Pub Date : 2020-07-01DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162923
Prabhu Janakaraj, Pinyarash Pinyoanuntapong, Pu Wang, Minwoo Lee
Self-driving network is an emerging network automation design principle for building next generation autonomous networked systems based on machine learning algorithms trained on real-time experiences, i.e., network state measurements. However, existing network measurement techniques are designed on centralized architecture leading to considerable control overheads in wireless networks. In this work, we designed and implemented a distributed In-band network telemetry system (S-INT) and Wireless Network Operating System (WINOS) for self-driving wireless networks. On one hand, our proposed S-INT system significantly reduces network measurement overhead by embedding telemetry into flowing data traffic with a specialized packet header. WINOS system, on the other hand, seamlessly integrates programmable measurement, i.e., the proposed S-INT framework, with the programmable network control, while providing rich APIs to facilitate fast implementation of machine learning algorithms for intelligent and distributed network control. To show the effectiveness of our proposed system design, we implemented a multi-agent reinforcement routing as a traffic engineering application to optimize end-to-end delay performance. To the best of our knowledge, our implementation is the first one in the literature that enables multi-agent reinforcement learning algorithm to run on an actual physical wireless multihop network.
{"title":"Towards In-Band Telemetry for Self Driving Wireless Networks","authors":"Prabhu Janakaraj, Pinyarash Pinyoanuntapong, Pu Wang, Minwoo Lee","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162923","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162923","url":null,"abstract":"Self-driving network is an emerging network automation design principle for building next generation autonomous networked systems based on machine learning algorithms trained on real-time experiences, i.e., network state measurements. However, existing network measurement techniques are designed on centralized architecture leading to considerable control overheads in wireless networks. In this work, we designed and implemented a distributed In-band network telemetry system (S-INT) and Wireless Network Operating System (WINOS) for self-driving wireless networks. On one hand, our proposed S-INT system significantly reduces network measurement overhead by embedding telemetry into flowing data traffic with a specialized packet header. WINOS system, on the other hand, seamlessly integrates programmable measurement, i.e., the proposed S-INT framework, with the programmable network control, while providing rich APIs to facilitate fast implementation of machine learning algorithms for intelligent and distributed network control. To show the effectiveness of our proposed system design, we implemented a multi-agent reinforcement routing as a traffic engineering application to optimize end-to-end delay performance. To the best of our knowledge, our implementation is the first one in the literature that enables multi-agent reinforcement learning algorithm to run on an actual physical wireless multihop network.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115263968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/infocomwkshps50562.2020.9162718
Z. Tang, Sudan Li, Peng Xun, Chengsong Wang, Wenping Deng, Baosheng Wang
Currently, the biggest barrier to adopt the model-based test (MBT) is modeling itself. To simplify the protocol modeling process, an agile protocol conformance automatic test platform (AutoPCT) is proposed in this paper. With our platform, the protocol test state machine can be easily designed and modified in graphical mode, and the conformance test scripts can be automatically generated and executed through integrating enhanced formal modeling tool EFM and TTCN-3 test tool Titan. Meanwhile, editable EFSM (Enhanced Finite State Machine) user interface and flexible input/output packet structure design tool are introduced in our platform to improve the development efficiency of protocol conformance test. Finally, the effectiveness of our proposed platform is analyzed through practical protocol test cases.
