjusting MC3.

Using the abovementioned algorithm, simultaneous conjugate-matching state

for all the elements in an N-element array antenna is possible, irrespective of the

structure of the array antenna.

3 Realization of the proposed algorithm

In order to realize the proposed algorithm, the circuit configuration mounted on a

terminal needs to be clarified. Fig. 2 shows the configuration of matching circuit for

one element. The matching circuit (MC1) of the antenna #1 is shown in detail, and

that of the other antennas is not shown for simplicity. The matching circuit shown

in Fig. 2 is a typical example because the circuit configuration may change

depending on the type of antenna. To achieve the conjugate-matching, the complex

impedances ZLk and Zink (k ¼ 1 � N), as shown in Fig. 1, are needed. In Fig. 2, the

complex impedances can be obtained by extracting signals from the three ports (A1,

B1 and C1) using two directional couplers and a switch SW1.

The voltage reflection coefficient �in1 with respect to the reference-plane (a)

between MC1 and antenna #1 shown in Fig. 2, is calculated from Eq. (1),

�in1 ¼ V1Ar

V1Atð1Þ

where the voltage V1At is a transmission voltage that is applied to MC1 from the

source Vg1A, and it is measured at port C1 when SW1 selects SA. The voltage V1Ar is

a reflection voltage flowing from the antenna #1 to MC1, and it is measured at port

Fig. 1. Proposed method of a sequential automatic impedance-match-ing.

© IEICE 2015DOI: 10.1587/comex.4.327Received September 4, 2015Accepted October 15, 2015Published November 16, 2015

329

IEICE Communications Express, Vol.4, No.11, 327–332

Page 14: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

A1 when SW1 selects SA. Then the complex impedance Zin1 can be calculated using

Eq. (2),

Zin1 ¼ Z01 þ �in1

1 � �in1ð2Þ

where Z0 ¼ 50Ω.

On the other hand, the voltage reflection coefficient �L10 with respect to the

reference-plane (a)B shown in Fig. 2, is calculated from Eq. (3),

�L10 ¼ V1Br

V1Btð3Þ

where the voltage V1Bt is a transmission voltage that is applied to MC1 from the

source Vg1B, and it is measured at port A1 when SW1 selects SB and Vg1A ¼ 0. The

voltage V1Br is a reflection voltage flowing from MC1 to the source Vg1B, and it is

measured at port B1 when SW1 selects SB and Vg1A ¼ 0. To achieve the conjugate-

matching, the voltage reflection coefficient �L1 with respect to the reference-plane

(a) in Fig. 2 should be evaluated, which can be calculated using �L10 from Eq. (3),

as shown in the following equation,

�L1 ¼ �L10e�j2�c ð4Þ

where �c is the phase shift value of the directional coupler between the reference-

plane (a) and (a)B in Fig. 2, where the insertion loss of the directional coupler is

assumed to be negligibly small. Then the complex impedance ZL1 can be calculated

using Eq. (5).

ZL1 ¼ Z01 þ �L1

1 � �L1ð5Þ

Using the circuit configuration shown in Fig. 2, the proposed algorithm can be

realized. The experimental verification will be addressed in future studies.

4 Analytical verification of the proposed method

An investigation was carried out using the method of moments with half-wave-

length dipole antennas at 900MHz. Fig. 3(a) shows the configuration of the array

when N ¼ 2, 3, and 4 in a square arrangement. The element spacing d was set to

Fig. 2. Configuration of a matching circuit.

© IEICE 2015DOI: 10.1587/comex.4.327Received September 4, 2015Accepted October 15, 2015Published November 16, 2015

330

IEICE Communications Express, Vol.4, No.11, 327–332

Page 15: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

2 cm (0:06�). The residual target ε was set to 0.1. Fig. 3(b) shows the relationship

between the iteration number and Zin1. Zin1 is the impedance looking into the

antenna side from the reference-plane (a) shown in Fig. 2. In Fig. 3(b), the blue,

red, and green lines show the relationship when N ¼ 2, 3, and 4. The combination

of the array elements used in different arrays is represented by boxes of the same

color in Figs. 3(a), 3(b) and 3(c); the array for N ¼ 2 is constructed with the

elements #1 and #2, and the array for N ¼ 3 is constructed with the elements #1,

#2, and #3. The solid and dashed curves in Fig. 3(b) represent the real and

imaginary part of the impedance, respectively.

The star symbols in Fig. 3(b) indicate the analytical solutions calculated from

the matched-load-determination equation when N ¼ 2 and 3 [4, 7]. Since the

determination equations are non-linear when N > 3 [4], we carried out numerical

analysis (Trust Region Method) using MATLAB to obtain the solution when

N ¼ 3. Extensive investigation is needed to obtain the solution when N > 4. This

will be addressed in our future studies.

