首页 > 最新文献

2017 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
Evaluation of touchscreen assistive technology for visually disabled users 对视障用户的触屏辅助技术的评估
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024537
B. Smaradottir, S. Martinez, Jarle Audun Håland
Touchscreen assistive technology is designed to support speech interaction between visually disabled people and mobile devices, allowing the use of a choreography of gestures to interact with a touch user interface. This paper presents the evaluation of VoiceOver, a screen reader in Apple Inc. products, made in the research project Visually impaired users touching the screen- A user evaluation of assistive technology together with six visually disabled test participants. The aim was to identify challenges related to the performance of the gestures for screen interaction and evaluate the system response to the gestures. The main results showed that most of the hand gestures were easy to perform for the test participants. The system adequately responded to gesture interaction, but some inconsistent responses associated to several functionalities and lack of information were found.
触摸屏辅助技术旨在支持视觉残疾人士和移动设备之间的语音交互,允许使用手势编排与触摸用户界面进行交互。本文在“视障用户触摸屏幕-辅助技术的用户评价”研究项目中对苹果公司产品中的屏幕阅读器VoiceOver进行了评价,并与6名视障参与者一起进行了测试。目的是确定与屏幕交互手势性能相关的挑战,并评估系统对手势的响应。主要结果表明,大多数手势对测试参与者来说很容易执行。系统充分响应手势交互,但一些不一致的响应与几个功能和缺乏信息被发现。
{"title":"Evaluation of touchscreen assistive technology for visually disabled users","authors":"B. Smaradottir, S. Martinez, Jarle Audun Håland","doi":"10.1109/ISCC.2017.8024537","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024537","url":null,"abstract":"Touchscreen assistive technology is designed to support speech interaction between visually disabled people and mobile devices, allowing the use of a choreography of gestures to interact with a touch user interface. This paper presents the evaluation of VoiceOver, a screen reader in Apple Inc. products, made in the research project Visually impaired users touching the screen- A user evaluation of assistive technology together with six visually disabled test participants. The aim was to identify challenges related to the performance of the gestures for screen interaction and evaluate the system response to the gestures. The main results showed that most of the hand gestures were easy to perform for the test participants. The system adequately responded to gesture interaction, but some inconsistent responses associated to several functionalities and lack of information were found.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An approach to share MRI data over the Cloud preserving patients' privacy 一种通过云共享MRI数据的方法,保护患者隐私
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024511
A. Galletta, L. Bonanno, A. Celesti, S. Marino, P. Bramanti, M. Villari
Patients' data security and privacy is fundamental in the perspective of moving clinical data over the Cloud. Indeed, this concern has slowed down the adoption of Cloud services in the healthcare context. In fact, clinical operators are reluctant to open Hospital Information Systems (HIS) to external Cloud services. In this paper, we discuss system developed at the IRCCS “Bonino Pulejo” clinical and research centre (Italy) that is able to solve this concern. Such a system is based on two software components that are anonymizer and splitter. The first collects anonymize clinical data, whereas the second obfuscates and stores data in multiple Cloud storage providers. Thus, only authorized clinical operators can access data over the Cloud. A case of study considering real Magnetic Resonance Imaging (MRI) data is analysed in order to assess the performance of the whole system.
