首页 > 最新文献

2017 9th International Conference on Communication Systems and Networks (COMSNETS)最新文献

英文 中文
Simulation of P2P overlays over MANETs: Impediments and proposed solution P2P覆盖在manet上的模拟:障碍和建议的解决方案
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945395
Shabir Ali, Anurag Sewak, M. Pandey, N. Tyagi
Peer-to-Peer (P2P) overlays and Mobile Ad hoc Networks (MANETs) exhibit some common characteristics, such as dynamism, self-organization and decentralized control. The synergy between the two has been utilized by researchers to design distributed applications over MANETs. However, the available simulation platforms are far from perfect to evaluate the proposed designs. In most of the simulation platforms, good support is available for wired networks, wireless ad hoc networks and P2P overlays. However, P2P overlays in these platforms are programmed on top of wired networks, and there is no ready-to-use implementation of P2P over MANETs. In this paper, we present our experience and lessons learnt while simulating P2P over MANETs. We have tried different available platforms and concluded that OverSim over OMNeT++ is the best candidate for P2P simulation over MANET underlay. However, we need to incorporate a lot of changes and configurations to solve the purpose. We have designed a new underlay configurator by modifying an existing underlay model of OverSim to add wireless and mobility support in overlay nodes. The modified simulation setup is used for performance evaluation of P2P overlay over MANET at different mobility speeds and node densities. The results obtained are consistent with mobility and churn dynamics, thereby suggesting the utility of our simulation setup.
点对点(P2P)覆盖和移动自组织网络(manet)表现出一些共同的特征,如动态性、自组织和分散控制。研究人员利用两者之间的协同作用来设计基于manet的分布式应用程序。然而,现有的仿真平台远不能完美地评估所提出的设计。在大多数仿真平台中,对有线网络、无线自组织网络和P2P覆盖都有很好的支持。然而,这些平台中的P2P覆盖是在有线网络上编程的,并且在manet上没有现成的P2P实现。在本文中,我们介绍了我们在模拟manet上的P2P时所获得的经验和教训。我们尝试了不同的可用平台,并得出结论,omnet++上的OverSim是基于MANET底层的P2P模拟的最佳候选。然而,我们需要合并大量的更改和配置来解决这个问题。我们通过修改OverSim现有的底层模型,设计了一个新的底层配置器,在覆盖节点中添加无线和移动性支持。利用改进的仿真设置对不同移动速度和节点密度下的P2P覆盖进行了性能评估。所得结果与流动性和流失动力学一致,从而表明我们的模拟设置的实用性。
{"title":"Simulation of P2P overlays over MANETs: Impediments and proposed solution","authors":"Shabir Ali, Anurag Sewak, M. Pandey, N. Tyagi","doi":"10.1109/COMSNETS.2017.7945395","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945395","url":null,"abstract":"Peer-to-Peer (P2P) overlays and Mobile Ad hoc Networks (MANETs) exhibit some common characteristics, such as dynamism, self-organization and decentralized control. The synergy between the two has been utilized by researchers to design distributed applications over MANETs. However, the available simulation platforms are far from perfect to evaluate the proposed designs. In most of the simulation platforms, good support is available for wired networks, wireless ad hoc networks and P2P overlays. However, P2P overlays in these platforms are programmed on top of wired networks, and there is no ready-to-use implementation of P2P over MANETs. In this paper, we present our experience and lessons learnt while simulating P2P over MANETs. We have tried different available platforms and concluded that OverSim over OMNeT++ is the best candidate for P2P simulation over MANET underlay. However, we need to incorporate a lot of changes and configurations to solve the purpose. We have designed a new underlay configurator by modifying an existing underlay model of OverSim to add wireless and mobility support in overlay nodes. The modified simulation setup is used for performance evaluation of P2P overlay over MANET at different mobility speeds and node densities. The results obtained are consistent with mobility and churn dynamics, thereby suggesting the utility of our simulation setup.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127516974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Convolutional regression framework for health behavior prediction 健康行为预测的卷积回归框架
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945379
Srinka Basu, Saikat Roy, U. Maulik
Understanding the propagation of human health behavior, such as smoking and obesity, and identification of the factors that control such phenomenon is an important area of research in recent years mainly because, in industrialized countries a substantial proportion of the mortality and quality of life is due to particular behavior patterns, and that these behavior patterns are modifiable. Predicting the individuals who are going to be overweight or obese in future, as overweight and obesity propagate over dynamic human interaction network, is an important problem in this area. However, the problem has received limited attention from the network analysis and machine learning perspective till date. In this work, we propose a scalable supervised prediction model based on convolutional regression framework that is particularly suitable for short time series data. We propose various schemes to model social influence for health behavior change. Further we study the contribution of the primary factors of overweight and obesity, like unhealthy diets, recent weight gains and inactivity in the prediction task. A thorough experiment shows the superiority of the proposed method over the state-of-the-art.
