首页 > 最新文献

ICC 2020 - 2020 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Offloading Network Data Analytics Function to the Cloud with Minimum Cost and Maximum Utilization 以最小的成本和最大的利用率将网络数据分析功能卸载到云端
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148665
Nazih Salhab, Rana Rahim, R. Langar, R. Boutaba
Cloud computing is being embraced more and more by telecommunication operators for on-demand access to computing resources. Knowing that 5G Core reference architecture is envisioned to be cloud-native and service-oriented, we propose, in this paper, offloading to the cloud, some of 5G delay-tolerant Network Functions and in particular the Network Data Analytics Function (NWDAF). The dynamic selection of cloud resources to serve off-loaded 5G-NWDAF, while incurring minimum cost and maximizing utilization of served next generation Node-Bs (gNBs) requires agility and automation. This paper introduces a framework to automate the selection process that satisfies resource demands while meeting two objectives, namely, cost minimization and utilization maximization. We first formulate the mapping of gNBs to 5G-NWDAF problem as an Integer Linear Program (ILP). Then, we propose an algorithm to solve it based on branch-cut-and-price technique combining all of branch-and-price, branch-and-cut and branch-and-bound. Results using pricing data from a public cloud provider (Google Cloud Platform), show that our proposal achieves important savings in cloud computing costs and reduction in execution time compared to other state-of-the-art frameworks.
电信运营商越来越多地采用云计算来按需访问计算资源。了解到5G核心参考架构被设想为云原生和面向服务的,我们在本文中建议将一些5G延迟容忍网络功能,特别是网络数据分析功能(NWDAF)卸载到云中。动态选择云资源为卸载的5G-NWDAF服务,同时降低成本并最大限度地利用所服务的下一代node - b (gnb),这需要敏捷性和自动化。本文介绍了一个自动化选择过程的框架,以满足资源需求,同时满足两个目标,即成本最小化和利用率最大化。我们首先将gnb与5G-NWDAF问题的映射表述为整数线性规划(ILP)。在此基础上,我们提出了一种基于分支分割和价格技术的求解算法,该算法将分支分割和价格、分支分割和分支分割结合起来。使用来自公共云提供商(Google云平台)的定价数据的结果表明,与其他最先进的框架相比,我们的建议在云计算成本和执行时间方面实现了重要的节省。
{"title":"Offloading Network Data Analytics Function to the Cloud with Minimum Cost and Maximum Utilization","authors":"Nazih Salhab, Rana Rahim, R. Langar, R. Boutaba","doi":"10.1109/ICC40277.2020.9148665","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148665","url":null,"abstract":"Cloud computing is being embraced more and more by telecommunication operators for on-demand access to computing resources. Knowing that 5G Core reference architecture is envisioned to be cloud-native and service-oriented, we propose, in this paper, offloading to the cloud, some of 5G delay-tolerant Network Functions and in particular the Network Data Analytics Function (NWDAF). The dynamic selection of cloud resources to serve off-loaded 5G-NWDAF, while incurring minimum cost and maximizing utilization of served next generation Node-Bs (gNBs) requires agility and automation. This paper introduces a framework to automate the selection process that satisfies resource demands while meeting two objectives, namely, cost minimization and utilization maximization. We first formulate the mapping of gNBs to 5G-NWDAF problem as an Integer Linear Program (ILP). Then, we propose an algorithm to solve it based on branch-cut-and-price technique combining all of branch-and-price, branch-and-cut and branch-and-bound. Results using pricing data from a public cloud provider (Google Cloud Platform), show that our proposal achieves important savings in cloud computing costs and reduction in execution time compared to other state-of-the-art frameworks.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning Centric Power Allocation for Edge Intelligence 以学习为中心的边缘智能功率分配
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148872
Shuai Wang, Rui Wang, Qi Hao, Yik-Chung Wu, H. Poor
While machine-type communication (MTC) devices generate massive data, they often cannot process this data due to limited energy and computation power. To this end, edge intelligence has been proposed, which collects distributed data and performs machine learning at the edge. However, this paradigm needs to maximize the learning performance instead of the communication throughput, for which the celebrated water-filling and max-min fairness algorithms become inefficient since they allocate resources merely according to the quality of wireless channels. This paper proposes a learning centric power allocation (LCPA) method, which allocates radio resources based on an empirical classification error model. To get insights into LCPA, an asymptotic optimal solution is derived. The solution shows that the transmit powers are inversely proportional to the channel gain, and scale exponentially with the learning parameters. Experimental results show that the proposed LCPA algorithm significantly outperforms other power allocation algorithms.
