首页 > 最新文献

2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)最新文献

英文 中文
Joint Content Placement and Secure Lightpath Provisioning in EONs Supporting Anycast Traffic 支持任播流量的eon中的联合内容放置和安全光路配置
G. Savva, K. Manousakis, Vasilis Sourlas, G. Ellinas
This work considers secure lightpath establishment and content placement in elastic optical networks (EONs). Security of confidential connections against eavesdropping attacks is ensured through network coding among confidential and non-confidential unicast or anycast lightpaths. A unicast connection requires a lightpath establishment from a specific source to a destination, whereas, for an anycast connection, the source can be chosen from a specific set of network nodes (data centers) where the content can be located at. To address this problem, a heuristic algorithm is developed that considers the different types of connections to be established, with the objective to maximize the security level of the confidential connections, while source node selection and content placement are performed for the anycast connections. Performance results demonstrate that anycast connections significantly improve the security level of confidential connections with no additional spectrum requirements, compared to the scenario where only non-confidential unicast connections are used for security purposes.
这项工作考虑了弹性光网络(EONs)中安全光路的建立和内容的放置。通过在机密和非机密单播或任意播光路之间进行网络编码,确保机密连接免受窃听攻击的安全性。单播连接需要建立从特定源到目的地的光路,而对于任意播连接,可以从内容所在的一组特定网络节点(数据中心)中选择源。为了解决这个问题,开发了一种启发式算法,该算法考虑要建立的不同类型的连接,目的是最大限度地提高机密连接的安全级别,同时为任意播连接执行源节点选择和内容放置。性能结果表明,与出于安全目的仅使用非机密单播连接的场景相比,任意播连接在不需要额外频谱需求的情况下显著提高了机密连接的安全级别。
{"title":"Joint Content Placement and Secure Lightpath Provisioning in EONs Supporting Anycast Traffic","authors":"G. Savva, K. Manousakis, Vasilis Sourlas, G. Ellinas","doi":"10.1109/CAMAD55695.2022.9966917","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966917","url":null,"abstract":"This work considers secure lightpath establishment and content placement in elastic optical networks (EONs). Security of confidential connections against eavesdropping attacks is ensured through network coding among confidential and non-confidential unicast or anycast lightpaths. A unicast connection requires a lightpath establishment from a specific source to a destination, whereas, for an anycast connection, the source can be chosen from a specific set of network nodes (data centers) where the content can be located at. To address this problem, a heuristic algorithm is developed that considers the different types of connections to be established, with the objective to maximize the security level of the confidential connections, while source node selection and content placement are performed for the anycast connections. Performance results demonstrate that anycast connections significantly improve the security level of confidential connections with no additional spectrum requirements, compared to the scenario where only non-confidential unicast connections are used for security purposes.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121329790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Two-Way Communications Between UAVs and Control Center in IoV 5G Communication 物联网5G通信中无人机与控制中心双向通信安全
Andreas Andreou, C. Mavromoustakis, J. M. Batalla, E. Markakis, G. Mastorakis, E. Pallis
Integration of UAVs into the fifth generation (5G) cellular networks as aerial base stations would be a promising technology to achieve several goals, namely ubiquitous accessibility, robust navigation, ease of monitoring and management. Real-time distribution of critical information must be embedded throughout transport infrastructure. The ability of Unmanned Aerial Vehicles (UAVs) with high agility, mobility, and flexibility to offload data traffic from terrestrial base stations and Road Side Units (RSUs) by providing additional access points enables swift, accurate, timely and actionable decisions in Intelligent Transportation System (ITS) based on data-driven insights. However, we must ensure secure data exchange when multi-purpose RSU is deployed for confidential data acquisition and distribution. It is a prerequisite for data sovereignty in the Internet of Vehicles (IoV) network to be facilitated by secure data exchange between trusted parties. Therefore, we propose a robust encryption method to incentivize data exchange within the ITS ecosystem to enable confidential data sharing in IoV communication. In addition, the novel encryption method we present enables real-time, encryption and decryption for ciphertexts containing confidential information between UAVs and the control center.