了解诸如吸烟和肥胖等人类健康行为的蔓延以及查明控制这种现象的因素是近年来一个重要的研究领域,主要是因为在工业化国家,死亡率和生活质量的很大一部分是由特定的行为模式造成的,而这些行为模式是可以改变的。当超重和肥胖在动态人际互动网络中传播时,预测个体未来的超重或肥胖是该领域的一个重要问题。然而,迄今为止,从网络分析和机器学习的角度来看,这个问题得到的关注有限。在这项工作中,我们提出了一个基于卷积回归框架的可扩展监督预测模型,该模型特别适合于短时间序列数据。我们提出了各种方案来模拟健康行为改变的社会影响。我们进一步研究了超重和肥胖的主要因素,如不健康的饮食,最近的体重增加和不运动在预测任务中的贡献。一项彻底的实验表明,所提出的方法优于最先进的方法。
{"title":"Convolutional regression framework for health behavior prediction","authors":"Srinka Basu, Saikat Roy, U. Maulik","doi":"10.1109/COMSNETS.2017.7945379","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945379","url":null,"abstract":"Understanding the propagation of human health behavior, such as smoking and obesity, and identification of the factors that control such phenomenon is an important area of research in recent years mainly because, in industrialized countries a substantial proportion of the mortality and quality of life is due to particular behavior patterns, and that these behavior patterns are modifiable. Predicting the individuals who are going to be overweight or obese in future, as overweight and obesity propagate over dynamic human interaction network, is an important problem in this area. However, the problem has received limited attention from the network analysis and machine learning perspective till date. In this work, we propose a scalable supervised prediction model based on convolutional regression framework that is particularly suitable for short time series data. We propose various schemes to model social influence for health behavior change. Further we study the contribution of the primary factors of overweight and obesity, like unhealthy diets, recent weight gains and inactivity in the prediction task. A thorough experiment shows the superiority of the proposed method over the state-of-the-art.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ambiguity-region analysis for double threshold energy detection in cooperative spectrum sensing 协同频谱感知中双阈值能量检测的模糊区域分析
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945367
Dhritiman Das, Siddharth Deshmukh
In this paper we investigate cooperative spectrum sensing technique in which double threshold based energy detection is used at local cognitive radio (CR) sensors. Cooperative spectrum sensing improves reliability in detection of underutilized spectrum by fusing the decisions of local CR sensors. Local CR sensors use two thresholds, λ1 and λ2 (with λ2 > λ1). If the sensed energy is greater than λ2 or less than λ1 then with complete certainty local sensors decide for the presence or absence of primary user (PU) respectively. The difference between λ2 and λ1 defines the ambiguity region, i.e., Δth = λ2 — λ1 in which local CRs are unable to decide the presence or absence of PU. In this work local sensors report the decision along with situation in which sensed energy falls in ambiguity region. In our analysis we use majority rule at the fusion center and compute an analytical expression of average probability of sensing error as a function of width of ambiguity region, i.e., Δth. Using the derived analytical expression and by simulation we show that there exists an optimal value of Δth for which the probability of sensing error is minimum.
