首页 > 最新文献

2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)最新文献

英文 中文
A Hint-Based Random Access Protocol for mMTC in 5G Mobile Network 5G移动网络中基于提示的mMTC随机接入协议
Yining Xu, Yi Ren, K. Lin, Y. Tseng
With the increasing popularity of machine-type communication (MTC) devices, several new challenges are encountered by the legacy long term evolution (LTE) system. One critical issue is that a massive number of MTC devices trying to conduct random access procedures may cause significant collisions and long delays. In this work, we present a new random access mechanism by splitting the contention-based preambles in LTE into two logically disjoint parts, one for the user equipment (UE) being paged and the other for the UEs not being paged. Since the IDs of paged UEs are known by the base station, a novel hash-based random access, which we call hint, is possible. The main idea is to pre-allocate preambles to paged UEs in a contention-free manner and confines non-paged UEs to contend in a separate region. We further build a mathematical model to find the optimal ratio of pre-allocated preambles. Extensive simulations are conducted to validate our results.
随着机器类型通信(MTC)设备的日益普及,传统的长期演进(LTE)系统面临着一些新的挑战。一个关键的问题是,大量的MTC设备试图进行随机访问程序可能会导致严重的碰撞和长时间的延迟。在这项工作中,我们提出了一种新的随机访问机制,通过将LTE中基于争用的序言分为两个逻辑上不相连的部分,一个用于被分页的用户设备(UE),另一个用于未被分页的UE。由于被分页的ue的id是由基站知道的,因此一种新的基于哈希的随机访问(我们称之为提示)是可能的。其主要思想是以无争用的方式将前言预先分配给分页的ue,并将非分页的ue限制在单独的区域内争用。在此基础上,建立了一个数学模型来寻找最优的预分配序数比例。进行了大量的模拟来验证我们的结果。
{"title":"A Hint-Based Random Access Protocol for mMTC in 5G Mobile Network","authors":"Yining Xu, Yi Ren, K. Lin, Y. Tseng","doi":"10.1109/MASS.2018.00062","DOIUrl":"https://doi.org/10.1109/MASS.2018.00062","url":null,"abstract":"With the increasing popularity of machine-type communication (MTC) devices, several new challenges are encountered by the legacy long term evolution (LTE) system. One critical issue is that a massive number of MTC devices trying to conduct random access procedures may cause significant collisions and long delays. In this work, we present a new random access mechanism by splitting the contention-based preambles in LTE into two logically disjoint parts, one for the user equipment (UE) being paged and the other for the UEs not being paged. Since the IDs of paged UEs are known by the base station, a novel hash-based random access, which we call hint, is possible. The main idea is to pre-allocate preambles to paged UEs in a contention-free manner and confines non-paged UEs to contend in a separate region. We further build a mathematical model to find the optimal ratio of pre-allocated preambles. Extensive simulations are conducted to validate our results.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123138310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Publisher's Information 出版商的信息
{"title":"Publisher's Information","authors":"","doi":"10.1109/mass.2018.00089","DOIUrl":"https://doi.org/10.1109/mass.2018.00089","url":null,"abstract":"","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122692306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defending Against Voice Spoofing: A Robust Software-Based Liveness Detection System 防范语音欺骗:一种鲁棒的基于软件的动态检测系统
Jiacheng Shang, Si Chen, Jie Wu
The recent proliferation of smartphones has been the primary driving factor behind the booming of voice-based mobile applications. However, the human voice is often exposed to the public in many different scenarios, and an adversary can easily "steal" a person's voice and attack voice-based applications with the help of state-of-the-art voice synthesis/conversion softwares. In this paper, we propose a robust software-based voice liveness detection system for defending against voice spoofing attack. The proposed system is tailored for mobile platforms and can be easily integrated with existing mobile applications. We propose three approaches based on leveraging the vibration of human vocal cords, the motion of the human vocal system, and the functionality of vibration motor inside the smartphone. Experimental results show that our system can detect a live speaker with a mean accuracy of 94.38% and detect an attacker with a mean accuracy of 88.89% by combining three approaches we proposed.
