首页 > 最新文献

2022 IEEE International Conference on Communications Workshops (ICC Workshops)最新文献

英文 中文
Unsupervised deep learning to solve power allocation problems in cognitive relay networks 无监督深度学习解决认知中继网络中的功率分配问题
Pub Date : 2022-05-16 DOI: 10.1109/iccworkshops53468.2022.9814541
Yacine Benatia, Anne Savard, Romain Negrel, E. Belmega
In this paper, an unsupervised deep learning approach is proposed to solve the constrained and non-convex Shannon rate maximization problem in a relay-aided cognitive radio network. This network consists of a primary and a sec-ondary user-destination pair and a secondary full-duplex relay performing Decode-and-Forward. The primary communication is protected by a Quality of Service (QoS) constraint in terms of tolerated Shannon rate degradation. The relaying operation leads to non-convex objective and primary QoS constraint, which makes deep learning approaches relevant and promising. For this, we propose a fully-connected neural network architecture coupled with a custom and communication-tailored loss function to be minimized during training in an unsupervised manner. A major interest of our approach is that the required training data contains only system parameters without the ground truth, i.e., the corresponding solutions to the non-convex optimization problem, as opposed to supervised approaches. Our numerical experiments show that our proposed approach has a high generalization capability on unseen data without overfitting. Also, the predicted solution performs close to the brute force one, highlighting the high potential of our unsupervised approach.
本文提出了一种无监督深度学习方法来解决中继辅助认知无线电网络中的约束非凸香农速率最大化问题。该网络由一个主用户和一个辅助用户目的地对以及一个执行解码和转发的辅助全双工中继组成。根据可容忍的香农速率退化,主通信受到服务质量(QoS)约束的保护。中继操作导致非凸目标和初级QoS约束,这使得深度学习方法具有相关性和前景。为此,我们提出了一个全连接的神经网络架构,加上一个自定义的和通信定制的损失函数,以无监督的方式在训练过程中最小化。我们的方法的一个主要兴趣是所需的训练数据只包含系统参数而不包含基本真理,即非凸优化问题的相应解,与监督方法相反。数值实验表明,该方法对未见过的数据具有较高的泛化能力,不会出现过拟合现象。此外,预测的解决方案与蛮力解决方案接近,突出了我们的无监督方法的巨大潜力。
{"title":"Unsupervised deep learning to solve power allocation problems in cognitive relay networks","authors":"Yacine Benatia, Anne Savard, Romain Negrel, E. Belmega","doi":"10.1109/iccworkshops53468.2022.9814541","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814541","url":null,"abstract":"In this paper, an unsupervised deep learning approach is proposed to solve the constrained and non-convex Shannon rate maximization problem in a relay-aided cognitive radio network. This network consists of a primary and a sec-ondary user-destination pair and a secondary full-duplex relay performing Decode-and-Forward. The primary communication is protected by a Quality of Service (QoS) constraint in terms of tolerated Shannon rate degradation. The relaying operation leads to non-convex objective and primary QoS constraint, which makes deep learning approaches relevant and promising. For this, we propose a fully-connected neural network architecture coupled with a custom and communication-tailored loss function to be minimized during training in an unsupervised manner. A major interest of our approach is that the required training data contains only system parameters without the ground truth, i.e., the corresponding solutions to the non-convex optimization problem, as opposed to supervised approaches. Our numerical experiments show that our proposed approach has a high generalization capability on unseen data without overfitting. Also, the predicted solution performs close to the brute force one, highlighting the high potential of our unsupervised approach.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121898608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain Networks and Communications 区块链网络和通信
Pub Date : 2022-05-16 DOI: 10.1109/iccworkshops53468.2022.9814617
{"title":"Blockchain Networks and Communications","authors":"","doi":"10.1109/iccworkshops53468.2022.9814617","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814617","url":null,"abstract":"","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Encryption for UAV-to-Ground Communications 无人机对地通信的物理层加密
Pub Date : 2022-05-16 DOI: 10.1109/iccworkshops53468.2022.9814512
Ahmed Maksud, Y. Hua
Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.