本文研究了基于双阈值能量检测的协同频谱感知技术在局部认知无线电(CR)传感器中的应用。协同频谱感知通过融合局部CR传感器的决策,提高了检测未充分利用频谱的可靠性。局部CR传感器使用两个阈值,λ1和λ2 (λ2 > λ1)。如果感应能量大于λ2或小于λ1,则本地传感器可以完全确定地分别判断主用户(PU)的存在或不存在。λ2与λ1的差值定义了模糊区域,即Δth = λ2 - λ1,在该区域内,局部cr无法判断PU的存在与否。在此工作中,局部传感器随传感能量落在模糊区域的情况报告决策。在我们的分析中,我们在融合中心使用多数原则,并计算平均感知误差概率的解析表达式作为模糊区域宽度的函数,即Δth。利用推导出的解析表达式并通过仿真证明存在一个感知误差概率最小的最优值Δth。
{"title":"Ambiguity-region analysis for double threshold energy detection in cooperative spectrum sensing","authors":"Dhritiman Das, Siddharth Deshmukh","doi":"10.1109/COMSNETS.2017.7945367","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945367","url":null,"abstract":"In this paper we investigate cooperative spectrum sensing technique in which double threshold based energy detection is used at local cognitive radio (CR) sensors. Cooperative spectrum sensing improves reliability in detection of underutilized spectrum by fusing the decisions of local CR sensors. Local CR sensors use two thresholds, λ<inf>1</inf> and λ<inf>2</inf> (with λ<inf>2</inf> > λ<inf>1</inf>). If the sensed energy is greater than λ<inf>2</inf> or less than λ<inf>1</inf> then with complete certainty local sensors decide for the presence or absence of primary user (PU) respectively. The difference between λ<inf>2</inf> and λ<inf>1</inf> defines the ambiguity region, i.e., Δ<inf>th</inf> = λ<inf>2</inf> — λ<inf>1</inf> in which local CRs are unable to decide the presence or absence of PU. In this work local sensors report the decision along with situation in which sensed energy falls in ambiguity region. In our analysis we use majority rule at the fusion center and compute an analytical expression of average probability of sensing error as a function of width of ambiguity region, i.e., Δ<inf>th</inf>. Using the derived analytical expression and by simulation we show that there exists an optimal value of Δ<inf>th</inf> for which the probability of sensing error is minimum.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"9 42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123807575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN 分析DDoS攻击行为,识别SDN网络的DDoS检测特征
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945387
Neelam Dayal, S. Srivastava
Software Defined Network (SDN) facilitates network programmers with easier network monitoring, identification of anomalies, instant implementation of changes, central control to the whole network in a cost effective and efficient manner. These features could be beneficial for securing and maintaining entire network. Being a promising network paradigm, it draws a lot of attention from researchers in security domain. But it's logically centralized control tends to single point of failure, increasing the risk of attacks such as Distributed Denial of Service (DDoS) attack. In this paper, we have tried to identify various possibilities of DDoS attacks in SDN environment with the help of attack tree and an attack model. Further, an attempt to analyze the impact of various traditional DDoS attacks on SDN components is done. Such analysis helps in identifying the type of DDoS attacks that impose bigger threat on SDN architecture and also the features that could play important role in identification of these attacks are deduced.