最近智能手机的普及是基于语音的移动应用蓬勃发展背后的主要驱动因素。然而,人类的声音经常在许多不同的场景中暴露给公众,对手可以很容易地“窃取”一个人的声音,并在最先进的语音合成/转换软件的帮助下攻击基于语音的应用程序。本文提出了一种鲁棒的基于软件的语音活跃度检测系统,用于防御语音欺骗攻击。所提出的系统是为移动平台量身定制的,可以很容易地与现有的移动应用程序集成。我们提出了基于利用人类声带的振动、人类发声系统的运动和智能手机内部振动马达的功能的三种方法。实验结果表明,结合我们提出的三种方法,我们的系统可以检测到一个活着的说话者,平均准确率为94.38%,检测到攻击者的平均准确率为88.89%。
{"title":"Defending Against Voice Spoofing: A Robust Software-Based Liveness Detection System","authors":"Jiacheng Shang, Si Chen, Jie Wu","doi":"10.1109/MASS.2018.00016","DOIUrl":"https://doi.org/10.1109/MASS.2018.00016","url":null,"abstract":"The recent proliferation of smartphones has been the primary driving factor behind the booming of voice-based mobile applications. However, the human voice is often exposed to the public in many different scenarios, and an adversary can easily \"steal\" a person's voice and attack voice-based applications with the help of state-of-the-art voice synthesis/conversion softwares. In this paper, we propose a robust software-based voice liveness detection system for defending against voice spoofing attack. The proposed system is tailored for mobile platforms and can be easily integrated with existing mobile applications. We propose three approaches based on leveraging the vibration of human vocal cords, the motion of the human vocal system, and the functionality of vibration motor inside the smartphone. Experimental results show that our system can detect a live speaker with a mean accuracy of 94.38% and detect an attacker with a mean accuracy of 88.89% by combining three approaches we proposed.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130420026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process WDMTI:无线设备制造商和使用分层狄利克雷过程的类型识别
Lingjing Yu, Tao Liu, Zhaoyu Zhou, Yujia Zhu, Qingyun Liu, Jianlong Tan
Wireless devices have been widely adopted across all domains. With the convenience brought by wireless communication technology, increasing number of conventional (wired) devices are evolving to become wireless. However, significant security issues arise with the popularity of wireless devices. To start an attack, the adversary usually performs a network reconnaissance to discover exposed devices, identify device manufacturers and types, and then scan for vulnerabilities. From the defense side, network administrators are expected to identify the potential vulnerabilities/risks and enforce Network Access Control (or Network Admission Control, NAC) on all the connecting devices. To do this, it is essential to accurately identify the make/model/type of each device that attempts to connect to the network, e.g., MacBooks, Samsung smart phones (Android), Amazon kindles, DLink surveillance cameras, TP-Link smart plugs, etc. In this paper, we present a novel approach, namely WDMTI, for the identification of wireless device manufacturer and type. We tackle the challenge from two aspects: the features and the classification model. First, we claim that it is critical to discover the device manufacturer and type as soon as the device requests to join the WLAN, and it is unrealistic to make other assumptions on the status of the device, e.g., assuming that the device is booting up or initializing a new connection to corresponding servers/clouds. We primarily depend on the features extracted from the network connection phase, while features from device booting are considered "bonus". In particular, we propose to utilize features from the raw HDCP packets, which is shown to be sufficient for device manufacturer and type recognition with high accuracy. Meanwhile, in the WDMTI system, we employ the Hierarchical Dirichlet Process (HDP), which is a nonparametric Bayesian model for grouped data. HDP allows new groups to be introduced with new data being added, i.e. previously unknown devices connect to the network and the extracted features receive new labels. The WDMTI mechanism is dynamically retrained on-line, instead of requiring a time-consuming off-line retraining process. Our experiments show that WDMTI identifies known types of devices with average accuracy of 0.89, and new types of devices with average accuracy of 0.96, both of which is higher than the state-of-art approaches. In summary, we present a wireless device manufacturer and type identification (WDMTI) system that is both scalable and accurate, and capable of adapting to unknown types of devices on-the-fly.