目前,采用基于模型的测试(MBT)的最大障碍是建模本身。为了简化协议建模过程,本文提出了一种敏捷协议一致性自动测试平台(AutoPCT)。通过集成增强的形式化建模工具EFM和TTCN-3测试工具Titan,可以方便地以图形方式设计和修改协议测试状态机,并自动生成和执行一致性测试脚本。同时,引入了可编辑的EFSM (Enhanced Finite State Machine,增强有限状态机)用户界面和灵活的输入/输出包结构设计工具,提高了协议一致性测试的开发效率。最后,通过实际协议测试用例对平台的有效性进行了分析。
{"title":"Demo Abstract: AutoPCT: An Agile Protocol Conformance Automatic Test Platform Based on Editable EFSM","authors":"Z. Tang, Sudan Li, Peng Xun, Chengsong Wang, Wenping Deng, Baosheng Wang","doi":"10.1109/infocomwkshps50562.2020.9162718","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162718","url":null,"abstract":"Currently, the biggest barrier to adopt the model-based test (MBT) is modeling itself. To simplify the protocol modeling process, an agile protocol conformance automatic test platform (AutoPCT) is proposed in this paper. With our platform, the protocol test state machine can be easily designed and modified in graphical mode, and the conformance test scripts can be automatically generated and executed through integrating enhanced formal modeling tool EFM and TTCN-3 test tool Titan. Meanwhile, editable EFSM (Enhanced Finite State Machine) user interface and flexible input/output packet structure design tool are introduced in our platform to improve the development efficiency of protocol conformance test. Finally, the effectiveness of our proposed platform is analyzed through practical protocol test cases.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116968420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/infocomwkshps50562.2020.9162692
Madhusudan Singh
Intelligent Vehicular Network (IVN) is a communication environment, where Intelligent vehicles communicate and share the information within the network. In an IVN, all vehicles are connected to the internet and vehicles ease to communicate information with other vehicles. IVN aims to improve safety and efficiency by sharing data with only nearby vehicles. The greatest challenge in IVN is trusted data circulation with reliable intelligent vehicles without affecting any personal information of Intelligent vehicles. In this article, we endeavor to resolve above mentioned issue by proposing an effective tri-Blockchain based communication network. We have introduced three blockchain servers, namely Public, Special and Supreme Blockchain server. The public blockchain server and special blockchain server show dynamic features whereas supreme blockchain server features are static for all the time. Our Tri-Blockchain servers provide a greater extent of reliable and quick response during emergency scenario. We have verified our proposal with an accidental USECASE scenario.
{"title":"Tri-Blockchain Based Intelligent Vehicular Networks","authors":"Madhusudan Singh","doi":"10.1109/infocomwkshps50562.2020.9162692","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162692","url":null,"abstract":"Intelligent Vehicular Network (IVN) is a communication environment, where Intelligent vehicles communicate and share the information within the network. In an IVN, all vehicles are connected to the internet and vehicles ease to communicate information with other vehicles. IVN aims to improve safety and efficiency by sharing data with only nearby vehicles. The greatest challenge in IVN is trusted data circulation with reliable intelligent vehicles without affecting any personal information of Intelligent vehicles. In this article, we endeavor to resolve above mentioned issue by proposing an effective tri-Blockchain based communication network. We have introduced three blockchain servers, namely Public, Special and Supreme Blockchain server. The public blockchain server and special blockchain server show dynamic features whereas supreme blockchain server features are static for all the time. Our Tri-Blockchain servers provide a greater extent of reliable and quick response during emergency scenario. We have verified our proposal with an accidental USECASE scenario.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162851
O. Vikhrova, S. Pizzi, A. Molinaro, G. Araniti
Group-oriented/multicast services in cellular networks are gaining momentum as the number of connected Internet of Things (IoT) devices is constantly growing. Different sensors, video cameras, robots, and general-purpose IoT devices can be organised into groups to receive services over a Point-to-Multipoint (PTM) link, thus improving the system spectral efficiency. When the group-oriented content is available in the radio access network (RAN) segment, the network sends paging messages to announce the multicast service. However, most of the battery-powered devices are not immediately available for paging and multicast services. In this work, we analyze the fundamental trade-off between paging and delay for the group-based content delivery. The impact of different paging configurations on the system performance is investigated analytically and proved by simulations.
{"title":"Paging Group Size Distribution for Multicast Services in 5G Networks","authors":"O. Vikhrova, S. Pizzi, A. Molinaro, G. Araniti","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162851","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162851","url":null,"abstract":"Group-oriented/multicast services in cellular networks are gaining momentum as the number of connected Internet of Things (IoT) devices is constantly growing. Different sensors, video cameras, robots, and general-purpose IoT devices can be organised into groups to receive services over a Point-to-Multipoint (PTM) link, thus improving the system spectral efficiency. When the group-oriented content is available in the radio access network (RAN) segment, the network sends paging messages to announce the multicast service. However, most of the battery-powered devices are not immediately available for paging and multicast services. In this work, we analyze the fundamental trade-off between paging and delay for the group-based content delivery. The impact of different paging configurations on the system performance is investigated analytically and proved by simulations.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124843689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162757
Xiang Li, Yuchun Guo, Ye Sheng, Yishuai Chen
With the rapid development of online social networks, marketing through online social platforms attracts a lot of attention. Recently, a special social marketing method is prevailing, i.e., e-commerce celebrities(ECs). ECs run their social network accounts to attract followers and then sell products to them directly. While the sales of ECs have dominated the e-commerce marketing in China, there is, however, a lack of accurate measurement and model about it. In this paper, we first conduct a large-scale cross-platform measurement on two of the biggest online social network platforms and e-commerce platforms in China, i.e., Sina Weibo and Taobao. We then characterize the typical behavioral patterns of ECs and build a machine learning model to quantitatively represent the relationship between the social network behavior and their product sale volumes. Experimental results show that we can accurately predict an EC's sale volume based on the 41 social network behavior features (F1 score can reach 0.83). Furthermore, we obtain the top-10 most important features that affect the sales. Our measurement and modeling results provide beneficial insights in understanding and optimizing social marketing for ECs.
