首页 > 最新文献

Int. J. Interdiscip. Telecommun. Netw.最新文献

英文 中文
GPS Location Spoofing and FM Broadcast Intrusion Using Software-Defined Radio GPS位置欺骗与软件无线电调频广播入侵
Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100108
Soon Heng Mavric Tan, C. Yeo
This paper makes use of a simple and inexpensive software-defined radio (SDR) to demonstrate the potential threats posed to wireless communication. SDR is a radio communication system where components that are traditionally implemented in hardware are being replaced via software running on computing devices. The authors make use of a simple SDR to demonstrate how local disruption to wireless communication can be easily carried out. In particular, the authors show how FM radio broadcast can be hijacked and the spoofing of GPS location signals using a single SDR on a local basis as well as how Google Maps apps on an Android phone can be fooled by the spoofed GPS data. The authors also show how an ‘autonomous' car can be re-routed via emulation with a rigged up remote control toy car. The spoofing of GPS signals is a potential threat to all GPS-based applications, especially when powerful radios are used. The security threats on GPS-based navigation especially for drones and autonomous vehicles are real.
本文利用一种简单而廉价的软件定义无线电(SDR)来演示对无线通信构成的潜在威胁。SDR是一种无线电通信系统,其中传统上在硬件中实现的组件正在通过运行在计算设备上的软件来取代。作者利用一个简单的SDR来演示如何容易地对无线通信进行局部中断。特别是,作者展示了调频广播是如何被劫持的,以及在本地基础上使用单个SDR欺骗GPS位置信号,以及Android手机上的谷歌地图应用程序是如何被欺骗的GPS数据所欺骗的。作者还展示了一辆“自动”汽车是如何通过模拟遥控玩具车来重新路由的。GPS信号的欺骗对所有基于GPS的应用都是一个潜在的威胁,特别是当使用强大的无线电时。gps导航的安全威胁是真实存在的,尤其是无人机和自动驾驶汽车。
{"title":"GPS Location Spoofing and FM Broadcast Intrusion Using Software-Defined Radio","authors":"Soon Heng Mavric Tan, C. Yeo","doi":"10.4018/ijitn.2020100108","DOIUrl":"https://doi.org/10.4018/ijitn.2020100108","url":null,"abstract":"This paper makes use of a simple and inexpensive software-defined radio (SDR) to demonstrate the potential threats posed to wireless communication. SDR is a radio communication system where components that are traditionally implemented in hardware are being replaced via software running on computing devices. The authors make use of a simple SDR to demonstrate how local disruption to wireless communication can be easily carried out. In particular, the authors show how FM radio broadcast can be hijacked and the spoofing of GPS location signals using a single SDR on a local basis as well as how Google Maps apps on an Android phone can be fooled by the spoofed GPS data. The authors also show how an ‘autonomous' car can be re-routed via emulation with a rigged up remote control toy car. The spoofing of GPS signals is a potential threat to all GPS-based applications, especially when powerful radios are used. The security threats on GPS-based navigation especially for drones and autonomous vehicles are real.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-Layered Reliability Approach in Vehicular Ad-Hoc Networks 车载Ad-Hoc网络的多层可靠性方法
Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100110
Hasita Kaja, C. Beard
Vehicular ad-hoc networks (VANETs) have been an important part of intelligent transport systems (ITS). Developing a reliable network for vehicle-to-vehicle communication is a crucial part of network deployment. In the present paper, the authors are discussing a layered approach towards reliability of VANETs. This paper will consider different layers of the dedicated short-range communications (DSRC) protocol stack and discuss key reliability indicators in each layer. This layered approach towards computing reliability results in more practical probability calculations and improves the minimum probability of reliability achievable by the VANETs. The authors discuss about different techniques to increase the reliability of VANETs. In the future works, the goal is to calculate probability density and distribution functions of reliability at each layer and derive combined reliability and availability of a given vehicular ad-hoc network (VANET).