无线设备已被广泛应用于各个领域。随着无线通信技术带来的便利,越来越多的传统(有线)设备正在向无线方向发展。然而,随着无线设备的普及,出现了重大的安全问题。攻击者通常通过网络侦察来发现暴露的设备,识别设备的制造商和类型,然后扫描漏洞。从防御方面来看,网络管理员需要识别潜在的漏洞/风险,并对所有连接设备实施网络访问控制(或网络准入控制,NAC)。要做到这一点,必须准确识别每个试图连接到网络的设备的品牌/型号/类型,例如,macbook,三星智能手机(Android),亚马逊kindle, DLink监控摄像头,TP-Link智能插头等。在本文中,我们提出了一种新的方法,即WDMTI,用于无线设备制造商和类型的识别。我们从特征和分类模型两个方面来解决这一问题。首先,我们声称,一旦设备请求加入WLAN,就发现设备制造商和类型是至关重要的,并且对设备的状态做出其他假设是不现实的,例如,假设设备正在启动或初始化到相应服务器/云的新连接。我们主要依赖于从网络连接阶段提取的特征,而从设备启动的特征被认为是“额外的”。特别是,我们建议利用原始HDCP数据包的特征,这对于设备制造商和高精度的类型识别来说已经足够了。同时,在WDMTI系统中,我们采用了分层狄利克雷过程(HDP),这是一种分组数据的非参数贝叶斯模型。HDP允许通过添加新数据引入新组,即以前未知的设备连接到网络,提取的特征接收新标签。WDMTI机制是动态的在线再培训,而不需要耗时的离线再培训过程。我们的实验表明,WDMTI识别已知类型设备的平均准确率为0.89,识别新类型设备的平均准确率为0.96,两者都高于目前的方法。总之,我们提出了一种无线设备制造商和类型识别(WDMTI)系统,该系统既可扩展又准确,并且能够适应未知类型的设备。
{"title":"WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process","authors":"Lingjing Yu, Tao Liu, Zhaoyu Zhou, Yujia Zhu, Qingyun Liu, Jianlong Tan","doi":"10.1109/MASS.2018.00015","DOIUrl":"https://doi.org/10.1109/MASS.2018.00015","url":null,"abstract":"Wireless devices have been widely adopted across all domains. With the convenience brought by wireless communication technology, increasing number of conventional (wired) devices are evolving to become wireless. However, significant security issues arise with the popularity of wireless devices. To start an attack, the adversary usually performs a network reconnaissance to discover exposed devices, identify device manufacturers and types, and then scan for vulnerabilities. From the defense side, network administrators are expected to identify the potential vulnerabilities/risks and enforce Network Access Control (or Network Admission Control, NAC) on all the connecting devices. To do this, it is essential to accurately identify the make/model/type of each device that attempts to connect to the network, e.g., MacBooks, Samsung smart phones (Android), Amazon kindles, DLink surveillance cameras, TP-Link smart plugs, etc. In this paper, we present a novel approach, namely WDMTI, for the identification of wireless device manufacturer and type. We tackle the challenge from two aspects: the features and the classification model. First, we claim that it is critical to discover the device manufacturer and type as soon as the device requests to join the WLAN, and it is unrealistic to make other assumptions on the status of the device, e.g., assuming that the device is booting up or initializing a new connection to corresponding servers/clouds. We primarily depend on the features extracted from the network connection phase, while features from device booting are considered \"bonus\". In particular, we propose to utilize features from the raw HDCP packets, which is shown to be sufficient for device manufacturer and type recognition with high accuracy. Meanwhile, in the WDMTI system, we employ the Hierarchical Dirichlet Process (HDP), which is a nonparametric Bayesian model for grouped data. HDP allows new groups to be introduced with new data being added, i.e. previously unknown devices connect to the network and the extracted features receive new labels. The WDMTI mechanism is dynamically retrained on-line, instead of requiring a time-consuming off-line retraining process. Our experiments show that WDMTI identifies known types of devices with average accuracy of 0.89, and new types of devices with average accuracy of 0.96, both of which is higher than the state-of-art approaches. In summary, we present a wireless device manufacturer and type identification (WDMTI) system that is both scalable and accurate, and capable of adapting to unknown types of devices on-the-fly.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enabling Edge Intelligence for Activity Recognition in Smart Homes 为智能家居中的活动识别启用边缘智能
Shaojun Zhang, Wei Li, Yongwei Wu, P. Watson, Albert Y. Zomaya
