首页 > 最新文献

2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

英文 中文
Application Based Caching in Fog Computing to Improve Quality of Service 雾计算中基于应用缓存提高服务质量的研究
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144812
W. Almobaideen, Ola M. Malkawi
Fog Computing is an emergent network paradigm that arises as a response to the prevalence of Internet of Things (IoT). By the use of fog computing, cloud is extended close to end users to reduce latency, traffic load, and needed bandwidth. Efficient data caching presents the core of fog computing. Moreover, low quality caching techniques may represent an additional burden on network resources in case of high miss ratio. As an emergent paradigm, fog computing raises the demand on efficient caching techniques, these techniques must be compatible with IoT and the wide variety of its applications. In this paper, a new caching approach is proposed, referred to as Application Based Caching for Fog computing, abbreviated as ABCFOG. The proposed approach considers the type of application as the main caching prediction criteria. ABCFOG has been tested under various case studies including three types of applications. It is discussed in details before it has been evaluated by simulation using NS-2 Network Simulator. Three evaluation parameters are measured, hit ratio, response time and bandwidth. Results show that ABCFOG has improved caching with at least 30% in response time and hit ratio. However, an additional cost of bandwidth is needed for such improvement.
雾计算是一种新兴的网络范式,是对物联网(IoT)流行的回应。通过使用雾计算,云被扩展到接近最终用户,以减少延迟、流量负载和所需带宽。高效的数据缓存是雾计算的核心。此外,在高丢失率的情况下,低质量的缓存技术可能会给网络资源带来额外的负担。作为一种新兴的范式,雾计算提高了对高效缓存技术的需求,这些技术必须与物联网及其各种应用兼容。本文提出了一种新的缓存方法,称为基于应用程序的雾计算缓存,简称ABCFOG。提出的方法将应用程序的类型作为主要的缓存预测标准。ABCFOG已在各种案例研究中进行了测试,包括三种类型的应用。本文详细讨论了该方案,并利用NS-2网络模拟器对其进行了仿真评估。测量了命中率、响应时间和带宽三个评价参数。结果表明,ABCFOG使缓存的响应时间和命中率提高了至少30%。然而,这种改进需要额外的带宽成本。
{"title":"Application Based Caching in Fog Computing to Improve Quality of Service","authors":"W. Almobaideen, Ola M. Malkawi","doi":"10.1109/FMEC49853.2020.9144812","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144812","url":null,"abstract":"Fog Computing is an emergent network paradigm that arises as a response to the prevalence of Internet of Things (IoT). By the use of fog computing, cloud is extended close to end users to reduce latency, traffic load, and needed bandwidth. Efficient data caching presents the core of fog computing. Moreover, low quality caching techniques may represent an additional burden on network resources in case of high miss ratio. As an emergent paradigm, fog computing raises the demand on efficient caching techniques, these techniques must be compatible with IoT and the wide variety of its applications. In this paper, a new caching approach is proposed, referred to as Application Based Caching for Fog computing, abbreviated as ABCFOG. The proposed approach considers the type of application as the main caching prediction criteria. ABCFOG has been tested under various case studies including three types of applications. It is discussed in details before it has been evaluated by simulation using NS-2 Network Simulator. Three evaluation parameters are measured, hit ratio, response time and bandwidth. Results show that ABCFOG has improved caching with at least 30% in response time and hit ratio. However, an additional cost of bandwidth is needed for such improvement.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simplistic Machine Learning-Based Air-to-Ground Path Loss Modeling in an Urban Environment 城市环境中基于简单机器学习的空对地路径损失建模
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144965
A. Tahat, T. Edwan, Hamza Al-Sawwaf, Jumana Al-Baw, Mohammad Amayreh
Unmanned aerial vehicles (UAVs) are being broadly employed lately in different domains because of their unique features such as ease of mobility and feasibility. A high fidelity communication link is the basis for guaranteeing the robustness of the UAV network between its ends. To offer reliable models for utilization in designing UAV communication systems, in addition to the processes of planning, deploying, and operating these systems, accurate estimation of the prevailing radio channel framework parameters is required. In this work, we suggest and present a strategy for constructing an empirical path loss (PL) model for air-to-ground radio frequency channels relying on machine learning (ML). ML regression algorithms including K-nearest-neighbors (kNN), Regression Trees (RT) and Artificial Neural Networks (ANN) are utilized in our versatile three-dimensional (3D) technique. To that end, we investigate the use of GPS coordinates (i.e., latitude, longitude, and altitude.) of both of the UAV transmitter and ground receiver, in addition to humidity, temperature and atmospheric pressure as features into the ML algorithm to predict the link PL. Hence, all environment parameters, and the corresponding implicit relationships are incorporated in the learning phase, and the subsequent prediction of the PL. The validity of our model and approach is verified through numerical results.
