首页 > 最新文献

2021 28th International Conference on Telecommunications (ICT)最新文献

英文 中文
Secure transmission in cooperative wireless networks: A two-level coalitional game approach 合作无线网络中的安全传输:一个两级联盟博弈方法
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511540
Feiwen Li, Shunliang Zhang
In this paper, we propose a novel hybrid beamforming and jamming strategy to secure the transmission in wireless cooperative networks. It enhances the secrecy capacity by cooperatively using distributed multi-antenna techniques to maximize the secrecy capacity, as well as nullify the information leakage at the eavesdropper and the interference at the legitimate users. The optimum intermediate relays and jammers selection is modeled as a two-level coalitional game problem. A distributed coalition formation algorithm based on merge-and-split rules is devised to solve the problem. The approach enables the intermediate nodes self-organize into independent disjoint coalitions and requires much less computational complexity. Then the optimal relaying and jamming coalitions are selected to secure transmission in a cooperative way. Extensive simulations demonstrate that the proposed coalition formation method can improve the secrecy capacity significantly compared with the existing non-collaborate relaying and jamming nodes selection scheme and random selection approach.
为了保证无线协作网络的传输安全,提出了一种新的波束形成与干扰混合策略。它通过协同使用分布式多天线技术来增强保密能力,最大限度地提高保密能力,同时消除窃听者的信息泄露和合法用户的干扰。将中间中继和干扰机的最佳选择建模为一个两级联合博弈问题。针对该问题,提出了一种基于合并分裂规则的分布式联盟形成算法。该方法使中间节点能够自组织成独立的不相交的联盟,并且大大降低了计算复杂度。然后选择最佳中继和干扰联盟,以协同方式保证传输安全。大量仿真结果表明,与现有的非协作中继和干扰节点选择方案和随机选择方法相比,所提出的联盟形成方法可以显著提高保密能力。
{"title":"Secure transmission in cooperative wireless networks: A two-level coalitional game approach","authors":"Feiwen Li, Shunliang Zhang","doi":"10.1109/ICT52184.2021.9511540","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511540","url":null,"abstract":"In this paper, we propose a novel hybrid beamforming and jamming strategy to secure the transmission in wireless cooperative networks. It enhances the secrecy capacity by cooperatively using distributed multi-antenna techniques to maximize the secrecy capacity, as well as nullify the information leakage at the eavesdropper and the interference at the legitimate users. The optimum intermediate relays and jammers selection is modeled as a two-level coalitional game problem. A distributed coalition formation algorithm based on merge-and-split rules is devised to solve the problem. The approach enables the intermediate nodes self-organize into independent disjoint coalitions and requires much less computational complexity. Then the optimal relaying and jamming coalitions are selected to secure transmission in a cooperative way. Extensive simulations demonstrate that the proposed coalition formation method can improve the secrecy capacity significantly compared with the existing non-collaborate relaying and jamming nodes selection scheme and random selection approach.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125044162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CEEMDAN-CA Detector for UWB Pulse Signal in Low SNR 低信噪比UWB脉冲信号的CEEMDAN-CA检测器
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511536
Yanyun Xu, Zekun Hong
In this paper, we propose a novel detector that combines complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and cell averaging-constant false alarm rate (CA-CFAR) approach for noise-dominated ultra-wideband (UWB) pulse signal. The proposed detector is utilized to estimate noise power from the received signal's intrinsic mode functions (IMFs). Then the detection threshold is determined based on noise estimation and a given false alarm rate. The proposed method can detect UWB pulse signal submerged in noise and work blindly, requiring no prior information. The performance is validated by simulations and experiments, which show the proposed detector has high robustness to noise uncertainty and can detect weak UWB pulse signal at -15dB of signal-to-noise ratio (SNR) with a detection rate of nearly 90%. Further, experiments on the UWB positioning module prove the effectiveness of this method in practical application.