In recent years, Edge computing has emerged as a new paradigm that can reduce communication delays over the Internet by moving computation power from far-end cloud servers to be closer to data sources. It is natural to shift the design of cloud-based IoT applications to Edge-based ones. Activity recognition in smart homes is one of the IoT applications that can benefit significantly from such a shift. In this work, we propose an Edge-based solution for addressing the activity recognition problem in smart homes from multiple perspectives, including architecture, algorithm design and system implementation. First, the Edge computing architecture is introduced and several critical management tasks are also investigated. Second, a realization of the Edge computing system is presented by using open source software and low-cost hardware. The consistency and scalability of running jobs on Edge devices are also addressed in our approach. Last, we propose a convolutional neural network model to perform activity recognition tasks on Edge devices. Preliminary experiments are conducted to compare our model with existing machine learning methods, and the results demonstrate that the performance of our model is promising.
近年来,边缘计算已经成为一种新的范例,它可以通过将计算能力从远端云服务器转移到更靠近数据源的地方来减少互联网上的通信延迟。将基于云的物联网应用程序的设计转变为基于边缘的设计是很自然的。智能家居中的活动识别是可以从这种转变中显著受益的物联网应用之一。在这项工作中,我们从架构、算法设计和系统实现等多个角度提出了一种基于edge的解决方案来解决智能家居中的活动识别问题。首先,介绍了边缘计算架构,并对几个关键的管理任务进行了研究。其次,提出了一种采用开源软件和低成本硬件实现边缘计算系统的方法。在Edge设备上运行作业的一致性和可扩展性也在我们的方法中得到解决。最后,我们提出了一个卷积神经网络模型来执行Edge设备上的活动识别任务。进行了初步的实验,将我们的模型与现有的机器学习方法进行了比较,结果表明我们的模型的性能是有希望的。
{"title":"Enabling Edge Intelligence for Activity Recognition in Smart Homes","authors":"Shaojun Zhang, Wei Li, Yongwei Wu, P. Watson, Albert Y. Zomaya","doi":"10.1109/MASS.2018.00044","DOIUrl":"https://doi.org/10.1109/MASS.2018.00044","url":null,"abstract":"In recent years, Edge computing has emerged as a new paradigm that can reduce communication delays over the Internet by moving computation power from far-end cloud servers to be closer to data sources. It is natural to shift the design of cloud-based IoT applications to Edge-based ones. Activity recognition in smart homes is one of the IoT applications that can benefit significantly from such a shift. In this work, we propose an Edge-based solution for addressing the activity recognition problem in smart homes from multiple perspectives, including architecture, algorithm design and system implementation. First, the Edge computing architecture is introduced and several critical management tasks are also investigated. Second, a realization of the Edge computing system is presented by using open source software and low-cost hardware. The consistency and scalability of running jobs on Edge devices are also addressed in our approach. Last, we propose a convolutional neural network model to perform activity recognition tasks on Edge devices. Preliminary experiments are conducted to compare our model with existing machine learning methods, and the results demonstrate that the performance of our model is promising.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115837852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Delay Efficient Data Aggregation Scheduling in Multi-channel Duty-Cycled WSNs 多通道占空比无线传感器网络的时延高效数据聚合调度
Xianlong Jiao, W. Lou, Xinxin Feng, Xiaodong Wang, Libin Yang, Guirong Chen
Data aggregation scheduling is a critical issue in wireless sensor networks (WSNs). This paper studies the Delay efficient Data Aggregation scheduling problem in multi-Channel Duty-cycled WSNs (DDACD problem), which aims to accomplish data aggregation with minimum delay. Existing researches, nevertheless, either focus on non-sleeping scenarios, or assume that nodes communicate on one single channel, and thus have poor performance in multi-channel duty-cycled scenarios. In this paper, we first show that DDACD problem is NP-hard. We then propose two new concepts of Candidate Active Conflict Graphs (CACG) and Feasible Active Conflict Graphs (FACG) to depict the relationship of the data aggregation links, and present two coloring methods to well separate the links at different time-slots or on different channels. Based on these two new concepts and two coloring methods, we propose an Efficient Data Aggregation Scheduling algorithm called EDAS, which exploits the fewest-children-first rule to choose the forwarding nodes to benefit the link scheduling. We theoretically prove that our proposed EDAS algorithm can achieve provable performance guarantee. The results of extensive simulations confirm the efficiency of our algorithm.