In Fig. 3(b), the convergence is achieved for both the real and imaginary part of

the input impedance when iteration number is more than 10, irrespective of the

element number N. We also see that the convergence values agree well with the

analytical solutions, denoted by the star symbols. This assures that the proposed

method can be used for a multiple-element array antenna.

Fig. 3(c) shows the relationship between the VSWR of element #1 and the

iteration number. The VSWR was calculated by the following formulae:

� ¼ Zin1ðiÞ � ZL1ði � 1Þ�Zin1ðiÞ þ ZL1ði � 1Þ ð6Þ

(d) VSWR vs. residual target εε

(a) Configuration of the array (b) Zin1 vs. iteration number

(c) VSWR vs. iteration number

Fig. 3. Analytical results when N ¼ 2, 3, and 4.

© IEICE 2015DOI: 10.1587/comex.4.327Received September 4, 2015Accepted October 15, 2015Published November 16, 2015

331

IEICE Communications Express, Vol.4, No.11, 327–332

Page 16: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

VSWR ¼ 1 þ j�j1 � j�j ð7Þ

As shown in Fig. 3(c), when the number of elements increases, the convergence

condition varies. However, it can be seen that the VSWR converges to unity

irrespective of the number of elements when iteration number is more than 10.

Fig. 3(d) shows the relationship between the VSWR and the residual target ε.

If the VSWR needs to be limited to VSWR ¼ 1:2, ε should be less than 4 in the case

of N ¼ 2 whereas ε should be less than 3 in the case of N ¼ 3 and 4. Therefore,

considering the desired VSWR of different applications, ε must be adjusted to the

optimum value.

5 Conclusion

In this paper, we have proposed an automatic impedance-matching algorithm that

can sequentially realize simultaneous conjugate-matching state for all the elements

in an N-element array antenna. The analytical results show that the VSWR

converges to unity irrespective of the number of elements, demonstrating that the

antenna performance is improved by applying the proposed method to MIMO array

antennas. Future studies include experimental verifications of the proposed method.

© IEICE 2015DOI: 10.1587/comex.4.327Received September 4, 2015Accepted October 15, 2015Published November 16, 2015

332

IEICE Communications Express, Vol.4, No.11, 327–332

Page 17: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

An adaptive coarse timesynchronization methodfor factory automationin wireless control networkbased on OFDM systems overfading channels

Wenjian Wanga), Chang-Jun Ahn, Tatsuya Omori,and Ken-ya HashimotoGraduate School of Engineering, Chiba University,

1–33 Yayoi, Inage, Chiba 263–8522, Japan

a) [email protected]

Abstract: An accurate estimation of symbol timing is significant for

orthogonal frequency division multiplexing (OFDM) since the symbol tim-

ing inaccuracy will lead to phase offset (FO), inter-symbol interference (ISI)

and inter-channel interference (ICI). In this letter, a metric function has been

designed by taking advantage of the correlation properties of OFDM signals.

Computer simulation results show that the scheme is superior because it gets

a larger probability that fall into the ISI and ICI free region and has lower

computational complexity compared with the conventional methods over

frequency-selective channels, which can be used for factory automation (FA)

in wireless control network (WCN).

Keywords: frequency-selective channels, factory automation, symbol tim-

ing offset

Classification: Transmission Systems and Transmission Equipment for

Communications

References

[1] H. Minn, V. K. Bhargava, and K. B. Letaief, “A robust timing and frequencysynchronization for OFDM systems,” IEEE Trans. Wireless Commun., vol. 2,no. 4, pp. 822–839, July 2003. DOI:10.1109/TWC.2003.814346

[2] B. Park, H. Cheon, C. Kang, and D. Hong, “A novel timing estimation methodfor OFDM systems,” IEEE Commun. Lett., vol. 7, no. 5, pp. 239–241, May2003. DOI:10.1109/LCOMM.2003.812181

[3] H. Huh, “ML frame synchronization for OFDM systems using a known pilotand cyclic prefixes,” IEICE Trans. Commun., vol. E95-B, no. 7, July 2012.DOI:10.1587/transcom.E95.B.2296

[4] J. J. van de Beek, M. Sandell, and P. O. Borjesson, “ML estimation of time andfrequency offset in OFDM systems,” IEEE Trans. Signal Process., vol. 45,no. 7, pp. 1800–1805, July 1997. DOI:10.1109/78.599949

[5] M. Speth, F. Classen, and H. Meyr, “Frame synchronization of OFDM systems

© IEICE 2015DOI: 10.1587/comex.4.333Received October 19, 2015Accepted October 26, 2015Published November 20, 2015

333

IEICE Communications Express, Vol.4, No.11, 333–339

Page 18: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

in frequency selective fading channels,” Proc. IEEE VTC’97, pp. 1807–1811,May 1997. DOI:10.1109/VETEC.1997.605870

[6] T. Keller and L. Hanzo, “Orthogonal frequency division multiplex synchroniza-tion techniques for wireless local area networks,” Proc. IEEE PIMRC’96,pp. 963–967, Oct. 1996. DOI:10.1109/PIMRC.1996.568424