在本文中,我们提出了一种新的检测器,结合了自适应噪声的完全系综经验模态分解(CEEMDAN)和细胞平均恒定虚警率(CA-CFAR)方法来检测噪声占主导的超宽带(UWB)脉冲信号。该检测器利用接收信号的本征模态函数(IMFs)估计噪声功率。然后根据噪声估计和给定的虚警率确定检测阈值。该方法可以检测淹没在噪声中的超宽带脉冲信号,并且不需要先验信息,可以盲目工作。仿真和实验结果表明,该检测器对噪声不确定性具有较强的鲁棒性,能够在信噪比为-15dB的情况下检测到微弱的UWB脉冲信号,检测率接近90%。在UWB定位模块上的实验验证了该方法在实际应用中的有效性。
{"title":"A CEEMDAN-CA Detector for UWB Pulse Signal in Low SNR","authors":"Yanyun Xu, Zekun Hong","doi":"10.1109/ICT52184.2021.9511536","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511536","url":null,"abstract":"In this paper, we propose a novel detector that combines complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN) and cell averaging-constant false alarm rate (CA-CFAR) approach for noise-dominated ultra-wideband (UWB) pulse signal. The proposed detector is utilized to estimate noise power from the received signal's intrinsic mode functions (IMFs). Then the detection threshold is determined based on noise estimation and a given false alarm rate. The proposed method can detect UWB pulse signal submerged in noise and work blindly, requiring no prior information. The performance is validated by simulations and experiments, which show the proposed detector has high robustness to noise uncertainty and can detect weak UWB pulse signal at -15dB of signal-to-noise ratio (SNR) with a detection rate of nearly 90%. Further, experiments on the UWB positioning module prove the effectiveness of this method in practical application.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Welcome General 欢迎广大
Pub Date : 2021-06-01 DOI: 10.1109/ict52184.2021.9511527
{"title":"Welcome General","authors":"","doi":"10.1109/ict52184.2021.9511527","DOIUrl":"https://doi.org/10.1109/ict52184.2021.9511527","url":null,"abstract":"","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122817878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient 基于变分模态分解和定向梯度直方图的特定发射器识别
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511516
Shaoying Guo, Yanyun Xu, Wei-qing Huang, Bo Liu
Specific emitter identification (SEI) is a physical-layer-based approach for enhancing wireless communication network security. A well-done SEI method can be widely applied in identifying the individual wireless communication device. In this paper, we propose a novel specific emitter identification method based on variational mode decomposition and histogram of oriented gradient (VMD-HOG). The signal is decomposed into specific temporal modes via VMD and HOG features are obtained from the time-frequency spectrum of temporal modes. The performance of the proposed method is evaluated both in single hop and relaying scenarios and under three channels with the number of emitters varying. Results depict that our proposed method provides great identification performance for both simulated signals and realistic data of Zigbee devices and outperforms the two existing methods in identification accuracy and computational complexity.
