首页 > 最新文献

2020 2nd International Conference on Computer Communication and the Internet (ICCCI)最新文献

英文 中文
Handover Management for D2D Communication in 5G Networks 5G网络中D2D通信的切换管理
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145969
W. Lai, Chin-Shiuh Shieh, Fu-Sheng Chou, Chia-Yu Hsu, Meng-Han Shen
This study addresses the handover management issue for Device-to-Device communication in 5G networks. The 3rd Generation Partnership Project (3GPP) drafted a standard for Proximity Services (ProSe), also named Device-to-Device (D2D) communication, which is a promising technology in offering higher throughput and lower latency services to end-users. Handover is an essential issue in wireless mobile networks due to the mobility of user equipment (UE). Currently, the handover mechanism for D2D pairs is not standardized yet. LTE-A only considers the handover procedure of a single user. Therefore, when a D2D pair moves across cell boundaries, the control channels of the two UEs may connect to different base stations and result in increased latency. Hence, we propose a handover management scheme for D2D communication to encourage both parties of a D2D pair to handover to the same destination eNB at the same time. By doing so, the number of unnecessary handovers, as well as the handover latency, can be reduced. In the proposed method, we predict the destination eNB of D2D users based on their movements and the received signal characteristics. Subsequently, we make a handover decision for each D2D pair by jointly factoring in the signal quality and connection stability. Expected improvement can be attained, as revealed in the simulation.
本研究针对5G网络中设备对设备通信的切换管理问题。第三代合作伙伴计划(3GPP)起草了近距离服务(ProSe)标准,也称为设备到设备(D2D)通信,这是一项有前途的技术,可以为最终用户提供更高的吞吐量和更低的延迟服务。由于用户设备的移动性,切换是无线移动网络中的一个重要问题。目前,D2D对的切换机制还没有标准化。LTE-A只考虑单个用户的切换过程。因此,当D2D对跨越小区边界移动时,两个ue的控制通道可能连接到不同的基站,从而导致延迟增加。因此,我们提出了一种D2D通信的切换管理方案,以鼓励D2D对的双方同时切换到同一目的地eNB。通过这样做,可以减少不必要的切换次数以及切换延迟。在该方法中,我们根据D2D用户的运动和接收到的信号特征来预测目的地eNB。然后,综合考虑信号质量和连接稳定性,对每个D2D对进行切换决策。如仿真所示,可以达到预期的改进。
{"title":"Handover Management for D2D Communication in 5G Networks","authors":"W. Lai, Chin-Shiuh Shieh, Fu-Sheng Chou, Chia-Yu Hsu, Meng-Han Shen","doi":"10.1109/ICCCI49374.2020.9145969","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145969","url":null,"abstract":"This study addresses the handover management issue for Device-to-Device communication in 5G networks. The 3rd Generation Partnership Project (3GPP) drafted a standard for Proximity Services (ProSe), also named Device-to-Device (D2D) communication, which is a promising technology in offering higher throughput and lower latency services to end-users. Handover is an essential issue in wireless mobile networks due to the mobility of user equipment (UE). Currently, the handover mechanism for D2D pairs is not standardized yet. LTE-A only considers the handover procedure of a single user. Therefore, when a D2D pair moves across cell boundaries, the control channels of the two UEs may connect to different base stations and result in increased latency. Hence, we propose a handover management scheme for D2D communication to encourage both parties of a D2D pair to handover to the same destination eNB at the same time. By doing so, the number of unnecessary handovers, as well as the handover latency, can be reduced. In the proposed method, we predict the destination eNB of D2D users based on their movements and the received signal characteristics. Subsequently, we make a handover decision for each D2D pair by jointly factoring in the signal quality and connection stability. Expected improvement can be attained, as revealed in the simulation.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trait Extraction Method for Digital Equipment Using Clock Drifts Based on Comparison of Criterion Server 基于标准服务器比较的时钟漂移数字设备特征提取方法
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145998
Naoto Hoshikawa, T. Shimobaba, T. Ito
Open connectivity is required to expand the IoT services, but such environments are prone to the risk of information leakage and illegal operation by spoofing. In this paper, we present clock fingerprints concept based on clock frequency trait, and propose a method for extracting trait using clock drifts and criterion server. This trait can be available in identifying digital equipment to increase security in the future open IoT services. In our two experiments, we demonstrate the extraction of traits from some computers. First one show that unique characteristics can be extracted from two kinds of clock signals. Second show that different characteristics can be extracted from the same model number and the same software settings. We conclude with the challenges that we plan to address in our future work to improve this method.