[7] D. Lee and K. Cheun, “Coarse symbol synchronization algorithms for OFDMsystems in multipath channels,” IEEE Commun. Lett., vol. 6, pp. 446–448, Oct.2002. DOI:10.1109/LCOMM.2002.804247

[8] S. Ma, X. Pan, G. Yang, and T. Ng, “Blind symbol synchronization based oncyclic prefix for OFDM systems,” IEEE Trans. Vehicular Technol., vol. 58,no. 4, pp. 1746–1751, May 2009. DOI:10.1109/TVT.2008.2004031

[9] W. Chin, “ML estimation of timing and frequency offsets using distinctivecorrelation characteristics of OFDM signals over dispersive fading channels,”IEEE Trans. Vehicular Technol., vol. 60, no. 2, pp. 444–456, Feb. 2011.DOI:10.1109/TVT.2010.2102058

1 Introduction

Orthogonal Frequency Division Multiplexing (OFDM) has been applied in many

areas including digital audio broadcasting (DAB), WLAN and Ultra-wideband

(UWB). Unlike single-carrier systems, OFDM systems demand high synchroniza-

tion performance and synchronization inaccuracy will bring about some serious

problems like sampling clock offset (SCO), symbol timing offset (STO), and carrier

frequency offset (CFO).

Symbol synchronization is generally divided into two major categories, pre-

amble-aided and non-preamble-aided. For preamble-aided approaches, a single

training symbol with identically repetitive structure of different periodic length in

the time domain can be used in [1]. To effectively solve the problem that the

declining curve is not steep enough, training symbols with circular conjugate

symmetry format are employed, it makes the correct timing position close to the

pulse form which can be correctly captured by the synchronizer [2]. Another type

of technique is to exploit a synchronization word and CP simultaneously [3], it

provides better performance in the condition that the influence of the multipath is

not serious. Using the symbol training sequence can obtain accurate delay estima-

tion, but the introduction of extra redundancy will significantly reduce the band-

width utilization efficiency. In order to make full use of spectrum resources,

recently, blind synchronization algorithms have been widely studied. The repre-

sentative algorithms are maximum likelihood (ML) [4], minimum mean square

error (MMSE) [5] and the maximum correlation (MC) [6]. The estimator counter-

acting multipath fading has been developed in [7]. The disadvantage of this

approach is that the exact channel length is needed. In [8, 9], some schemes were

presented that needless to know the channel state information (CSI) which can

accurately obtain the original start position of the FFTwindow, but the computation

complexity is increased significantly.

To mitigate above-mentioned problems, in this letter, a novel timing estimator

based on the redundancy of CP is proposed for high-speed OFDM systems over

multipath fading channels. Numerical results show that the proposed approach

© IEICE 2015DOI: 10.1587/comex.4.333Received October 19, 2015Accepted October 26, 2015Published November 20, 2015

334

IEICE Communications Express, Vol.4, No.11, 333–339

Page 19: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

achieves better performance and manifests its robustness to multi-path fading

channels.

2 System model and correlation properties

Consider the correlation properties of the received OFDM signals yðnÞ and

yðn þ NÞ. Here, the intervals are divided into three parts namely A1 ¼ f�; � þ1; . . . ; � þ L � 2g, A2 ¼ f� þ L � 1; � þ L; . . . ; � þ Ncp � 1g and A3 ¼ f� þ Ncp;

� þ Ncp þ 1; . . . ; � þ Ncp þ L � 2g. The correlation between yðnÞ and yðn þ NÞthus satisfies

EfyðnÞy�ðn þ NÞg

¼ e�j2�"XL�1l¼0

jhðlÞ2jEfxðn � l � �Þx�ðn þ N � l � �Þg

¼

Q1ðnÞe�j2�"; for n 2 A1

�m2e�j2�"; for n 2 A2

Q2ðnÞe�j2�"; for n 2 A3

0; otherwise

8>>>><>>>>:

ð1Þ

where

Q1ðnÞ ¼Xn��l¼0

jhðlÞj2�x2 < �m2; ð2Þ

�m2 ¼ EfjyðnÞj2g � �n

2 ¼XL�1l¼0

jhðlÞj2�x2; ð3Þ

Q2ðnÞ ¼XL�1

l¼n���Ncpþ1jhðlÞj2�x2 < �m

2: ð4Þ

where XðkÞ denotes the datas transmitted in the OFDM symbol over the kth

subcarrier. After inverse fast fourier transform (IFFT) of N samples size, the signal

turns out to be xðnÞ. hðlÞ is the channel impulse response with the lagged channel

response of L � 1 samples. The symbol timing offset η and the normalized carrier

frequency offset ¥ (ratio of the CFO to subcarrier spacing �f, shown as � ¼foffset=�f) are modeled as a delayed signal in the receiver and a phase offset in