特定发射器识别(SEI)是一种基于物理层的增强无线通信网络安全性的方法。良好的SEI方法可以广泛应用于识别单个无线通信设备。本文提出了一种基于变分模态分解和定向梯度直方图(VMD-HOG)的特定发射器识别方法。通过VMD将信号分解为特定的时间模态,从时间模态的时频谱中得到HOG特征。对该方法在单跳和中继场景下的性能以及在三信道下发射机数量变化的情况下的性能进行了评估。结果表明,该方法对Zigbee设备的仿真信号和真实数据都具有良好的识别性能,并且在识别精度和计算复杂度方面优于现有的两种方法。
{"title":"Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient","authors":"Shaoying Guo, Yanyun Xu, Wei-qing Huang, Bo Liu","doi":"10.1109/ICT52184.2021.9511516","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511516","url":null,"abstract":"Specific emitter identification (SEI) is a physical-layer-based approach for enhancing wireless communication network security. A well-done SEI method can be widely applied in identifying the individual wireless communication device. In this paper, we propose a novel specific emitter identification method based on variational mode decomposition and histogram of oriented gradient (VMD-HOG). The signal is decomposed into specific temporal modes via VMD and HOG features are obtained from the time-frequency spectrum of temporal modes. The performance of the proposed method is evaluated both in single hop and relaying scenarios and under three channels with the number of emitters varying. Results depict that our proposed method provides great identification performance for both simulated signals and realistic data of Zigbee devices and outperforms the two existing methods in identification accuracy and computational complexity.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127745538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names 利用域名特征向量间距离检测未知DGAs
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511517
Ji Huan, Yongzheng Zhang, Peng Chang, Yupeng Tuo
Many botnets adopt domain generation algorithms (DGAs) to set up stealthy Command & Control (C2) communication. A DGA generates a great number of domain names and the attacker selects some of them to map to the C2 servers. In this paper, we propose Talos, a DGA detection approach to detect unknown DGAs and also known DGAs accurately. The key insight of Talos is that domain names can be represented by feature vectors satisfying the condition that distances between the feature vectors can reflect whether they are of the same class. Talos uses a neural language model to extract the feature vector of a domain name. After that, Talos determines if the feature vector belongs to a class based on whether it is within the boundary of the class and near the centroid of the class. We evaluate the detection ability of Talos on both unknown and known DGAs. Our experimental results show that Talos achieves recall over 92% on unknown classes and F1-score over 95% on known classes. We also compare Talos with state-of-the-art detection approaches and find that Talos's ability to detect unknown DGAs largely surpasses them.
许多僵尸网络采用域生成算法(DGAs)建立隐蔽的命令与控制(C2)通信。DGA生成大量域名,攻击者从中选择一部分域名映射到C2服务器。在本文中,我们提出了一种DGA检测方法Talos,它可以准确地检测未知的DGAs和已知的DGAs。Talos的关键见解是,域名可以用满足条件的特征向量来表示,特征向量之间的距离可以反映它们是否属于同一类。Talos使用神经语言模型来提取域名的特征向量。之后,Talos根据特征向量是否在类的边界内,是否在类的质心附近,来判断该特征向量是否属于该类。我们评估了Talos对未知和已知DGAs的检测能力。我们的实验结果表明,Talos在未知类别上的召回率超过92%,在已知类别上的f1得分超过95%。我们还将Talos与最先进的检测方法进行了比较,发现Talos检测未知DGAs的能力在很大程度上超过了它们。
{"title":"Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names","authors":"Ji Huan, Yongzheng Zhang, Peng Chang, Yupeng Tuo","doi":"10.1109/ICT52184.2021.9511517","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511517","url":null,"abstract":"Many botnets adopt domain generation algorithms (DGAs) to set up stealthy Command & Control (C2) communication. A DGA generates a great number of domain names and the attacker selects some of them to map to the C2 servers. In this paper, we propose Talos, a DGA detection approach to detect unknown DGAs and also known DGAs accurately. The key insight of Talos is that domain names can be represented by feature vectors satisfying the condition that distances between the feature vectors can reflect whether they are of the same class. Talos uses a neural language model to extract the feature vector of a domain name. After that, Talos determines if the feature vector belongs to a class based on whether it is within the boundary of the class and near the centroid of the class. We evaluate the detection ability of Talos on both unknown and known DGAs. Our experimental results show that Talos achieves recall over 92% on unknown classes and F1-score over 95% on known classes. We also compare Talos with state-of-the-art detection approaches and find that Talos's ability to detect unknown DGAs largely surpasses them.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123524604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Klm-based Profiling and Preventing Security Attacks for Cloud Computing: A Comparative Study 基于klm的分析与防范云计算安全攻击的比较研究
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511463
Nahid Eddermoug, A. Mansour, M. Sadik, Essaid Sabir, Mohamed Azmi
Cloud computing is a digital era technology which uses the Internet to maintain data as well as applications in cloud data centers. However, this technology still meet numerous challenges and suffers from several attacks. For this reason, we proposed recently a new scheme called “klm-based profiling and preventing security attacks (klm-PPSA)” to detect both known and unknown attacks. In this study, we exhibit a comparative study of the klm-PPSA model using separately two accurate and interpretable machine learning algorithms: regularized class association rules (RCAR) and classification based on associations (CBA). Moreover, considering an interesting data set, three case studies of the proposal with three different implementations of the $klm$ security factors are given ($k$-PPSA, km-PPSA and klm-PPSA models). The experiments for each case study with run-time measurement were done. The obtained results show that: compared to $k$-PPSA and km-PPSA models, the klm-PPSA model gives the highest performances in terms of sensitivity with both CBA and RCAR but with a processing time seven times more than CBA. However, RCAR gives an accuracy and specificity better than the CBA for all the models. Eventually, klm-PPSA system is able to detect and prevent several types of known and unknown attacks.