将无人机集成到第五代(5G)蜂窝网络中作为空中基站将是一项有前途的技术,可以实现几个目标,即无处不在的可访问性、强大的导航、易于监控和管理。关键信息的实时分发必须嵌入整个交通基础设施。无人机(uav)具有高敏捷性、机动性和灵活性,可以通过提供额外的接入点,从地面基站和路侧单元(rsu)卸载数据流量,从而在智能交通系统(ITS)中基于数据驱动的见解实现快速、准确、及时和可操作的决策。然而,当部署多用途RSU用于机密数据的获取和分发时,我们必须确保安全的数据交换。可信各方之间的安全数据交换是实现车联网数据主权的前提。因此,我们提出了一种强大的加密方法来激励ITS生态系统内的数据交换,以实现车联网通信中的机密数据共享。此外,我们提出的新加密方法能够对无人机和控制中心之间包含机密信息的密文进行实时加密和解密。
{"title":"Secure Two-Way Communications Between UAVs and Control Center in IoV 5G Communication","authors":"Andreas Andreou, C. Mavromoustakis, J. M. Batalla, E. Markakis, G. Mastorakis, E. Pallis","doi":"10.1109/CAMAD55695.2022.9966916","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966916","url":null,"abstract":"Integration of UAVs into the fifth generation (5G) cellular networks as aerial base stations would be a promising technology to achieve several goals, namely ubiquitous accessibility, robust navigation, ease of monitoring and management. Real-time distribution of critical information must be embedded throughout transport infrastructure. The ability of Unmanned Aerial Vehicles (UAVs) with high agility, mobility, and flexibility to offload data traffic from terrestrial base stations and Road Side Units (RSUs) by providing additional access points enables swift, accurate, timely and actionable decisions in Intelligent Transportation System (ITS) based on data-driven insights. However, we must ensure secure data exchange when multi-purpose RSU is deployed for confidential data acquisition and distribution. It is a prerequisite for data sovereignty in the Internet of Vehicles (IoV) network to be facilitated by secure data exchange between trusted parties. Therefore, we propose a robust encryption method to incentivize data exchange within the ITS ecosystem to enable confidential data sharing in IoV communication. In addition, the novel encryption method we present enables real-time, encryption and decryption for ciphertexts containing confidential information between UAVs and the control center.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Network Intrusion Detection Systems for Outlier Detection 鲁棒网络入侵检测系统的异常值检测
Rohan Desai, T. G. Venkatesh
Machine Learning Algorithms have become a crucial tool for designing Intrusion Detection Systems(IDS). The research community has identified deep learning architectures like Convolutional Neural Networks(CNN) as the go-to solution for IDS. However, these deep learning models are not immune to new outliers. We propose a Robust Network intrusion Detection system (RNIDS) model, which combines a CNN architecture followed by K Nearest Neighbors method. The proposed RNIDS model can classify different known attacks, and then predict if a new arriving traffic is an outlier with very high accuracy. We train and evaluate a CNN-based model which can classify attacks with an accuracy of 98.3% using up only 70,252 training parameters.
机器学习算法已经成为设计入侵检测系统(IDS)的重要工具。研究界已经将卷积神经网络(CNN)等深度学习架构确定为IDS的首选解决方案。然而,这些深度学习模型也不能幸免于新的异常值。本文提出了一种鲁棒网络入侵检测系统(RNIDS)模型,该模型结合了CNN架构和K近邻方法。提出的RNIDS模型可以对不同的已知攻击进行分类,然后以非常高的准确率预测新到达的流量是否为异常值。我们训练并评估了一个基于cnn的模型,该模型仅使用70,252个训练参数就能以98.3%的准确率对攻击进行分类。
{"title":"Robust Network Intrusion Detection Systems for Outlier Detection","authors":"Rohan Desai, T. G. Venkatesh","doi":"10.1109/CAMAD55695.2022.9966883","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966883","url":null,"abstract":"Machine Learning Algorithms have become a crucial tool for designing Intrusion Detection Systems(IDS). The research community has identified deep learning architectures like Convolutional Neural Networks(CNN) as the go-to solution for IDS. However, these deep learning models are not immune to new outliers. We propose a Robust Network intrusion Detection system (RNIDS) model, which combines a CNN architecture followed by K Nearest Neighbors method. The proposed RNIDS model can classify different known attacks, and then predict if a new arriving traffic is an outlier with very high accuracy. We train and evaluate a CNN-based model which can classify attacks with an accuracy of 98.3% using up only 70,252 training parameters.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
M-TADS: A Multi-Trust DoS Attack Detection System for MEC-enabled Industrial loT M-TADS:一种支持mec的多信任DoS攻击检测系统
Eric Gyamfi, A. Jurcut