确保安全可靠的无线通信对于无人机(UAV)应用至关重要。之前关于安全无人机对地(U2G)通信的大部分工作都集中在轨迹和/或功率优化上,以确保所需的U2G信道比窃听信道更强。在本文中,我们提出了一种新的物理层加密方法,该方法执行符号和/或星座隐藏,用于安全的U2G通信。与之前针对对手特定检测算法的符号和/或星座隐藏工作不同,我们的方法利用了无人机和所需地面站(GS)之间互惠通道中固有的机密性,因此原则上对包括深度机器学习在内的任何窃听攻击算法都具有鲁棒性。该方法首先利用连续加密函数(CEF)将无人机和GS处的两个估计的互反信道向量(ercv)分别转换为任意维数的两个拟连续伪随机数序列(qcprn)。这些qcprn对ercv的一系列统计分布具有鲁棒性,大致遵循已知的统计分布,因此可以进一步转化为两个均匀分布(UD) qcprn序列。在UAV上生成的UD-QCPRNs被UAV以模方式叠加到其传输符号上,在GS上生成的UD-QCPRNs用于在GS上解密。本文还研究了两种ercv之间的差异以及其他噪声对所需U2G信道性能的影响。
{"title":"Physical Layer Encryption for UAV-to-Ground Communications","authors":"Ahmed Maksud, Y. Hua","doi":"10.1109/iccworkshops53468.2022.9814512","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814512","url":null,"abstract":"Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User-Centric Blockchain for Industry 5.0 Applications 以用户为中心的区块链工业5.0应用
Pub Date : 2022-05-16 DOI: 10.1109/iccworkshops53468.2022.9814562
Hulin Yang, Alia Asheralieva, Jin Zhang, Md. Monjurul Karim, D. Niyato, Khuhawar Arif Raza
The forthcoming Industry 5.0 era reinforces the role of the “human( user )-centric” approach for future technologies, services and applications, where the key objective is to satisfy the quality of service (QoS), security and privacy requirements of each individual user. To meet this objective, blockchain is considered as one of the prime enablers, as it allows secure, reliable, verifiable, and transparent management of private user data. However, contemporary blockchains are not suitable for Industry 5.0 applications due to their inability to ensure high throughput while maintaining reasonable security levels. Hence, in this paper, we design a user-centric sharded blockchain that enables generating, verifying, and storing blocks of data related to individual users with the aim to satisfy their QoS, security and privacy requirements. By analyzing the impact of user allocations to shards on the block period, we devise the user-shard allocation algorithm to minimize the block period or, equivalently, maximize the system throughput, and demonstrate the superior performance of our framework via simulations.