软件定义网络(SDN)使网络程序员更容易进行网络监控,识别异常,即时实施更改,以经济高效的方式对整个网络进行集中控制。这些特性对于保护和维护整个网络是有益的。作为一种极具发展前景的网络范式,它受到了安全领域研究者的广泛关注。但它在逻辑上的集中控制往往会导致单点故障,从而增加了分布式拒绝服务(DDoS)攻击等攻击的风险。在本文中,我们尝试通过攻击树和攻击模型来识别SDN环境下DDoS攻击的各种可能性。此外,还尝试分析了各种传统DDoS攻击对SDN组件的影响。这种分析有助于识别对SDN架构造成更大威胁的DDoS攻击类型,并推断出在识别这些攻击中可能发挥重要作用的特征。
{"title":"Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN","authors":"Neelam Dayal, S. Srivastava","doi":"10.1109/COMSNETS.2017.7945387","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945387","url":null,"abstract":"Software Defined Network (SDN) facilitates network programmers with easier network monitoring, identification of anomalies, instant implementation of changes, central control to the whole network in a cost effective and efficient manner. These features could be beneficial for securing and maintaining entire network. Being a promising network paradigm, it draws a lot of attention from researchers in security domain. But it's logically centralized control tends to single point of failure, increasing the risk of attacks such as Distributed Denial of Service (DDoS) attack. In this paper, we have tried to identify various possibilities of DDoS attacks in SDN environment with the help of attack tree and an attack model. Further, an attempt to analyze the impact of various traditional DDoS attacks on SDN components is done. Such analysis helps in identifying the type of DDoS attacks that impose bigger threat on SDN architecture and also the features that could play important role in identification of these attacks are deduced.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Network function placement on virtualized cellular cores 在虚拟蜂窝核心上放置网络功能
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945385
David Dietrich, C. Papagianni, Panagiotis Papadimitriou, J. Baras
The proliferation of mobiles devices, application sprawl, and the ever-increasing data volume generates significant stress on cellular networks and particularly on the cellular core, also known as the Evolved Packet Core (EPC). This is further exacerbated by the deployment of hardware appliances for the implementation of a wide range of network functions (e.g., gateways, mobility management, firewalls, network address translation), hindering any opportunity for elastic provisioning, and eventually leading to high operational costs and a significant degree of load imbalance across the EPC. Network Function Virtualization (NFV) has been seen a promising solution in order to enable elasticity in the cellular core. Applying NFV to the EPC raises the need for network function (NF) placement, which in turn entails significant challenges, due to the stringent delay budgets among cellular core components and the coexistence of communicating data and control plane elements. To address these challenges, we present a linear programming (LP) formulation for the computation of NF placements that strikes a balance between optimality and time complexity. Our evaluation results show that the LP achieves significantly better load balancing, request acceptance rate, and resource utilization compared to a greedy algorithm that performs NF placement inline with carriers' common practice today.
移动设备的激增、应用程序的蔓延和不断增加的数据量给蜂窝网络,特别是蜂窝核心(也称为演进分组核心(EPC))带来了巨大的压力。为实现广泛的网络功能(例如,网关、移动性管理、防火墙、网络地址转换)而部署的硬件设备进一步加剧了这种情况,阻碍了弹性供应的任何机会,并最终导致高运营成本和跨EPC的显著程度的负载不平衡。网络功能虚拟化(NFV)被认为是一种很有前途的解决方案,可以实现蜂窝核心的弹性。将NFV应用于EPC增加了对网络功能(NF)布局的需求,这反过来又带来了重大挑战,因为蜂窝核心组件之间的延迟预算严格,通信数据和控制平面元素共存。为了解决这些挑战,我们提出了一个用于计算NF位置的线性规划(LP)公式,该公式在最优性和时间复杂性之间取得了平衡。我们的评估结果表明,与贪婪算法相比,LP实现了更好的负载平衡、请求接受率和资源利用率,贪婪算法与运营商目前的常见做法相结合,执行NF放置。
{"title":"Network function placement on virtualized cellular cores","authors":"David Dietrich, C. Papagianni, Panagiotis Papadimitriou, J. Baras","doi":"10.1109/COMSNETS.2017.7945385","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945385","url":null,"abstract":"The proliferation of mobiles devices, application sprawl, and the ever-increasing data volume generates significant stress on cellular networks and particularly on the cellular core, also known as the Evolved Packet Core (EPC). This is further exacerbated by the deployment of hardware appliances for the implementation of a wide range of network functions (e.g., gateways, mobility management, firewalls, network address translation), hindering any opportunity for elastic provisioning, and eventually leading to high operational costs and a significant degree of load imbalance across the EPC. Network Function Virtualization (NFV) has been seen a promising solution in order to enable elasticity in the cellular core. Applying NFV to the EPC raises the need for network function (NF) placement, which in turn entails significant challenges, due to the stringent delay budgets among cellular core components and the coexistence of communicating data and control plane elements. To address these challenges, we present a linear programming (LP) formulation for the computation of NF placements that strikes a balance between optimality and time complexity. Our evaluation results show that the LP achieves significantly better load balancing, request acceptance rate, and resource utilization compared to a greedy algorithm that performs NF placement inline with carriers' common practice today.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"99 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115157871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Tiered attestation for Internet-of-Things (IoT) devices 物联网(IoT)设备的分层认证
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945438
G. Mandyam
Remote attestation is the procedure in which a relying party verifies the environment in which a device is carrying out cryptographic operations. Relying parties can leverage attestation data as part of their authentication and authorization procedures. However many Internet-of-Things (IoT) devices either do not have direct connectivity to relying parties, or may simply not be able to provide reliable attestation data. This paper introduces the concept of tiered attestation, where edge routing entities (i.e. gateways) can augment attestation data for relying parties while still accounting for limitations in the actual IoT devices.