The Industrial Internet of Things (IIoT) remains an inevitable system in various applications that require data collection and processing in the modern industrial revolution. The IIoTs are responsible for critical data collection and transmission to cloud servers to address life-dependent problems. However, these cyber-physical devices are vulnerable to network attacks such as selective forwarding, flooding, and Sybil attacks. Meanwhile, behavioural patterns characterise the IIoT devices under such attacks due to their effect on transmission latency, power consumption, and computational time. Hence, this paper presents a multi-trust security system to monitor and record these parameters, such as network byte-in and byte-out, CPU usage, and energy consumption on the IIoT device. Based on the ML model, we created an efficient multi-trust attack detection system (M-TADS) to detect denial of service attacks (DoS) in the IIoT. IIoT devices have resource constraints that practically prevent them from fully implementing the proposed M-TADS on the same cyber-physical device. Hence, the captured parameters from the IIoT devices are offloaded to a deep neural network model created with long short term memory (LSTM). The LSTM is hosted on a multi-access edge computing (MEC) server at the network edge to determine the possible existence of the DoS attack signature. Due to the high latency accompanying DoS attack, we introduce a custom hold and check filter on the IIoT devices. The proposed M-TADS performance is verified through simulations, and the results confirm high performance in terms of throughput, energy consumption, packet delay, and IIoT network DoS attack detection accuracy.
工业物联网(IIoT)在现代工业革命中需要数据收集和处理的各种应用中仍然是一个不可避免的系统。工业物联网负责关键数据的收集和传输到云服务器,以解决依赖生命的问题。但是,这些网络物理设备容易受到选择性转发、泛洪攻击、Sybil攻击等网络攻击。同时,由于其对传输延迟、功耗和计算时间的影响,行为模式表征了此类攻击下工业物联网设备的特征。因此,本文提出了一种多信任安全系统来监控和记录这些参数,例如IIoT设备上的网络字节输入和字节输出、CPU使用情况和能耗。基于机器学习模型,我们创建了一个高效的多信任攻击检测系统(M-TADS)来检测工业物联网中的拒绝服务攻击(DoS)。工业物联网设备具有资源限制,这实际上阻止了它们在同一网络物理设备上完全实现拟议的M-TADS。因此,从IIoT设备捕获的参数被卸载到使用长短期记忆(LSTM)创建的深度神经网络模型中。LSTM驻留在网络边缘的MEC (multi-access edge computing)服务器上,用于判断是否存在DoS攻击签名。由于DoS攻击的高延迟,我们在IIoT设备上引入了自定义保持和检查过滤器。通过仿真验证了所提出的M-TADS的性能,结果证实了在吞吐量、能耗、数据包延迟和IIoT网络DoS攻击检测精度方面的高性能。
{"title":"M-TADS: A Multi-Trust DoS Attack Detection System for MEC-enabled Industrial loT","authors":"Eric Gyamfi, A. Jurcut","doi":"10.1109/CAMAD55695.2022.9966900","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966900","url":null,"abstract":"The Industrial Internet of Things (IIoT) remains an inevitable system in various applications that require data collection and processing in the modern industrial revolution. The IIoTs are responsible for critical data collection and transmission to cloud servers to address life-dependent problems. However, these cyber-physical devices are vulnerable to network attacks such as selective forwarding, flooding, and Sybil attacks. Meanwhile, behavioural patterns characterise the IIoT devices under such attacks due to their effect on transmission latency, power consumption, and computational time. Hence, this paper presents a multi-trust security system to monitor and record these parameters, such as network byte-in and byte-out, CPU usage, and energy consumption on the IIoT device. Based on the ML model, we created an efficient multi-trust attack detection system (M-TADS) to detect denial of service attacks (DoS) in the IIoT. IIoT devices have resource constraints that practically prevent them from fully implementing the proposed M-TADS on the same cyber-physical device. Hence, the captured parameters from the IIoT devices are offloaded to a deep neural network model created with long short term memory (LSTM). The LSTM is hosted on a multi-access edge computing (MEC) server at the network edge to determine the possible existence of the DoS attack signature. Due to the high latency accompanying DoS attack, we introduce a custom hold and check filter on the IIoT devices. The proposed M-TADS performance is verified through simulations, and the results confirm high performance in terms of throughput, energy consumption, packet delay, and IIoT network DoS attack detection accuracy.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127020675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic 改变你的汽车过滤器:OBD-II网络流量的高效并发和多阶段防火墙
Felix Klement, H. C. Pöhls, S. Katzenbeisser
Modern cars offer one common interface to the outside, the OBD. Among the multitude of protocols that could exchange messages with the car's internal devices over OBD the CAN-BUS protocol is the most well-known; several commercial devices (so-called dongles) would allow to send and receive messages without any user-controlled restrictions. In order to enable fine-grained filtering on the CAN - BUS we exploit a security weakness called man-in-the-middle: the car or dongle does not apply any origin authentication as neither digital signatures nor message authentication codes (MACs) are used. We are the first to present this approach and offer measurements for our concurrent and multi-stage design that enables a fine-grained and extensible filtering approach for all protocols within the OBD.