近年来,无人驾驶飞行器(uav)因其易于移动和可行性等独特特点在不同领域得到广泛应用。高保真通信链路是保证无人机网络两端间鲁棒性的基础。为了提供可靠的模型用于设计UAV通信系统,除了规划、部署和操作这些系统的过程之外,需要对现行无线电信道框架参数进行准确估计。在这项工作中,我们建议并提出了一种基于机器学习(ML)构建空对地射频信道的经验路径损失(PL)模型的策略。ML回归算法包括k -最近邻(kNN),回归树(RT)和人工神经网络(ANN)被用于我们的多功能三维(3D)技术。为此,我们研究了使用无人机发射器和地面接收器的GPS坐标(即纬度、经度和高度),以及湿度、温度和大气压力作为ML算法预测链路PL的特征。因此,所有环境参数以及相应的隐含关系都被纳入学习阶段。并通过数值结果验证了模型和方法的有效性。
{"title":"Simplistic Machine Learning-Based Air-to-Ground Path Loss Modeling in an Urban Environment","authors":"A. Tahat, T. Edwan, Hamza Al-Sawwaf, Jumana Al-Baw, Mohammad Amayreh","doi":"10.1109/FMEC49853.2020.9144965","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144965","url":null,"abstract":"Unmanned aerial vehicles (UAVs) are being broadly employed lately in different domains because of their unique features such as ease of mobility and feasibility. A high fidelity communication link is the basis for guaranteeing the robustness of the UAV network between its ends. To offer reliable models for utilization in designing UAV communication systems, in addition to the processes of planning, deploying, and operating these systems, accurate estimation of the prevailing radio channel framework parameters is required. In this work, we suggest and present a strategy for constructing an empirical path loss (PL) model for air-to-ground radio frequency channels relying on machine learning (ML). ML regression algorithms including K-nearest-neighbors (kNN), Regression Trees (RT) and Artificial Neural Networks (ANN) are utilized in our versatile three-dimensional (3D) technique. To that end, we investigate the use of GPS coordinates (i.e., latitude, longitude, and altitude.) of both of the UAV transmitter and ground receiver, in addition to humidity, temperature and atmospheric pressure as features into the ML algorithm to predict the link PL. Hence, all environment parameters, and the corresponding implicit relationships are incorporated in the learning phase, and the subsequent prediction of the PL. The validity of our model and approach is verified through numerical results.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115790725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Jay: Adaptive Computation Offloading for Hybrid Cloud Environments Jay:混合云环境的自适应计算卸载
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144950
Joaquim Silva, Eduardo R. B. Marques, Luís M. B. Lopes, Fernando M A Silva
Edge computing is a hot research topic given the ever-increasing requirements of mobile applications in terms of computation and communication and the emerging Internet-of-Things with billions of devices. While ubiquitous and with considerable computational resources, devices at the edge may not be able to handle processing tasks on their own and thus resort to offloading to cloudlets, when available, or traditional cloud infrastructures. In this paper, we present Jay, a modular and extensible platform for mobile devices, cloudlets, and clouds that can manage computational tasks spawned by devices and make informed decisions about offloading to neighboring devices, cloudlets, or traditional clouds. Jay is parametric on the scheduling strategy and metrics used to make offloading decisions, providing a useful tool to study the impact of distinct offloading strategies. We illustrate the use of Jay with an evaluation of several offloading strategies in distinct cloud configurations using a real-world machine learning application, firing tasks can be dynamically executed on or offloaded to Android devices, cloudlet servers, or Google Cloud servers. The results obtained show that edge-clouds form competent computing platforms on their own and that they can effectively be meshed with cloudlets and traditional clouds when more demanding processing tasks are considered. In particular, edge computing is competitive with infrastructure clouds in scenarios where data is generated at the edge, high bandwidth is required, and a pool of computationally competent devices or an edge-server is available. The results also highlight JAY's ability of exposing the performance compromises in applications when they are deployed over distinct hybrid cloud configurations using distinct offloading strategies.