{"title":"Characterizing Social Marketing Behavior of E-commerce Celebrities and Predicting Their Value","authors":"Xiang Li, Yuchun Guo, Ye Sheng, Yishuai Chen","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162757","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162757","url":null,"abstract":"With the rapid development of online social networks, marketing through online social platforms attracts a lot of attention. Recently, a special social marketing method is prevailing, i.e., e-commerce celebrities(ECs). ECs run their social network accounts to attract followers and then sell products to them directly. While the sales of ECs have dominated the e-commerce marketing in China, there is, however, a lack of accurate measurement and model about it. In this paper, we first conduct a large-scale cross-platform measurement on two of the biggest online social network platforms and e-commerce platforms in China, i.e., Sina Weibo and Taobao. We then characterize the typical behavioral patterns of ECs and build a machine learning model to quantitatively represent the relationship between the social network behavior and their product sale volumes. Experimental results show that we can accurately predict an EC's sale volume based on the 41 social network behavior features (F1 score can reach 0.83). Furthermore, we obtain the top-10 most important features that affect the sales. Our measurement and modeling results provide beneficial insights in understanding and optimizing social marketing for ECs.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123271919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Free hand interaction with devices is a promising trend with the advent of Internet of Things (IoT). The unmodulated ambient light, which can be an exciting modality for interaction, is still deficient in research and practice when most of the efforts in the field of visible light sensing are put into solutions based on modulated light. In this paper, we propose a low-cost ambient light-based system which performs finger gesture recognition in real-time. The system relies on a recurrent neural network (RNN) architecture without complicated pre-processing algorithms for the gesture classification task. The results of experimental evaluation proves that the solution that we put forward achieves a rather high recognition accuracy with our proposed sensor layout across a certain group of users.
{"title":"Demo Abstract: FingerLite: Finger Gesture Recognition Using Ambient Light","authors":"Miao Huang, Haihan Duan, Yanru Chen, Yanbing Yang, J. Hao, Liangyin Chen","doi":"10.1109/INFOCOMWKSHPS50562.2020.9163016","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9163016","url":null,"abstract":"Free hand interaction with devices is a promising trend with the advent of Internet of Things (IoT). The unmodulated ambient light, which can be an exciting modality for interaction, is still deficient in research and practice when most of the efforts in the field of visible light sensing are put into solutions based on modulated light. In this paper, we propose a low-cost ambient light-based system which performs finger gesture recognition in real-time. The system relies on a recurrent neural network (RNN) architecture without complicated pre-processing algorithms for the gesture classification task. The results of experimental evaluation proves that the solution that we put forward achieves a rather high recognition accuracy with our proposed sensor layout across a certain group of users.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are enormous types of traffic flows in the IoT era. The traffics could be control by Software Defined Network (SDN) or other transmission protocols in the core networks or mobile edge networks. TCP-BBR algorithm has a better performance on long-fat pipes than traditional TCP protocols in terms of link perception and response time. However, when TCP-BBR and other congestion control algorithms which are based on time delay like TCP-Westwood is applied to the same network links, TCP-BBR will perform unfriendly to the TCP-Westwood. Aiming to improve the fairness between TCP-BBR congestion control algorithm and delay-based congestion control algorithms, this paper proposes a congestion control algorithm based on TCP-BBR which has moderate fairness named Modest Fairness BBR(MFBBR). The simulation results on the Mininet show that our algorithm can improve the fairness of BBR when it coexists with Westwood, and it also has better fairness than delay-based congestion control algorithms.