time domain respectively. The complex white Gaussian noise in yðnÞ is defined

as !ðnÞ with zero mean and the variance of �2n. Note that since CP is to extend

the OFDM symbol length by copying the last Ncp samples into its front, for

n; n þ n1 2 f0; 1; . . . ; Ncp � 1g, the correlation relationship between xðnÞ and

xðn þ n1Þ can be shown as

E½xðnÞx�ðn þ n1Þ� ¼�x

2; n1 ¼ 0 or N

0; otherwise

(ð5Þ

where �x2 ¼ E½jxðnÞj2�. As shown above, the correlation characteristics are decided

by the channel condition. When the signal yðnÞ is located in A2 region, known as

ISI-free region, the correlation value will reach the peak simply because it contains

the information of all the channel taps. Otherwise, it will be reduced correspond-

ingly on account of ISI under frequency-selective fading channels.

© IEICE 2015DOI: 10.1587/comex.4.333Received October 19, 2015Accepted October 26, 2015Published November 20, 2015

335

IEICE Communications Express, Vol.4, No.11, 333–339

Page 20: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

3 Proposed synchronization algorithm

Fig. 1 shows the block diagram of the discrete-time baseband high-speed OFDM

and the proposed scheme.

A metric function is proposed by means of utilizing sampling datas that is not

influenced by ISI. Since the exact channel length is not clearly known, in order to

avoid the influence of multipath fading, we use the block length b (b < Ncp) instead

of using all the samples in the CP. We perform the correlation calculation between

two data blocks at a span of N samples. The block length b must be set

appropriately so that the probability that the overall block falls into ISI-free region

is high. The purpose of designing the metric function is to find a point in the

interval A2 on the premise that we do not know the exact channel length L. The

metric function can be expressed as

�ðnÞ ¼Xb�1k¼0

Efyðn þ kÞy�ðn þ N þ kÞg�����

������ �

2

Xb�1k¼0

½Efjyðn þ kÞj2g þ Efjyðn þ N þ kÞj2g�

n 2 f0; 1; . . . ; N þ Ncp � 1g; ð6Þwhere

� ¼ fE½jyðnÞj2� � E½j!ðnÞj2�g=E½jyðnÞj2�¼ �m

2=ð�m2 þ �n2Þ ¼ SNR=ðSNR þ 1Þ: ð7Þ

From the discussion above, the function in (6) becomes

�ðnÞ ¼Xb�1k¼0

Efyðn þ kÞy�ðn þ N þ kÞg�����

����� � b�m2: ð8Þ

we make an analysis as follows:

Case i: for n þ b � 1 < � þ L � 1,

�ðnÞ < b�m2 � b�m

2 ¼ 0: ð9ÞCase ii: for ðn � � þ L � 2Þ \ ðn þ b � 1 � � þ L � 1Þ, here we assume the length

of the block that falls within the interval A1 is b1, it yields

�ðnÞ ¼ b1Q1ðnÞ þ ðb � b1Þ�m2 � b�m2

< b�m2 � b�m

2 ¼ 0: ð10Þ

Fig. 1. Block diagram of high-speed OFDM for WCN.

© IEICE 2015DOI: 10.1587/comex.4.333Received October 19, 2015Accepted October 26, 2015Published November 20, 2015

336

IEICE Communications Express, Vol.4, No.11, 333–339

Page 21: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

Case iii: for ðn � � þ L � 1Þ \ ðn þ b � 1 < � þ NcpÞ,�ðnÞ ¼ b�m

2 � b�m2 ¼ 0: ð11Þ

Case iv: for ðn þ b � 1 � � þ NcpÞ \ ðn � � þ Ncp � 1Þ, here we assume the length

of the block that falls within the interval A2 is b2, �ðnÞ is obtained as

�ðnÞ ¼ b2�m2 þ ðb � b2ÞQ2ðnÞ � b�m

2

< b�m2 � b�m

2 ¼ 0: ð12ÞCase v: for n > � þ Ncp � 1,

�ðnÞ < b � 0 ¼ 0; ð13Þnmax ¼ argmax

nf�ðnÞg: ð14Þ

In regard to deciding b, Fig. 2(a) shows the lock-in probability outside the

interval A2 as a function of block length in FSF channel at the SNR of 22 dB. To

verify whether the value of b ¼ 4 can be commonly used, we consider the other two

cases when the system parameters such as the Ncp and L are changed to show its

generality. In high speed WCN, the duration of transmission time for one OFDM

symbol (N þ Ncp ¼ 160) is set to 10 µs with Ncp is about 2 µs in our system. In

general, short-range communication of WCN for FA has a small delay spread. To

show the feasibility of the model, we choose the maximum delay about 0.5 µs,

which is enough to satisfy conditions of real environment. Based on this point, we

select L to be 5 and 10 with the minimum and maximum respectively to determine

the block length. The simulation results show that with the increase in block length,

the probability will rise correspondingly except for the first point. Hence, the block

length is set to be 4 samples (b ¼ 4) to achieve the best performance. Furthermore,

the lock-in probability in A2 is also improved with the increase of CP length at a

given channel length, however it is reduced with the increase of channel length at a

given CP length.

