首页 > 最新文献

2017 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
An efficient and dynamic pseudonyms change system for privacy in VANET 一种高效、动态的VANET隐私化名变更系统
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024505
Walid Bouksani, B. A. Bensaber
We propose in this paper a security protocol based on a dynamic change of pseudonyms for privacy in Vehicular Ad hoc NETworks (VANET). Our proposal ensures privacy for the driver and his vehicle whether he is transmitter or receiver of the message. By handling all possible cases of changes in vehicle behavior during traffic, we ensure a safe and secure traffic management. We built the architecture of our solution on three essential devices designed for VANET. In three steps, the anonymity is guaranteed by our Real Initial New protocol (RIN). This latest provides a high security to vehicles.
本文提出了一种基于动态更改假名的车辆自组织网络(VANET)安全协议。我们的提议确保了司机和他的车辆的隐私,无论他是发送者还是接收者。通过处理交通中所有可能发生的车辆行为变化,我们确保安全可靠的交通管理。我们在为VANET设计的三个基本设备上构建了我们的解决方案架构。通过三个步骤,我们的真实初始新协议(RIN)保证了匿名性。这一最新技术为车辆提供了高度的安全性。
{"title":"An efficient and dynamic pseudonyms change system for privacy in VANET","authors":"Walid Bouksani, B. A. Bensaber","doi":"10.1109/ISCC.2017.8024505","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024505","url":null,"abstract":"We propose in this paper a security protocol based on a dynamic change of pseudonyms for privacy in Vehicular Ad hoc NETworks (VANET). Our proposal ensures privacy for the driver and his vehicle whether he is transmitter or receiver of the message. By handling all possible cases of changes in vehicle behavior during traffic, we ensure a safe and secure traffic management. We built the architecture of our solution on three essential devices designed for VANET. In three steps, the anonymity is guaranteed by our Real Initial New protocol (RIN). This latest provides a high security to vehicles.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128799836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
CREDENCE: A Carrier Grade Software Defined Networking control environment based on the JAIN SLEE component model CREDENCE:基于JAIN SLEE组件模型的电信级软件定义网络控制环境
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024567
J.L. Martinez, P. F. Rosa, Flávio de Oliveira Silva, C. Ferreira, Pedro Bispo, Daniel Corujo, R. Aguiar
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are catching the attention of telecom operators. Telecom environments establish a set of Carrier Grade requirements such as high availability, high throughput and low latency. To address these challenges SDN deploys logically-centralized controllers, such as ONOS and OpenDayLight. Based on the JAIN SLEE component model, which is a Carrier Grade component already deployed at telecom operators, and the Libfluid OpenFlow driver, this work presents the CREDENCE, a carrier grade SDN controller, which in our evaluation shows that it offers a higher throughput and a lower latency when compared to ONOS, OpenDayLight, Ryu and POX.
软件定义网络(SDN)和网络功能虚拟化(NFV)正受到电信运营商的关注。电信环境建立了一组运营商级需求,如高可用性、高吞吐量和低延迟。为了应对这些挑战,SDN部署了逻辑上集中的控制器,如ONOS和OpenDayLight。基于电信运营商已经部署的运营商级组件JAIN SLEE组件模型和Libfluid OpenFlow驱动程序,本研究提出了运营商级SDN控制器CREDENCE,在我们的评估中显示,与ONOS、OpenDayLight、Ryu和POX相比,它提供了更高的吞吐量和更低的延迟。
{"title":"CREDENCE: A Carrier Grade Software Defined Networking control environment based on the JAIN SLEE component model","authors":"J.L. Martinez, P. F. Rosa, Flávio de Oliveira Silva, C. Ferreira, Pedro Bispo, Daniel Corujo, R. Aguiar","doi":"10.1109/ISCC.2017.8024567","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024567","url":null,"abstract":"Software Defined Networking (SDN) and Network Function Virtualization (NFV) are catching the attention of telecom operators. Telecom environments establish a set of Carrier Grade requirements such as high availability, high throughput and low latency. To address these challenges SDN deploys logically-centralized controllers, such as ONOS and OpenDayLight. Based on the JAIN SLEE component model, which is a Carrier Grade component already deployed at telecom operators, and the Libfluid OpenFlow driver, this work presents the CREDENCE, a carrier grade SDN controller, which in our evaluation shows that it offers a higher throughput and a lower latency when compared to ONOS, OpenDayLight, Ryu and POX.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of WiFi Direct for data dissemination in mobile social networks WiFi Direct在移动社交网络中数据传播的性能评价
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024690
Z. Mao, Jing Ma, Yuming Jiang, Bin Yao
WiFi Direct is a recent device-to-device communication technology standardized by the WiFi Alliance. Its increasing availability on popular mobile systems (e.g. Android) presents a unique opportunity for developers to implement mobile social networks (MSNs), a new paradigm that facilitates data dissemination without Internet access by leveraging human mobility and short-range communication technologies. Since WiFi Direct is not originally designed for such applications, it is significant to learn its performance in practice. In this paper, we investigate goodput and fairness of WiFi Direct for data dissemination in MSNs. To this end, we develop an MSN application and conduct three sets of experiments on a testbed comprising several Android devices. Experimental results show that the data loads and mobility of nodes greatly impact the goodput and fairness.