从将临床数据转移到云端的角度来看,患者的数据安全和隐私是至关重要的。事实上,这种担忧已经减缓了云服务在医疗保健领域的采用。事实上,临床运营商不愿意将医院信息系统(HIS)开放给外部云服务。在本文中,我们讨论了在IRCCS“Bonino Pulejo”临床和研究中心(意大利)开发的能够解决这一问题的系统。这样的系统是基于两个软件组件,即匿名器和分离器。第一种方法收集匿名临床数据,而第二种方法将数据混淆并存储在多个云存储提供商中。因此,只有经过授权的临床操作人员才能通过云访问数据。为了评估整个系统的性能,分析了一个考虑真实磁共振成像(MRI)数据的研究案例。
{"title":"An approach to share MRI data over the Cloud preserving patients' privacy","authors":"A. Galletta, L. Bonanno, A. Celesti, S. Marino, P. Bramanti, M. Villari","doi":"10.1109/ISCC.2017.8024511","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024511","url":null,"abstract":"Patients' data security and privacy is fundamental in the perspective of moving clinical data over the Cloud. Indeed, this concern has slowed down the adoption of Cloud services in the healthcare context. In fact, clinical operators are reluctant to open Hospital Information Systems (HIS) to external Cloud services. In this paper, we discuss system developed at the IRCCS “Bonino Pulejo” clinical and research centre (Italy) that is able to solve this concern. Such a system is based on two software components that are anonymizer and splitter. The first collects anonymize clinical data, whereas the second obfuscates and stores data in multiple Cloud storage providers. Thus, only authorized clinical operators can access data over the Cloud. A case of study considering real Magnetic Resonance Imaging (MRI) data is analysed in order to assess the performance of the whole system.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Two Layers Multi-class Detection method for network Intrusion Detection System 网络入侵检测系统的二层多类检测方法
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024620
Yali Yuan, Liuwei Huo, D. Hogrefe
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as the false alarm rate. The proposed TLMD algorithm also addresses some difficulties in data mining situations such as handling imbalance datasets, dealing with continuous attributes, and reducing noise in training dataset. We compared the performance of the proposed TLMD method with that of existing algorithms, using the detection rate, accuracy as well as false alarm rate on the KDDcup99 benchmark intrusion detection dataset. The experimental results prove that the proposed TLMD method has a reduced false alarm rate and a good detection rate based on the imbalanced dataset.
入侵检测系统(ids)是一种功能强大的系统,它可以监控和分析事件,以检测安全问题的迹象并采取措施阻止入侵。本文提出了两层多类检测(Two Layers Multi-class Detection, TLMD)方法,结合C5.0方法和朴素贝叶斯算法进行自适应网络入侵检测,提高了检测率和虚警率。提出的TLMD算法还解决了数据挖掘中的一些难题,如处理不平衡数据集、处理连续属性、降低训练数据集中的噪声等。利用KDDcup99基准入侵检测数据集的检测率、准确率和虚警率,比较了所提出的TLMD方法与现有算法的性能。实验结果表明,基于不平衡数据集的TLMD方法具有较低的虚警率和较好的检测率。
{"title":"Two Layers Multi-class Detection method for network Intrusion Detection System","authors":"Yali Yuan, Liuwei Huo, D. Hogrefe","doi":"10.1109/ISCC.2017.8024620","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024620","url":null,"abstract":"Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as the false alarm rate. The proposed TLMD algorithm also addresses some difficulties in data mining situations such as handling imbalance datasets, dealing with continuous attributes, and reducing noise in training dataset. We compared the performance of the proposed TLMD method with that of existing algorithms, using the detection rate, accuracy as well as false alarm rate on the KDDcup99 benchmark intrusion detection dataset. The experimental results prove that the proposed TLMD method has a reduced false alarm rate and a good detection rate based on the imbalanced dataset.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
The impact of quick charging stations on the route planning of Electric Vehicles 快速充电站对电动汽车路线规划的影响
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024521
B. Çatay, M. Keskin
Many companies have a growing interest in utilizing alternative fuel vehicles in their logistics operations due to increasing environmental concerns in developed countries. Consequently, green vehicle routing problems have attracted more attention in the literature. The Electric Vehicle Routing Problem (EVRP) is one such problem where the customers are served using an electric vehicle (EV) fleet. In this problem, the energy on the battery of the EV is consumed proportionally with distance traveled and the EV may need recharging en route in order to complete its tour. In this study, we consider a variant of EVRP where the customers are associated with service time windows and the stations may be equipped with normal and quick charging systems. In the quick charge case, the battery is recharged with the same energy in a shorter time but at a higher cost. Our objective is to minimize energy costs while operating minimum number of vehicles. We formulate the mathematical programming models of the single and multiple charger cases and solve them using a commercial solver. Our aim is to investigate the complexity of the problems and analyze the potential benefits associated with the quick charging option.