{"title":"MFBBR: An Optimized Fairness-aware TCP-BBR Algorithm in Wired-cum-wireless Network","authors":"Minghan Jia, Weifeng Sun, Zun Wang, Yaohua Yan, Hongyu Qin, Kelong Meng","doi":"10.1109/INFOCOMWKSHPS50562.2020.9163004","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9163004","url":null,"abstract":"There are enormous types of traffic flows in the IoT era. The traffics could be control by Software Defined Network (SDN) or other transmission protocols in the core networks or mobile edge networks. TCP-BBR algorithm has a better performance on long-fat pipes than traditional TCP protocols in terms of link perception and response time. However, when TCP-BBR and other congestion control algorithms which are based on time delay like TCP-Westwood is applied to the same network links, TCP-BBR will perform unfriendly to the TCP-Westwood. Aiming to improve the fairness between TCP-BBR congestion control algorithm and delay-based congestion control algorithms, this paper proposes a congestion control algorithm based on TCP-BBR which has moderate fairness named Modest Fairness BBR(MFBBR). The simulation results on the Mininet show that our algorithm can improve the fairness of BBR when it coexists with Westwood, and it also has better fairness than delay-based congestion control algorithms.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126863614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/INFOCOMWKSHPS50562.2020.9163041
Su Wang, Zhiliang Wang, Xia Yin, Xingang Shi
Nowadays, attackers tend to perform several steps to complete a cyber attack named multi-step network attack which is different from the traditional network attack. Plenty of studies carried on multi-step attack detection use rule-based intrusion detection system (IDS) alerts as source while rule-based IDS relies heavily on its rule set. It is hard for IDS rule set to detect every anomaly behavior and once some attack steps do not cause alert, the subsequent multi-step attack detection will be affected. In this poster, we present a novel unsupervised two layer multi-step attack detector. In the first layer, we propose Dynamic Threshold Time Decay Frequent Item Mining to detect those steps IDS cannot generate alert and in the second layer, we utilize Heuristic Alarm Clustering method to detect the multi step attack scenario. The results of evaluation on IDS2012 dataset show that our detector can significantly reduce the false negative rate (FNR) of Suricata IDS.
{"title":"Poster Abstract: An Unsupervised Two-Layer Multi-Step Network Attack Detector","authors":"Su Wang, Zhiliang Wang, Xia Yin, Xingang Shi","doi":"10.1109/INFOCOMWKSHPS50562.2020.9163041","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9163041","url":null,"abstract":"Nowadays, attackers tend to perform several steps to complete a cyber attack named multi-step network attack which is different from the traditional network attack. Plenty of studies carried on multi-step attack detection use rule-based intrusion detection system (IDS) alerts as source while rule-based IDS relies heavily on its rule set. It is hard for IDS rule set to detect every anomaly behavior and once some attack steps do not cause alert, the subsequent multi-step attack detection will be affected. In this poster, we present a novel unsupervised two layer multi-step attack detector. In the first layer, we propose Dynamic Threshold Time Decay Frequent Item Mining to detect those steps IDS cannot generate alert and in the second layer, we utilize Heuristic Alarm Clustering method to detect the multi step attack scenario. The results of evaluation on IDS2012 dataset show that our detector can significantly reduce the false negative rate (FNR) of Suricata IDS.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115069189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A smart grid (SG) system offers many services to the end-users, such as load management, load forecasting, and energy trading (ET). As data among different devices in SG environment flows through an open channel, i.e., Internet, so, security and privacy always remains a challenging issue. Though many solutions exist for this problem in literature but these solutions are not adequate to handle security, privacy, latency, real-time settlement of ET. Moreover, most of the solutions reported in the literature are based upon the centralized architecture having single point of failure. Motivated from these facts, this paper proposes a scheme ET-DeaL, which is a Smart Contract-based Secure Energy Trading scheme for SG system for peer-to-peer (P2P) ET. ET-DeaL uses Ethereum smart contract (ESC) and Inter Planetary File System (IPFS) for the P2P ET management. Moreover, it manages the energy load of residential houses, industries, and electric vehicles (EVs). In ET-DeaL, security and privacy issues have been resolved using ESC, while storage cost issues are handled with IPFS protocol. We implemented a real time ESC and deploy it in Truffle suite. The security bugs of the ET-DeaL are tested on MyThril open-source tool. Finally, ET-DeaL performance evaluation demonstrates its effectiveness as compared to the traditional systems where it outperforms the existing schemes with respect to various performance evaluation metrics.