WiFi Direct是最近由WiFi联盟标准化的设备对设备通信技术。它在流行的移动系统(如Android)上的可用性越来越高,为开发人员实现移动社交网络(msn)提供了一个独特的机会,这是一种新的范例,通过利用人类移动性和短距离通信技术,在没有互联网接入的情况下促进数据传播。由于WiFi Direct最初并不是为这些应用而设计的,因此在实践中了解其性能是很有意义的。本文研究了WiFi Direct在微信网络中数据传播的优点和公平性。为此,我们开发了一个MSN应用程序,并在由多台Android设备组成的测试台上进行了三组实验。实验结果表明,节点的数据负载和可移动性极大地影响了算法的有效性和公平性。
{"title":"Performance evaluation of WiFi Direct for data dissemination in mobile social networks","authors":"Z. Mao, Jing Ma, Yuming Jiang, Bin Yao","doi":"10.1109/ISCC.2017.8024690","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024690","url":null,"abstract":"WiFi Direct is a recent device-to-device communication technology standardized by the WiFi Alliance. Its increasing availability on popular mobile systems (e.g. Android) presents a unique opportunity for developers to implement mobile social networks (MSNs), a new paradigm that facilitates data dissemination without Internet access by leveraging human mobility and short-range communication technologies. Since WiFi Direct is not originally designed for such applications, it is significant to learn its performance in practice. In this paper, we investigate goodput and fairness of WiFi Direct for data dissemination in MSNs. To this end, we develop an MSN application and conduct three sets of experiments on a testbed comprising several Android devices. Experimental results show that the data loads and mobility of nodes greatly impact the goodput and fairness.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130751083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Worst-case attacker models for two-layered networks based on the Minimum Overlay Cut 基于最小覆盖分割的二层网络最坏情况攻击模型
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024709
M. Backhaus, G. Schäfer
Appropriate attacker models are generally known to be a fundamental prerequisite for any security evaluation of complex systems or networks. This paper deals with worst-case attacker models targeted to cause maximum damage in an overlay network by deliberately disturbing links within the underlying transport network topology. The flexibility of rerouting in underlay and overlay networks leads to complex dynamics in the topology of such two-layered overlay networks, which needs to be appropriately considered in attacker modeling. In this article, we present two worst-case attacker models based on the Minimum Overlay Cut, which either try to maximize network damage with a given number of possible outages, or aim at a given level of damage with minimal effort. For this, we developed a novel Integer Linear Programming (ILP) formulation for the Minimum Cut, that uses less binary variables than existing approaches, and is therefore better suited to deal with larger networks as well as multiple demands. An evaluation of a typical VPN overlay scenario shows that our worst-case models give significantly more realistic assessments of potential damages than two alternatively evaluated random and greedy strategies.