随着移动应用在计算和通信方面的需求不断增加,以及数十亿设备的物联网的兴起,边缘计算成为一个热门的研究课题。虽然无处不在并且拥有大量的计算资源,但边缘设备可能无法自己处理处理任务,因此在可用时求助于卸载到cloudlets或传统云基础设施。在本文中,我们介绍了Jay,一个模块化和可扩展的移动设备、云平台和云平台,它可以管理由设备产生的计算任务,并做出关于卸载到相邻设备、云平台或传统云的明智决策。Jay对用于卸载决策的调度策略和指标进行了参数化,为研究不同卸载策略的影响提供了有用的工具。我们通过使用真实世界的机器学习应用程序在不同的云配置中评估几种卸载策略来说明Jay的使用,触发任务可以在Android设备、cloudlet服务器或Google cloud服务器上动态执行或卸载。研究结果表明,边缘云可以独立形成计算平台,并且在考虑更苛刻的处理任务时,可以有效地与小云和传统云相结合。特别是,在数据在边缘生成,需要高带宽,并且有计算能力强的设备池或边缘服务器可用的情况下,边缘计算与基础设施云具有竞争力。结果还强调了当应用程序部署在不同的混合云配置上,使用不同的卸载策略时,JAY能够暴露应用程序中的性能折衷。
{"title":"Jay: Adaptive Computation Offloading for Hybrid Cloud Environments","authors":"Joaquim Silva, Eduardo R. B. Marques, Luís M. B. Lopes, Fernando M A Silva","doi":"10.1109/FMEC49853.2020.9144950","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144950","url":null,"abstract":"Edge computing is a hot research topic given the ever-increasing requirements of mobile applications in terms of computation and communication and the emerging Internet-of-Things with billions of devices. While ubiquitous and with considerable computational resources, devices at the edge may not be able to handle processing tasks on their own and thus resort to offloading to cloudlets, when available, or traditional cloud infrastructures. In this paper, we present Jay, a modular and extensible platform for mobile devices, cloudlets, and clouds that can manage computational tasks spawned by devices and make informed decisions about offloading to neighboring devices, cloudlets, or traditional clouds. Jay is parametric on the scheduling strategy and metrics used to make offloading decisions, providing a useful tool to study the impact of distinct offloading strategies. We illustrate the use of Jay with an evaluation of several offloading strategies in distinct cloud configurations using a real-world machine learning application, firing tasks can be dynamically executed on or offloaded to Android devices, cloudlet servers, or Google Cloud servers. The results obtained show that edge-clouds form competent computing platforms on their own and that they can effectively be meshed with cloudlets and traditional clouds when more demanding processing tasks are considered. In particular, edge computing is competitive with infrastructure clouds in scenarios where data is generated at the edge, high bandwidth is required, and a pool of computationally competent devices or an edge-server is available. The results also highlight JAY's ability of exposing the performance compromises in applications when they are deployed over distinct hybrid cloud configurations using distinct offloading strategies.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Fog-Augmented Machine Learning based SMS Spam Detection and Classification System 基于雾增强机器学习的短信垃圾邮件检测与分类系统
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144833
Sahar Bo-saeed, Iyad A. Katib, Rashid Mehmood
Smart cities and societies are driving unprecedented technological and socioeconomic growth in everyday life albeit making us increasingly vulnerable to infinitely and incomprehensibly diverse threats. Short Message Service (SMS) spam is one such threat that can affect mobile security by propagating malware on mobile devices. A security breach could also cause a mobile device to send spam messages. Many works have focused on classifying incoming SMS messages. This paper proposes a tool to detect spam from outgoing SMS messages, although the work can be applied to both incoming and outgoing SMS messages. Specifically, we develop a system that comprises multiple machine learning (ML) based classifiers built by us using three classification methods -- Naïve Bayes (NB), Support Vector Machine (SVM), and Naïve Bayes Multinomial (NBM)- and five preprocessing and feature extraction methods. The system is built to allow its execution in cloud, fog or edge layers, and is evaluated using 15 datasets built by 4 widely-used public SMS datasets. The system detects spam SMSs and gives recommendations on the spam filters and classifiers to be used based on user preferences including classification accuracy, True Negatives (TN), and computational resource requirements.