即将到来的工业5.0时代强化了“以人为中心”的方法在未来技术、服务和应用中的作用,其关键目标是满足每个用户的服务质量(QoS)、安全和隐私要求。为了实现这一目标,区块链被认为是主要推动者之一,因为它允许对私人用户数据进行安全、可靠、可验证和透明的管理。然而,当代区块链不适合工业5.0应用,因为它们无法在保持合理安全水平的同时确保高吞吐量。因此,在本文中,我们设计了一个以用户为中心的分片区块链,可以生成、验证和存储与个人用户相关的数据块,以满足他们的QoS、安全和隐私要求。通过分析用户对分片的分配对块周期的影响,我们设计了用户-分片分配算法,以最小化块周期,即最大化系统吞吐量,并通过仿真证明了我们框架的优越性能。
{"title":"User-Centric Blockchain for Industry 5.0 Applications","authors":"Hulin Yang, Alia Asheralieva, Jin Zhang, Md. Monjurul Karim, D. Niyato, Khuhawar Arif Raza","doi":"10.1109/iccworkshops53468.2022.9814562","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814562","url":null,"abstract":"The forthcoming Industry 5.0 era reinforces the role of the “human( user )-centric” approach for future technologies, services and applications, where the key objective is to satisfy the quality of service (QoS), security and privacy requirements of each individual user. To meet this objective, blockchain is considered as one of the prime enablers, as it allows secure, reliable, verifiable, and transparent management of private user data. However, contemporary blockchains are not suitable for Industry 5.0 applications due to their inability to ensure high throughput while maintaining reasonable security levels. Hence, in this paper, we design a user-centric sharded blockchain that enables generating, verifying, and storing blocks of data related to individual users with the aim to satisfy their QoS, security and privacy requirements. By analyzing the impact of user allocations to shards on the block period, we devise the user-shard allocation algorithm to minimize the block period or, equivalently, maximize the system throughput, and demonstrate the superior performance of our framework via simulations.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Over-the-Air Computation for Vertical Federated Learning 垂直联邦学习的空中计算
Pub Date : 2022-05-16 DOI: 10.1109/iccworkshops53468.2022.9814484
Xiangyu Zeng, Shuhao Xia, Kai Yang, Youlong Wu, Yuanming Shi
Vertical federated learning (FL) is a critical tech-nology to support distributed artificial intelligence (AI) services in futuristic 6G systems, since it enables efficient and secure collaborative machine learning from a number of heteroge-neous devices in Internet of Things. In order to improve communication efficiency in vertical FL, we propose an over-the-air computation (AirComp) assisted vertical FL approach to achieve fast global aggregation. We theoretically establish the convergence analysis of the approach and thus propose to minimize the mean-squared error (MSE) of AirComp to reduce the optimality gap. So as to tackle the intractable non-convex problem, we propose an algorithm based on superiorization of bounded perturbation with convergence guarantee. Numerical experiments demonstrate that our proposed algorithm achieves low AirComp MSE in short running time, thereby improving the learning performance of vertical FL.
垂直联邦学习(FL)是未来6G系统中支持分布式人工智能(AI)服务的关键技术,因为它可以从物联网中的许多异构设备中实现高效和安全的协作机器学习。为了提高垂直FL的通信效率,我们提出了一种空中计算(AirComp)辅助垂直FL实现快速全局聚合的方法。我们从理论上建立了该方法的收敛性分析,从而提出最小化AirComp的均方误差(MSE)以减小最优性差距。为了解决棘手的非凸问题,我们提出了一种具有收敛保证的有界扰动优越性算法。数值实验表明,该算法在较短的运行时间内实现了较低的AirComp MSE,从而提高了垂直FL的学习性能。
{"title":"Over-the-Air Computation for Vertical Federated Learning","authors":"Xiangyu Zeng, Shuhao Xia, Kai Yang, Youlong Wu, Yuanming Shi","doi":"10.1109/iccworkshops53468.2022.9814484","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814484","url":null,"abstract":"Vertical federated learning (FL) is a critical tech-nology to support distributed artificial intelligence (AI) services in futuristic 6G systems, since it enables efficient and secure collaborative machine learning from a number of heteroge-neous devices in Internet of Things. In order to improve communication efficiency in vertical FL, we propose an over-the-air computation (AirComp) assisted vertical FL approach to achieve fast global aggregation. We theoretically establish the convergence analysis of the approach and thus propose to minimize the mean-squared error (MSE) of AirComp to reduce the optimality gap. So as to tackle the intractable non-convex problem, we propose an algorithm based on superiorization of bounded perturbation with convergence guarantee. Numerical experiments demonstrate that our proposed algorithm achieves low AirComp MSE in short running time, thereby improving the learning performance of vertical FL.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123329403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact of Multiple Fully-Absorbing Receivers in Molecular Communications 多个完全吸收接收器在分子通信中的影响
Pub Date : 2022-05-16 DOI: 10.48550/arXiv.2205.10519
N. Sabu, Abhishek Gupta, Neeraj Varshney, Anshuman Jindal
Molecular communication is a promising solution to enable intra-body communications among nanomachines. However, malicious and non-cooperative receivers can degrade the performance, compromising these systems' security. Analyzing the communication and security performance of these systems requires accurate channel models. However, such models are not present in the literature. In this work, we develop an analytical framework to derive the hitting probability of a molecule on a fully absorbing receiver (FAR) in the presence of other FARs, which can be either be cooperative or malicious. We first present an approximate hitting probability expression for the 3-FARs case. A simplified expression is obtained for the case when FARs are symmetrically positioned. Using the derived expressions, we study the impact of malicious receivers on the intended receiver and discuss how to minimize this impact to obtain a secure communication channel. We also study the gain that can be obtained by the cooperation of these FARs. We then present an approach to extend the analysis for a system with $N$ FARs. The derived expressions can be used to analyze and design multiple input/output and secure molecular communication systems.