车载自组织网络(VANETs)已成为智能交通系统(ITS)的重要组成部分。开发可靠的车对车通信网络是网络部署的关键部分。在本文中,作者讨论了VANETs可靠性的分层方法。本文将考虑专用短程通信(DSRC)协议栈的不同层,并讨论每层的关键可靠性指标。这种计算可靠性的分层方法导致更实用的概率计算,并提高了VANETs可实现的最小可靠性概率。作者讨论了提高VANETs可靠性的不同技术。在未来的工作中,目标是计算每层可靠性的概率密度和分布函数,并得出给定车辆自组织网络(VANET)的综合可靠性和可用性。
{"title":"A Multi-Layered Reliability Approach in Vehicular Ad-Hoc Networks","authors":"Hasita Kaja, C. Beard","doi":"10.4018/ijitn.2020100110","DOIUrl":"https://doi.org/10.4018/ijitn.2020100110","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) have been an important part of intelligent transport systems (ITS). Developing a reliable network for vehicle-to-vehicle communication is a crucial part of network deployment. In the present paper, the authors are discussing a layered approach towards reliability of VANETs. This paper will consider different layers of the dedicated short-range communications (DSRC) protocol stack and discuss key reliability indicators in each layer. This layered approach towards computing reliability results in more practical probability calculations and improves the minimum probability of reliability achievable by the VANETs. The authors discuss about different techniques to increase the reliability of VANETs. In the future works, the goal is to calculate probability density and distribution functions of reliability at each layer and derive combined reliability and availability of a given vehicular ad-hoc network (VANET).","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127090314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance and Security Tradeoffs in Cryptographic Hash Functions 加密哈希函数的性能和安全性权衡
Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100103
Sultan Almuhammadi, O. Bawazeer
A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their limited computational power. The researchers in this paper study the most common cryptographic hash functions and highlights the tradeoffs between their performance and security. The hash functions considered in this study are MD4, MD5, Whirlpool, and the hash functions in the SHA family. The security of these hash functions is compared based on recent attacks in terms of collision resistance, preimage attacks, and sensitivity analysis. While the performance is tested on different input block sizes, useful observations and recommendations are made based on the results of this study.
加密哈希函数是许多应用程序中使用的重要组件,例如区块链,身份验证,数据完整性和数字签名。随着移动设备使用量的迅速增加,由于移动设备的计算能力有限,加密哈希函数在性能和安全性之间的权衡越来越受到人们的关注。本文的研究人员研究了最常见的加密散列函数,并强调了它们的性能和安全性之间的权衡。本研究中考虑的哈希函数有MD4、MD5、Whirlpool和SHA家族中的哈希函数。这些哈希函数的安全性基于最近的攻击,从抗碰撞性、预像攻击和灵敏度分析等方面进行比较。虽然在不同的输入块大小上测试了性能,但根据本研究的结果提出了有用的观察和建议。
{"title":"Performance and Security Tradeoffs in Cryptographic Hash Functions","authors":"Sultan Almuhammadi, O. Bawazeer","doi":"10.4018/ijitn.2020100103","DOIUrl":"https://doi.org/10.4018/ijitn.2020100103","url":null,"abstract":"A cryptographic hash function is an important component used in many applications, such as blockchain, authentication, data integrity, and digital signature. With the rapid increase in usage of mobile devices, more attention goes towards the tradeoffs between performance and security of cryptographic hash functions on mobile devices due to their limited computational power. The researchers in this paper study the most common cryptographic hash functions and highlights the tradeoffs between their performance and security. The hash functions considered in this study are MD4, MD5, Whirlpool, and the hash functions in the SHA family. The security of these hash functions is compared based on recent attacks in terms of collision resistance, preimage attacks, and sensitivity analysis. While the performance is tested on different input block sizes, useful observations and recommendations are made based on the results of this study.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks 有线网络中TFRC、DCCP、SCTP和UDP协议的仿真性能
Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100107
D. Kanellopoulos, Ali H. Wheeb
Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were throughput, end-to-end delay, and packet loss ratio. They compared their performance to learn in which traffic flow/service each of these protocols functions better than the others. The throughput of SCTP and TFRC is better than UDP. DCCP is superior to SCTP and TFRC in terms of end-to-end delay. SCTP is suitable for Internet applications that require high bandwidth.