当机器类型通信(MTC)设备产生大量数据时,由于有限的能量和计算能力,它们通常无法处理这些数据。为此,边缘智能被提出,它收集分布式数据并在边缘执行机器学习。然而,这种模式需要最大限度地提高学习性能而不是通信吞吐量,因此著名的注水算法和最大最小公平性算法由于仅根据无线信道的质量分配资源而变得效率低下。提出了一种基于经验分类误差模型的以学习为中心的无线电资源分配方法。为了深入了解LCPA问题,我们推导了一个渐近最优解。结果表明,发射功率与信道增益成反比,并随学习参数呈指数比例增长。实验结果表明,LCPA算法明显优于其他功率分配算法。
{"title":"Learning Centric Power Allocation for Edge Intelligence","authors":"Shuai Wang, Rui Wang, Qi Hao, Yik-Chung Wu, H. Poor","doi":"10.1109/ICC40277.2020.9148872","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148872","url":null,"abstract":"While machine-type communication (MTC) devices generate massive data, they often cannot process this data due to limited energy and computation power. To this end, edge intelligence has been proposed, which collects distributed data and performs machine learning at the edge. However, this paradigm needs to maximize the learning performance instead of the communication throughput, for which the celebrated water-filling and max-min fairness algorithms become inefficient since they allocate resources merely according to the quality of wireless channels. This paper proposes a learning centric power allocation (LCPA) method, which allocates radio resources based on an empirical classification error model. To get insights into LCPA, an asymptotic optimal solution is derived. The solution shows that the transmit powers are inversely proportional to the channel gain, and scale exponentially with the learning parameters. Experimental results show that the proposed LCPA algorithm significantly outperforms other power allocation algorithms.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125748489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
OAM-NFC: A Short-Range High Capacity Transmission Scheme OAM-NFC:一种短距离高容量传输方案
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148881
Runyu Lyu, Wenchi Cheng, Wei Zhang, F. Qin
Due to its low energy consumption and high security, near field communication (NFC) has been extensively used in various short-range non-contact transmission scenarios such as the proximity payment and NFC entrance guard. However, the low data rate of NFC limits its application in high rate demanded scenarios, such as high-resolution fingerprint identification and streaming media transmission. In this paper, we propose the orbital angular momentum (OAM) based NFC system to significantly increase the capacity for NFC systems. With coils circularly equipped at the transmitter and receiver, OAM signals can be transmitted, received, and detected. Then, we analyze the mutual inductances between the transmit and receive coils to derive the OAM-NFC magneto-inductive channel matrix. Based on the channel matrix, we develop the OAM-NFC transmission and detection schemes for NFC multiplexing transmission. We also compare the capacity of our proposed OAM-NFC system with those of SISO NFC system and MIMO NFC system. Simulation results validate the feasibility and capacity enhancement of our proposed OAM-NFC system. How the number of the transceiver coils impacts the capacity of OAM-NFC system is also evaluated.