分子通信是一种很有前途的解决方案,可以实现纳米机器之间的体内通信。然而,恶意和不合作的接收方会降低性能,危及这些系统的安全性。分析这些系统的通信和安全性能需要精确的信道模型。然而,这样的模型并没有出现在文献中。在这项工作中,我们开发了一个分析框架来推导在其他完全吸收接收器(FAR)存在的情况下,分子在完全吸收接收器(FAR)上的撞击概率,这些接收器可以是合作的,也可以是恶意的。我们首先给出了3-FARs情况下的近似命中概率表达式。得到了FARs对称定位情况下的简化表达式。利用导出的表达式,我们研究了恶意接收器对预期接收器的影响,并讨论了如何将这种影响最小化以获得安全的通信通道。我们还研究了这些FARs的合作所能获得的增益。然后,我们提出了一种方法来扩展具有$N$ FARs的系统的分析。导出的表达式可用于分析和设计多输入/输出和安全的分子通信系统。
{"title":"Impact of Multiple Fully-Absorbing Receivers in Molecular Communications","authors":"N. Sabu, Abhishek Gupta, Neeraj Varshney, Anshuman Jindal","doi":"10.48550/arXiv.2205.10519","DOIUrl":"https://doi.org/10.48550/arXiv.2205.10519","url":null,"abstract":"Molecular communication is a promising solution to enable intra-body communications among nanomachines. However, malicious and non-cooperative receivers can degrade the performance, compromising these systems' security. Analyzing the communication and security performance of these systems requires accurate channel models. However, such models are not present in the literature. In this work, we develop an analytical framework to derive the hitting probability of a molecule on a fully absorbing receiver (FAR) in the presence of other FARs, which can be either be cooperative or malicious. We first present an approximate hitting probability expression for the 3-FARs case. A simplified expression is obtained for the case when FARs are symmetrically positioned. Using the derived expressions, we study the impact of malicious receivers on the intended receiver and discuss how to minimize this impact to obtain a secure communication channel. We also study the gain that can be obtained by the cooperation of these FARs. We then present an approach to extend the analysis for a system with $N$ FARs. The derived expressions can be used to analyze and design multiple input/output and secure molecular communication systems.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Millimeter Wave vs. THz Energy Harvesting for Autonomous Reconfigurable Intelligent Surfaces 毫米波与太赫兹能量收集用于自主可重构智能表面
Pub Date : 2022-05-16 DOI: 10.1109/iccworkshops53468.2022.9814622
K. Ntontin, S. Chatzinotas
The aim of this work is to examine the efficacy of wireless energy harvesting for autonomous reconfigurable intelligent surfaces that is performed either at millimeter wave or the lower THz bands. Towards this, we first consider an architecture in which a subset of unit cells is dedicated to energy harvesting and the rest to information transmission to a receiver through reflection. Subsequently, we compute the RIS energy consumption per frame according to the considered channel-estimation protocol. Based on it, we formulate an optimization problem that has as aim the maximization of the average rate under the constraint of meeting the RIS long-term energy consumption demands and provide its closed-form solution. Finally, numerical results are provided that target the performance comparison between the RIS-assisted links operating at the 28 GHz and 140 GHz bands. They reveal that the energy harvesting becomes more effective at the 140 GHz band, owing to the larger amount of unit cells that can be accommodated onto the same physical space.