Known from above, due to the influence of the multipath, new timing metric

will have a period of platform with the length of p at the rear-end of cyclic prefix.

Furthermore, after the platform there is a falling edge, as a result, channel length

0 5 10 15 20 25 30

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

0.55

SNR (dB)

The

pro

babi

lity

of in

corr

ect

posi

tion

ing

in A

2 by

met

ric

func

tion

proposed metric function (Ncp = 32, L = 10)proposed metric function (Ncp = 64, L = 10)proposed metric function (Ncp = 32, L = 5)

2 4 6 8 10 12 14 16 18 200.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

Block lengthT

he p

roba

bilit

y of

inco

rrec

t po

siti

onin

g in

A2

by m

etri

c fu

ncti

on

proposed metric function (Ncp = 32, L = 10)proposed metric function (Ncp = 64, L = 10)proposed metric function (Ncp = 32, L = 5)

(a) (b)

Fig. 2. The probability of incorrect positioning in ISI-free region A2 bymetric function versus block length and SNR in frequency-selective fading channels. (N ¼ 128, SNR ¼ 22 dB) in (a) and(N ¼ 128, b ¼ 4) in (b).

© IEICE 2015DOI: 10.1587/comex.4.333Received October 19, 2015Accepted October 26, 2015Published November 20, 2015

337

IEICE Communications Express, Vol.4, No.11, 333–339

Page 22: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

can be roughly estimated, L ¼ Ncp � b � p þ 2. In fact the detailed procedures for

deciding p can be figured out by finding the first dip where �ðnÞ is below the given

threshold which is zero theoretically. After that, we search to obtain the value nmaxin (14) that correspond to the maximum point in the platform. Fig. 2(b) show the

estimation accuracy achieved by the metric function with different GI length and

channel length. Obviously, with the increase of SNR, the lock-in probability in A2

is improved.

4 Simulation results

4.1 BER performance by proposed estimator

We consider an OFDM system with 128 subcarriers and CP length of 32. The

transmission bit rate is 16 � 106 bits/s and the modulation mode is QPSK.

Frequency selective fading channels with 10 Rayleigh-fading taps (L ¼ 10) were

considered here. The path separation is Tpath ¼ 62:5 nsec and its power presents

exponential decay with the form of 100�ððtap�1Þ=10Þ. Channel responses were

produced by taking advance of complex Gaussion random variable which satisfies

that the power summation of every normalized path amplitude is equal toPl jhðlÞj2 ¼ 1.

Fig. 3 shows the BER performance of proposed symbol synchronization

method compared with the existing methods. Note that in order to see the effect

of STO, the signal after taking FFT has not been compensated in any form. The

BER performances of MMSE, MC and ML methods are severely degraded because

they have unnecessary summation lengths under the condition of no exact channel

length, which results in high error rate. The 2-D search method in [8] achieves

relatively high BER at the cost of a high computational complexity. The proposed

method has gained better effect than the others, which simplifies the subsequent

error compensation.

4.2 Computational complexity

The computational complexity is calculated in terms of complex multiplications. In

our system, the mathematical OFDM symbol numbers are assumed to be S. That

0 5 10 15 20 25 3010

−3

10−2

10−1

100

SNR (dB)

BE

R

MMSEproposed for initial timingMCMLOFDM with exact timing 2−D search method

Fig. 3. The BER performance subject to STO with equalization forinitial time synchronization in frequency-selective fadingchannels. (L ¼ 10, b ¼ 4).

© IEICE 2015DOI: 10.1587/comex.4.333Received October 19, 2015Accepted October 26, 2015Published November 20, 2015

338

IEICE Communications Express, Vol.4, No.11, 333–339

Page 23: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

means S consecutive high-speed OFDM symbols are sent and should be timing

synchronized at a time. The computational complexity that required in MC,

MMSE, ML algorithm are SNcpðN þ NcpÞ, 3SNcpðN þ NcpÞ, 3SNcpðN þ NcpÞ re-

spectively. The 2-D search algorithm in [8] can achieve high STO estimation

accuracy, however, the complexity is 3SNcpðNcp þ 1ÞðN þ NcpÞ=2 which is far

larger than the others. Under the given system parameters, we perform the metric

function with varying b to decide the appropriate block length in the first OFDM

symbol and use the decided b in the remaining OFDM symbols. As a result,

the proposed algorithm has the complexity of 3ðN þ NcpÞð2 þ 20Þ � 19=2 þðS � 1Þ½3bðN þ NcpÞ�. The selected block length satisfies b ¼ 4, moreover, N ¼128, Ncp ¼ 32, and L ¼ 10 are considered respectively. Since a large amount of

high-speed OFDM symbols are sent successively in the actual uplink WCN

systems and each symbol needs to be synchronized. An actual situation is discussed

here, in fact, when S > 31, we have the following property of complexity relations:

proposed ¼ 98400 þ 1920S < MC ¼ 5120S

< ML ¼ MMSE ¼ 15360S < ½8� ¼ 253440S ð15ÞAs shown above, the proposed algorithm has lower computational complexity for

practical application.