适当的攻击者模型通常被认为是任何复杂系统或网络安全评估的基本先决条件。本文研究了通过故意干扰底层传输网络拓扑中的链路,在覆盖网络中造成最大损害的最坏情况攻击模型。由于底层和覆盖网络重路由的灵活性,导致这两层覆盖网络的拓扑结构具有复杂的动态特性,在攻击者建模时需要适当考虑这一点。在本文中,我们提出了两种基于最小覆盖切断的最坏情况攻击者模型,它们要么试图在给定数量的可能中断的情况下最大化网络破坏,要么以最小的努力达到给定的破坏水平。为此,我们开发了一种新颖的整数线性规划(ILP)最小切割公式,它比现有方法使用更少的二进制变量,因此更适合处理更大的网络以及多种需求。对典型VPN覆盖场景的评估表明,我们的最坏情况模型对潜在损害的评估明显比两种随机评估和贪婪策略更现实。
{"title":"Worst-case attacker models for two-layered networks based on the Minimum Overlay Cut","authors":"M. Backhaus, G. Schäfer","doi":"10.1109/ISCC.2017.8024709","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024709","url":null,"abstract":"Appropriate attacker models are generally known to be a fundamental prerequisite for any security evaluation of complex systems or networks. This paper deals with worst-case attacker models targeted to cause maximum damage in an overlay network by deliberately disturbing links within the underlying transport network topology. The flexibility of rerouting in underlay and overlay networks leads to complex dynamics in the topology of such two-layered overlay networks, which needs to be appropriately considered in attacker modeling. In this article, we present two worst-case attacker models based on the Minimum Overlay Cut, which either try to maximize network damage with a given number of possible outages, or aim at a given level of damage with minimal effort. For this, we developed a novel Integer Linear Programming (ILP) formulation for the Minimum Cut, that uses less binary variables than existing approaches, and is therefore better suited to deal with larger networks as well as multiple demands. An evaluation of a typical VPN overlay scenario shows that our worst-case models give significantly more realistic assessments of potential damages than two alternatively evaluated random and greedy strategies.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131269134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel urban traffic management mechanism based on FOG 一种基于光纤陀螺的城市交通管理机制
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024559
Celso A. R. L. Brennand, A. Boukerche, R. Meneguette, L. Villas
An increase of vehicles in a city without an efficient infrastructure of traffic management can cause damages not only financial but also environmental and social. In order to support urban traffic system to relieve the traffic congestion and the damage caused by congestion of vehicles, in this paper, we propose a mechanism for Intelligent Transport Systems named FOg RoutE VEhiculaR (FOREVER), in order to assist the traffic management in Vehicular Networks (VANET). For achieving this, FOREVER will detect and recommend an alternative route for the vehicles to avoid previous congestion. FOREVER is based on FOG computing paradigm that aims of to compute and modify the route of the vehicle to avoid the formation of congestion. Thus, the results show that FOREVER had a reduction about 7.9% of the CO2 emissions, 8.3% the stop time and 7.6% of the trip time.
在一个没有有效的交通管理基础设施的城市中,车辆的增加不仅会造成经济损失,还会造成环境和社会损失。为了支持城市交通系统缓解交通拥堵和车辆拥堵造成的损害,本文提出了一种基于FOg RoutE vehicle (FOREVER)的智能交通系统机制,以辅助车辆网络(VANET)中的交通管理。为了实现这一目标,FOREVER将检测并为车辆推荐一条替代路线,以避免之前的拥堵。FOREVER基于FOG计算范式,旨在计算和修改车辆的路线,以避免拥堵的形成。因此,结果表明,FOREVER减少了约7.9%的二氧化碳排放量,8.3%的停车时间和7.6%的行程时间。
{"title":"A novel urban traffic management mechanism based on FOG","authors":"Celso A. R. L. Brennand, A. Boukerche, R. Meneguette, L. Villas","doi":"10.1109/ISCC.2017.8024559","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024559","url":null,"abstract":"An increase of vehicles in a city without an efficient infrastructure of traffic management can cause damages not only financial but also environmental and social. In order to support urban traffic system to relieve the traffic congestion and the damage caused by congestion of vehicles, in this paper, we propose a mechanism for Intelligent Transport Systems named FOg RoutE VEhiculaR (FOREVER), in order to assist the traffic management in Vehicular Networks (VANET). For achieving this, FOREVER will detect and recommend an alternative route for the vehicles to avoid previous congestion. FOREVER is based on FOG computing paradigm that aims of to compute and modify the route of the vehicle to avoid the formation of congestion. Thus, the results show that FOREVER had a reduction about 7.9% of the CO2 emissions, 8.3% the stop time and 7.6% of the trip time.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
A cooperative location service for VANETs 为VANETs提供的合作定位服务