这项工作的目的是研究在毫米波或低太赫兹波段进行自主可重构智能表面的无线能量收集的有效性。为此,我们首先考虑一种架构,其中单元格的一个子集专门用于能量收集,其余部分用于通过反射向接收器传输信息。随后,我们根据考虑的信道估计协议计算每帧RIS能量消耗。在此基础上,提出了在满足RIS长期能耗需求约束下,以平均费率最大化为目标的优化问题,并给出了其封闭解。最后,给出了运行在28 GHz和140 GHz频段的ris辅助链路性能比较的数值结果。他们发现,在140 GHz频段,能量收集变得更加有效,因为在相同的物理空间中可以容纳更多的单元电池。
{"title":"Millimeter Wave vs. THz Energy Harvesting for Autonomous Reconfigurable Intelligent Surfaces","authors":"K. Ntontin, S. Chatzinotas","doi":"10.1109/iccworkshops53468.2022.9814622","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814622","url":null,"abstract":"The aim of this work is to examine the efficacy of wireless energy harvesting for autonomous reconfigurable intelligent surfaces that is performed either at millimeter wave or the lower THz bands. Towards this, we first consider an architecture in which a subset of unit cells is dedicated to energy harvesting and the rest to information transmission to a receiver through reflection. Subsequently, we compute the RIS energy consumption per frame according to the considered channel-estimation protocol. Based on it, we formulate an optimization problem that has as aim the maximization of the average rate under the constraint of meeting the RIS long-term energy consumption demands and provide its closed-form solution. Finally, numerical results are provided that target the performance comparison between the RIS-assisted links operating at the 28 GHz and 140 GHz bands. They reveal that the energy harvesting becomes more effective at the 140 GHz band, owing to the larger amount of unit cells that can be accommodated onto the same physical space.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"182 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120880947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Security for Visible Light Communication in the Presence of ISI and NLoS ISI和NLoS存在下可见光通信的物理层安全
Pub Date : 2022-05-16 DOI: 10.1109/iccworkshops53468.2022.9814535
Cenk Albayrak, H. Arslan, K. Türk
Visible light communication (VLC) is an important alternative and/or complementary technology for next generation indoor wireless broadband communication systems. In order to ensure data security for VLC in public areas, many studies in literature consider physical layer security (PLS). These studies generally neglect the reflections in the VLC channel and assume no inter symbol interference (ISI). However, increasing the data transmission rate causes ISI. In addition, even if the power of the reflections is small compared to the line of sight (LoS) components, it can affect the secrecy rate in a typical indoor VLC system. In this study, we investigate the effects of ISI and reflected channel components on secrecy rate in multiple-input single-output (MISO) VLC scenario utilized null-steering (NS) and artificial noise (AN) PLS techniques.