数据聚合调度是无线传感器网络中的一个关键问题。本文研究了多通道占空比无线传感器网络中时延有效的数据聚合调度问题(DDACD问题),该问题旨在以最小的时延完成数据聚合。然而,现有的研究要么关注非睡眠场景,要么假设节点在单通道上通信,因此在多通道占空比场景下性能较差。在本文中,我们首先证明了daddd问题是np困难的。在此基础上,我们提出了候选活动冲突图(CACG)和可行活动冲突图(FACG)两个概念来描述数据聚合链路之间的关系,并提出了两种着色方法来很好地分离不同时隙或不同通道上的链路。基于这两个新概念和两种着色方法,我们提出了一种高效的数据聚合调度算法EDAS,该算法利用子节点最少优先的原则来选择转发节点,从而有利于链路调度。从理论上证明了我们提出的EDAS算法可以实现可证明的性能保证。大量的仿真结果证实了算法的有效性。
{"title":"Delay Efficient Data Aggregation Scheduling in Multi-channel Duty-Cycled WSNs","authors":"Xianlong Jiao, W. Lou, Xinxin Feng, Xiaodong Wang, Libin Yang, Guirong Chen","doi":"10.1109/MASS.2018.00055","DOIUrl":"https://doi.org/10.1109/MASS.2018.00055","url":null,"abstract":"Data aggregation scheduling is a critical issue in wireless sensor networks (WSNs). This paper studies the Delay efficient Data Aggregation scheduling problem in multi-Channel Duty-cycled WSNs (DDACD problem), which aims to accomplish data aggregation with minimum delay. Existing researches, nevertheless, either focus on non-sleeping scenarios, or assume that nodes communicate on one single channel, and thus have poor performance in multi-channel duty-cycled scenarios. In this paper, we first show that DDACD problem is NP-hard. We then propose two new concepts of Candidate Active Conflict Graphs (CACG) and Feasible Active Conflict Graphs (FACG) to depict the relationship of the data aggregation links, and present two coloring methods to well separate the links at different time-slots or on different channels. Based on these two new concepts and two coloring methods, we propose an Efficient Data Aggregation Scheduling algorithm called EDAS, which exploits the fewest-children-first rule to choose the forwarding nodes to benefit the link scheduling. We theoretically prove that our proposed EDAS algorithm can achieve provable performance guarantee. The results of extensive simulations confirm the efficiency of our algorithm.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129988231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Multi-person Sleeping Respiration Monitoring with COTS WiFi Devices 多人睡眠呼吸监测与COTS WiFi设备
Yanni Yang, Jiannong Cao, Xuefeng Liu, Kai Xing
Recently, non-intrusive respiration monitoring has attracted much attention. Many respiration monitoring systems using the commercial off-the-shelf WiFi devices have been developed. However, these systems mainly have difficulties in the presence of multiple persons. The difficulty generally comes from the separation of the effects of multiple persons' respiration on the received WiFi signals. Another problem is that even though the separation can be feasible with some complicated algorithms, it is still impossible to map the multiple identified respiration states to the corresponding persons. In this paper, we study the problem of multi-person sleeping respiration monitoring and try to address the above challenges. Instead of focusing on developing complicated signal processing algorithms, we take another approach: via the deployment of WiFi transceivers. The key insight comes from the WiFi Fresnel zone model, which indicates that a carefully placed WiFi transceiver may only be affected by the person in a certain location. Furthermore, we consider the sleeping movements of people as well as the sleeping posture change to improve the robustness of the system. Extensive experiments show that we can successfully estimate the respiration rate of multiple persons, with the Mean Absolute Error (MAE) of 0.5 bpm - 1 bpm.