智能城市和社会正在推动日常生活中前所未有的技术和社会经济增长,尽管它使我们越来越容易受到无限和难以理解的各种威胁。短消息服务(SMS)垃圾邮件就是这样一种威胁,它可以通过在移动设备上传播恶意软件来影响移动安全。安全漏洞还可能导致移动设备发送垃圾邮件。许多工作都集中在对收到的短信进行分类上。本文提出了一种检测外发短信中的垃圾邮件的工具,尽管该工作可以同时应用于传入和传出的短信。具体来说,我们开发了一个系统,该系统包括我们使用三种分类方法(Naïve贝叶斯(NB),支持向量机(SVM)和Naïve贝叶斯多项式(NBM))构建的多个基于机器学习(ML)的分类器,以及五种预处理和特征提取方法。该系统的构建允许其在云,雾或边缘层中执行,并使用4个广泛使用的公共SMS数据集构建的15个数据集进行评估。系统检测垃圾短信,并根据用户偏好(包括分类精度、真阴性(TN)和计算资源需求)推荐垃圾邮件过滤器和分类器。
{"title":"A Fog-Augmented Machine Learning based SMS Spam Detection and Classification System","authors":"Sahar Bo-saeed, Iyad A. Katib, Rashid Mehmood","doi":"10.1109/FMEC49853.2020.9144833","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144833","url":null,"abstract":"Smart cities and societies are driving unprecedented technological and socioeconomic growth in everyday life albeit making us increasingly vulnerable to infinitely and incomprehensibly diverse threats. Short Message Service (SMS) spam is one such threat that can affect mobile security by propagating malware on mobile devices. A security breach could also cause a mobile device to send spam messages. Many works have focused on classifying incoming SMS messages. This paper proposes a tool to detect spam from outgoing SMS messages, although the work can be applied to both incoming and outgoing SMS messages. Specifically, we develop a system that comprises multiple machine learning (ML) based classifiers built by us using three classification methods -- Naïve Bayes (NB), Support Vector Machine (SVM), and Naïve Bayes Multinomial (NBM)- and five preprocessing and feature extraction methods. The system is built to allow its execution in cloud, fog or edge layers, and is evaluated using 15 datasets built by 4 widely-used public SMS datasets. The system detects spam SMSs and gives recommendations on the spam filters and classifiers to be used based on user preferences including classification accuracy, True Negatives (TN), and computational resource requirements.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Security Threats and Challenges to IoT and its Applications: A Review 物联网及其应用的安全威胁与挑战:综述
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144832
R. W. Anwar, A. Zainal, Tariq Abdullah, Saleem Iqbal
The emergence and rapid growth of Internet of Things (IoT) with unlimited benefits, facilities and applications provided such as smart cities, smart home, intelligent transportation (ITS), smart health and smart grids impacts everyone's lives. However, IoT based systems and applications are vulnerable to various security threats and attacks due to their deployment and use of sensing devices. Moreover, the lack of standardization due to heterogeneity of devices and technologies implementing security in IoT is real challenge. The aim of this review paper is to highlight the various security threats, challenges and attacks faced by IoT enable applications.