现代汽车提供一个与外部的通用接口,OBD。在众多可以通过OBD与汽车内部设备交换消息的协议中,CAN-BUS协议是最著名的;一些商业设备(所谓的加密狗)将允许在没有任何用户控制限制的情况下发送和接收消息。为了在CAN - BUS上启用细粒度过滤,我们利用了一个称为中间人的安全弱点:汽车或加密狗不应用任何原始身份验证,因为既没有使用数字签名,也没有使用消息身份验证码(mac)。我们是第一个提出这种方法的人,并为我们的并发和多阶段设计提供了度量,该设计为OBD中的所有协议提供了细粒度和可扩展的过滤方法。
{"title":"Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic","authors":"Felix Klement, H. C. Pöhls, S. Katzenbeisser","doi":"10.1109/CAMAD55695.2022.9966902","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966902","url":null,"abstract":"Modern cars offer one common interface to the outside, the OBD. Among the multitude of protocols that could exchange messages with the car's internal devices over OBD the CAN-BUS protocol is the most well-known; several commercial devices (so-called dongles) would allow to send and receive messages without any user-controlled restrictions. In order to enable fine-grained filtering on the CAN - BUS we exploit a security weakness called man-in-the-middle: the car or dongle does not apply any origin authentication as neither digital signatures nor message authentication codes (MACs) are used. We are the first to present this approach and offer measurements for our concurrent and multi-stage design that enables a fine-grained and extensible filtering approach for all protocols within the OBD.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"245 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Achieving Low Probability of Interference in Spread Spectrum Cognitive Radio Networks 实现扩频认知无线电网络中的低干扰概率
Kyle Watters, E. Coyle
Power control algorithms for cognitive radio networks allow users to minimize interference with primary users. The interference values are calculated in reference to some known primary user, whose location is approximated as a bivariate distribution. To close links between nodes using minimal energy, the user must also be able to approximate the bit error rate (BER) of a transmission. This paper focuses on mobile cognitive radio networks utilizing sectored antennas. Nodes use BER estimation to minimize the transmitted energy required for each hop while choosing multi-hop routes that minimize the interference to primary users. Highly mobile networks necessitate the ability to approximate the BER and interference values quickly, necessitating the approximations in the paper.