近场通信(NFC)由于具有低能耗、高安全性等优点,在近距离支付、近场通信门禁等各种近距离非接触传输场景中得到了广泛应用。然而,NFC的低数据速率限制了其在高速率需求场景中的应用,如高分辨率指纹识别和流媒体传输。本文提出了基于轨道角动量(OAM)的近场通信系统,以显著提高近场通信系统的容量。通过在发射机和接收机上环形安装线圈,OAM信号可以传输、接收和检测。然后,我们分析了发射线圈和接收线圈之间的互感,得出了OAM-NFC磁感应通道矩阵。基于信道矩阵,我们开发了OAM-NFC传输和NFC复用传输的检测方案。我们还比较了我们所提出的OAM-NFC系统与SISO NFC系统和MIMO NFC系统的容量。仿真结果验证了所提出的OAM-NFC系统的可行性和容量增强效果。分析了收发线圈数量对OAM-NFC系统容量的影响。
{"title":"OAM-NFC: A Short-Range High Capacity Transmission Scheme","authors":"Runyu Lyu, Wenchi Cheng, Wei Zhang, F. Qin","doi":"10.1109/ICC40277.2020.9148881","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148881","url":null,"abstract":"Due to its low energy consumption and high security, near field communication (NFC) has been extensively used in various short-range non-contact transmission scenarios such as the proximity payment and NFC entrance guard. However, the low data rate of NFC limits its application in high rate demanded scenarios, such as high-resolution fingerprint identification and streaming media transmission. In this paper, we propose the orbital angular momentum (OAM) based NFC system to significantly increase the capacity for NFC systems. With coils circularly equipped at the transmitter and receiver, OAM signals can be transmitted, received, and detected. Then, we analyze the mutual inductances between the transmit and receive coils to derive the OAM-NFC magneto-inductive channel matrix. Based on the channel matrix, we develop the OAM-NFC transmission and detection schemes for NFC multiplexing transmission. We also compare the capacity of our proposed OAM-NFC system with those of SISO NFC system and MIMO NFC system. Simulation results validate the feasibility and capacity enhancement of our proposed OAM-NFC system. How the number of the transceiver coils impacts the capacity of OAM-NFC system is also evaluated.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125851472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICC 2020 Commentary
Pub Date : 2020-06-01 DOI: 10.1109/icc40277.2020.9148747
{"title":"ICC 2020 Commentary","authors":"","doi":"10.1109/icc40277.2020.9148747","DOIUrl":"https://doi.org/10.1109/icc40277.2020.9148747","url":null,"abstract":"","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128320545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computation Offloading in Energy Harvesting Systems via Continuous Deep Reinforcement Learning 基于连续深度强化学习的能量收集系统计算卸载
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148938
Jing Zhang, Jun Du, Chunxiao Jiang, Yuan Shen, Jian Wang
As a promising technology to improve the computation experience for mobile devices, mobile edge computing (MEC) is becoming an emerging paradigm to meet the tremendous increasing computation demands. In this paper, a mobile edge computing system consisting of multiple mobile devices with energy harvesting and an edge server is considered. Specifically, multiple devices decide the offloading ratio and local computation capacity, which are both in continuous values. Each device equips a task load queue and energy harvesting, which increases the system dynamics and leads to the time-dependence of the optimal offloading decision. In order to minimize the sum cost of the execution time and energy consumption in the long-term, we develop a continuous control based deep reinforcement learning algorithm for computation offloading. Utilizing the actor-critic learning approach, we propose a centralized learning policy for each device. By incorporating the states of other devices with centralized learning, the proposed method learns to coordinate among all devices. Simulation results validate the effectiveness of our proposed algorithm, which demonstrates superior generalization ability and achieves a better performance compared with discrete decision based deep reinforcement learning methods.