近年来,非侵入式呼吸监测备受关注。许多使用商用现成WiFi设备的呼吸监测系统已经被开发出来。然而,这些系统主要在多人在场的情况下存在困难。难点通常来自于多人呼吸对接收到的WiFi信号的影响的分离。另一个问题是,即使使用一些复杂的算法可以实现分离,但仍然无法将多个已识别的呼吸状态映射到相应的人。本文对多人睡眠呼吸监测问题进行了研究,试图解决上述问题。而不是专注于开发复杂的信号处理算法,我们采取另一种方法:通过部署WiFi收发器。关键的洞察来自WiFi菲涅耳区模型,该模型表明,精心放置的WiFi收发器可能只会受到特定位置的人的影响。此外,我们考虑了人的睡眠运动和睡眠姿势的变化,以提高系统的鲁棒性。大量的实验表明,我们可以成功地估计多人的呼吸速率,平均绝对误差(MAE)为0.5 bpm - 1 bpm。
{"title":"Multi-person Sleeping Respiration Monitoring with COTS WiFi Devices","authors":"Yanni Yang, Jiannong Cao, Xuefeng Liu, Kai Xing","doi":"10.1109/MASS.2018.00017","DOIUrl":"https://doi.org/10.1109/MASS.2018.00017","url":null,"abstract":"Recently, non-intrusive respiration monitoring has attracted much attention. Many respiration monitoring systems using the commercial off-the-shelf WiFi devices have been developed. However, these systems mainly have difficulties in the presence of multiple persons. The difficulty generally comes from the separation of the effects of multiple persons' respiration on the received WiFi signals. Another problem is that even though the separation can be feasible with some complicated algorithms, it is still impossible to map the multiple identified respiration states to the corresponding persons. In this paper, we study the problem of multi-person sleeping respiration monitoring and try to address the above challenges. Instead of focusing on developing complicated signal processing algorithms, we take another approach: via the deployment of WiFi transceivers. The key insight comes from the WiFi Fresnel zone model, which indicates that a carefully placed WiFi transceiver may only be affected by the person in a certain location. Furthermore, we consider the sleeping movements of people as well as the sleeping posture change to improve the robustness of the system. Extensive experiments show that we can successfully estimate the respiration rate of multiple persons, with the Mean Absolute Error (MAE) of 0.5 bpm - 1 bpm.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128921817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Welcome Message from BigTrust 2018 Workshop Organizers BigTrust 2018研讨会主办方致欢迎辞
{"title":"Welcome Message from BigTrust 2018 Workshop Organizers","authors":"","doi":"10.1109/mass.2018.00010","DOIUrl":"https://doi.org/10.1109/mass.2018.00010","url":null,"abstract":"","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134628153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-hop Deflection Routing Algorithm Based on Q-Learning for Energy-Harvesting Nanonetworks 基于q -学习的能量收集纳米网络多跳偏转路由算法
Chaochao Wang, Qin Xia, Xinwei Yao, Wanliang Wang, J. Jornet
Nanonetworks composed by communicating nano-devices enable new applications in the consumer, biomedical, and environmental fields. Three main characteristics introduce strict requirements for routing protocols design for nanonetworks, namely, short transmission range at Terahertz (THz) frequency (0.1-10 THz), fluctuations in the energy of nano-nodes due to the energy harvesting processes and very limited memory/buffer size of nano-nodes. In this paper, a multi-hop deflection routing algorithm based on Q-learning for energy-harvesting nanonetworks (MDRQEN) is proposed to guarantee the network energy efficiency, while ensuring a low packet loss probability. First, a deflection table is introduced to deflect the packets when the next hop nano-nodes are unavailable due to energy or memory/buffer constraints. Then, a Q-learning scheme is proposed to update the routing table and deflection table by utilizing the reward information contained in the forwarded packet from the previous nano-node. In the Q-learning update scheme, packet deflection ratio, packet loss ratio, packet hop count and node energy status of nano-nodes are taken into consideration. As numerically shown through extensive simulations in Network Simulator 3 (NS-3), the proposed MDRQEN algorithm can achieve a better packet delivery ratio and energy efficiency than random routing algorithm, flooding routing algorithm and the MDRQEN algorithm without the Q-learning update scheme.