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024504
Tawfiq Nebbou, H. Fouchal, M. Lehsaini, Marwane Ayaida
Routing messages over vehicular ad hoc networks (VANETs) is usually achieved through geographic routing protocols. In such networks, the vehicle dynamics causes rapid changes on the vehicle density and the communication links. In order to be efficient to route messages from a vehicle to another, we need to locate each node (its position), this is achieved by a location service. This study works on simple location service adapted for unicast routing over VANETs in city environment. This service is able to find a route from a route from a source to the destination and this route is the one passing through the most dense path‥ We have implemented our proposal on the OMNET++ simulator and we have conducted extensive simulations in different scenarios to evaluate its scalability and robustness against frequent topology changes. The results obtained have shown that our proposed protocol provides significant improvements in terms of packet delivery ratio, end-to-end delay and overhead compared to EGyTAR protocol.
车辆自组织网络(vanet)上的路由消息通常通过地理路由协议实现。在这种网络中,车辆的动态变化会导致车辆密度和通信链路的快速变化。为了有效地将消息从一辆车路由到另一辆车,我们需要定位每个节点(它的位置),这是通过位置服务实现的。本文研究了适合城市环境下vanet单播路由的简单位置服务。这个服务能够从一个从源到目的地的路由找到一条路由,这条路由是通过最密集的路径的路由。我们已经在omnet++模拟器上实现了我们的提议,我们已经在不同的场景中进行了广泛的模拟,以评估其可扩展性和鲁棒性,以应对频繁的拓扑变化。结果表明,与EGyTAR协议相比,我们提出的协议在分组传输比、端到端延迟和开销方面有了显著的改进。
{"title":"A cooperative location service for VANETs","authors":"Tawfiq Nebbou, H. Fouchal, M. Lehsaini, Marwane Ayaida","doi":"10.1109/ISCC.2017.8024504","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024504","url":null,"abstract":"Routing messages over vehicular ad hoc networks (VANETs) is usually achieved through geographic routing protocols. In such networks, the vehicle dynamics causes rapid changes on the vehicle density and the communication links. In order to be efficient to route messages from a vehicle to another, we need to locate each node (its position), this is achieved by a location service. This study works on simple location service adapted for unicast routing over VANETs in city environment. This service is able to find a route from a route from a source to the destination and this route is the one passing through the most dense path‥ We have implemented our proposal on the OMNET++ simulator and we have conducted extensive simulations in different scenarios to evaluate its scalability and robustness against frequent topology changes. The results obtained have shown that our proposed protocol provides significant improvements in terms of packet delivery ratio, end-to-end delay and overhead compared to EGyTAR protocol.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134120688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
FMR-PDP: Flexible multiple-replica provable data possession in cloud storage FMR-PDP:云存储中灵活的多副本可证明的数据占有
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024675
Limin Li, Yahui Yang, Zhonghai Wu
Cloud storage is a service provided by cloud service provider (CSP). More and more individuals and organizations accept the scheme and outsource their data to CSP seeking to reduce local storage burden. Since the outsourced files are no longer under the data owners' direct control and CSP is not trustworthy, it is necessary for data owners to check the integrity of their files outsourced to CSP. To address this crucial problem, some provable data possession (PDP) protocols have been presented. In order to obtain higher availability, storing multiple replicas is a common strategy in cloud storage. Most recent researches on multiple-replica provable data possession (MR-PDP) use homomorphic linear authenticators (HLAs) to generate aggregated tags for the blocks at the same indices in each replica, but it cannot verify single replica to identify the corrupted replicas. In this paper, we proposed a novel multiple replica provable data possession scheme, named FMR-PDP. In FMR-PDP, we compute tags based on vector dot product instead of expensive group exponentiation operations, and only generate one tag for all blocks at the same indices in each replica. Our FMR-PDP scheme supports a flexible data possession verification, which means the data owner can check any number of replicas in a verification. In addition, we make a comprehensive performance analysis, which shows that our proposed scheme is flexible and efficient.