5 Conclusion

A fast time synchronizer has been proposed for high-rate wireless control network.

We do not use preamble ahead for the reason that the reduction of preamble is

highly beneficial since the transmission time of preamble is longer than that of the

payload. By utilizing a metric function to find a sampling point in ISI-free region,

the proposed algorithm achieves better BER performance subject to STO for initial

time synchronization under frequency-selective fading channels, moreover, it has

lower computational complexity compared with the existing method when consid-

ering the actual situation, which can fully meet the real-time requirement in WCN

systems for FA.

Acknowledgement

This work was partially supported by the grant of scientific research No. 26420339

from JSPS.

© IEICE 2015DOI: 10.1587/comex.4.333Received October 19, 2015Accepted October 26, 2015Published November 20, 2015

339

IEICE Communications Express, Vol.4, No.11, 333–339

Page 24: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

Secure parent node selectionscheme in route constructionto exclude attacking nodesfrom RPL network

Iuchi Kenji, Takumi Matsunagaa), Kentaroh Toyoda,and Iwao SasaseDept. of Information and Computer Science, Keio University,

3–14–1 Hiyoshi, Kohoku, Yokohama 223–8522, Japan

a) [email protected]

Abstract: We propose a secure parent node selection scheme in the IPv6

Routing Protocol for Low-power and Lossy networks (RPL) so that each

child node can select a legitimate node as its parent. In the proposed scheme,

each node chooses a parent after excluding too good candidate if multiple

parent candidates exist. Our scheme utilizes the fact that an attacking node

claims falsely a lower rank than that of legitimate nodes. Simulation results

show that the proposed scheme reduces the total number of child nodes

attached to attacking nodes.

Keywords: IoT, RPL, security, sensor network

Classification: Network

References

[1] K. Ashton, “That ‘Internet of Things’ Thing,” RFID Journal, 2009. http://www.rfidjournal.com/articles/view?4986

[2] T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R.Struik, J. Vasseur, and R. Alexander, “RPL: IPv6 routing protocol for low-power and lossy networks,” RFC 6550, 2012. http://tools.ietf.org/html/rfc6550

[3] A. Le, J. Loo, A. Lasebae, A. Vinel, Y. Chen, and M. Chai, “The impact ofrank attack on network topology of routing protocol for low-power and lossynetworks,” IEEE Sensors J., vol. 13, no. 10, pp. 3685–3692, 2013. DOI:10.1109/JSEN.2013.2266399

[4] A. Dvir, T. Holczer, and L. Buttyan, “VeRA— version number and rankauthentication in RPL,” Proc. IEEE Conference on Mobile Adhoc and SensorSystems (MASS), pp. 709–714, Oct. 2011. DOI:10.1109/MASS.2011.76

[5] S. Raza, L. Wallgren, and T. Voigt, “SVELTE: real-time intrusion detection inthe Internet of things,” Ad Hoc Netw., vol. 11, no. 8, pp. 2661–2674, 2013.DOI:10.1016/j.adhoc.2013.04.014

[6] H. Perrey, M. Landsmann, O. Ugus, T. C. Schmidt, and M. Wählisch, “TRAIL:topology authentication in RPL,” arXiv:1312.0984, 2013. http://arxiv.org/abs/1312.0984

[7] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacksand countermeasures,” Ad Hoc Netw., vol. 1, no. 2, pp. 293–315, 2003. DOI:10.1016/S1570-8705(03)00008-8

[8] A. Dunkels, B. Gronvall, and T. Voigt, “Contiki— a lightweight and flexible

© IEICE 2015DOI: 10.1587/comex.4.340Received October 13, 2015Accepted November 5, 2015Published November 30, 2015

340

IEICE Communications Express, Vol.4, No.11, 340–345

Page 25: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

operating system for tiny networked sensors,” Proc. IEEE Conference on LocalComputer Networks (LCN), pp. 455–462, Nov. 2004. DOI:10.1109/LCN.2004.38

[9] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, “Cross-levelsensor network simulation with COOJA,” Proc. IEEE Conference on LocalComputer Networks (LCN), pp. 641–648, Nov. 2006. DOI:10.1109/LCN.2006.322172

[10] P. Thubert, “Objective function zero for the routing protocol for low-power andlossy networks (RPL),” RFC 6552, 2012. http://tools.ietf.org/html/rfc6552

1 Introduction

In the Internet of Things (IoT), resource-constrained sensing devices are connected

to the Internet via IPv6 network so as to monitor and control everything, e.g.,

energy consumption of appliances or everlasting structure monitoring [1]. The IPv6

Routing Protocol for Low-Power and Lossy Networks (RPL) is selected as a

standard routing protocol to realize the IoT [2]. In RPL, nodes create a loop-free

tree-based topology to send collected data to the sink. In order to construct the

tree topology network, each node has a rank which is a cumulative value, e.g., the

number of hops from the sink, and selects the least rank neighbor node as its parent

node.