移动边缘计算(MEC)作为改善移动设备计算体验的一种有前景的技术,正在成为满足日益增长的计算需求的新兴范式。本文研究了一种由多个具有能量收集功能的移动设备和一个边缘服务器组成的移动边缘计算系统。具体来说,多个设备决定了卸载比和本地计算能力,两者都是连续值。每个设备配备一个任务负载队列和能量收集,这增加了系统的动态性,并导致最优卸载决策的时间依赖性。为了使长期执行时间和能量消耗的总和成本最小化,我们开发了一种基于连续控制的深度强化学习算法来进行计算卸载。利用行动者-评论家学习方法,我们为每个设备提出了一个集中的学习策略。通过将其他设备的状态与集中学习相结合,该方法学会了在所有设备之间进行协调。仿真结果验证了该算法的有效性,与基于离散决策的深度强化学习方法相比,该算法具有优越的泛化能力,取得了更好的性能。
{"title":"Computation Offloading in Energy Harvesting Systems via Continuous Deep Reinforcement Learning","authors":"Jing Zhang, Jun Du, Chunxiao Jiang, Yuan Shen, Jian Wang","doi":"10.1109/ICC40277.2020.9148938","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148938","url":null,"abstract":"As a promising technology to improve the computation experience for mobile devices, mobile edge computing (MEC) is becoming an emerging paradigm to meet the tremendous increasing computation demands. In this paper, a mobile edge computing system consisting of multiple mobile devices with energy harvesting and an edge server is considered. Specifically, multiple devices decide the offloading ratio and local computation capacity, which are both in continuous values. Each device equips a task load queue and energy harvesting, which increases the system dynamics and leads to the time-dependence of the optimal offloading decision. In order to minimize the sum cost of the execution time and energy consumption in the long-term, we develop a continuous control based deep reinforcement learning algorithm for computation offloading. Utilizing the actor-critic learning approach, we propose a centralized learning policy for each device. By incorporating the states of other devices with centralized learning, the proposed method learns to coordinate among all devices. Simulation results validate the effectiveness of our proposed algorithm, which demonstrates superior generalization ability and achieves a better performance compared with discrete decision based deep reinforcement learning methods.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128574358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Tensor-computing-based Spectrum Usage Framework for 6G 基于张量计算的6G频谱使用框架
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149401
Wensheng Zhang, Jingxian Wu, Chengxiang Wang
In this paper, we coin a new concept of tensor-computing, which is based on tensor theory and designed for future sixth generation (6G) wireless communication systems. Two different types of tensors, namely spectrum-tensor and system-tensor, are defined and analysed to develop a new spectrum usage framework for 6G. The spectrum-tensor encapsulates high dimensional spectrum big data into the format of a compact tensor. The system-tensor summarizes key system performance, including data rate, bandwidth, delay, spectral efficiency, and energy efficiency, into a multi-dimension tensor. The concepts of spectrum-tensor and system-tensor enable unique tensor-based computing and analysis with the help of high efficiency tensor-computing tools, such as tensor completion and tensor decomposition. In the new spectrum usage framework, a value-based spectrum fusion scheme is designed. The maximum system value is achieved under the constraint that the individual value of single user should be guaranteed. The proposed tensor-computing framework builds a bridge between 6G wireless functions with real-world high dimension data processing tools, such as TensorFlow and Tensor Processing Unit (TPU). The authors hope this paper will shine a beam of tensor theory in and open a new research field of tensor-computing for future 6G wireless communications.