可见光通信(VLC)是下一代室内无线宽带通信系统的重要替代和/或补充技术。为了保证公共区域VLC的数据安全,文献中的许多研究都考虑了物理层安全(PLS)。这些研究通常忽略了VLC信道中的反射,并假设不存在码间干扰。但是,提高数据传输速率会引起ISI。此外,即使反射的功率与视线(LoS)组件相比很小,它也会影响典型室内VLC系统的保密率。在本研究中,我们利用零转向(NS)和人工噪声(AN) PLS技术,研究了ISI和反射信道分量对多输入单输出(MISO) VLC场景下保密率的影响。
{"title":"Physical Layer Security for Visible Light Communication in the Presence of ISI and NLoS","authors":"Cenk Albayrak, H. Arslan, K. Türk","doi":"10.1109/iccworkshops53468.2022.9814535","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814535","url":null,"abstract":"Visible light communication (VLC) is an important alternative and/or complementary technology for next generation indoor wireless broadband communication systems. In order to ensure data security for VLC in public areas, many studies in literature consider physical layer security (PLS). These studies generally neglect the reflections in the VLC channel and assume no inter symbol interference (ISI). However, increasing the data transmission rate causes ISI. In addition, even if the power of the reflections is small compared to the line of sight (LoS) components, it can affect the secrecy rate in a typical indoor VLC system. In this study, we investigate the effects of ISI and reflected channel components on secrecy rate in multiple-input single-output (MISO) VLC scenario utilized null-steering (NS) and artificial noise (AN) PLS techniques.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Differential Defense Against Distributed Timing Attack for Privacy-Preserving Information Centric Network 隐私保护信息中心网络分布式定时攻击的差分防御
Pub Date : 2022-05-16 DOI: 10.1109/ICCWorkshops53468.2022.9882148
Jiajin Yang, Junhua Tang, Jianhua Li, Futai Zou, Linsen Li
In-network content caching is a key feature of Information Centric Network (ICN), which facilitates efficient content distribution with reduced bandwidth consumption, less network congestion, and improved content retrieval latency. However, this ubiquitous caching of ICN is vulnerable to side-channel timing attack, where the adversary takes advantage of the response time difference between the cached and un-cached contents from the router, to detect if a privacy-sensitive object is cached, or even infer which user requested the object. To mitigate this type of privacy risk in ICN, we propose a differential defense mechanism against distributed timing attack in this paper. Specifically, we design an algorithm based on differential privacy to determine whether a cache-hit or cache-miss is returned for a certain request, which effectively hide the actual cache hit with differential privacy guarantee. Furthermore, a differential delay algorithm for artificial cache miss is implemented based on Laplace mechanism of differential privacy. Performance analysis and simulation results show that our scheme is more effective against distributed timing attack and incurs less impact on caching efficiency and delay performance compared with existing defense schemes for ICN.
网络内内容缓存是信息中心网络(Information Centric Network, ICN)的一个关键特性,它通过减少带宽消耗、减少网络拥塞和改进内容检索延迟来促进有效的内容分发。然而,这种无处不在的ICN缓存很容易受到侧信道定时攻击,攻击者利用来自路由器的缓存和未缓存内容之间的响应时间差来检测是否缓存了隐私敏感对象,甚至推断哪个用户请求了该对象。为了减轻ICN中的这种隐私风险,我们在本文中提出了一种针对分布式定时攻击的差分防御机制。具体来说,我们设计了一种基于差分隐私的算法来确定某个请求是否返回cache-hit或cache-miss,有效地隐藏了具有差分隐私保证的实际缓存命中。在此基础上,基于差分隐私的拉普拉斯机制,实现了一种针对人工缓存缺失的差分延迟算法。性能分析和仿真结果表明,与现有的ICN防御方案相比,该方案对分布式定时攻击更有效,对缓存效率和延迟性能的影响更小。
{"title":"Differential Defense Against Distributed Timing Attack for Privacy-Preserving Information Centric Network","authors":"Jiajin Yang, Junhua Tang, Jianhua Li, Futai Zou, Linsen Li","doi":"10.1109/ICCWorkshops53468.2022.9882148","DOIUrl":"https://doi.org/10.1109/ICCWorkshops53468.2022.9882148","url":null,"abstract":"In-network content caching is a key feature of Information Centric Network (ICN), which facilitates efficient content distribution with reduced bandwidth consumption, less network congestion, and improved content retrieval latency. However, this ubiquitous caching of ICN is vulnerable to side-channel timing attack, where the adversary takes advantage of the response time difference between the cached and un-cached contents from the router, to detect if a privacy-sensitive object is cached, or even infer which user requested the object. To mitigate this type of privacy risk in