由于发达国家日益增加的环境问题,许多公司对在其物流业务中使用替代燃料汽车越来越感兴趣。因此,绿色车辆路径问题越来越受到文献的关注。电动汽车路线问题(EVRP)就是这样一个问题,客户使用电动汽车(EV)车队服务。在这个问题中,电动汽车电池上的能量与行驶距离成正比,并且电动汽车可能需要在途中充电以完成其行程。在本研究中,我们考虑了EVRP的一种变体,其中客户与服务时间窗口相关联,并且站点可以配备正常和快速充电系统。在快速充电的情况下,电池在更短的时间内以相同的能量充电,但成本更高。我们的目标是在运行最少数量车辆的同时将能源成本降至最低。建立了单充电器和多充电器的数学规划模型,并利用商业求解器进行求解。我们的目的是调查问题的复杂性,并分析与快速充电选项相关的潜在好处。
{"title":"The impact of quick charging stations on the route planning of Electric Vehicles","authors":"B. Çatay, M. Keskin","doi":"10.1109/ISCC.2017.8024521","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024521","url":null,"abstract":"Many companies have a growing interest in utilizing alternative fuel vehicles in their logistics operations due to increasing environmental concerns in developed countries. Consequently, green vehicle routing problems have attracted more attention in the literature. The Electric Vehicle Routing Problem (EVRP) is one such problem where the customers are served using an electric vehicle (EV) fleet. In this problem, the energy on the battery of the EV is consumed proportionally with distance traveled and the EV may need recharging en route in order to complete its tour. In this study, we consider a variant of EVRP where the customers are associated with service time windows and the stations may be equipped with normal and quick charging systems. In the quick charge case, the battery is recharged with the same energy in a shorter time but at a higher cost. Our objective is to minimize energy costs while operating minimum number of vehicles. We formulate the mathematical programming models of the single and multiple charger cases and solve them using a commercial solver. Our aim is to investigate the complexity of the problems and analyze the potential benefits associated with the quick charging option.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Mitigating elephant flows in SDN-based IXP networks 减轻基于sdn的IXP网络中的大象流
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024712
Luis Augusto Dias Knob, R. Esteves, L. Granville, L. Tarouco
Internet Exchange Points (IXPs) play a key role in the Internet architecture, enabling cost-effective connections among multiple autonomous systems (ASes). The management of IXP networks includes the activity of taking care of elephant flows; they represent a small number of the total flows of an IXP, but have high impact on the overall network traffic. Managing elephant flows involves adequate identification and eventually rerouting of such flows to more appropriate locations, to minimize the possible negative impact on the other (mice) flows. Elephant flow management becomes even more important in SDN-based IXPs that require controllers to have a consistent view of the underlying network to allow fine-grained adjustment. In this paper, we propose, develop, and evaluate a recommendation system to suggest alternative configurations to previously identified elephant flows in an SDN-based IXP network. In our solution, the IXP operator can define templates that ultimately define how elephant flows can be rerouted to achieve a specific objective. We demonstrate that our system can help IXP operators to mitigate the impact of elephant flows on the IXP network.