智能城市、智能家居、智能交通、智能健康和智能电网等物联网(IoT)的出现和快速发展,带来了无限的好处、设施和应用,影响着每个人的生活。然而,基于物联网的系统和应用程序由于部署和使用传感设备而容易受到各种安全威胁和攻击。此外,由于在物联网中实现安全的设备和技术的异质性而缺乏标准化是真正的挑战。这篇综述的目的是强调物联网应用面临的各种安全威胁、挑战和攻击。
{"title":"Security Threats and Challenges to IoT and its Applications: A Review","authors":"R. W. Anwar, A. Zainal, Tariq Abdullah, Saleem Iqbal","doi":"10.1109/FMEC49853.2020.9144832","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144832","url":null,"abstract":"The emergence and rapid growth of Internet of Things (IoT) with unlimited benefits, facilities and applications provided such as smart cities, smart home, intelligent transportation (ITS), smart health and smart grids impacts everyone's lives. However, IoT based systems and applications are vulnerable to various security threats and attacks due to their deployment and use of sensing devices. Moreover, the lack of standardization due to heterogeneity of devices and technologies implementing security in IoT is real challenge. The aim of this review paper is to highlight the various security threats, challenges and attacks faced by IoT enable applications.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving Energy Conservation Level in WSNs by Modifying CH Node Location 通过改变CH节点位置提高WSNs的节能水平
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144975
A. Khalifeh, Husam Abid, Khalid A. Darabkh
Wireless Sensor Networks (WSNs) consist of a large number of small size, limited energy nodes distributed over an Area of Interest (AoI), in order to perform sensing and monitoring operations. Due to their limited energy sources, it is of utmost importance to optimize the nodes' energy consumption thus prolonging the sensors' lifetime. In this paper, an optimization problem is formulated and solved to find the optimal location of the Cluster Head (CH) node with respect to the other nodes such that the communication path loss of the nodes with respect to the CH is minimized. Simulation results have shown that the proposed Cluster Head Positioning Optimization (CHPO) mechanism has proven its effectiveness when compared with the literature work, in reducing the nodes' energy consumption, thus increasing the network lifetime.
无线传感器网络(wsn)由分布在感兴趣区域(AoI)上的大量小尺寸、有限能量的节点组成,以执行传感和监测操作。由于传感器的能量有限,优化节点的能量消耗从而延长传感器的使用寿命是至关重要的。本文构造并求解了一个优化问题,求出簇头(CH)节点相对于其他节点的最优位置,使各节点相对于CH的通信路径损失最小。仿真结果表明,与文献研究相比,本文提出的簇头定位优化(CHPO)机制在降低节点能耗、提高网络寿命方面是有效的。
{"title":"Improving Energy Conservation Level in WSNs by Modifying CH Node Location","authors":"A. Khalifeh, Husam Abid, Khalid A. Darabkh","doi":"10.1109/FMEC49853.2020.9144975","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144975","url":null,"abstract":"Wireless Sensor Networks (WSNs) consist of a large number of small size, limited energy nodes distributed over an Area of Interest (AoI), in order to perform sensing and monitoring operations. Due to their limited energy sources, it is of utmost importance to optimize the nodes' energy consumption thus prolonging the sensors' lifetime. In this paper, an optimization problem is formulated and solved to find the optimal location of the Cluster Head (CH) node with respect to the other nodes such that the communication path loss of the nodes with respect to the CH is minimized. Simulation results have shown that the proposed Cluster Head Positioning Optimization (CHPO) mechanism has proven its effectiveness when compared with the literature work, in reducing the nodes' energy consumption, thus increasing the network lifetime.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125600699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ColPri: Towards a Collaborative Privacy Knowledge Management Ontology for the Internet of Things 面向物联网的协同隐私知识管理本体
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144927
A. Toumia, Samuel Szoniecky, I. Saleh
User privacy preferences management is a nontrivial task. In the context of the Internet of Things (IoT), where a huge amount of data is generated, transferred and stored via various local and cloud architectures, privacy protection becomes complex and hard to manage. Indeed, privacy management is a time-consuming activity that requires a lot of knowledge which most of IoT system users often lack or are not keen on acquiring due to its complexity. The knowledge dimension has often been neglected, by both researchers and industry. In this article, we focus on the privacy protection knowledge management aspect. We produce a first version of ColPri, an ontology that sets the basis for a collaborative extensible privacy protection knowledge management system that is able to collaboratively produce diagnosis of IoT stakeholders privacy policies. This paper aims to investigate collaborative privacy knowledge management in the IoT and how non-technical users could benefit from it to easily configure their privacy policies. It allows an open exchange of privacy-related knowledge. We propose ColPri, a collaborative privacy ontology after specifying design requirements that guided our choices during the ontology creation process. This ontology lays out the use of a privacy community to create and develop privacy-related information within a user-centric privacy architecture. Then, we show how to use this ontology through a use case scenario. Finally, we describe future research based on this work.