扩展物联网业务需要开放连接,但这种环境容易存在信息泄露和被欺骗非法操作的风险。本文提出了基于时钟频率特征的时钟指纹概念,并提出了一种利用时钟漂移和准则服务器提取时钟指纹特征的方法。这一特性可用于识别数字设备,以提高未来开放物联网服务的安全性。在我们的两个实验中,我们演示了从一些计算机中提取特征。首先,从两种时钟信号中可以提取出独特的特征。其次,从相同的型号和相同的软件设置中可以提取出不同的特征。最后,我们计划在未来的工作中解决这些挑战,以改进这种方法。
{"title":"Trait Extraction Method for Digital Equipment Using Clock Drifts Based on Comparison of Criterion Server","authors":"Naoto Hoshikawa, T. Shimobaba, T. Ito","doi":"10.1109/ICCCI49374.2020.9145998","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145998","url":null,"abstract":"Open connectivity is required to expand the IoT services, but such environments are prone to the risk of information leakage and illegal operation by spoofing. In this paper, we present clock fingerprints concept based on clock frequency trait, and propose a method for extracting trait using clock drifts and criterion server. This trait can be available in identifying digital equipment to increase security in the future open IoT services. In our two experiments, we demonstrate the extraction of traits from some computers. First one show that unique characteristics can be extracted from two kinds of clock signals. Second show that different characteristics can be extracted from the same model number and the same software settings. We conclude with the challenges that we plan to address in our future work to improve this method.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Analysis of Symmetric Block Cipher Kuznyechik 库兹涅奇克对称块密码的功率分析
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145964
E. Maro, Vadim Girichev
Paper presents an overview of power analysis attack and experimental results of the first main stage of simple power analysis (SPA) and differential power analysis (DPA) attacks-a practical correlation of power consumption measurement charts to each of encryption operations for standard Kuznyechik cipher (GOST R 34.12-2015 (n = 128)). As part of experiments we construct lightweight hardware implementation of Kuznyechik cipher on Arduino electric board (namely Arduino Nano) and compile measurements of power consumption by LECROY WavePro 7100A oscilloscope (with a 1 GHz bandwidth and 10 GHz / 4 channel sampling frequency). Our experiments led to finding signature (fixed structure and power consumption value) for encryption operations of Kuznyechik cipher: additions with round key, nonlinear transformation and linear transformation.
论文概述了功耗分析攻击以及简单功耗分析(SPA)和差分功耗分析(DPA)攻击第一主要阶段的实验结果--标准库兹涅茨克密码(GOST R 34.12-2015(n = 128))每次加密操作的功耗测量图的实际相关性。作为实验的一部分,我们在 Arduino 电板(即 Arduino Nano)上构建了库兹涅奇克密码的轻量级硬件实现,并通过 LECROY WavePro 7100A 示波器(带宽为 1 GHz,采样频率为 10 GHz / 4 通道)编制了功耗测量图。通过实验,我们找到了库兹涅奇克密码加密操作的签名(固定结构和功耗值):使用圆形密钥的加法、非线性变换和线性变换。
{"title":"Power Analysis of Symmetric Block Cipher Kuznyechik","authors":"E. Maro, Vadim Girichev","doi":"10.1109/ICCCI49374.2020.9145964","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145964","url":null,"abstract":"Paper presents an overview of power analysis attack and experimental results of the first main stage of simple power analysis (SPA) and differential power analysis (DPA) attacks-a practical correlation of power consumption measurement charts to each of encryption operations for standard Kuznyechik cipher (GOST R 34.12-2015 (n = 128)). As part of experiments we construct lightweight hardware implementation of Kuznyechik cipher on Arduino electric board (namely Arduino Nano) and compile measurements of power consumption by LECROY WavePro 7100A oscilloscope (with a 1 GHz bandwidth and 10 GHz / 4 channel sampling frequency). Our experiments led to finding signature (fixed structure and power consumption value) for encryption operations of Kuznyechik cipher: additions with round key, nonlinear transformation and linear transformation.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126353548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficiency Comparison for Full-Duplex DF and AF Relaying Protocols 全双工DF和AF中继协议的能效比较
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145975
Zhongxia Gao, Runhe Qiu, Caixia Cai, Jiai Xue, Chen Wang, Sijing Chen
In this paper, the energy efficiency (EE) of full-duplex (FD) two-hop relay system with decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols is studied. The residual self-interference (RSI) is modeled as a linear function of relay transmit power first. Then, with the constant transmission rate, the EE maximization problem is transformed into transmit power minimization problem and the minimum transmit power consumptions of the DF and AF protocols are obtained. Furthermore, the EE comparison of the DF and AF protocols is given with the minimum transmit power consumption. The simulation results are given to verify the theoretical EE analysis and comparison.