多媒体应用施加了不同的QoS要求(例如,有界的端到端延迟和抖动),并且需要一个增强的传输层协议来处理数据包丢失、最小化错误、管理网络拥塞和有效传输。在IP网络中,传输层协议提供数据传输,并影响提供给应用程序的QoS。Internet应用程序使用的最常见的传输层协议是TCP和UDP。还有一些高级的传输层协议,如DCCP和TFRC。作者评估了有线网络上UDP、DCCP、SCTP和TFRC在三种流量流(数据传输、视频流和IP语音)下的性能。评估标准是吞吐量、端到端延迟和丢包率。他们比较了它们的性能,以了解这些协议中哪个流量/服务比其他协议更好。SCTP和TFRC的吞吐量优于UDP。DCCP在端到端延迟方面优于SCTP和TFRC。SCTP适用于对带宽要求较高的Internet应用。
{"title":"Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks","authors":"D. Kanellopoulos, Ali H. Wheeb","doi":"10.4018/ijitn.2020100107","DOIUrl":"https://doi.org/10.4018/ijitn.2020100107","url":null,"abstract":"Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were throughput, end-to-end delay, and packet loss ratio. They compared their performance to learn in which traffic flow/service each of these protocols functions better than the others. The throughput of SCTP and TFRC is better than UDP. DCCP is superior to SCTP and TFRC in terms of end-to-end delay. SCTP is suitable for Internet applications that require high bandwidth.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Two-Stage Spectrum Sensing for Cognitive Radio Using Eigenvalues Detection 基于特征值检测的认知无线电两级频谱感知
Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100102
Faten Mashta, Wissam Altabban, Mohieddin Wainakh
Spectrum sensing in cognitive radio has difficult and complex requirements, requiring speed and good detection performance at low SNR ratios. As suggested in IEEE 802.22, the primary user signal needs to be detected at SNR = -21dB with a probability of detection exceeds 0.9. Conventional spectrum sensing methods such as the energy detector, which is characterized by simplicity with good detection performance at high SNR values, are ineffective at low SNR values, whereas eigenvalues detection methods have good detection performance at low SNR ratios, but they have high complexity. In this paper, the authors investigate the process of spectrum sensing in two stages: in the first stage (coarse sensing), the energy detector is adopted, while in the second stage (fine sensing), eigenvalues detection methods are used. This method improves performance in terms of probability of detection and computational complexity, as the authors compared the performance of two-stage sensing scheme with ones where only energy detection or eigenvalues detection is performed.