认知无线网络的功率控制算法允许用户最大限度地减少对主要用户的干扰。干扰值是根据已知的主用户计算的,其位置近似为二元分布。为了使用最小的能量关闭节点之间的链接,用户还必须能够近似传输的误码率(BER)。本文主要研究利用扇形天线的移动认知无线网络。节点使用误码率估计来最小化每一跳所需的传输能量,同时选择对主用户干扰最小的多跳路由。高度移动的网络需要快速逼近误码率和干扰值的能力,这就需要本文的逼近。
{"title":"Achieving Low Probability of Interference in Spread Spectrum Cognitive Radio Networks","authors":"Kyle Watters, E. Coyle","doi":"10.1109/CAMAD55695.2022.10214402","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.10214402","url":null,"abstract":"Power control algorithms for cognitive radio networks allow users to minimize interference with primary users. The interference values are calculated in reference to some known primary user, whose location is approximated as a bivariate distribution. To close links between nodes using minimal energy, the user must also be able to approximate the bit error rate (BER) of a transmission. This paper focuses on mobile cognitive radio networks utilizing sectored antennas. Nodes use BER estimation to minimize the transmitted energy required for each hop while choosing multi-hop routes that minimize the interference to primary users. Highly mobile networks necessitate the ability to approximate the BER and interference values quickly, necessitating the approximations in the paper.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Power Consumption in 4G VoLTE and 5G VoNR Over IMS Network 4G VoLTE和5G VoNR Over IMS网络的功耗分析
Caio B. Bezerra De Souza, J. J. Arnez, Tarcisio Fernandes, Cassio A. Tavares Alves, J. O. D. Sousa
The purpose of this work is to assess the battery consumption for voice call services in both 5G Standalone (SA) and 4G Long Term Evolution (LTE) mobile networks. The voice call services are assessed as a function of the power consumption during a call over IP Multimedia Subsystem (IMS) network. A top-class Device Under Test (DUT) and an experimental setup was used to evaluate the current and power values during the experimentation. Measurement results show that the DUT consumes up to 38.88 % less energy when performing voice calls using a 5G SA network. Additionally, voice calls made using 5G SA networks had superior quality compared to voice calls made in 4G networks, with an average jitter difference of up to 16.5 ms. Based on the results, analyses of the battery consumption are provided for improvements to the IMS technology and Voice over New Radio (VoNR) commercial use.
这项工作的目的是评估5G独立(SA)和4G长期演进(LTE)移动网络中语音通话服务的电池消耗。语音通话业务以IP多媒体子系统IMS (call over IP Multimedia Subsystem)网络的功耗为函数进行评估。采用一流的被测设备(DUT)和实验装置来评估实验过程中的电流和功率值。测试结果表明,在5G SA组网下,被测设备语音通话能耗可降低38.88%。此外,使用5G SA网络进行的语音通话质量优于使用4G网络进行的语音通话,平均抖动差高达16.5 ms。在此基础上,为改进IMS技术和VoNR商用提供了电池消耗分析。
{"title":"Analysis of Power Consumption in 4G VoLTE and 5G VoNR Over IMS Network","authors":"Caio B. Bezerra De Souza, J. J. Arnez, Tarcisio Fernandes, Cassio A. Tavares Alves, J. O. D. Sousa","doi":"10.1109/CAMAD55695.2022.9966918","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966918","url":null,"abstract":"The purpose of this work is to assess the battery consumption for voice call services in both 5G Standalone (SA) and 4G Long Term Evolution (LTE) mobile networks. The voice call services are assessed as a function of the power consumption during a call over IP Multimedia Subsystem (IMS) network. A top-class Device Under Test (DUT) and an experimental setup was used to evaluate the current and power values during the experimentation. Measurement results show that the DUT consumes up to 38.88 % less energy when performing voice calls using a 5G SA network. Additionally, voice calls made using 5G SA networks had superior quality compared to voice calls made in 4G networks, with an average jitter difference of up to 16.5 ms. Based on the results, analyses of the battery consumption are provided for improvements to the IMS technology and Voice over New Radio (VoNR) commercial use.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Control in massive MIMO Networks Using Transfer Learning with Deep Neural Networks 基于深度神经网络迁移学习的大规模MIMO网络功率控制
Neda Ahmadi, I. Mporas, Anastasios K. Papazafeiropoulos, P. Kourtessis, J. Senior
Power control (PC) plays a crucial role in massive multiple-input-multiple-output (mMIMO) networks. There are several heuristic algorithms, like the weighted mean square error (WMMSE) algorithm, used to optimise the PC. In order these algorithms to perform the power allocation they require high computational power. In this paper, we address this problem through the application of machine learning (ML)-based algorithms as they can produce close to optimal solutions with a very low computational complexity. We propose the use of transfer learning with deep neural networks (TLDNN) under the objective of maximising the sum spectral efficiency (SE). The evaluation results demonstrate that the TLDNN approach outperforms the deep neural network (DNN) based PC and is twice faster than the WMMSE based PC.