用户隐私首选项管理是一项非常重要的任务。在物联网(IoT)的背景下,大量数据通过各种本地和云架构生成、传输和存储,隐私保护变得复杂且难以管理。事实上,隐私管理是一项耗时的活动,需要大量的知识,而由于其复杂性,大多数物联网系统用户往往缺乏或不热衷于获取这些知识。知识维度经常被研究人员和工业界所忽视。本文主要讨论隐私保护知识管理方面的内容。我们制作了ColPri的第一个版本,这是一个本体,为协作可扩展的隐私保护知识管理系统奠定了基础,该系统能够协作生成物联网利益相关者隐私政策的诊断。本文旨在研究物联网中的协同隐私知识管理,以及非技术用户如何从中受益,从而轻松配置他们的隐私策略。它允许公开交换与隐私相关的知识。在指定了指导我们在本体创建过程中选择的设计需求之后,我们提出了ColPri,一个协作隐私本体。该本体展示了如何使用隐私社区在以用户为中心的隐私架构中创建和开发与隐私相关的信息。然后,我们通过一个用例场景展示如何使用这个本体。最后,在此基础上对未来的研究进行了展望。
{"title":"ColPri: Towards a Collaborative Privacy Knowledge Management Ontology for the Internet of Things","authors":"A. Toumia, Samuel Szoniecky, I. Saleh","doi":"10.1109/FMEC49853.2020.9144927","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144927","url":null,"abstract":"User privacy preferences management is a nontrivial task. In the context of the Internet of Things (IoT), where a huge amount of data is generated, transferred and stored via various local and cloud architectures, privacy protection becomes complex and hard to manage. Indeed, privacy management is a time-consuming activity that requires a lot of knowledge which most of IoT system users often lack or are not keen on acquiring due to its complexity. The knowledge dimension has often been neglected, by both researchers and industry. In this article, we focus on the privacy protection knowledge management aspect. We produce a first version of ColPri, an ontology that sets the basis for a collaborative extensible privacy protection knowledge management system that is able to collaboratively produce diagnosis of IoT stakeholders privacy policies. This paper aims to investigate collaborative privacy knowledge management in the IoT and how non-technical users could benefit from it to easily configure their privacy policies. It allows an open exchange of privacy-related knowledge. We propose ColPri, a collaborative privacy ontology after specifying design requirements that guided our choices during the ontology creation process. This ontology lays out the use of a privacy community to create and develop privacy-related information within a user-centric privacy architecture. Then, we show how to use this ontology through a use case scenario. Finally, we describe future research based on this work.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129309991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Precoding Based Power Domain UFMC Waveform for 5G Multi-Access Edge Computing 基于预编码的5G多址边缘计算功率域UFMC波形
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144955
I. Baig, U. Farooq, N. Hasan, Manaf Zghaibeh, U. Rana, Ahthasham Sajid
Multi-Carrier Waveform (MCW) design has become one of the challenging research issue for 5G Multi-Access Edge Computing (MAEC). A large number of different MCWs have been designed and proposed in the literature as an alternative to the conventional Orthogonal Frequency Division Multiplexing (OFDM) waveform. Although, OFDM based waveforms are broadly employed in many real-time systems, but they cannot support the stringent requirements of 5G MAEC. Therefore, more flexible MCWs need to be investigated and designed. Hence, in this paper a new MCW with minimum Peak-to-Average Ratio (PAPR) has been designed and proposed. The proposed MCW is based on precoding and power control of the transmitted Universal Filtered Multi-Carriers (UFMC) signals. Computer simulations in MATLAB® have been carried out to show the performance of proposed precoding based MCW. It is concluded from the computer simulation results that the proposed precoding based waveform outperforms the standard UFMC waveform.