在本文中,我们提出了一个基于张量理论的张量计算的新概念,该概念是为未来的第六代(6G)无线通信系统设计的。定义并分析了两种不同类型的张量,即频谱张量和系统张量,以开发新的6G频谱使用框架。谱张量将高维谱大数据封装成紧张量的形式。系统张量将关键的系统性能,包括数据速率、带宽、延迟、频谱效率和能源效率,总结成一个多维张量。谱张量和系统张量的概念使得高效张量计算工具(如张量补全和张量分解)能够实现独特的基于张量的计算和分析。在新的频谱使用框架中,设计了一种基于值的频谱融合方案。在保证单个用户的个体值的约束下,实现系统值的最大值。提出的张量计算框架在6G无线功能与现实世界的高维数据处理工具(如TensorFlow和张量处理单元(TPU))之间建立了一座桥梁。作者希望本文能在未来的6G无线通信中,为张量计算的研究开辟一个新的领域。
{"title":"Tensor-computing-based Spectrum Usage Framework for 6G","authors":"Wensheng Zhang, Jingxian Wu, Chengxiang Wang","doi":"10.1109/ICC40277.2020.9149401","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149401","url":null,"abstract":"In this paper, we coin a new concept of tensor-computing, which is based on tensor theory and designed for future sixth generation (6G) wireless communication systems. Two different types of tensors, namely spectrum-tensor and system-tensor, are defined and analysed to develop a new spectrum usage framework for 6G. The spectrum-tensor encapsulates high dimensional spectrum big data into the format of a compact tensor. The system-tensor summarizes key system performance, including data rate, bandwidth, delay, spectral efficiency, and energy efficiency, into a multi-dimension tensor. The concepts of spectrum-tensor and system-tensor enable unique tensor-based computing and analysis with the help of high efficiency tensor-computing tools, such as tensor completion and tensor decomposition. In the new spectrum usage framework, a value-based spectrum fusion scheme is designed. The maximum system value is achieved under the constraint that the individual value of single user should be guaranteed. The proposed tensor-computing framework builds a bridge between 6G wireless functions with real-world high dimension data processing tools, such as TensorFlow and Tensor Processing Unit (TPU). The authors hope this paper will shine a beam of tensor theory in and open a new research field of tensor-computing for future 6G wireless communications.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Multi-Beam Arrangement for Improving Throughput in an HTS Communication System 提高HTS通信系统吞吐量的自适应多波束配置
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148622
Masaki Takahashi, Y. Kawamoto, N. Kato, A. Miura, M. Toyoshima
In recent years, the expectations for high throughput satellite (HTS) have diversified based on rapid increase in traffic demands. However, the Ku-band and Ka-band utilized by HTS are growing tighter. It is necessary to utilize the limited frequency ranges efficiently and share resources with other communication systems. The digital beam forming (DBF), which has a high area flexibility for allocating power resources, is being developed to adapt to the diversification of communication applications. However, it remains unclear how multi-spot beam placement is related to throughput in an HTS communication system equipped with DBF. In this study, we attempted to determine how the distances between spot beams in the same frequency band and the distances between adjacent spot beams in different frequency bands are related to overall system throughput and to derive a multi-spot beam arrangement to improve overall system throughput. The main contributions of this study are the clarification of relationships between the positions of multi-spot beams and overall system throughput and the construction of a novel mathematical model to derive multi-spot beam arrangements to enhance overall throughput. The effectiveness of our proposal is evaluated through numerical analysis.
近年来,随着通信量需求的快速增长,对高通量卫星的期望呈现多样化。然而,高温超导利用的ku波段和ka波段越来越紧。必须有效地利用有限的频率范围,并与其他通信系统共享资源。为了适应通信应用的多样化,数字波束形成技术(DBF)在功率资源分配方面具有很高的区域灵活性。然而,在配备DBF的HTS通信系统中,多点波束放置与吞吐量的关系尚不清楚。在本研究中,我们试图确定同一频段点波束之间的距离和相邻不同频段点波束之间的距离与系统整体吞吐量的关系,并推导出一种多点波束的排列方式来提高系统整体吞吐量。本研究的主要贡献在于澄清了多点光束位置与系统整体吞吐量之间的关系,并建立了一个新的数学模型来推导多点光束布置以提高整体吞吐量。通过数值分析,对该方案的有效性进行了评价。