云存储是云服务提供商(CSP)提供的一种服务。越来越多的个人和组织接受这种方案,并将他们的数据外包给CSP,以减少本地存储负担。由于外判文件已不再受资料拥有人的直接控制,而CSP又不值得信任,因此资料拥有人有必要检查外判给CSP的文件的完整性。为了解决这个关键问题,已经提出了一些可证明的数据占有(PDP)协议。为了获得更高的可用性,存储多个副本是云存储中的常用策略。最近的多副本可证明数据占有(MR-PDP)研究大多使用同态线性身份验证器(HLAs)为每个副本中相同索引处的块生成聚合标签,但它不能验证单个副本以识别损坏的副本。本文提出了一种新的多副本可证明数据占有方案——FMR-PDP。在FMR-PDP中,我们基于向量点积而不是昂贵的群幂运算来计算标签,并且每个副本中相同索引处的所有块仅生成一个标签。我们的FMR-PDP方案支持灵活的数据占有验证,这意味着数据所有者可以在验证中检查任意数量的副本。此外,我们还进行了全面的性能分析,表明我们提出的方案是灵活和高效的。
{"title":"FMR-PDP: Flexible multiple-replica provable data possession in cloud storage","authors":"Limin Li, Yahui Yang, Zhonghai Wu","doi":"10.1109/ISCC.2017.8024675","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024675","url":null,"abstract":"Cloud storage is a service provided by cloud service provider (CSP). More and more individuals and organizations accept the scheme and outsource their data to CSP seeking to reduce local storage burden. Since the outsourced files are no longer under the data owners' direct control and CSP is not trustworthy, it is necessary for data owners to check the integrity of their files outsourced to CSP. To address this crucial problem, some provable data possession (PDP) protocols have been presented. In order to obtain higher availability, storing multiple replicas is a common strategy in cloud storage. Most recent researches on multiple-replica provable data possession (MR-PDP) use homomorphic linear authenticators (HLAs) to generate aggregated tags for the blocks at the same indices in each replica, but it cannot verify single replica to identify the corrupted replicas. In this paper, we proposed a novel multiple replica provable data possession scheme, named FMR-PDP. In FMR-PDP, we compute tags based on vector dot product instead of expensive group exponentiation operations, and only generate one tag for all blocks at the same indices in each replica. Our FMR-PDP scheme supports a flexible data possession verification, which means the data owner can check any number of replicas in a verification. In addition, we make a comprehensive performance analysis, which shows that our proposed scheme is flexible and efficient.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Optimization and resource management in NOMA wireless networks supporting real and non-real time service bundling 支持实时和非实时业务捆绑的NOMA无线网络的优化和资源管理
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024609
Panagiotis Vamvakas, Eirini-Eleni Tsiropoulou, S. Papavassiliou, J. Baras
In this paper, the problem of joint users' uplink transmission power and rate allocation in NOMA wireless networks is studied, under the scenario that each user is simultaneously requesting multiple services. Each user is associated with a two-variable utility function that represents his satisfaction from his allocated resources (i.e., power and rate). In order to appropriately reflect the combined needs of the user for bundling different types of services under the same common umbrella, user's utility function consists of two parts while different percentages are adopted by each user for each part in order to express his need for real and non-real time services. The joint resource allocation problem is directly confronted as a two-variable optimization problem and formulated as a non-cooperative game. The theory of S-modular multivariable games is adopted towards determining the Nash equilibrium point of the game. A distributed, iterative and low complexity algorithm for computing game's Nash equilibrium is introduced, while updating user's uplink transmission power and rate at the same step. Detailed numerical results exhibit the ability of the proposed framework to simultaneously satisfy diverse multiple services requested by the same user.