多载波波形(MCW)设计已成为5G多接入边缘计算(MAEC)的研究难点之一。文献中已经设计和提出了大量不同的mcw作为传统正交频分复用(OFDM)波形的替代方案。虽然基于OFDM的波形被广泛应用于许多实时系统中,但它们无法支持5G MAEC的严格要求。因此,需要研究和设计更灵活的mcw。为此,本文设计并提出了一种新的具有最小峰均比(PAPR)的最小最小模态波。该方法基于对传输的通用滤波多载波(UFMC)信号进行预编码和功率控制。在MATLAB®中进行了计算机仿真,验证了所提出的基于MCW预编码的性能。计算机仿真结果表明,所提出的基于预编码的波形优于标准UFMC波形。
{"title":"A Precoding Based Power Domain UFMC Waveform for 5G Multi-Access Edge Computing","authors":"I. Baig, U. Farooq, N. Hasan, Manaf Zghaibeh, U. Rana, Ahthasham Sajid","doi":"10.1109/FMEC49853.2020.9144955","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144955","url":null,"abstract":"Multi-Carrier Waveform (MCW) design has become one of the challenging research issue for 5G Multi-Access Edge Computing (MAEC). A large number of different MCWs have been designed and proposed in the literature as an alternative to the conventional Orthogonal Frequency Division Multiplexing (OFDM) waveform. Although, OFDM based waveforms are broadly employed in many real-time systems, but they cannot support the stringent requirements of 5G MAEC. Therefore, more flexible MCWs need to be investigated and designed. Hence, in this paper a new MCW with minimum Peak-to-Average Ratio (PAPR) has been designed and proposed. The proposed MCW is based on precoding and power control of the transmitted Universal Filtered Multi-Carriers (UFMC) signals. Computer simulations in MATLAB® have been carried out to show the performance of proposed precoding based MCW. It is concluded from the computer simulation results that the proposed precoding based waveform outperforms the standard UFMC waveform.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129516562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Autonomy with Blockchain and Multi-Access Edge Computing in Distributed Robotic Systems 利用区块链和多访问边缘计算增强分布式机器人系统中的自主性
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144809
J. P. Queralta, Qingqing Li, Zhuo Zou, Tomi Westerlund
This conceptual paper discusses how different aspects involving the autonomous operation of robots and vehicles will change when they have access to next-generation mobile networks. 5G and beyond connectivity is bringing together a myriad of technologies and industries under its umbrella. High-bandwidth, low-latency edge computing services through network slicing have the potential to support novel application scenarios in different domains including robotics, autonomous vehicles, and the Internet of Things. In particular, multi-tenant applications at the edge of the network will boost the development of autonomous robots and vehicles offering computational resources and intelligence through reliable offloading services. The integration of more distributed network architectures with distributed robotic systems can increase the degree of intelligence and level of autonomy of connected units. We argue that the last piece to put together a services framework with third-party integration will be next-generation low-latency blockchain networks. Blockchains will enable a transparent and secure way of providing services and managing resources at the Multi-Access Edge Computing (MEC) layer. We overview the state-of-the-art in MEC slicing, distributed robotic systems and blockchain technology to define a framework for services the MEC layer that will enhance the autonomous operations of connected robots and vehicles.
这篇概念性论文讨论了当机器人和车辆接入下一代移动网络时,涉及自主操作的不同方面将如何变化。5G及其他连接将无数技术和行业聚集在一起。通过网络切片的高带宽、低延迟边缘计算服务有可能支持不同领域的新应用场景,包括机器人、自动驾驶汽车和物联网。特别是,网络边缘的多租户应用将推动自主机器人和车辆的发展,通过可靠的卸载服务提供计算资源和智能。将更多的分布式网络架构与分布式机器人系统集成,可以提高连接单元的智能程度和自治水平。我们认为,将服务框架与第三方集成在一起的最后一部分将是下一代低延迟区块链网络。区块链将以透明和安全的方式在多访问边缘计算(MEC)层提供服务和管理资源。我们概述了MEC切片,分布式机器人系统和区块链技术的最新技术,以定义MEC层的服务框架,该框架将增强连接机器人和车辆的自主操作。
{"title":"Enhancing Autonomy with Blockchain and Multi-Access Edge Computing in Distributed Robotic Systems","authors":"J. P. Queralta, Qingqing Li, Zhuo Zou, Tomi Westerlund","doi":"10.1109/FMEC49853.2020.9144809","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144809","url":null,"abstract":"This conceptual paper discusses how different aspects involving the autonomous operation of robots and vehicles will change when they have access to next-generation mobile networks. 