{"title":"ET-DeaL: A P2P Smart Contract-based Secure Energy Trading Scheme for Smart Grid Systems","authors":"Aparna Kumari, Arpit Shukla, Rajesh Gupta, S. Tanwar, Sudhanshu Tyagi, Neeraj Kumar","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162989","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162989","url":null,"abstract":"A smart grid (SG) system offers many services to the end-users, such as load management, load forecasting, and energy trading (ET). As data among different devices in SG environment flows through an open channel, i.e., Internet, so, security and privacy always remains a challenging issue. Though many solutions exist for this problem in literature but these solutions are not adequate to handle security, privacy, latency, real-time settlement of ET. Moreover, most of the solutions reported in the literature are based upon the centralized architecture having single point of failure. Motivated from these facts, this paper proposes a scheme ET-DeaL, which is a Smart Contract-based Secure Energy Trading scheme for SG system for peer-to-peer (P2P) ET. ET-DeaL uses Ethereum smart contract (ESC) and Inter Planetary File System (IPFS) for the P2P ET management. Moreover, it manages the energy load of residential houses, industries, and electric vehicles (EVs). In ET-DeaL, security and privacy issues have been resolved using ESC, while storage cost issues are handled with IPFS protocol. We implemented a real time ESC and deploy it in Truffle suite. The security bugs of the ET-DeaL are tested on MyThril open-source tool. Finally, ET-DeaL performance evaluation demonstrates its effectiveness as compared to the traditional systems where it outperforms the existing schemes with respect to various performance evaluation metrics.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1109/INFOCOMWKSHPS50562.2020.9162935
T. D. P. Perera, Stefan R. Panic, D. Jayakody, P. Muthuchidambaranathan
Radio frequency energy harvesting (RF-EH) offers an unorthodox solution to the painstaking energy constraint drawback in wireless sensor networks (WSNs). In this paper, a data-gathering scenario from a UAV assisted WSN that consists of multiple sensor nodes (SNs) and power beacons (PBs) is considered. All the SNs are remotely powered by the PBs via wireless power transfer (WPT). In the first phase, a cluster-head (CH) is selected from the powered-up SNs and each SN periodically sends its observations to the CH. In the second phase, UAV powers the CH and collects the aggregated sensor observations from the CH. Under the assumption of Rayleigh and Rician fading channels, the outage probability at the UAV is derived and identified the time ratio of the proposed time-block structure that minimizes the outage probability. Furthermore, an effective algorithm is proposed to generate a solution for the process of CH selection. Finally, the achievable outage probability, throughput and the service range of the UAV are demonstrated for a given random setup of WSN through the theoretical and simulation results obtained.
{"title":"UAV-assisted Data Collection in Wireless Powered Sensor Networks over Multiple Fading Channels","authors":"T. D. P. Perera, Stefan R. Panic, D. Jayakody, P. Muthuchidambaranathan","doi":"10.1109/INFOCOMWKSHPS50562.2020.9162935","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162935","url":null,"abstract":"Radio frequency energy harvesting (RF-EH) offers an unorthodox solution to the painstaking energy constraint drawback in wireless sensor networks (WSNs). In this paper, a data-gathering scenario from a UAV assisted WSN that consists of multiple sensor nodes (SNs) and power beacons (PBs) is considered. All the SNs are remotely powered by the PBs via wireless power transfer (WPT). In the first phase, a cluster-head (CH) is selected from the powered-up SNs and each SN periodically sends its observations to the CH. In the second phase, UAV powers the CH and collects the aggregated sensor observations from the CH. Under the assumption of Rayleigh and Rician fading channels, the outage probability at the UAV is derived and identified the time ratio of the proposed time-block structure that minimizes the outage probability. Furthermore, an effective algorithm is proposed to generate a solution for the process of CH selection. Finally, the achievable outage probability, throughput and the service range of the UAV are demonstrated for a given random setup of WSN through the theoretical and simulation results obtained.","PeriodicalId":104136,"journal":{"name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}