本文研究了具有译码转发(DF)和放大转发(AF)中继协议的全双工(FD)两跳中继系统的能量效率(EE)。首先将剩余自干扰(RSI)建模为中继发射功率的线性函数。然后,在传输速率不变的情况下,将EE最大化问题转化为发射功率最小化问题,得到DF和AF协议的最小发射功耗。在最小传输功耗条件下,给出了DF协议和AF协议的EE比较。仿真结果验证了理论分析和比较。
{"title":"Energy Efficiency Comparison for Full-Duplex DF and AF Relaying Protocols","authors":"Zhongxia Gao, Runhe Qiu, Caixia Cai, Jiai Xue, Chen Wang, Sijing Chen","doi":"10.1109/ICCCI49374.2020.9145975","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145975","url":null,"abstract":"In this paper, the energy efficiency (EE) of full-duplex (FD) two-hop relay system with decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols is studied. The residual self-interference (RSI) is modeled as a linear function of relay transmit power first. Then, with the constant transmission rate, the EE maximization problem is transformed into transmit power minimization problem and the minimum transmit power consumptions of the DF and AF protocols are obtained. Furthermore, the EE comparison of the DF and AF protocols is given with the minimum transmit power consumption. The simulation results are given to verify the theoretical EE analysis and comparison.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bayesian Estimation Method of Transportation Frequency for Disaster Information Sharing System 灾害信息共享系统运输频率的贝叶斯估计方法
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145965
Kaito Shibutani, A. Kobayashi
In large-scale disasters such as earthquakes, sharing of disaster information is required without relying on the existing communication infrastructure. In this paper, we propose a disaster information sharing system using passive portable storages such as a USB memory stick as for communication media. Our pro-posed system assumes a serious disaster that requires the physical transport of communication media. In this system, the portable storages are transported by local citizens. In such situations, each sending node cannot know both the destination node of each message and the receiver node of portable storages. Therefore, an efficiency content selection method is required for our proposed system. We also propose a content selection method based on priority. The proposed method calculates the content priority based on the transportation frequency information between nodes estimated from the transportation history of portable storages and the content diffusion information in the network. We have revealed the effectiveness of our proposed method by simulation using actual geographical points of evacuation centers.
在地震等大规模灾害中,需要在不依赖现有通信基础设施的情况下共享灾害信息。在本文中,我们提出了一个灾难信息共享系统,使用无源移动存储,如USB记忆棒作为通信介质。我们提出的系统假定发生了严重的灾难,需要通信介质的物理传输。在这个系统中,便携式存储器由当地居民运输。在这种情况下,每个发送节点不可能同时知道每条消息的目的节点和便携存储的接收节点。因此,我们所提出的系统需要一种高效的内容选择方法。我们还提出了一种基于优先级的内容选择方法。该方法根据便携式存储器的传输历史和网络中的内容扩散信息估计节点之间的传输频率信息,计算内容优先级。我们利用疏散中心的实际地理点进行了模拟,证明了我们提出的方法的有效性。
{"title":"Bayesian Estimation Method of Transportation Frequency for Disaster Information Sharing System","authors":"Kaito Shibutani, A. Kobayashi","doi":"10.1109/ICCCI49374.2020.9145965","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145965","url":null,"abstract":"In large-scale disasters such as earthquakes, sharing of disaster information is required without relying on the existing communication infrastructure. In this paper, we propose a disaster information sharing system using passive portable storages such as a USB memory stick as for communication media. Our pro-posed system assumes a serious disaster that requires the physical transport of communication media. In this system, the portable storages are transported by local citizens. In such situations, each sending node cannot know both the destination node of each message and the receiver node of portable storages. Therefore, an efficiency content selection method is required for our proposed system. We also propose a content selection method based on priority. The proposed method calculates the content priority based on the transportation frequency information between nodes estimated from the transportation history of portable storages and the content diffusion information in the network. We have revealed the effectiveness of our proposed method by simulation using actual geographical points of evacuation centers.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Topology Planning for Wireless Mesh Networks Based on Deep Reinforcement Learning 基于深度强化学习的无线网状网络拓扑规划研究
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145985
Changsheng Yin, Ruopeng Yang, Xiaofei Zou, Wei Zhu
Focus on the access point deployment and topology control problem in Wireless Mesh Networks (WMNs), a topology planning method based on deep reinforcement learning was proposed. Developing a method of sample data generation using monte-carlo tree search and self-game, then a policy and value network based on residual network was established. A model based on Tensorflow was developed to solve the training problem. Finally, simulation results show that the proposed method can provide efficient network planning solution with high performance on timeliness and validity.