认知无线电中的频谱感知难度大、要求复杂,在低信噪比条件下要求速度快、检测性能好。根据IEEE 802.22的建议,需要在信噪比= -21dB的条件下检测主用户信号,检测概率大于0.9。传统的频谱感知方法,如能量检测器,具有简单的特点,在高信噪比下具有良好的检测性能,但在低信噪比下检测效果不佳,而特征值检测方法在低信噪比下具有良好的检测性能,但复杂度较高。在本文中,作者研究了两个阶段的频谱感知过程:第一阶段(粗感知)采用能量检测器,第二阶段(细感知)采用特征值检测方法。该方法在检测概率和计算复杂度方面提高了性能,因为作者将两阶段感知方案的性能与仅执行能量检测或特征值检测的方案进行了比较。
{"title":"Two-Stage Spectrum Sensing for Cognitive Radio Using Eigenvalues Detection","authors":"Faten Mashta, Wissam Altabban, Mohieddin Wainakh","doi":"10.4018/ijitn.2020100102","DOIUrl":"https://doi.org/10.4018/ijitn.2020100102","url":null,"abstract":"Spectrum sensing in cognitive radio has difficult and complex requirements, requiring speed and good detection performance at low SNR ratios. As suggested in IEEE 802.22, the primary user signal needs to be detected at SNR = -21dB with a probability of detection exceeds 0.9. Conventional spectrum sensing methods such as the energy detector, which is characterized by simplicity with good detection performance at high SNR values, are ineffective at low SNR values, whereas eigenvalues detection methods have good detection performance at low SNR ratios, but they have high complexity. In this paper, the authors investigate the process of spectrum sensing in two stages: in the first stage (coarse sensing), the energy detector is adopted, while in the second stage (fine sensing), eigenvalues detection methods are used. This method improves performance in terms of probability of detection and computational complexity, as the authors compared the performance of two-stage sensing scheme with ones where only energy detection or eigenvalues detection is performed.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124000316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Queueing Networks in Equilibrium: Numerical Steady-State Solutions of Markov Chains 均衡状态下排队网络的分析:马尔可夫链的数值稳态解
Pub Date : 2020-10-01 DOI: 10.4018/ijitn.2020100101
I. Lokshina, C. Lanting
Equilibria of queueing networks are a means for performance analysis of real communication networks introduced as Markov chains. In this paper, the authors developed, evaluated, and compared computational procedures to obtain numerical solutions for queueing networks in equilibrium with the use of direct, iterative, and aggregative techniques in steady-state analysis of Markov chains. Advanced computational procedures are developed with the use of Gaussian elimination, power iteration, Courtois' decomposition, and Takahashi's iteration techniques. Numerical examples are provided together with comparative analysis of obtained results. The authors consider these procedures are also applicable to other domains where systems are described with comparable queuing models and stochastic techniques are sufficiently relevant. Several suitable domains of applicability are proposed.
排队网络的均衡是用马尔可夫链来分析真实通信网络性能的一种方法。在本文中,作者开发,评估,并比较计算程序,以获得数值解的排队网络在平衡与使用直接,迭代和聚集技术在马尔可夫链的稳态分析。利用高斯消去法、幂迭代法、库尔图瓦分解法和高桥迭代法开发了先进的计算程序。给出了数值算例,并对所得结果进行了对比分析。作者认为这些过程也适用于其他领域,其中系统描述与可比的排队模型和随机技术是充分相关的。提出了几个合适的适用领域。
{"title":"Analysis of Queueing Networks in Equilibrium: Numerical Steady-State Solutions of Markov Chains","authors":"I. Lokshina, C. Lanting","doi":"10.4018/ijitn.2020100101","DOIUrl":"https://doi.org/10.4018/ijitn.2020100101","url":null,"abstract":"Equilibria of queueing networks are a means for performance analysis of real communication networks introduced as Markov chains. In this paper, the authors developed, evaluated, and compared computational procedures to obtain numerical solutions for queueing networks in equilibrium with the use of direct, iterative, and aggregative techniques in steady-state analysis of Markov chains. Advanced computational procedures are developed with the use of Gaussian elimination, power iteration, Courtois' decomposition, and Takahashi's iteration techniques. Numerical examples are provided together with comparative analysis of obtained results. The authors consider these procedures are also applicable to other domains where systems are described with comparable queuing models and stochastic techniques are sufficiently relevant. Several suitable domains of applicability are proposed.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134255494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing Smart Buildings Using Blockchain, Internet of Things, and Building Information Modeling 利用区块链、物联网和建筑信息建模开发智能建筑
Pub Date : 2020-07-01 DOI: 10.4018/ijitn.2020070101
K. Siountri, Emmanouil Skondras, D. Vergados
Building information modeling (BIM) is a revolutionary technology that provides all the necessary mechanisms to achieve end-to-end communication, data exchange and information sharing between project actors, leading to smarter outcomes for communities and more efficient projects for AEC service providers. 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through building management systems (BMS) adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT devices in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. This article focuses on applying novel technologies in the construction industry, such as BIM, IoT, and Blockchain, but also on examining their interconnection and interoperability on a proposed system architecture on a case of a building (museum), where efficient security, management and monitoring are considered crucial factors for the unobstructed operation of the organization that hosts.