5G and beyond connectivity is bringing together a myriad of technologies and industries under its umbrella. High-bandwidth, low-latency edge computing services through network slicing have the potential to support novel application scenarios in different domains including robotics, autonomous vehicles, and the Internet of Things. In particular, multi-tenant applications at the edge of the network will boost the development of autonomous robots and vehicles offering computational resources and intelligence through reliable offloading services. The integration of more distributed network architectures with distributed robotic systems can increase the degree of intelligence and level of autonomy of connected units. We argue that the last piece to put together a services framework with third-party integration will be next-generation low-latency blockchain networks. Blockchains will enable a transparent and secure way of providing services and managing resources at the Multi-Access Edge Computing (MEC) layer. We overview the state-of-the-art in MEC slicing, distributed robotic systems and blockchain technology to define a framework for services the MEC layer that will enhance the autonomous operations of connected robots and vehicles.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Reducing Service Migrations in Fog Infrastructures by Optimizing Node Location 通过优化节点位置减少雾基础设施中的业务迁移
Pub Date : 2020-04-01 DOI: 10.1109/FMEC49853.2020.9144775
Ioanna-Vasiliki Stypsanelli, Samir Medjiah, B. Prabhu
In order to ensure service continuity of connected cars moving inside a Fog Computing infrastructure under a Service Level Agreement, a service needs to migrate from a fog node to another. An approach is to always keep migrating the service towards the fog node that is the closest to the current position. However, frequent service migrations have a migration and network cost. Intuitively, the more migrations are triggered, the bigger this cost is. In this work we look into ways to reduce this cost by studying how to minimize the number of VM migrations triggered. We introduce a general case in which we minimize a linear combination of the infrastructure cost and the number of service migrations given statistics on the routes taken by the vehicles. This problem can be represented as a bipartite graph where the minimization problem is an instance of the Weighted Set Cover problem. For a special case of pair-wise mobility model in which the origin and destination of vehicles are in the coverage range of adjacent base stations, we first present a static offline ILP formulation of the migration minimization problem. For this simple case, we then propose two heuristics inspired by the greedy algorithm for the weighted set cover problem as polynomial approximations.
为了确保在雾计算基础设施中移动的联网汽车在服务水平协议下的服务连续性,服务需要从一个雾节点迁移到另一个雾节点。一种方法是始终将服务迁移到离当前位置最近的雾节点。但是,频繁的业务迁移会带来迁移和网络成本。直观地说,触发的迁移越多,这个成本就越大。在这项工作中,我们将通过研究如何最小化触发的VM迁移数量来研究降低此成本的方法。我们介绍了一个一般情况,在这个情况下,我们最小化了基础设施成本和给定车辆路线统计数据的服务迁移数量的线性组合。该问题可以表示为一个二部图,其中最小化问题是加权集覆盖问题的一个实例。对于车辆始发地和目的地在相邻基站覆盖范围内的特殊情况下的成对移动模型,首先给出了迁移最小化问题的静态离线ILP公式。对于这种简单的情况,我们提出了两种启发式算法,这些启发式算法受到贪婪算法的启发,用于加权集合覆盖问题的多项式近似。
{"title":"Reducing Service Migrations in Fog Infrastructures by Optimizing Node Location","authors":"Ioanna-Vasiliki Stypsanelli, Samir Medjiah, B. Prabhu","doi":"10.1109/FMEC49853.2020.9144775","DOIUrl":"https://doi.org/10.1109/FMEC49853.2020.9144775","url":null,"abstract":"In order to ensure service continuity of connected cars moving inside a Fog Computing infrastructure under a Service Level Agreement, a service needs to migrate from a fog node to another. An approach is to always keep migrating the service towards the fog node that is the closest to the current position. However, frequent service migrations have a migration and network cost. Intuitively, the more migrations are triggered, the bigger this cost is. In this work we look into ways to reduce this cost by studying how to minimize the number of VM migrations triggered. We introduce a general case in which we minimize a linear combination of the infrastructure cost and the number of service migrations given statistics on the routes taken by the vehicles. This problem can be represented as a bipartite graph where the minimization problem is an instance of the Weighted Set Cover problem. For a special case of pair-wise mobility model in which the origin and destination of vehicles are in the coverage range of adjacent base stations, we first present a static offline ILP formulation of the migration minimization problem. For this simple case, we then propose two heuristics inspired by the greedy algorithm for the weighted set cover problem as polynomial approximations.","PeriodicalId":110283,"journal":{"name":"2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115158546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1