在大规模多输入多输出网络中,功率控制(PC)起着至关重要的作用。有几种启发式算法,如加权均方误差(WMMSE)算法,用于优化PC。为了使这些算法执行功率分配,它们需要很高的计算能力。在本文中,我们通过应用基于机器学习(ML)的算法来解决这个问题,因为它们可以以非常低的计算复杂度产生接近最优的解决方案。我们提出将迁移学习与深度神经网络(TLDNN)结合使用,目标是最大化和谱效率(SE)。评估结果表明,TLDNN方法优于基于深度神经网络(DNN)的PC,比基于WMMSE的PC快两倍。
{"title":"Power Control in massive MIMO Networks Using Transfer Learning with Deep Neural Networks","authors":"Neda Ahmadi, I. Mporas, Anastasios K. Papazafeiropoulos, P. Kourtessis, J. Senior","doi":"10.1109/CAMAD55695.2022.9966903","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966903","url":null,"abstract":"Power control (PC) plays a crucial role in massive multiple-input-multiple-output (mMIMO) networks. There are several heuristic algorithms, like the weighted mean square error (WMMSE) algorithm, used to optimise the PC. In order these algorithms to perform the power allocation they require high computational power. In this paper, we address this problem through the application of machine learning (ML)-based algorithms as they can produce close to optimal solutions with a very low computational complexity. We propose the use of transfer learning with deep neural networks (TLDNN) under the objective of maximising the sum spectral efficiency (SE). The evaluation results demonstrate that the TLDNN approach outperforms the deep neural network (DNN) based PC and is twice faster than the WMMSE based PC.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Machine Learning for the Performance Analysis of a Mobile Hotspot with a Call Admission Control Mechanism 利用机器学习进行具有呼叫接纳控制机制的移动热点性能分析
I. Keramidi, D. Uzunidis, Marinos Vlasakis, P. Sarigiannidis, I. Moscholios
Machine Learning (ML) algorithms can be efficiently employed to calculate various performance metrics in telecommunication systems showing comparable accuracy with analytical expressions while at the same time decreasing the computation time in several operational cases. In this paper, we examine the impact of six ML methods both on the accuracy of calculations and on the estimation time and benchmark them against an analytical formalism which solves a 2D Markov chain to estimate seven performance metrics in a vehicular system of a mobile hotspot. As a consequence, when using ML methods, we show that the computational complexity can be reduced, especially in cases where the system capacity is large and the computational complexity of the 2D Markov chain increases. More specifically, the proposed approach is applied in a dataset which comprises 100,000 operational cases, demonstrating a reduction of estimation time of more than two orders of magnitude while maintaining the average error less than 4.5%.
机器学习(ML)算法可以有效地用于计算电信系统中的各种性能指标,其精度与解析表达式相当,同时减少了几种操作情况下的计算时间。在本文中,我们研究了六种机器学习方法对计算精度和估计时间的影响,并将它们与解决二维马尔可夫链的分析形式化进行基准测试,以估计移动热点车辆系统中的七个性能指标。因此,当使用ML方法时,我们表明可以降低计算复杂度,特别是在系统容量较大且二维马尔可夫链的计算复杂度增加的情况下。更具体地说,所提出的方法应用于包含100,000个操作案例的数据集,证明了估计时间减少了两个数量级以上,同时保持平均误差小于4.5%。
{"title":"Exploiting Machine Learning for the Performance Analysis of a Mobile Hotspot with a Call Admission Control Mechanism","authors":"I. Keramidi, D. Uzunidis, Marinos Vlasakis, P. Sarigiannidis, I. Moscholios","doi":"10.1109/CAMAD55695.2022.9966911","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966911","url":null,"abstract":"Machine Learning (ML) algorithms can be efficiently employed to calculate various performance metrics in telecommunication systems showing comparable accuracy with analytical expressions while at the same time decreasing the computation time in several operational cases. In this paper, we examine the impact of six ML methods both on the accuracy of calculations and on the estimation time and benchmark them against an analytical formalism which solves a 2D Markov chain to estimate seven performance metrics in a vehicular system of a mobile hotspot. As a consequence, when using ML methods, we show that the computational complexity can be reduced, especially in cases where the system capacity is large and the computational complexity of the 2D Markov chain increases. More specifically, the proposed approach is applied in a dataset which comprises 100,000 operational cases, demonstrating a reduction of estimation time of more than two orders of magnitude while maintaining the average error less than 4.5%.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Failure Recovery in Emergency IoT Applications Using D2D in LoRa/LoRaWAN 在LoRa/LoRaWAN中使用D2D实现紧急物联网应用中的故障恢复