{"title":"Adaptive Multi-Beam Arrangement for Improving Throughput in an HTS Communication System","authors":"Masaki Takahashi, Y. Kawamoto, N. Kato, A. Miura, M. Toyoshima","doi":"10.1109/ICC40277.2020.9148622","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148622","url":null,"abstract":"In recent years, the expectations for high throughput satellite (HTS) have diversified based on rapid increase in traffic demands. However, the Ku-band and Ka-band utilized by HTS are growing tighter. It is necessary to utilize the limited frequency ranges efficiently and share resources with other communication systems. The digital beam forming (DBF), which has a high area flexibility for allocating power resources, is being developed to adapt to the diversification of communication applications. However, it remains unclear how multi-spot beam placement is related to throughput in an HTS communication system equipped with DBF. In this study, we attempted to determine how the distances between spot beams in the same frequency band and the distances between adjacent spot beams in different frequency bands are related to overall system throughput and to derive a multi-spot beam arrangement to improve overall system throughput. The main contributions of this study are the clarification of relationships between the positions of multi-spot beams and overall system throughput and the construction of a novel mathematical model to derive multi-spot beam arrangements to enhance overall throughput. The effectiveness of our proposal is evaluated through numerical analysis.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129321202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Blockchain Based Zero-Knowledge Proof of Location in IoT 物联网中基于b区块链的零知识位置证明
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149366
Wei Wu, Erwu Liu, Xinglin Gong, Rui Wang
With the development of precise positioning technology, a growing number of location-based services (LBSs) facilitate people’s life. Most LBSs require proof of location (PoL) to prove that the user satisfies the service requirement, which exposes the user’s privacy. In this paper, we propose a zero-knowledge proof of location (zk-PoL) protocol to better protect the user’s privacy. With the zk-PoL protocol, the user can choose necessary information to expose to the server, so that hierarchical privacy protection can be achieved. The evaluation shows that the zk-PoL has excellent security to resist main attacks, moreover the computational efficiency is independent of input parameters and the zk-PoL is appropriate to delay-tolerant LBSs.
随着精确定位技术的发展,越来越多的基于位置的服务为人们的生活提供了便利。大多数lbs需要位置证明(PoL)来证明用户满足服务需求,这暴露了用户的隐私。为了更好地保护用户隐私,本文提出了一种零知识位置证明(zk-PoL)协议。使用zk-PoL协议,用户可以选择向服务器公开必要的信息,从而实现分层隐私保护。评估结果表明,zk-PoL具有良好的抗主攻击安全性,且计算效率与输入参数无关,适合于容延迟lbs。
{"title":"Blockchain Based Zero-Knowledge Proof of Location in IoT","authors":"Wei Wu, Erwu Liu, Xinglin Gong, Rui Wang","doi":"10.1109/ICC40277.2020.9149366","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149366","url":null,"abstract":"With the development of precise positioning technology, a growing number of location-based services (LBSs) facilitate people’s life. Most LBSs require proof of location (PoL) to prove that the user satisfies the service requirement, which exposes the user’s privacy. In this paper, we propose a zero-knowledge proof of location (zk-PoL) protocol to better protect the user’s privacy. With the zk-PoL protocol, the user can choose necessary information to expose to the server, so that hierarchical privacy protection can be achieved. The evaluation shows that the zk-PoL has excellent security to resist main attacks, moreover the computational efficiency is independent of input parameters and the zk-PoL is appropriate to delay-tolerant LBSs.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129657574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Reliable Semi-Supervised Intrusion Detection Model: One Year of Network Traffic Anomalies 一种可靠的半监督入侵检测模型:一年的网络流量异常
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148916
E. Viegas, A. Santin, V. Cogo, Vilmar Abreu
Despite the promising results of machine learning for network-based intrusion detection, current techniques are not widely deployed in real-world environments. In general, proposed detection models quickly become obsolete, thus, generating unreliable classifications over time. In this paper, we propose a new reliable model for semi-supervised intrusion detection that uses a verification technique to provide reliable classifications over time, even in the absence of model updates. Additionally, we cope with this verification technique with semi-supervised learning to autonomously update the underlying machine learning models without human assistance. Our experiments consider a full year of real network traffic and demonstrate that our solution maintains the accuracy rate over time without model updates while rejecting only 10.6% of instances on average. Moreover, when autonomous (non-human-assisted) model updates are performed, the average rejection rate drops to just 3.2% without affecting the accuracy of our solution.