由通信纳米设备组成的纳米网络在消费、生物医学和环境领域实现了新的应用。纳米网络的三个主要特点对路由协议设计提出了严格的要求,即太赫兹(THz)频率(0.1-10太赫兹)的传输距离短,能量收集过程导致纳米节点的能量波动,以及纳米节点的内存/缓冲区大小非常有限。本文提出了一种基于q -学习的能量收集纳米网络(MDRQEN)多跳偏转路由算法,在保证网络能量效率的同时保证低丢包概率。首先,当下一跳纳米节点由于能量或内存/缓冲区限制而不可用时,引入偏转表来偏转数据包。然后,提出了一种q学习方案,利用前一个纳米节点转发的数据包中包含的奖励信息来更新路由表和偏转表。在Q-learning更新方案中,考虑了纳米节点的报文偏转率、丢包率、跳包数和节点能量状态。在Network Simulator 3 (NS-3)中进行了大量的数值模拟,结果表明,本文提出的MDRQEN算法比随机路由算法、泛洪路由算法和不采用Q-learning更新方案的MDRQEN算法具有更好的分组传送率和能量效率。
{"title":"Multi-hop Deflection Routing Algorithm Based on Q-Learning for Energy-Harvesting Nanonetworks","authors":"Chaochao Wang, Qin Xia, Xinwei Yao, Wanliang Wang, J. Jornet","doi":"10.1109/MASS.2018.00059","DOIUrl":"https://doi.org/10.1109/MASS.2018.00059","url":null,"abstract":"Nanonetworks composed by communicating nano-devices enable new applications in the consumer, biomedical, and environmental fields. Three main characteristics introduce strict requirements for routing protocols design for nanonetworks, namely, short transmission range at Terahertz (THz) frequency (0.1-10 THz), fluctuations in the energy of nano-nodes due to the energy harvesting processes and very limited memory/buffer size of nano-nodes. In this paper, a multi-hop deflection routing algorithm based on Q-learning for energy-harvesting nanonetworks (MDRQEN) is proposed to guarantee the network energy efficiency, while ensuring a low packet loss probability. First, a deflection table is introduced to deflect the packets when the next hop nano-nodes are unavailable due to energy or memory/buffer constraints. Then, a Q-learning scheme is proposed to update the routing table and deflection table by utilizing the reward information contained in the forwarded packet from the previous nano-node. In the Q-learning update scheme, packet deflection ratio, packet loss ratio, packet hop count and node energy status of nano-nodes are taken into consideration. As numerically shown through extensive simulations in Network Simulator 3 (NS-3), the proposed MDRQEN algorithm can achieve a better packet delivery ratio and energy efficiency than random routing algorithm, flooding routing algorithm and the MDRQEN algorithm without the Q-learning update scheme.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129973989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Placement of Highly Available Virtual Network Functions Through Local Rerouting 通过本地重路由放置高可用的虚拟网络功能
Xiaojun Shang, Zhenhua Li, Yuanyuan Yang
The recent development of network function virtualization decouples network functions from dedicated hardware. Thus, virtual network functions (VNFs) can be distributed onto shared and virtualized platforms held by multiple data centers in various network locations. The architecture of the distributed VNFs interconnected by virtual links is denoted as the Service Function Chain (SFC). SFC has the potential to significantly reduce the opening and operating cost of the network services while improving the flexibility. However, the availability of SFC on chained up data centers is always inferior to that of network functions running on a single data center because the failure in any data center on the