Internet交换点(Internet Exchange point, ixp)在Internet体系结构中起着关键作用,能够在多个自治系统(自治系统)之间实现经济高效的连接。IXP网络的管理包括照顾大象流动的活动;它们只占IXP总流量的一小部分,但对整个网络流量有很大影响。大象流的管理包括充分识别并最终将这些流重新路由到更合适的位置,以尽量减少对其他(老鼠)流可能产生的负面影响。大象流管理在基于sdn的ixp中变得更加重要,因为它要求控制器具有底层网络的一致视图,以便进行细粒度的调整。在本文中,我们提出、开发和评估了一个推荐系统,为基于sdn的IXP网络中先前识别的大象流提供替代配置建议。在我们的解决方案中,IXP操作符可以定义模板,这些模板最终定义如何重路由大象流以实现特定目标。我们证明了我们的系统可以帮助IXP操作员减轻大象流对IXP网络的影响。
{"title":"Mitigating elephant flows in SDN-based IXP networks","authors":"Luis Augusto Dias Knob, R. Esteves, L. Granville, L. Tarouco","doi":"10.1109/ISCC.2017.8024712","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024712","url":null,"abstract":"Internet Exchange Points (IXPs) play a key role in the Internet architecture, enabling cost-effective connections among multiple autonomous systems (ASes). The management of IXP networks includes the activity of taking care of elephant flows; they represent a small number of the total flows of an IXP, but have high impact on the overall network traffic. Managing elephant flows involves adequate identification and eventually rerouting of such flows to more appropriate locations, to minimize the possible negative impact on the other (mice) flows. Elephant flow management becomes even more important in SDN-based IXPs that require controllers to have a consistent view of the underlying network to allow fine-grained adjustment. In this paper, we propose, develop, and evaluate a recommendation system to suggest alternative configurations to previously identified elephant flows in an SDN-based IXP network. In our solution, the IXP operator can define templates that ultimately define how elephant flows can be rerouted to achieve a specific objective. We demonstrate that our system can help IXP operators to mitigate the impact of elephant flows on the IXP network.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Evaluating the cooling subsystem availability on a Cloud data center 评估云数据中心上冷却子系统的可用性
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024615
D. Gomes, P. Endo, G. Gonçalves, Daniel Rosendo, Guto Leoni Santos, J. Kelner, D. Sadok, M. Mahloo
A data center is divided into three basic subsystems: information technology (IT), power, and cooling. Cooling plays an important role related to data center availability, and a failure in this subsystem may cause an interruption of services. Generally, a redundant cooling subsystem is implemented based on replacing the failed component by the standby one. However, it also can be based on a rotation of computer room air conditioners (CRACs). This paper proposes scalable models that represent the cooling subsystem behavior to evaluate the impact of cooling failures on the data center availability. Models are based on the TIA-942 standard and represent Tiers I and II. We validate our model by comparing our results with the literatures. Our results show that the CRACs' rotation has similar results in availability when compared to the replace strategy.
数据中心分为IT、电源、制冷三个基本子系统。冷却在数据中心可用性方面起着重要的作用,该子系统的故障可能会导致业务中断。通常,冗余冷却子系统是通过用备用部件替换故障部件来实现的。然而,它也可以基于机房空调(crac)的旋转。本文提出了代表冷却子系统行为的可扩展模型,以评估冷却故障对数据中心可用性的影响。模型基于TIA-942标准,代表一级和二级。通过与文献的比较,验证了模型的正确性。我们的结果表明,与替换策略相比,crac的轮换在可用性方面具有相似的结果。
{"title":"Evaluating the cooling subsystem availability on a Cloud data center","authors":"D. Gomes, P. Endo, G. Gonçalves, Daniel Rosendo, Guto Leoni Santos, J. Kelner, D. Sadok, M. Mahloo","doi":"10.1109/ISCC.2017.8024615","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024615","url":null,"abstract":"A data center is divided into three basic subsystems: information technology (IT), power, and cooling. Cooling plays an important role related to data center availability, and a failure in this subsystem may cause an interruption of services. Generally, a redundant cooling subsystem is implemented based on replacing the failed component by the standby one. However, it also can be based on a rotation of computer room air conditioners (CRACs). This paper proposes scalable models that represent the cooling subsystem behavior to evaluate the impact of cooling failures on the data center availability. Models are based on the TIA-942 standard and represent Tiers I and II. We validate our model by comparing our results with the literatures. Our results show that the CRACs' rotation has similar results in availability when compared to the replace strategy.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123272849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Understanding the role of mobility in real mobile ad-hoc networks connectivity 了解移动性在实际移动自组织网络连接中的作用
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024672
Leonardo Cotta, Pedro O. S. Vaz de Melo, A. Loureiro
The recent exponential growth of the Internet of Things (IoT) and its mobile devices asks for the advancement of mobile networks technology. In such direction, current and next generations of cellular and vehicular networks foresees adhoc communication. In such paradigm, as entities are constantly moving, connections between them are intermittent and of little, if none, reliability. Recent studies have explored entities connections and how to design efficient ad-hoc communication algorithms for them. In this paper, using real mobility data, we study how and to what extent the entities mobility affects the network (global) and the entities (local) connectivity. We propose and leverage existing mobility metrics to capture both the depth and the spread of entities trajectories. Furthermore, we show how global connectivity is related to the depth of the trajectories, while local connectivity is related to the spread of the trajectories. Finally, as we use both human and vehicular mobility data, we discuss how their mobility nature can affect their mobility characteristics and connectivity.