本文研究了NOMA无线网络中每个用户同时请求多个业务的情况下,联合用户上行传输功率和速率分配问题。每个用户都与一个双变量效用函数相关联,该函数表示他对分配的资源(即功率和速率)的满意度。为了恰当地反映用户将不同类型的服务捆绑在同一保护伞下的综合需求,用户效用函数分为两部分,每个用户对每一部分采用不同的百分比,以表达其对实时和非实时服务的需求。联合资源分配问题作为一个双变量优化问题直接面对,并被表述为一个非合作博弈。采用s模多变量对策理论确定对策的纳什均衡点。提出了一种计算博弈纳什均衡的分布式迭代低复杂度算法,同时同步更新用户的上行传输功率和速率。详细的数值结果表明,所提出的框架能够同时满足同一用户所要求的多种服务。
{"title":"Optimization and resource management in NOMA wireless networks supporting real and non-real time service bundling","authors":"Panagiotis Vamvakas, Eirini-Eleni Tsiropoulou, S. Papavassiliou, J. Baras","doi":"10.1109/ISCC.2017.8024609","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024609","url":null,"abstract":"In this paper, the problem of joint users' uplink transmission power and rate allocation in NOMA wireless networks is studied, under the scenario that each user is simultaneously requesting multiple services. Each user is associated with a two-variable utility function that represents his satisfaction from his allocated resources (i.e., power and rate). In order to appropriately reflect the combined needs of the user for bundling different types of services under the same common umbrella, user's utility function consists of two parts while different percentages are adopted by each user for each part in order to express his need for real and non-real time services. The joint resource allocation problem is directly confronted as a two-variable optimization problem and formulated as a non-cooperative game. The theory of S-modular multivariable games is adopted towards determining the Nash equilibrium point of the game. A distributed, iterative and low complexity algorithm for computing game's Nash equilibrium is introduced, while updating user's uplink transmission power and rate at the same step. Detailed numerical results exhibit the ability of the proposed framework to simultaneously satisfy diverse multiple services requested by the same user.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133375724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Mobile Edge Computing-assisted video delivery architecture for wireless heterogeneous networks 一种基于移动边缘计算的无线异构网络视频传输架构
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024583
Yue Li, P. A. Frangoudis, Y. H. Aoul, P. Bertin
We focus on QoE-optimized video delivery in a wireless heterogeneous network setting, where users equipped with multi-interface devices access a Dynamic Adaptive Streaming over HTTP (DASH) video service. We provide an Integer Linear Programming (ILP) formulation for the problem of optimal joint video quality and network interface selection and a heuristic algorithm to solve it, shown via simulation and testbed experiments to achieve near-optimal performance in terms of Quality of Experience (QoE), with reduced execution time. We further design a video delivery architecture based on the emerging Mobile Edge Computing (MEC) standard, where our video quality and network selection functionality is executed as a MEC application. Notably, our architecture transparently operates with standard DASH clients.
我们专注于无线异构网络设置中qos优化的视频传输,其中配备多接口设备的用户访问动态自适应HTTP流(DASH)视频服务。我们为最佳联合视频质量和网络接口选择问题提供了一个整数线性规划(ILP)公式,并提供了一个启发式算法来解决这个问题,通过仿真和试验台实验证明,在减少执行时间的情况下,在体验质量(QoE)方面实现了接近最佳的性能。我们进一步设计了基于新兴移动边缘计算(MEC)标准的视频传输架构,其中我们的视频质量和网络选择功能作为MEC应用程序执行。值得注意的是,我们的架构透明地与标准DASH客户端一起运行。
{"title":"A Mobile Edge Computing-assisted video delivery architecture for wireless heterogeneous networks","authors":"Yue Li, P. A. Frangoudis, Y. H. Aoul, P. Bertin","doi":"10.1109/ISCC.2017.8024583","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024583","url":null,"abstract":"We focus on QoE-optimized video delivery in a wireless heterogeneous network setting, where users equipped with multi-interface devices access a Dynamic Adaptive Streaming over HTTP (DASH) video service. We provide an Integer Linear Programming (ILP) formulation for the problem of optimal joint video quality and network interface selection and a heuristic algorithm to solve it, shown via simulation and testbed experiments to achieve near-optimal performance in terms of Quality of Experience (QoE), with reduced execution time. We further design a video delivery architecture based on the emerging Mobile Edge Computing (MEC) standard, where our video quality and network selection functionality is executed as a MEC application. Notably, our architecture transparently operates with standard DASH clients.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Neutral Operation of the Minimum Energy Node in energy-harvesting environments 能量收集环境中最小能量节点的中性运行