远程认证是依赖方验证设备执行加密操作的环境的过程。依赖方可以利用认证数据作为其身份验证和授权过程的一部分。然而,许多物联网(IoT)设备要么没有与依赖方的直接连接,要么可能根本无法提供可靠的证明数据。本文介绍了分层认证的概念,其中边缘路由实体(即网关)可以为依赖方增加认证数据,同时仍然考虑到实际物联网设备中的限制。
{"title":"Tiered attestation for Internet-of-Things (IoT) devices","authors":"G. Mandyam","doi":"10.1109/COMSNETS.2017.7945438","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945438","url":null,"abstract":"Remote attestation is the procedure in which a relying party verifies the environment in which a device is carrying out cryptographic operations. Relying parties can leverage attestation data as part of their authentication and authorization procedures. However many Internet-of-Things (IoT) devices either do not have direct connectivity to relying parties, or may simply not be able to provide reliable attestation data. This paper introduces the concept of tiered attestation, where edge routing entities (i.e. gateways) can augment attestation data for relying parties while still accounting for limitations in the actual IoT devices.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116459019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why is 700 MHz band a good proposition for provisioning pan-India 4G LTE services?: A comparative techno-economic evaluation study 为什么700mhz频段是提供泛印度4G LTE服务的好选择?技术经济比较评价研究
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945381
Ashutosh Jha, Debashis Saha
Offering pan-India broadband connectivity over 4G LTE networks involves massive total cost of ownership (TCO) for the operators, which includes acquiring newer spectrum through an immensely competitive auction mechanism. Their bidding process usually follows an opportunity cost approach that attempts to trade off the investments in network infrastructure against the acquisition of bigger spectrum blocks in cost-effective bands. To help them understand better the effectiveness of the newly opened 700 MHz band in India, this paper compares the overall financial implications of deploying 4G LTE services on 700 MHz band with those on 1800 MHz and 2100 MHz bands over a 20-year horizon across 22 telecom circles. We use a combination of Okumara-Hata/Cost-231 model, cell-dimensioning approach and Bass model based adoption forecasts to determine coverage, capacity, and number of subscribers, respectively. After estimating the TCO and the revenue figures for all the three bands, we apply the discounted cash flow method to analyze their comparative profitability. Our results show that, in addition to giving better cellular coverage, 700 MHz is the most cost-effective band, its TCO being approximately one-fourth of that of 1800 MHz band, and one-sixth of that of 2100 MHz band. Moreover, the circle-wise profitability of 700 MHz is the highest amongst all the three bands, with maximum profitability being in Metro circles, followed by Category C circles. Interestingly, the potential for a better profitability in Category C circles, which are crucial to ensure the mandated last-mile coverage for rural villages, further increases the attractiveness of 700 MHz band. We also find that the smaller circles in Category B hold out better promises for profitability, compared to the larger circles in Category A. Hence, overall there is a genuine need for a consolidated approach in spectrum acquisition by an incumbent operator to reap synergistic benefit in aggregate profitability.