最近物联网(IoT)及其移动设备的指数级增长要求移动网络技术的进步。在这个方向上,当前和下一代的蜂窝和车载网络预见了自组织通信。在这种范式中,由于实体在不断移动,它们之间的联系是断断续续的,几乎没有可靠性。最近的研究主要探讨了实体连接以及如何为它们设计高效的自组织通信算法。本文利用真实的移动数据,研究了实体移动对网络(全局)和实体(局部)连通性的影响方式和程度。我们提出并利用现有的流动性指标来捕捉实体轨迹的深度和广度。此外,我们展示了全球连通性与轨迹的深度有关,而局部连通性与轨迹的传播有关。最后,由于我们使用了人和车辆的移动数据,我们讨论了他们的移动性如何影响他们的移动特性和连通性。
{"title":"Understanding the role of mobility in real mobile ad-hoc networks connectivity","authors":"Leonardo Cotta, Pedro O. S. Vaz de Melo, A. Loureiro","doi":"10.1109/ISCC.2017.8024672","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024672","url":null,"abstract":"The recent exponential growth of the Internet of Things (IoT) and its mobile devices asks for the advancement of mobile networks technology. In such direction, current and next generations of cellular and vehicular networks foresees adhoc communication. In such paradigm, as entities are constantly moving, connections between them are intermittent and of little, if none, reliability. Recent studies have explored entities connections and how to design efficient ad-hoc communication algorithms for them. In this paper, using real mobility data, we study how and to what extent the entities mobility affects the network (global) and the entities (local) connectivity. We propose and leverage existing mobility metrics to capture both the depth and the spread of entities trajectories. Furthermore, we show how global connectivity is related to the depth of the trajectories, while local connectivity is related to the spread of the trajectories. Finally, as we use both human and vehicular mobility data, we discuss how their mobility nature can affect their mobility characteristics and connectivity.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Control-theoretic approach for Duty Cycle Adaptation in dynamic wireless sensor networks 动态无线传感器网络占空比自适应的控制理论方法
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024572
R. Kiyumi, C. Foh, S. Vural, R. Tafazolli
Dynamic network conditions are inevitable in wireless sensor networks (WSNs). In multihop WSN data collection scenarios, data traffic load becomes heavier closer to the data sink. Therefore, extensive research work has been devoted to duty cycle adaptation mechanisms to meet the time-varying and/or spatially non-uniform traffic loads. In this paper, we propose a new algorithm, called Control-theoretic approach for Duty Cycle Adaptation (CDCA), based on the non-beacon-enable mode of the IEEE 802.15.4 protocol. We consider a distributed controller to be run at each node which adapts its duty cycle to achieve energy efficiency and maximise packet delivery performance under variable traffic conditions. CDCA adjusts a sensor's duty cycle using a traffic estimation mechanism based on a novel concept called a virtual queue. This is determined based on the sensor's local queue length as well as explicit packet-drop indications collected from its child nodes in a multihop tree structure rooted at the network's data sink. Based on control theory, the proposed controller is analysed to derive system stability. Performance results obtained using Network Simulator 3 demonstrate that CDCA outperforms the most recent and relevant scheme by saving more energy while also significantly improving packet delivery ratio to the data sink.