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024574
Andre Riker, M. Curado, E. Monteiro
With the recent emergence of energy-harvesting technologies in wireless devices, new challenges have to be addressed by Machine-to-Machine (M2M) communication protocols. The Neutral Operation problem is a relevant problem that seeks to maintain the energy reserve of a node in a level that minimizes energy depletion and maximizes the usage of the harvested-energy. However, neutral operation in a multihop network is a more complex issue, since the nodes lack full knowledge of the network and the nodes have diverse harvesting and consumption profiles. A simplification of the Neutral Operation problem is proposed, named Neutral Operation of the Minimum Energy Node, in which the node with the lowest amount of energy determines the operation of the whole network. This paper proposes a battery-aware solution, called Routing and Aggregation for Minimum Energy (RAME), that performs data-aggregation on the traffic load according to the minimum energy reserve on the path. As part the proposed solution, a kinetic battery model has been developed to provide non-linear battery level estimation. Besides, the Routing Protocol for Low-Power and Lossy Networks (RPL) was enhanced to use the kinetic battery estimation as metric for parent node selection and to find periodically the minimum energy reserve on the available paths. The performance evaluation of the proposed mechanism using Contiki shows the benefits of RAME in comparison to the M2M standard protocols.
随着无线设备中能量收集技术的出现,机器对机器(M2M)通信协议必须解决新的挑战。中立操作问题是一个相关的问题,它寻求保持一个节点的能量储备在一个最小的能量消耗和最大限度地利用收获的能量的水平。然而,多跳网络中的中立操作是一个更复杂的问题,因为节点缺乏对网络的充分了解,节点具有不同的收获和消费概况。提出了一种简化的中立操作问题,称为最小能量节点的中立操作,其中能量最小的节点决定整个网络的运行。本文提出了一种电池感知的方案,称为最小能量路由和聚合(RAME),它根据路径上的最小能量储备对交通负载进行数据聚合。作为提出的解决方案的一部分,已经开发了一个动态电池模型来提供非线性电池电量估计。此外,对低功耗损耗网络路由协议(RPL)进行了改进,使用电池动态估计作为父节点选择的度量,并周期性地找到可用路径上的最小能量储备。使用Contiki对提议的机制进行性能评估,显示了与M2M标准协议相比,RAME的优势。
{"title":"Neutral Operation of the Minimum Energy Node in energy-harvesting environments","authors":"Andre Riker, M. Curado, E. Monteiro","doi":"10.1109/ISCC.2017.8024574","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024574","url":null,"abstract":"With the recent emergence of energy-harvesting technologies in wireless devices, new challenges have to be addressed by Machine-to-Machine (M2M) communication protocols. The Neutral Operation problem is a relevant problem that seeks to maintain the energy reserve of a node in a level that minimizes energy depletion and maximizes the usage of the harvested-energy. However, neutral operation in a multihop network is a more complex issue, since the nodes lack full knowledge of the network and the nodes have diverse harvesting and consumption profiles. A simplification of the Neutral Operation problem is proposed, named Neutral Operation of the Minimum Energy Node, in which the node with the lowest amount of energy determines the operation of the whole network. This paper proposes a battery-aware solution, called Routing and Aggregation for Minimum Energy (RAME), that performs data-aggregation on the traffic load according to the minimum energy reserve on the path. As part the proposed solution, a kinetic battery model has been developed to provide non-linear battery level estimation. Besides, the Routing Protocol for Low-Power and Lossy Networks (RPL) was enhanced to use the kinetic battery estimation as metric for parent node selection and to find periodically the minimum energy reserve on the available paths. The performance evaluation of the proposed mechanism using Contiki shows the benefits of RAME in comparison to the M2M standard protocols.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113994525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2017 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1