建筑信息模型(BIM)是一项革命性的技术,它提供了所有必要的机制来实现项目参与者之间的端到端通信、数据交换和信息共享,从而为社区带来更智能的结果,为AEC服务提供商带来更高效的项目。在参与BIM过程的背景下生成的3D模型和通过建筑管理系统(BMS)交付的实物资产采用物联网(IoT)架构和服务。然而,在高度模块化的环境中,物联网设备的编排具有许多移动部件和该环境中利益相关者之间的相互依赖关系,导致许多安全问题。本文侧重于在建筑行业中应用新技术,如BIM、物联网和区块链,但也研究了它们在建筑(博物馆)案例中拟议系统架构上的互连和互操作性,其中高效的安全、管理和监控被认为是托管组织无障碍运营的关键因素。
{"title":"Developing Smart Buildings Using Blockchain, Internet of Things, and Building Information Modeling","authors":"K. Siountri, Emmanouil Skondras, D. Vergados","doi":"10.4018/ijitn.2020070101","DOIUrl":"https://doi.org/10.4018/ijitn.2020070101","url":null,"abstract":"Building information modeling (BIM) is a revolutionary technology that provides all the necessary mechanisms to achieve end-to-end communication, data exchange and information sharing between project actors, leading to smarter outcomes for communities and more efficient projects for AEC service providers. 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through building management systems (BMS) adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT devices in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. This article focuses on applying novel technologies in the construction industry, such as BIM, IoT, and Blockchain, but also on examining their interconnection and interoperability on a proposed system architecture on a case of a building (museum), where efficient security, management and monitoring are considered crucial factors for the unobstructed operation of the organization that hosts.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123562655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Key Impacts of Softwarization in the Modern Era of 5G and the Internet of Things 软件化在5G和物联网时代的关键影响
Pub Date : 2020-07-01 DOI: 10.4018/ijitn.2020070102
Opeoluwa Tosin Eluwole, M. Ojo
Fascinating technologies, such as software defined networking (SDN), network function virtualization (NFV) and mobile edge computing (MEC) among others, have introduced software-enabling capabilities to telecommunications, mobile and wireless communications. To depict this systemic evolution, various terminologies, such as system cloudification, network programmability, advanced computing and most popularly, softwarization, have been used by numerous scholars. Softwarization is now becoming a fully established phenomenon, especially in the new era of the rapidly evolving Internet of Things (IoT), artificial intelligence (AI) and the looming 5G technology. Away from the research and development (R&D) focus on the technological capabilities of softwarization, this article highlights the main stakeholders in softwarization and underlines a tripartite influence of the systemic evolution i.e. technical, social and economic impacts, all of which will be vital in ensuring a sustainable 5G technology and beyond.