云计算是一种利用互联网在云数据中心维护数据和应用程序的数字时代技术。然而,这项技术仍然面临许多挑战,并遭受一些攻击。出于这个原因,我们最近提出了一个名为“基于klm的分析和防止安全攻击(klm-PPSA)”的新方案,以检测已知和未知的攻击。在本研究中,我们分别使用两种准确且可解释的机器学习算法:正则化类关联规则(RCAR)和基于关联的分类(CBA)对klm-PPSA模型进行了比较研究。此外,考虑到一个有趣的数据集,给出了该提案的三个案例研究,其中包括三种不同实现的$klm$安全因子($k$-PPSA, km-PPSA和klm-PPSA模型)。对每个案例研究都进行了运行时测量实验。结果表明:与$k$-PPSA和km-PPSA模型相比,klm-PPSA模型对CBA和RCAR的灵敏度都最高,但处理时间是CBA的7倍。然而,对于所有模型,RCAR的准确性和特异性都优于CBA。最终,klm-PPSA系统能够检测和预防几种已知和未知的攻击。
{"title":"Klm-based Profiling and Preventing Security Attacks for Cloud Computing: A Comparative Study","authors":"Nahid Eddermoug, A. Mansour, M. Sadik, Essaid Sabir, Mohamed Azmi","doi":"10.1109/ICT52184.2021.9511463","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511463","url":null,"abstract":"Cloud computing is a digital era technology which uses the Internet to maintain data as well as applications in cloud data centers. However, this technology still meet numerous challenges and suffers from several attacks. For this reason, we proposed recently a new scheme called “klm-based profiling and preventing security attacks (klm-PPSA)” to detect both known and unknown attacks. In this study, we exhibit a comparative study of the klm-PPSA model using separately two accurate and interpretable machine learning algorithms: regularized class association rules (RCAR) and classification based on associations (CBA). Moreover, considering an interesting data set, three case studies of the proposal with three different implementations of the $klm$ security factors are given ($k$-PPSA, km-PPSA and klm-PPSA models). The experiments for each case study with run-time measurement were done. The obtained results show that: compared to $k$-PPSA and km-PPSA models, the klm-PPSA model gives the highest performances in terms of sensitivity with both CBA and RCAR but with a processing time seven times more than CBA. However, RCAR gives an accuracy and specificity better than the CBA for all the models. Eventually, klm-PPSA system is able to detect and prevent several types of known and unknown attacks.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evalt: Authenticate Implicitly Before Attacks Evalt:攻击前隐式认证
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511466
Lingyu Wang, Chen Li, Bibo Tu
Privileged credentials are one of the key targets of attackers. Password authentication is plagued by phishing scams and keyloggers for years. Using a second factor, such as user behavior, as a part of the authentication process offers higher assurance. A great deal of research has been proposed to authenticate based on the behavior of various entities. However, they often play effects after user logging on to the system. Even if the attacks are detected successfully, the malicious activities have been performed and the damage is done. In this paper, we present Evalt, an implicit approach that takes effect before user logging on to enhance authentication with an additional security layer. Evalt exploits the features extracted from authentication events to detect anomalies. Hence it could block the attackers before they cause damage to systems. We test Evalt on an open-source Windows security log dataset. The experiment shows that our method could identify threats with a good performance before the actual damage occurs based on the authentication events' features.