尽管机器学习在基于网络的入侵检测方面取得了很好的成果,但目前的技术并没有广泛应用于现实环境。一般来说,建议的检测模型很快就会过时,因此,随着时间的推移,产生不可靠的分类。在本文中,我们为半监督入侵检测提出了一个新的可靠模型,该模型使用验证技术随着时间的推移提供可靠的分类,即使在没有模型更新的情况下。此外,我们用半监督学习来处理这种验证技术,在没有人工帮助的情况下自主更新底层机器学习模型。我们的实验考虑了一整年的真实网络流量,并证明我们的解决方案在没有模型更新的情况下保持准确率,同时平均只拒绝10.6%的实例。此外,当执行自主(非人工辅助)模型更新时,平均拒绝率降至3.2%,而不会影响我们解决方案的准确性。
{"title":"A Reliable Semi-Supervised Intrusion Detection Model: One Year of Network Traffic Anomalies","authors":"E. Viegas, A. Santin, V. Cogo, Vilmar Abreu","doi":"10.1109/ICC40277.2020.9148916","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148916","url":null,"abstract":"Despite the promising results of machine learning for network-based intrusion detection, current techniques are not widely deployed in real-world environments. In general, proposed detection models quickly become obsolete, thus, generating unreliable classifications over time. In this paper, we propose a new reliable model for semi-supervised intrusion detection that uses a verification technique to provide reliable classifications over time, even in the absence of model updates. Additionally, we cope with this verification technique with semi-supervised learning to autonomously update the underlying machine learning models without human assistance. Our experiments consider a full year of real network traffic and demonstrate that our solution maintains the accuracy rate over time without model updates while rejecting only 10.6% of instances on average. Moreover, when autonomous (non-human-assisted) model updates are performed, the average rejection rate drops to just 3.2% without affecting the accuracy of our solution.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127181385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Successive Sub-Array Activation for Massive MIMO-NOMA Networks 大规模MIMO-NOMA网络的连续子阵列激活
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149116
A. S. D. Sena, D. B. D. Costa, Z. Ding, P. Nardelli, U. Dias, C. Papadias
In this paper, we propose a novel successive sub-array activation (SSAA) diversity scheme for a massive multiple-input multiple-output (MIMO) system in combination with non-orthogonal multiple access (NOMA). A single-cell multi-cluster downlink scenario is considered, where the base station (BS) sends redundant symbols through multiple transmit sub-arrays to multi-antenna receivers. An in-depth analytical analysis is carried out, in which an exact closed-form expression for the outage probability is derived. Also, a high signal-to-noise ratio (SNR) outage approximation is obtained and the system diversity order is determined. Our results show that the proposed scheme outperforms conventional full array massive MIMO setups.
本文提出了一种结合非正交多址(NOMA)的大规模多输入多输出(MIMO)系统的连续子阵列激活(SSAA)分集方案。考虑了单蜂窝多集群下行场景,其中基站(BS)通过多个发射子阵列向多天线接收器发送冗余符号。进行了深入的解析分析,导出了停机概率的精确封闭表达式。得到了高信噪比的中断近似,并确定了系统分集顺序。结果表明,该方案优于传统的全阵列大规模MIMO方案。
{"title":"Successive Sub-Array Activation for Massive MIMO-NOMA Networks","authors":"A. S. D. Sena, D. B. D. Costa, Z. Ding, P. Nardelli, U. Dias, C. Papadias","doi":"10.1109/ICC40277.2020.9149116","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149116","url":null,"abstract":"In this paper, we propose a novel successive sub-array activation (SSAA) diversity scheme for a massive multiple-input multiple-output (MIMO) system in combination with non-orthogonal multiple access (NOMA). A single-cell multi-cluster downlink scenario is considered, where the base station (BS) sends redundant symbols through multiple transmit sub-arrays to multi-antenna receivers. An in-depth analytical analysis is carried out, in which an exact closed-form expression for the outage probability is derived. Also, a high signal-to-noise ratio (SNR) outage approximation is obtained and the system diversity order is determined. Our results show that the proposed scheme outperforms conventional full array massive MIMO setups.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127224246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICC 2020 - 2020 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1