软件定义网络(SDN)、网络功能虚拟化(NFV)和移动边缘计算(MEC)等引人入胜的技术为电信、移动和无线通信带来了软件支持能力。为了描述这种系统的演变,许多学者使用了各种术语,如系统云化、网络可编程性、高级计算和最流行的软件化。在物联网(IoT)、人工智能(AI)和即将到来的5G技术快速发展的新时代,软件化正在成为一种完全确立的现象。撇开对软件技术能力的研究和开发(R&D)的关注,本文重点介绍了软件化的主要利益相关者,并强调了系统演变的三方影响,即技术、社会和经济影响,所有这些都将对确保5G技术的可持续发展至关重要。
{"title":"The Key Impacts of Softwarization in the Modern Era of 5G and the Internet of Things","authors":"Opeoluwa Tosin Eluwole, M. Ojo","doi":"10.4018/ijitn.2020070102","DOIUrl":"https://doi.org/10.4018/ijitn.2020070102","url":null,"abstract":"Fascinating technologies, such as software defined networking (SDN), network function virtualization (NFV) and mobile edge computing (MEC) among others, have introduced software-enabling capabilities to telecommunications, mobile and wireless communications. To depict this systemic evolution, various terminologies, such as system cloudification, network programmability, advanced computing and most popularly, softwarization, have been used by numerous scholars. Softwarization is now becoming a fully established phenomenon, especially in the new era of the rapidly evolving Internet of Things (IoT), artificial intelligence (AI) and the looming 5G technology. Away from the research and development (R&D) focus on the technological capabilities of softwarization, this article highlights the main stakeholders in softwarization and underlines a tripartite influence of the systemic evolution i.e. technical, social and economic impacts, all of which will be vital in ensuring a sustainable 5G technology and beyond.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121162648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Congestion Prediction System With Artificial Neural Networks 基于人工神经网络的拥塞预测系统
Pub Date : 2020-07-01 DOI: 10.4018/ijitn.2020070103
Fatma Gumus, Derya Yiltas-Kaplan
Software Defined Network (SDN) is a programmable network architecture that provides innovative solutions to the problems of the traditional networks. Congestion control is still an uncharted territory for this technology. In this work, a congestion prediction scheme has been developed by using neural networks. Minimum Redundancy Maximum Relevance (mRMR) feature selection algorithm was performed on the data collected from the OMNET++ simulation. The novelty of this study also covers the implementation of mRMR in an SDN congestion prediction problem. After evaluating the relevance scores, two highest ranking features were used. On the learning stage Nonlinear Autoregressive Exogenous Neural Network (NARX), Nonlinear Autoregressive Neural Network, and Nonlinear Feedforward Neural Network algorithms were executed. These algorithms had not been used before in SDNs according to the best of the authors knowledge. The experiments represented that NARX was the best prediction algorithm. This machine learning approach can be easily integrated to different topologies and application areas.
软件定义网络(SDN)是一种可编程的网络架构,为传统网络的问题提供了创新的解决方案。拥塞控制仍然是该技术的一个未知领域。本文提出了一种基于神经网络的拥塞预测方案。对omnet++仿真数据进行最小冗余最大相关性(mRMR)特征选择算法。本研究的新颖之处还包括mRMR在SDN拥塞预测问题中的实现。在评估相关分数后,使用两个最高排名的特征。在学习阶段分别使用了非线性自回归外源性神经网络(NARX)、非线性自回归神经网络和非线性前馈神经网络算法。据作者所知,这些算法在sdn中还没有被使用过。实验表明,NARX是最好的预测算法。这种机器学习方法可以很容易地集成到不同的拓扑和应用领域。
{"title":"Congestion Prediction System With Artificial Neural Networks","authors":"Fatma Gumus, Derya Yiltas-Kaplan","doi":"10.4018/ijitn.2020070103","DOIUrl":"https://doi.org/10.4018/ijitn.2020070103","url":null,"abstract":"Software Defined Network (SDN) is a programmable network architecture that provides innovative solutions to the problems of the traditional networks. Congestion control is still an uncharted territory for this technology. In this work, a congestion prediction scheme has been developed by using neural networks. Minimum Redundancy Maximum Relevance (mRMR) feature selection algorithm was performed on the data collected from the OMNET++ simulation. The novelty of this study also covers the implementation of mRMR in an SDN congestion prediction problem. After evaluating the relevance scores, two highest ranking features were used. On the learning stage Nonlinear Autoregressive Exogenous Neural Network (NARX), Nonlinear Autoregressive Neural Network, and Nonlinear Feedforward Neural Network algorithms were executed. These algorithms had not been used before in SDNs according to the best of the authors knowledge. The experiments represented that NARX was the best prediction algorithm. This machine learning approach can be easily integrated to different topologies and application areas.