特权凭证是攻击者的主要目标之一。多年来,密码认证一直受到网络钓鱼诈骗和键盘记录程序的困扰。使用第二个因素(如用户行为)作为身份验证过程的一部分可以提供更高的保证。基于各种实体的行为进行身份验证已经被提出了大量的研究。但是,它们通常在用户登录系统后才会产生效果。即使成功检测到攻击,恶意活动也已经执行,损害已经造成。在本文中,我们提出了Evalt,这是一种在用户登录之前生效的隐式方法,通过额外的安全层来增强身份验证。Evalt利用从身份验证事件中提取的特征来检测异常。因此,它可以在攻击者对系统造成损害之前阻止攻击者。我们在一个开源的Windows安全日志数据集上测试了Evalt。实验表明,基于认证事件的特征,我们的方法可以在实际损害发生之前识别出具有较好性能的威胁。
{"title":"Evalt: Authenticate Implicitly Before Attacks","authors":"Lingyu Wang, Chen Li, Bibo Tu","doi":"10.1109/ICT52184.2021.9511466","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511466","url":null,"abstract":"Privileged credentials are one of the key targets of attackers. Password authentication is plagued by phishing scams and keyloggers for years. Using a second factor, such as user behavior, as a part of the authentication process offers higher assurance. A great deal of research has been proposed to authenticate based on the behavior of various entities. However, they often play effects after user logging on to the system. Even if the attacks are detected successfully, the malicious activities have been performed and the damage is done. In this paper, we present Evalt, an implicit approach that takes effect before user logging on to enhance authentication with an additional security layer. Evalt exploits the features extracted from authentication events to detect anomalies. Hence it could block the attackers before they cause damage to systems. We test Evalt on an open-source Windows security log dataset. The experiment shows that our method could identify threats with a good performance before the actual damage occurs based on the authentication events' features.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128977127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning-Based Fast Decision for Task Execution in Next Generation Wireless Networks 下一代无线网络中基于学习的任务执行快速决策
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511542
Beste Atan, Nurullah Çalık, S. T. Basaran, M. Başaran, L. Durak-Ata
Learning-based computation of task execution in edge computing has a great potential to be a part of future cloud based next generation wireless networks. In this paper, we propose a novel intelligent computation task execution model to reduce decision latency by taking different system parameters into account including the execution deadline of the task, the battery level of mobile devices, and the channel between mobile device and edge server. In the edge computing, the number of task requests, resource constraints, mobility of users and energy consumption are main performance considerations. This study addresses the problem of a fast decision of the computing resources for the application offloaded to the edge servers by formulating it as a multi-class classification problem. The extensive simulation results demonstrate that the proposed algorithm is able to determine the decision of offloading computation tasks with more than 100 times faster than the conventional optimization method.