chain may affect its availability. To improve the availabilities of SFCs, in this paper we propose a local rerouting strategy to bypass the failed data centers on SFCs using locally rerouted paths (LRPs). Furthermore, we formulate an optimization model to minimize the maximum load on links while deploying SFCs and LRPs into the network. Thus, we reduce the potential risk of congested links caused by the local rerouting strategy. We then propose a randomized rounding approximation algorithm to solve the optimization problem, preserving the competitive ratio of O(logn) for the model. We also propose a fast heuristic algorithm to improve the efficiency. Our extensive simulation results show that the proposed algorithms can provide highly available SFCs with more balanced link load.
网络功能虚拟化的最新发展将网络功能与专用硬件解耦。因此,虚拟网络功能(VNFs)可以分布到由不同网络位置的多个数据中心所拥有的共享和虚拟化平台上。通过虚拟链路相互连接的分布式VNFs的体系结构称为SFC (Service Function Chain)。在提高灵活性的同时,SFC有可能大幅降低网络服务的开放和运营成本。然而,SFC在链接数据中心上的可用性总是不如在单个数据中心上运行的网络功能,因为链上任何数据中心的故障都可能影响其可用性。为了提高sfc的可用性,本文提出了一种本地重路由策略,使用本地重路由路径(lrp)绕过sfc上故障的数据中心。此外,我们制定了一个优化模型,以最小化在网络中部署sfc和lrp时链路上的最大负载。因此,我们减少了由本地重路由策略引起的链路拥塞的潜在风险。然后,我们提出了一种随机四舍五入近似算法来解决优化问题,保持模型的竞争比为O(logn)。为了提高效率,我们还提出了一种快速的启发式算法。大量的仿真结果表明,所提出的算法可以提供高可用性的sfc,并且链路负载更加均衡。
{"title":"Placement of Highly Available Virtual Network Functions Through Local Rerouting","authors":"Xiaojun Shang, Zhenhua Li, Yuanyuan Yang","doi":"10.1109/MASS.2018.00022","DOIUrl":"https://doi.org/10.1109/MASS.2018.00022","url":null,"abstract":"The recent development of network function virtualization decouples network functions from dedicated hardware. Thus, virtual network functions (VNFs) can be distributed onto shared and virtualized platforms held by multiple data centers in various network locations. The architecture of the distributed VNFs interconnected by virtual links is denoted as the Service Function Chain (SFC). SFC has the potential to significantly reduce the opening and operating cost of the network services while improving the flexibility. However, the availability of SFC on chained up data centers is always inferior to that of network functions running on a single data center because the failure in any data center on the chain may affect its availability. To improve the availabilities of SFCs, in this paper we propose a local rerouting strategy to bypass the failed data centers on SFCs using locally rerouted paths (LRPs). Furthermore, we formulate an optimization model to minimize the maximum load on links while deploying SFCs and LRPs into the network. Thus, we reduce the potential risk of congested links caused by the local rerouting strategy. We then propose a randomized rounding approximation algorithm to solve the optimization problem, preserving the competitive ratio of O(logn) for the model. We also propose a fast heuristic algorithm to improve the efficiency. Our extensive simulation results show that the proposed algorithms can provide highly available SFCs with more balanced link load.","PeriodicalId":146214,"journal":{"name":"2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130253871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1