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Enabling of Efficient Coexistence of LTE With WiFi: A Machine Learning-Based Approach LTE与WiFi高效共存的实现:基于机器学习的方法
Pub Date : 2020-07-01 DOI: 10.4018/ijitn.2020070104
Mohamed S. Hassan, M. H. Ismail, M. El-Tarhuni, Fatema Aseeri
The recently proposed extension of the LTE operation to the unlicensed spectrum, known as LTE-Unlicensed (LTE-U), is not only expected to alleviate the congestion in the licensed band but is expected to result in an increase in the network capacity, as well. Unfortunately, such extension is challenged by a coexistence problem with wireless technologies operating in the unlicensed spectrum, especially Wi-Fi. Therefore, this article employs time series forecasting methods to enable efficient LTE coexistence with Wi-Fi. This is done by enabling the LTE-U Home eNodeB (HeNB) to avoid collisions with Wi-Fi by predicting the state of the unlicensed channels prior to using them. Specifically, this research proposes a recurrent neural network-based algorithm that utilizes Long Short Term Memory (LSTM) networks with time series decomposition to predict the state of the channels in the unlicensed spectrum. The authors investigate the performance of the proposed approach using extensive simulations. The results show that the proposed LSTM-based method outperforms the classical Listen Before Talk (LBT) and duty-cycling approaches in terms of improved coexistence of LTE-U with Wi-Fi.
最近提出的将LTE业务扩展到未授权频谱,即LTE- unlicensing (LTE- u),不仅有望缓解许可频段的拥塞,而且有望增加网络容量。不幸的是,这种扩展受到在未经许可的频谱中运行的无线技术的共存问题的挑战,特别是Wi-Fi。因此,本文采用时间序列预测方法,实现LTE与Wi-Fi的高效共存。这是通过使LTE-U家庭eNodeB (HeNB)在使用未授权信道之前预测其状态来避免与Wi-Fi发生冲突来实现的。具体而言,本研究提出了一种基于循环神经网络的算法,该算法利用具有时间序列分解的长短期记忆(LSTM)网络来预测无许可频谱中的信道状态。作者通过大量的仿真研究了所提出方法的性能。结果表明,提出的基于lstm的方法在改善LTE-U与Wi-Fi共存方面优于经典的先听后讲(LBT)和占空循环方法。
{"title":"On the Enabling of Efficient Coexistence of LTE With WiFi: A Machine Learning-Based Approach","authors":"Mohamed S. Hassan, M. H. Ismail, M. El-Tarhuni, Fatema Aseeri","doi":"10.4018/ijitn.2020070104","DOIUrl":"https://doi.org/10.4018/ijitn.2020070104","url":null,"abstract":"The recently proposed extension of the LTE operation to the unlicensed spectrum, known as LTE-Unlicensed (LTE-U), is not only expected to alleviate the congestion in the licensed band but is expected to result in an increase in the network capacity, as well. Unfortunately, such extension is challenged by a coexistence problem with wireless technologies operating in the unlicensed spectrum, especially Wi-Fi. Therefore, this article employs time series forecasting methods to enable efficient LTE coexistence with Wi-Fi. This is done by enabling the LTE-U Home eNodeB (HeNB) to avoid collisions with Wi-Fi by predicting the state of the unlicensed channels prior to using them. Specifically, this research proposes a recurrent neural network-based algorithm that utilizes Long Short Term Memory (LSTM) networks with time series decomposition to predict the state of the channels in the unlicensed spectrum. The authors investigate the performance of the proposed approach using extensive simulations. The results show that the proposed LSTM-based method outperforms the classical Listen Before Talk (LBT) and duty-cycling approaches in terms of improved coexistence of LTE-U with Wi-Fi.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128205601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Interdiscip. Telecommun. Netw.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1