ICN, we propose a differential defense mechanism against distributed timing attack in this paper. Specifically, we design an algorithm based on differential privacy to determine whether a cache-hit or cache-miss is returned for a certain request, which effectively hide the actual cache hit with differential privacy guarantee. Furthermore, a differential delay algorithm for artificial cache miss is implemented based on Laplace mechanism of differential privacy. Performance analysis and simulation results show that our scheme is more effective against distributed timing attack and incurs less impact on caching efficiency and delay performance compared with existing defense schemes for ICN.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134256237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 24/60-GHz Dual-Band Double-Directional Channel Sounder Using COTS Phased Arrays 基于COTS相控阵的24/ 60ghz双频双向通道测深仪
Pub Date : 2022-05-16 DOI: 10.1109/iccworkshops53468.2022.9814563
Minseok Kim, Hibiki Tsukada, Keiichiro Kumakura, Riku Takahashi, Naoya Suzuki, H. Sawada, T. Matsumura
The use of millimeter-wave (mm-wave) bands has been expanding in new wireless communication systems such as fifth-generation (5G) mobile systems and WiGig WLANs. Since mm-waves have quasi-optical propagation characteristics, it is necessary to develop a channel model that can cover site-specific characteristics of various environments. For this reason, a large amount of channel measurement data measured in a wide range of frequency bands covering mm-wave in various environments should still be required. In particular, it is necessary to obtain the angular channel characteristics on both sides of the transmitter and receiver, but this requires considerable time and cost. The authors' previous study developed a 60-GHz double-directional (D-D) channel sounder using commercial-off-the-shelf (COTS) phased-array beamforming RFs, and it has currently been extended to realize 24/60-GHz dual-band simultaneous measurement. In this paper, we detailed the design of the dual-band D-D channel sounder. As a demonstration of the operation, some measurement results taken in typical urban macro-cell (UMa)/micro-cell (UMi) scenarios were quickly reported.
在第五代(5G)移动通信系统和WiGig wlan等新型无线通信系统中,毫米波(mm-wave)频段的使用正在扩大。由于毫米波具有准光传播特性,因此有必要开发一种能够覆盖各种环境中特定站点特性的信道模型。因此,仍然需要在各种环境下,在覆盖毫米波的宽频带范围内测量大量的信道测量数据。特别是需要获得发射器和接收器两侧的角度信道特性,但这需要相当的时间和成本。作者之前的研究使用商用现货(COTS)相控阵波束形成rf开发了60 ghz双向(D-D)通道测深仪,目前已扩展到实现24/60 ghz双频同时测量。本文详细介绍了双频D-D通道测深仪的设计。作为操作演示,快速报告了典型城市宏/微单元场景下的一些测量结果。
{"title":"A 24/60-GHz Dual-Band Double-Directional Channel Sounder Using COTS Phased Arrays","authors":"Minseok Kim, Hibiki Tsukada, Keiichiro Kumakura, Riku Takahashi, Naoya Suzuki, H. Sawada, T. Matsumura","doi":"10.1109/iccworkshops53468.2022.9814563","DOIUrl":"https://doi.org/10.1109/iccworkshops53468.2022.9814563","url":null,"abstract":"The use of millimeter-wave (mm-wave) bands has been expanding in new wireless communication systems such as fifth-generation (5G) mobile systems and WiGig WLANs. Since mm-waves have quasi-optical propagation characteristics, it is necessary to develop a channel model that can cover site-specific characteristics of various environments. For this reason, a large amount of channel measurement data measured in a wide range of frequency bands covering mm-wave in various environments should still be required. In particular, it is necessary to obtain the angular channel characteristics on both sides of the transmitter and receiver, but this requires considerable time and cost. The authors' previous study developed a 60-GHz double-directional (D-D) channel sounder using commercial-off-the-shelf (COTS) phased-array beamforming RFs, and it has currently been extended to realize 24/60-GHz dual-band simultaneous measurement. In this paper, we detailed the design of the dual-band D-D channel sounder. As a demonstration of the operation, some measurement results taken in typical urban macro-cell (UMa)/micro-cell (UMi) scenarios were quickly reported.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134287215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Conference on Communications Workshops (ICC Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1