针对无线Mesh网络中的接入点部署和拓扑控制问题,提出了一种基于深度强化学习的拓扑规划方法。提出了一种基于蒙特卡罗树搜索和自博弈的样本数据生成方法,在此基础上建立了基于残差网络的策略与价值网络。提出了一种基于Tensorflow的模型来解决训练问题。仿真结果表明,该方法能够提供高效的网络规划方案,具有较高的时效性和有效性。
{"title":"Research on Topology Planning for Wireless Mesh Networks Based on Deep Reinforcement Learning","authors":"Changsheng Yin, Ruopeng Yang, Xiaofei Zou, Wei Zhu","doi":"10.1109/ICCCI49374.2020.9145985","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145985","url":null,"abstract":"Focus on the access point deployment and topology control problem in Wireless Mesh Networks (WMNs), a topology planning method based on deep reinforcement learning was proposed. Developing a method of sample data generation using monte-carlo tree search and self-game, then a policy and value network based on residual network was established. A model based on Tensorflow was developed to solve the training problem. Finally, simulation results show that the proposed method can provide efficient network planning solution with high performance on timeliness and validity.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126265417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Diagnostic Framework for Distributed Application Performance Anomaly Based on Adaptive Instrumentation 基于自适应检测的分布式应用程序性能异常诊断框架
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145997
Shudong Zhang, Dongxue Liu, Lijuan Zhou, Zhongshan Ren, Zipeng Wang
Instrumentation technology can obtain the status information of the distributed system when it is running. It is the core part of software performance management tools. But the use of instrumentation technology is often accompanied by a waste of resources. In this paper, we designed an adaptive instrumentation mechanism to balance the monitoring needs and resource load. Using analytical models based on linear regression and K-Means based on density algorithm to analyze performance data, determine the actual operating conditions and monitoring requirements of the monitored system, dynamically change the insertion point, and reduce resource consumption. Experiments show that compared with traditional tools, using the method of this article for monitoring, when the user clicks a lot, the system throughput is lower, the resource load is smaller, the average response time of the tested web page is reduced by 3.37%, and the target program is Interference is smaller.
仪表技术可以获取分布式系统运行时的状态信息。它是软件性能管理工具的核心部分。但仪器仪表技术的使用往往伴随着资源的浪费。在本文中,我们设计了一种自适应检测机制来平衡监控需求和资源负载。利用基于线性回归的解析模型和基于密度算法的K-Means对性能数据进行分析,确定被监测系统的实际运行工况和监测需求,动态改变插入点,降低资源消耗。实验表明,与传统工具相比,使用本文的方法进行监控,当用户点击量大时,系统吞吐量更低,资源负载更小,被测网页的平均响应时间减少3.37%,目标程序干扰更小。
{"title":"Diagnostic Framework for Distributed Application Performance Anomaly Based on Adaptive Instrumentation","authors":"Shudong Zhang, Dongxue Liu, Lijuan Zhou, Zhongshan Ren, Zipeng Wang","doi":"10.1109/ICCCI49374.2020.9145997","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145997","url":null,"abstract":"Instrumentation technology can obtain the status information of the distributed system when it is running. It is the core part of software performance management tools. But the use of instrumentation technology is often accompanied by a waste of resources. In this paper, we designed an adaptive instrumentation mechanism to balance the monitoring needs and resource load. Using analytical models based on linear regression and K-Means based on density algorithm to analyze performance data, determine the actual operating conditions and monitoring requirements of the monitored system, dynamically change the insertion point, and reduce resource consumption. Experiments show that compared with traditional tools, using the method of this article for monitoring, when the user clicks a lot, the system throughput is lower, the resource load is smaller, the average response time of the tested web page is reduced by 3.37%, and the target program is Interference is smaller.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131288072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Optimization Based on Mimic Common Operating Environment for the Internet of Vehicles 基于模拟通用操作环境的车联网安全优化