Kalpit Dilip Ballal, Radheshyam Singh, S. C. Nwabuona, L. Dittmann, S. Ruepp
As the number of connected devices is increasing, several new communication technologies are getting developed and deployed to serve the rising need. Cellular Internet of Things (C-IoT) is the umbrella of Low Power Wide Area Network (LPWAN) technologies introduced by 3GPP in order to support critical IoT applications. C- IoT technologies are deployed by Mobile Network Operators (MNO) of the country to support IoT devices. Unfortunately, just like other wireless communication technologies, C- IoT may also suffer coverage outages in some regions of the country (e.g., Forests, basements, etc.). Unlike other wireless technologies such as LTE, 5G, etc. C-IoT is typically only deployed in one frequency spectrum (band 20 in Denmark [17]), making the handover of these IoT devices in an outage scenario difficult. This significantly affects critical IoT applications like remote health monitors, location tracers, etc., where communicating data through the network is extremely important. This paper focuses on using Device-to-Device (D2D) communication using LoRa and LoRaWAN to create a low-cost, easy-to-deploy, and manage network infrastructure to minimize data loss because of outage scenarios. In order to validate this approach, authors have developed a number of prototype devices based on C-IoT and LoRa/LoRaWAN and performed experiments.
随着连接设备数量的增加,一些新的通信技术正在开发和部署,以满足不断增长的需求。蜂窝物联网(C-IoT)是3GPP为支持关键物联网应用而引入的低功耗广域网(LPWAN)技术的保护伞。C- IoT技术由该国的移动网络运营商(MNO)部署,以支持IoT设备。不幸的是,就像其他无线通信技术一样,C- IoT也可能在该国的某些地区(例如森林,地下室等)遭受覆盖中断。与LTE、5G等其他无线技术不同。C-IoT通常只部署在一个频谱中(丹麦的20频段[17]),这使得在停电情况下这些物联网设备的切换变得困难。这严重影响了远程健康监视器、位置跟踪器等关键物联网应用,在这些应用中,通过网络通信数据非常重要。本文的重点是使用设备到设备(D2D)通信,使用LoRa和LoRaWAN来创建低成本、易于部署和管理的网络基础设施,以最大限度地减少由于中断场景导致的数据丢失。为了验证这种方法,作者开发了许多基于C-IoT和LoRa/LoRaWAN的原型设备并进行了实验。
{"title":"Implementation of Failure Recovery in Emergency IoT Applications Using D2D in LoRa/LoRaWAN","authors":"Kalpit Dilip Ballal, Radheshyam Singh, S. C. Nwabuona, L. Dittmann, S. Ruepp","doi":"10.1109/CAMAD55695.2022.9966914","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966914","url":null,"abstract":"As the number of connected devices is increasing, several new communication technologies are getting developed and deployed to serve the rising need. Cellular Internet of Things (C-IoT) is the umbrella of Low Power Wide Area Network (LPWAN) technologies introduced by 3GPP in order to support critical IoT applications. C- IoT technologies are deployed by Mobile Network Operators (MNO) of the country to support IoT devices. Unfortunately, just like other wireless communication technologies, C- IoT may also suffer coverage outages in some regions of the country (e.g., Forests, basements, etc.). Unlike other wireless technologies such as LTE, 5G, etc. C-IoT is typically only deployed in one frequency spectrum (band 20 in Denmark [17]), making the handover of these IoT devices in an outage scenario difficult. This significantly affects critical IoT applications like remote health monitors, location tracers, etc., where communicating data through the network is extremely important. This paper focuses on using Device-to-Device (D2D) communication using LoRa and LoRaWAN to create a low-cost, easy-to-deploy, and manage network infrastructure to minimize data loss because of outage scenarios. In order to validate this approach, authors have developed a number of prototype devices based on C-IoT and LoRa/LoRaWAN and performed experiments.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122536231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1