边缘计算中基于学习的任务执行计算具有成为未来基于云的下一代无线网络的一部分的巨大潜力。在本文中,我们提出了一种新的智能计算任务执行模型,通过考虑不同的系统参数,包括任务的执行期限、移动设备的电池电量以及移动设备与边缘服务器之间的通道来减少决策延迟。在边缘计算中,任务请求数量、资源约束、用户移动性和能耗是主要的性能考虑因素。本研究将应用程序的计算资源卸载到边缘服务器的快速决策问题表述为一个多类分类问题。大量的仿真结果表明,该算法能够以比传统优化方法快100倍以上的速度确定卸载计算任务的决策。
{"title":"Learning-Based Fast Decision for Task Execution in Next Generation Wireless Networks","authors":"Beste Atan, Nurullah Çalık, S. T. Basaran, M. Başaran, L. Durak-Ata","doi":"10.1109/ICT52184.2021.9511542","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511542","url":null,"abstract":"Learning-based computation of task execution in edge computing has a great potential to be a part of future cloud based next generation wireless networks. In this paper, we propose a novel intelligent computation task execution model to reduce decision latency by taking different system parameters into account including the execution deadline of the task, the battery level of mobile devices, and the channel between mobile device and edge server. In the edge computing, the number of task requests, resource constraints, mobility of users and energy consumption are main performance considerations. This study addresses the problem of a fast decision of the computing resources for the application offloaded to the edge servers by formulating it as a multi-class classification problem. The extensive simulation results demonstrate that the proposed algorithm is able to determine the decision of offloading computation tasks with more than 100 times faster than the conventional optimization method.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A DNS Security Policy for Timely Detection of Malicious Modification on Webpages 及时检测网页恶意修改的DNS安全策略
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511514
G. Varshney, Naman Shah
End users consider the data available through web as unmodified. Even when the web is secured by HTTPS, the data can be tampered in numerous tactical ways reducing trust on the integrity of data at the clients' end. One of the ways in which the web pages can be modified is via client side browser extensions. The extensions can transparently modify the web pages at client's end and can include new data to the web pages with minimal permissions. Clever modifications can be addition of a fake news or a fake advertisement or a link to a phishing website. We have identified through experimentation that such attacks are possible and have potential for serious damages. To prevent and detect such modifications we present a novel domain expressiveness based approach that uses DNS (Domain Name System) TXT records to express the Hash of important web pages that gets verified by the browsers to detect/thwart any modifications to the contents that are launched via client side malicious browser extensions or via cross site scripting. Initial experimentation suggest that the technique has potential to be used and deployed.
最终用户认为通过web获得的数据是未经修改的。即使网络有HTTPS保护,数据也可以通过多种战术方式被篡改,从而降低客户端对数据完整性的信任。其中一种修改网页的方法是通过客户端浏览器扩展。扩展可以透明地修改网页在客户端,并可以包含新的数据,以最小的权限到网页。聪明的修改可以是添加假新闻或假广告或链接到钓鱼网站。我们已经通过实验确定,这种攻击是可能的,并且有可能造成严重损害。为了防止和检测此类修改,我们提出了一种新颖的基于域表达性的方法,该方法使用DNS(域名系统)TXT记录来表达由浏览器验证的重要网页的哈希值,以检测/阻止通过客户端恶意浏览器扩展或通过跨站点脚本启动的内容的任何修改。初步实验表明,该技术具有应用和部署的潜力。
{"title":"A DNS Security Policy for Timely Detection of Malicious Modification on Webpages","authors":"G. Varshney, Naman Shah","doi":"10.1109/ICT52184.2021.9511514","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511514","url":null,"abstract":"End users consider the data available through web as unmodified. Even when the web is secured by HTTPS, the data can be tampered in numerous tactical ways reducing trust on the integrity of data at the clients' end. One of the ways in which the web pages can be modified is via client side browser extensions. The extensions can transparently modify the web pages at client's end and can include new data to the web pages with minimal permissions. Clever modifications can be addition of a fake news or a fake advertisement or a link to a phishing website. We have identified through experimentation that such attacks are possible and have potential for serious damages. To prevent and detect such modifications we present a novel domain expressiveness based approach that uses DNS (Domain Name System) TXT records to express the Hash of important web pages that gets verified by the browsers to detect/thwart any modifications to the contents that are launched via client side malicious browser extensions or via cross site scripting. Initial experimentation suggest that the technique has potential to be used and deployed.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117160982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing SLIPT for DF Based Mixed FSO-RF Communication System 基于DF的FSO-RF混合通信系统的滑移分析