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145966
Yue Xu, M. Ni, Fei Ying, Jingwen Zhang
The increasing vehicles have brought convenience to people as well as many traffic problems. The Internet of Vehicles (IoV) is an extension of the intelligent transportation system based on the Internet of Things (IoT), which is the omnibearing network connection among “Vehicles, Loads, Clouds”. However, IoV also faces threats from various known and unknown security vulnerabilities. Traditional security defense methods can only deal with known attacks, while there is no effective way to deal with unknown attacks. In this paper, we show an IoV system deployed on a Mimic Common Operating Environment (MCOE). At the sensing layer, we introduce a lightweight cryptographic algorithm, LBlock, to encrypt the data collected by the hardware. Thus, we can prevent malicious tampering of information such as vehicle conditions. At the application layer, we firstly put the IoV system platform into MCOE to make it dynamic, heterogeneous and redundant. Extensive experiments prove that the sensing layer can encrypt data reliably and energy-efficiently. And we prove the feasibility and security of the Internet of Vehicles system platform on MCOE.
越来越多的车辆给人们带来便利的同时也带来了许多交通问题。车联网(IoV)是基于物联网(IoT)的智能交通系统的延伸,物联网是“车、物、云”之间的全方位网络连接。然而,车联网也面临着各种已知和未知安全漏洞的威胁。传统的安全防御方法只能应对已知的攻击,对于未知的攻击没有有效的应对方法。在本文中,我们展示了一个部署在模拟通用操作环境(MCOE)上的IoV系统。在传感层,我们引入了一种轻量级的加密算法LBlock,对硬件采集的数据进行加密。因此,我们可以防止恶意篡改信息,如车辆状况。在应用层,我们首先将车联网系统平台纳入MCOE,使其具有动态性、异构性和冗余性。大量实验证明,该传感层能够可靠、高效地对数据进行加密。验证了基于MCOE的车联网系统平台的可行性和安全性。
{"title":"Security Optimization Based on Mimic Common Operating Environment for the Internet of Vehicles","authors":"Yue Xu, M. Ni, Fei Ying, Jingwen Zhang","doi":"10.1109/ICCCI49374.2020.9145966","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145966","url":null,"abstract":"The increasing vehicles have brought convenience to people as well as many traffic problems. The Internet of Vehicles (IoV) is an extension of the intelligent transportation system based on the Internet of Things (IoT), which is the omnibearing network connection among “Vehicles, Loads, Clouds”. However, IoV also faces threats from various known and unknown security vulnerabilities. Traditional security defense methods can only deal with known attacks, while there is no effective way to deal with unknown attacks. In this paper, we show an IoV system deployed on a Mimic Common Operating Environment (MCOE). At the sensing layer, we introduce a lightweight cryptographic algorithm, LBlock, to encrypt the data collected by the hardware. Thus, we can prevent malicious tampering of information such as vehicle conditions. At the application layer, we firstly put the IoV system platform into MCOE to make it dynamic, heterogeneous and redundant. Extensive experiments prove that the sensing layer can encrypt data reliably and energy-efficiently. And we prove the feasibility and security of the Internet of Vehicles system platform on MCOE.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Successive Artificial Noise Cancellation for Security Enhancing Spatial Modulation 增强空间调制安全性的连续人工降噪
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145986
Weicheng Yu, Xue-fen Wan, Xueqin Jiang, Jun Li, Miaowen Wen, J. Hou
Spatial modulation (SM) as a new transmission technique has a wide application prospect in multiple-input multiple-output (MIMO) wireless communications. In this paper, a novel physical layer security enhancing scheme using artificial noise (AN)is proposed for SM systems. In the proposed scheme, the transmitted signals contain the useful information symbols and the AN that is designed by exploiting the knowledge of the channel state information (CSI) over the legitimate channel. A new detection scheme is also proposed, which detects the information symbols by using signals received across two successive time slots such that the AN can only be perfectly cancelled at the legitimate receiver while confusing the passive eavesdropper. Furthermore, the simulation results on secrecy rate verify that the proposed security enhancing scheme can achieve a satisfactory performance.