However, attacking nodes that may drop, collapse, or tamper collected packets

can claim a forged rank that is lower than the true one to collect more packets from

child nodes in RPL [3]. Although many attacking nodes detection schemes [4, 5, 6]

have been proposed, each has shortcomings. The scheme in [4] has a problem that

computation complexity is heavy for resource limited nodes, e.g., sensor nodes.

The schemes in [5, 6] have a problem that the sink or each parent node detects

attacking nodes after route construction so that child nodes might send data to

an attacking node. Therefore, it is necessary that more child node can select a

legitimate node as its parent in route construction.

In this paper, we propose a secure parent node selection scheme in RPL so that

more child nodes can select a legitimate node as its parent. If multiple parent

candidates exist, each node selects a parent after excluding a too good candidate.

Therefore, more nodes might avoid selecting an attacking node as its parent node

and sending packets to the attacking node.

We show that the proposed scheme reduces the total number of child nodes

attached to attacking nodes than that in the conventional RPL scheme. We also

show that the attacking nodes have no merits to claim lower ranks than true ones so

as to collect more packets.

2 Attacker model

The goal of attacking nodes is to collect as many packets as possible from their

child nodes in order to drop, collapse, and tamper packets [7]. Hence they claim a

fake rank so that more child nodes select them as parents. Scenario 1 assumes that

attacking nodes pretend to be the sink, i.e., they broadcast the same ranks as sink.© IEICE 2015DOI: 10.1587/comex.4.340Received October 13, 2015Accepted November 5, 2015Published November 30, 2015

341

IEICE Communications Express, Vol.4, No.11, 340–345

Page 26: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

Scenario 2 assumes sophisticated attacking nodes that pretend to be the legitimate

node, i.e., they broadcast ranks as (true rank � 1) not to be detected as attacking

nodes easily. Scenario 3 assumes that attacking nodes behave as the legitimate

node, i.e., without faking their ranks.

3 Proposed scheme

Here we propose a secure parent node selection scheme in RPL network so that

more child nodes can select a legitimate node as its parent. At the route construction

phase, each node selects a parent after excluding a too good candidate by utilizing

the threshold. Each node can judge whether a rank value broadcast by its neighbor

nodes is too low since it can obtain a maximum and average rank of its neighbor

nodes. This notion comes from the fact that attacking nodes intend to falsely claim

a lower rank than legitimate nodes. After that, each node selects its parent node

except for nodes whose rank is judged to be too low. Therefore, each node avoids

not only selecting an attacking node as its parent node but also sending packets to

the attacking node. The proposed scheme has a merit that attacking nodes cannot

collect more packets if they falsely broadcast lower rank. The attacking nodes we

assume have no merits to claim lower rank than true one so as to collect more

packets.

3.1 Algorithm

In the route construction phase, each node i calculates its own threshold thresholdiwith the maximum and average rank of its neighbor nodes. thresholdi is calculated

as follows

thresholdi ¼ Rave � Rmax � K ð1Þwhere, Rave and Rmax are the average and the maximum rank values among node i’s

neighbors, and K (0 < K < 1) is a constant parameter, respectively. If its neighbor

node’s rank is lower than thresholdi, it judges the neighbor node as an attacking

Fig. 1. An example of the route construction phase.

© IEICE 2015DOI: 10.1587/comex.4.340Received October 13, 2015Accepted November 5, 2015Published November 30, 2015

342

IEICE Communications Express, Vol.4, No.11, 340–345

Page 27: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

node and excludes it from parent candidates. Then, it selects a node that is the

lowest rank in its neighbor nodes except for the attacking node.

We show an example of route construction phase in Fig. 1. Node 1 calculates

thresholdi with its neighbor ranks. In this case, Rave ¼ ð1 þ 3 þ 3 þ 4 þ 4Þ=5 ¼ 3

and Rmax ¼ 4. If K ¼ 0:25, thresholdi ¼ 3 � 4 � 0:25 ¼ 2. Node 1 excludes a node

whose rank is lower than thresholdi from its parent candidates since 1 (¼ attacking

node’s falsely claimed rank) < 2 (¼ thresholdi). Therefore, in the proposed

scheme, node 1 avoids selecting an attacking node as its parent.