Pub Date : 2021-06-01 DOI: 10.1109/ICT52184.2021.9511521
Amina Girdher, Ankur Bansal, Ankit Dubey
In this paper, we consider a decode-and-forward (DF) relay-assisted mixed free space optical-radio frequency (FSO-RF) system, where the FSO system utilizes simultaneous light-wave information and power transfer (SLIPT) to extend the lifetime of the system. Considering energy harvesting at DF relay node, we derive the statistics of end-to-end signal-to-noise ratio (SNR). For the considered system, the FSO channel is modeled by the Gamma-Gamma turbulence model affected by zero boresight pointing error, and the non-coherent intensity modulation with direct detection (IM/DD) technique is employed at the FSO receiver. Further, the RF channel is assumed to undergo Nakagami-m fading. In particular, analytical closed-form expression of outage probability is derived for the considered network in terms of Meijer's G-function. To obtain further insights, we derive asymptotic outage probability expression and evaluate the diversity order analytically. The impact of DC bias along with various atmospheric turbulence and misalignment conditions on the system performance is revealed for SLIPT based mixed FSO-RF communication system. Numerical results manifest that the considered DF-based mixed FSO-RF communication system utilizing SLIPT significantly outperforms the corresponding amplify-and-forward (AF) relay-based communication system. The analytical results are corroborated through Monte-Carlo simulations.
在本文中,我们考虑了一个解码和转发(DF)中继辅助的混合自由空间光射频(FSO- rf)系统,其中FSO系统利用同步光波信息和功率传输(SLIPT)来延长系统的寿命。考虑到DF中继节点的能量收集,导出了端到端信噪比的统计量。对于所考虑的系统,FSO信道采用受零轴向指向误差影响的Gamma-Gamma湍流模型建模,FSO接收机采用直接检测的非相干强度调制(IM/DD)技术。此外,假设射频信道经历了中上米衰落。特别地,对所考虑的网络,用Meijer的g函数,导出了中断概率的解析封闭表达式。为了获得更深入的认识,我们推导了渐近中断概率表达式,并对其分集阶进行了解析计算。在基于SLIPT的混合FSO-RF通信系统中,研究了直流偏置以及各种大气湍流和失调条件对系统性能的影响。数值结果表明,所考虑的基于df的利用SLIPT的混合FSO-RF通信系统明显优于相应的基于放大转发(AF)中继的通信系统。通过蒙特卡罗模拟验证了分析结果。
{"title":"Analyzing SLIPT for DF Based Mixed FSO-RF Communication System","authors":"Amina Girdher, Ankur Bansal, Ankit Dubey","doi":"10.1109/ICT52184.2021.9511521","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511521","url":null,"abstract":"In this paper, we consider a decode-and-forward (DF) relay-assisted mixed free space optical-radio frequency (FSO-RF) system, where the FSO system utilizes simultaneous light-wave information and power transfer (SLIPT) to extend the lifetime of the system. Considering energy harvesting at DF relay node, we derive the statistics of end-to-end signal-to-noise ratio (SNR). For the considered system, the FSO channel is modeled by the Gamma-Gamma turbulence model affected by zero boresight pointing error, and the non-coherent intensity modulation with direct detection (IM/DD) technique is employed at the FSO receiver. Further, the RF channel is assumed to undergo Nakagami-m fading. In particular, analytical closed-form expression of outage probability is derived for the considered network in terms of Meijer's G-function. To obtain further insights, we derive asymptotic outage probability expression and evaluate the diversity order analytically. The impact of DC bias along with various atmospheric turbulence and misalignment conditions on the system performance is revealed for SLIPT based mixed FSO-RF communication system. Numerical results manifest that the considered DF-based mixed FSO-RF communication system utilizing SLIPT significantly outperforms the corresponding amplify-and-forward (AF) relay-based communication system. The analytical results are corroborated through Monte-Carlo simulations.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125807839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 28th International Conference on Telecommunications (ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1