空间调制作为一种新的传输技术,在多输入多输出(MIMO)无线通信中具有广阔的应用前景。本文提出了一种基于人工噪声的SM系统物理层安全增强方案。在该方案中,传输的信号包含有用的信息符号和利用合法信道上的信道状态信息(CSI)知识设计的AN。提出了一种新的检测方案,该方案通过使用跨越两个连续时隙接收的信号来检测信息符号,使得AN只能在合法接收方完全取消,同时使被动窃听者感到困惑。此外,在保密率方面的仿真结果验证了所提出的安全增强方案能够达到令人满意的性能。
{"title":"Successive Artificial Noise Cancellation for Security Enhancing Spatial Modulation","authors":"Weicheng Yu, Xue-fen Wan, Xueqin Jiang, Jun Li, Miaowen Wen, J. Hou","doi":"10.1109/ICCCI49374.2020.9145986","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145986","url":null,"abstract":"Spatial modulation (SM) as a new transmission technique has a wide application prospect in multiple-input multiple-output (MIMO) wireless communications. In this paper, a novel physical layer security enhancing scheme using artificial noise (AN)is proposed for SM systems. In the proposed scheme, the transmitted signals contain the useful information symbols and the AN that is designed by exploiting the knowledge of the channel state information (CSI) over the legitimate channel. A new detection scheme is also proposed, which detects the information symbols by using signals received across two successive time slots such that the AN can only be perfectly cancelled at the legitimate receiver while confusing the passive eavesdropper. Furthermore, the simulation results on secrecy rate verify that the proposed security enhancing scheme can achieve a satisfactory performance.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132912151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Robot Position Control Using Force Information in Remote Robot Systems with Force Feedback: Comparition between Human-Robot and Robot-Robot Cases 力反馈远程机器人系统中基于力信息的机器人位置控制效果:人-机器人与机器人-机器人案例比较
Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145962
S. Ishikawa, Y. Ishibashi, Pingguo Huang, Y. Tateiwa
By experiment, this paper investigates effects of the robot position control using force information, which we previously proposed, for cooperative work between two remote robot systems with force feedback. As cooperative work, we deal with work in which a human and a robot arm in the system (i.e. human-robot) or two robot arms (robot-robot) carry an object together. Then, one robot arm which is operated automatically under the robot position control using force information follows a human or another robot arm. In our experiment, we compare force applied to the object between the human-robot and the robot-robot cases. In the robot-robot case, we also deal with the case in which the control is carried out in both systems, and the case in which the control is performed in only one system. Experimental results demonstrate that the human-robot case is the best among the three cases.
通过实验,研究了先前提出的基于力信息的机器人位置控制方法对具有力反馈的两个远程机器人系统之间协同工作的影响。作为协作工作,我们处理的是系统中一个人和一个机械臂(即人-机器人)或两个机械臂(机器人-机器人)一起搬运物体的工作。然后,在机器人位置控制下,利用力信息自动操作的机械臂跟随人或另一只机械臂。在我们的实验中,我们比较了人-机器人和机器人-机器人情况下施加在物体上的力。在机器人-机器人的情况下,我们还处理在两个系统中执行控制的情况,以及只在一个系统中执行控制的情况。实验结果表明,在三种情况下,人机情况是最好的。
{"title":"Effects of Robot Position Control Using Force Information in Remote Robot Systems with Force Feedback: Comparition between Human-Robot and Robot-Robot Cases","authors":"S. Ishikawa, Y. Ishibashi, Pingguo Huang, Y. Tateiwa","doi":"10.1109/ICCCI49374.2020.9145962","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145962","url":null,"abstract":"By experiment, this paper investigates effects of the robot position control using force information, which we previously proposed, for cooperative work between two remote robot systems with force feedback. As cooperative work, we deal with work in which a human and a robot arm in the system (i.e. human-robot) or two robot arms (robot-robot) carry an object together. Then, one robot arm which is operated automatically under the robot position control using force information follows a human or another robot arm. In our experiment, we compare force applied to the object between the human-robot and the robot-robot cases. In the robot-robot case, we also deal with the case in which the control is carried out in both systems, and the case in which the control is performed in only one system. Experimental results demonstrate that the human-robot case is the best among the three cases.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122590585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 2nd International Conference on Computer Communication and the Internet (ICCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1