在无线传感器网络中,动态网络条件是不可避免的。在多跳WSN数据采集场景中,数据流量越靠近数据汇聚点,负载越重。因此,为适应时变和/或空间非均匀交通负荷,对占空比自适应机制进行了大量的研究。本文提出了一种基于IEEE 802.15.4协议的非信标使能模式的控制理论占空比自适应算法(CDCA)。我们考虑在每个节点上运行一个分布式控制器,该控制器可以调整其占空比以实现能源效率,并在可变流量条件下最大化数据包传输性能。CDCA使用一种基于虚拟队列概念的流量估计机制来调整传感器的占空比。这是根据传感器的本地队列长度以及从植根于网络数据接收器的多跳树结构中的子节点收集的显式丢包指示来确定的。基于控制理论,对所提出的控制器进行了分析,得出了系统的稳定性。使用Network Simulator 3获得的性能结果表明,CDCA优于最新的相关方案,节省了更多的能量,同时显著提高了数据包到数据接收器的传输比率。
{"title":"A Control-theoretic approach for Duty Cycle Adaptation in dynamic wireless sensor networks","authors":"R. Kiyumi, C. Foh, S. Vural, R. Tafazolli","doi":"10.1109/ISCC.2017.8024572","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024572","url":null,"abstract":"Dynamic network conditions are inevitable in wireless sensor networks (WSNs). In multihop WSN data collection scenarios, data traffic load becomes heavier closer to the data sink. Therefore, extensive research work has been devoted to duty cycle adaptation mechanisms to meet the time-varying and/or spatially non-uniform traffic loads. In this paper, we propose a new algorithm, called Control-theoretic approach for Duty Cycle Adaptation (CDCA), based on the non-beacon-enable mode of the IEEE 802.15.4 protocol. We consider a distributed controller to be run at each node which adapts its duty cycle to achieve energy efficiency and maximise packet delivery performance under variable traffic conditions. CDCA adjusts a sensor's duty cycle using a traffic estimation mechanism based on a novel concept called a virtual queue. This is determined based on the sensor's local queue length as well as explicit packet-drop indications collected from its child nodes in a multihop tree structure rooted at the network's data sink. Based on control theory, the proposed controller is analysed to derive system stability. Performance results obtained using Network Simulator 3 demonstrate that CDCA outperforms the most recent and relevant scheme by saving more energy while also significantly improving packet delivery ratio to the data sink.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancement of transmission security for OFDM based systems OFDM系统传输安全性的提高
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024585
D. Efstathiou, G. Papadopoulos, D. Tsipouridou, F. Pavlidou
High level of security is essential in wireless communications multimedia applications. The last few years there has been an increase in research interest in the potential of the radio channel's physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in wireless systems. In this paper, we propose an enhancement to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot sub-carriers, essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the sub-carriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper receiver, does not have access to the information of the pilot sub-carriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity, the outage probability, the channel mean square error and the bit error rate. The proposed scheme is very simple and robust, strengthening security in multimedia applications.