3.2 Threshold

We discuss why we set thresholdi as Eq. (1). If thresholdi is too large, more nodes

avoid selecting not only attacking nodes but also better legitimate nodes as its

parent. As a consequence, detour may occur and the number of hops from each

node to the sink may increase. If thresholdi is too small, more nodes may select an

attacking node as its parent so that the probability of avoiding attacking nodes from

a parent is decreased. As a result, we calculate thresholdi with Rave as a reference

value. thresholdi needs to be less than Rave since the least rank in legitimate

neighbor nodes is usually lower than Rave. Thus, we decrease thresholdi with Rmax

and the parameter K. We can maintain small thresholdi by calculating it with Rmax

even if an attacking node claims much higher rank so that thresholdi becomes

higher than legitimate nodes. Moreover, thresholdi needs to be easily calculated

for resource constraint devices. Therefore, we only use simple arithmetic to

calculate thresholdi. In this paper, we heuristically determine the parameter K to

take into account both the number of hops and the probability of avoiding an

attacking node.

4 Evaluation

4.1 Simulation model

We evaluate the number of child nodes that select an attacking node as their parents

by Contiki’s network simulator Cooja [8, 9]. We compare the proposed scheme

with the conventional RPL scheme since, as described in Section III in [5, 6], each

node selects its parent node by the same method as the conventional RPL scheme.

We simulate three scenarios as described in attacker model. We show the

simulation model in Table I. The threshold K is based on empirical evaluation. The

sink is fixed at a corner in the simulation area, while legitimate and attacking nodes

are randomly deployed.

4.2 Simulation results and discussion

Fig. 2(a) shows the total number of child nodes attached to attacking nodes, which

we denote as Nattacked , versus the number of attacking nodes. Fig. 2(b) shows

Nattacked versus the number of hops from the sink to an attacking node. From

Fig. 2(a) and 2(b), the proposed scheme achieves the lower Nattacked than RPL in

both scenario 1 and scenario 2. In RPL, Nattacked is larger than those in our scheme

since each node selects a node that has the lowest rank as its parent. On the other

hand, in our scheme, Nattacked gets less since each node excludes attacking nodes© IEICE 2015DOI: 10.1587/comex.4.340Received October 13, 2015Accepted November 5, 2015Published November 30, 2015

343

IEICE Communications Express, Vol.4, No.11, 340–345

Page 28: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

from its parent candidates. We then compare the effect of our scheme against

various scenarios. As we can see from Fig. 2(a) and 2(b), our scheme achieves that

scenario 3 is the largest Nattacked of the three scenarios. In scenario 1 and scenario

2, ranks of attacking node are lower than those of legitimate ones. On the other

hand, in scenario 3, a rank of attacking nodes is same as that of legitimate ones.

Here, we assume other attacking nodes that claim higher rank than true rank so that

thresholdi becomes higher than legitimate nodes. If an attacking node claims a

rank as (true rank + 1), Rave is increased by 1=n (< 1), where n is the number of

neighbor nodes. As a result, the attack can hardly exclude legitimate node from

parent candidate. Moreover, the attacking node’s rank is higher so that it is difficult

to selected as a parent. Therefore, the scenario 3, i.e., when an attacking node

claims its true rank, is the best strategy for attacking nodes regardless of the number

Fig. 2. Nattacked versus the number of attacking nodes and the numberof hops from sink to an attacking node.

Table I. Simulation model

Name Value

Simulator Cooja

Simulation area 200m � 200m

Number of all nodes 32

Number of sink 1

Number of attackers 1–3

Transmission range 50m

Interference range 100m

MAC protocol IEEE 802.15.4

Objective function Objective Function 0 [10]

Threshold K ¼ 0:25

© IEICE 2015DOI: 10.1587/comex.4.340Received October 13, 2015Accepted November 5, 2015Published November 30, 2015

344

IEICE Communications Express, Vol.4, No.11, 340–345

Page 29: IEICE Communications Express, Vol.4, No.11, 317 320 ... · structure is the multiple assignment scheme proposed by Shamir [1] and named by Ito et al. [7]. It assigns multiple shares

of attacking nodes and the number of hops from the sink to an attacking node. From

these results, the attacking nodes we assume have no merits to claim falsely lower

ranks than true ones when our parent selection scheme is applied.

5 Conclusion

In this paper, we have proposed a secure parent selection scheme so that more child

nodes can select a legitimate node as its parent. In the proposed scheme, each node

tries to select a legitimate node by excluding too good candidates with a threshold.

We show that the proposed scheme reduces the total number of child nodes

attached to attacking nodes in comparison with the conventional RPL scheme

and that the attacking node we assume have no merits to falsely claim lower ranks

than true ones by computer simulation.

Acknowledgments

This work is partly supported by the Grant in Aid for Scientific Research

(No. 26420369) from Ministry of Education, Sport, Science and Technology,

Japan.

© IEICE 2015DOI: 10.1587/comex.4.340Received October 13, 2015Accepted November 5, 2015Published November 30, 2015

345

IEICE Communications Express, Vol.4, No.11, 340–345