在无线通信多媒体应用中,高水平的安全性是必不可少的。最近几年,人们对无线电信道的物理特性提供通信安全的潜力的研究兴趣有所增加。这些研究工作研究了衰落、干扰和路径分集,以开发无线系统中实现的安全技术。本文利用OFDM技术的特点,对现有的物理层安全方案进行了改进。OFDM符号包括导频子载波,导频子载波对于在合法接收机上执行的导频信道估计过程至关重要。在这项工作中,我们提出在每个OFDM符号上,子载波的位置按照只有合法发射机和合法接收机知道的概率分布变化。由于窃听接收机无法获得导频子载波的位置信息,因此采用盲信道估计。理论分析基于信息论问题的表述,并通过仿真得到了验证。使用的性能指标是保密能力、中断概率、信道均方误差和误码率。该方案简单、健壮,增强了多媒体应用的安全性。
{"title":"Enhancement of transmission security for OFDM based systems","authors":"D. Efstathiou, G. Papadopoulos, D. Tsipouridou, F. Pavlidou","doi":"10.1109/ISCC.2017.8024585","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024585","url":null,"abstract":"High level of security is essential in wireless communications multimedia applications. The last few years there has been an increase in research interest in the potential of the radio channel's physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in wireless systems. In this paper, we propose an enhancement to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot sub-carriers, essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the sub-carriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper receiver, does not have access to the information of the pilot sub-carriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity, the outage probability, the channel mean square error and the bit error rate. The proposed scheme is very simple and robust, strengthening security in multimedia applications.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131378950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
OpenFlow-compliant topology management for SDN-enabled Information Centric Networks 支持sdn的信息中心网络的openflow兼容拓扑管理
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024648
George P. Petropoulos, K. Katsaros, Maria-Evgenia Xezonaki
Information-Centric Networking (ICN) has emerged as an interesting approach to overcome many of the limitations of legacy IP-based networks. However, the drastic changes to legacy infrastructure required to realise an ICN have significantly hindered its adoption by network operators. As a result, alternative deployment strategies are investigated, with Software-Defined Networking (SDN) arising as a solution compatible with legacy infrastructure, thus opening new possibilities for integrating ICN concepts in operators' networks. This paper discusses the seamless integration of these two architectural paradigms and suggests a scalable and dynamic network topology bootstrapping and management framework to deploy and operate ICN topologies over SDN-enabled operator networks. We describe the designed protocol and supporting mechanisms, as well as the minimum required implementation to realize this inter-operability. A proof-of-concept prototype has been implemented to validate the feasibility of the approach. Results show that topology bootstrapping time is not significantly affected by the topology size, substantially facilitating the intelligent management of an ICN-enabled network.
以信息为中心的网络(Information-Centric Networking, ICN)已经成为一种克服传统基于ip的网络的许多限制的有趣方法。然而,实现ICN所需的遗留基础设施的巨大变化极大地阻碍了网络运营商对其的采用。因此,人们开始研究替代部署策略,软件定义网络(SDN)作为一种与传统基础设施兼容的解决方案出现,从而为将ICN概念集成到运营商的网络中开辟了新的可能性。本文讨论了这两种架构范例的无缝集成,并提出了一种可扩展的动态网络拓扑引导和管理框架,用于在支持sdn的运营商网络上部署和操作ICN拓扑。我们描述了所设计的协议和支持机制,以及实现这种互操作性所需的最小实现。一个概念验证原型已经实现,以验证该方法的可行性。结果表明,拓扑引导时间不受拓扑大小的显著影响,极大地促进了支持icn的网络的智能管理。
{"title":"OpenFlow-compliant topology management for SDN-enabled Information Centric Networks","authors":"George P. Petropoulos, K. Katsaros, Maria-Evgenia Xezonaki","doi":"10.1109/ISCC.2017.8024648","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024648","url":null,"abstract":"Information-Centric Networking (ICN) has emerged as an interesting approach to overcome many of the limitations of legacy IP-based networks. However, the drastic changes to legacy infrastructure required to realise an ICN have significantly hindered its adoption by network operators. As a result, alternative deployment strategies are investigated, with Software-Defined Networking (SDN) arising as a solution compatible with legacy infrastructure, thus opening new possibilities for integrating ICN concepts in operators' networks. This paper discusses the seamless integration of these two architectural paradigms and suggests a scalable and dynamic network topology bootstrapping and management framework to deploy and operate ICN topologies over SDN-enabled operator networks. We describe the designed protocol and supporting mechanisms, as well as the minimum required implementation to realize this inter-operability. A proof-of-concept prototype has been implemented to validate the feasibility of the approach. Results show that topology bootstrapping time is not significantly affected by the topology size, substantially facilitating the intelligent management of an ICN-enabled network.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2017 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1