通过4G LTE网络提供泛印度宽带连接涉及运营商的巨额总拥有成本(TCO),其中包括通过竞争激烈的拍卖机制获得较新的频谱。他们的投标过程通常遵循机会成本方法,即试图在网络基础设施投资与收购成本效益高的频段中的更大频谱块之间进行权衡。为了帮助他们更好地了解印度新开放的700 MHz频段的有效性,本文比较了22个电信行业在20年内在700 MHz频段与1800 MHz和2100 MHz频段部署4G LTE服务的总体财务影响。我们使用Okumara-Hata/Cost-231模型、小区维度方法和基于采用预测的Bass模型的组合来分别确定覆盖范围、容量和用户数量。在估计了所有三个波段的TCO和收入数字之后,我们应用贴现现金流量法来分析它们的比较盈利能力。我们的研究结果表明,除了提供更好的蜂窝覆盖外,700 MHz是最具成本效益的频段,其TCO约为1800 MHz频段的四分之一,2100 MHz频段的六分之一。此外,700 MHz的循环盈利能力是所有三个频段中最高的,最大盈利能力是在城域圈,其次是C类圈。有趣的是,C类频段的盈利潜力更大,这对确保农村的最后一英里覆盖至关重要,进一步增加了700兆赫频段的吸引力。我们还发现,与a类中较大的圈子相比,B类中较小的圈子在盈利能力方面有更好的承诺。因此,总体而言,现有运营商在频谱获取方面确实需要采用统一的方法,以获得总盈利能力的协同效益。
{"title":"Why is 700 MHz band a good proposition for provisioning pan-India 4G LTE services?: A comparative techno-economic evaluation study","authors":"Ashutosh Jha, Debashis Saha","doi":"10.1109/COMSNETS.2017.7945381","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945381","url":null,"abstract":"Offering pan-India broadband connectivity over 4G LTE networks involves massive total cost of ownership (TCO) for the operators, which includes acquiring newer spectrum through an immensely competitive auction mechanism. Their bidding process usually follows an opportunity cost approach that attempts to trade off the investments in network infrastructure against the acquisition of bigger spectrum blocks in cost-effective bands. To help them understand better the effectiveness of the newly opened 700 MHz band in India, this paper compares the overall financial implications of deploying 4G LTE services on 700 MHz band with those on 1800 MHz and 2100 MHz bands over a 20-year horizon across 22 telecom circles. We use a combination of Okumara-Hata/Cost-231 model, cell-dimensioning approach and Bass model based adoption forecasts to determine coverage, capacity, and number of subscribers, respectively. After estimating the TCO and the revenue figures for all the three bands, we apply the discounted cash flow method to analyze their comparative profitability. Our results show that, in addition to giving better cellular coverage, 700 MHz is the most cost-effective band, its TCO being approximately one-fourth of that of 1800 MHz band, and one-sixth of that of 2100 MHz band. Moreover, the circle-wise profitability of 700 MHz is the highest amongst all the three bands, with maximum profitability being in Metro circles, followed by Category C circles. Interestingly, the potential for a better profitability in Category C circles, which are crucial to ensure the mandated last-mile coverage for rural villages, further increases the attractiveness of 700 MHz band. We also find that the smaller circles in Category B hold out better promises for profitability, compared to the larger circles in Category A. Hence, overall there is a genuine need for a consolidated approach in spectrum acquisition by an incumbent operator to reap synergistic benefit in aggregate profitability.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Energy saving in heterogeneous cellular network via transfer reinforcement learning based policy 基于迁移强化学习策略的异构蜂窝网络节能研究
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945411
Shreyata Sharma, S. Darak, A. Srivastava
Energy efficient operation of heterogeneous networks (HetNets) has become extremely crucial owing to their fast increasing deployment. This work presents a novel approach in which an actor-critic (AC) reinforcement learning (RL) framework is used to enable traffic based ON/OFF switching of base stations (BSs) in a HetNet leading to a reduction in overall energy consumption. Further, previously estimated traffic statistics is exploited in future scenarios which speeds up the learning process and provide additional improvement in energy saving. The presented scheme leads to up to 82% drop in energy consumption which is a quite significant amount. Furthermore, the analysis of system delay and energy saving trade-off is done.
由于异构网络(HetNets)的快速部署,其节能运行变得至关重要。这项工作提出了一种新颖的方法,其中使用行为-批评(AC)强化学习(RL)框架来实现基于HetNet中基站(BSs)开/关切换的流量,从而降低总体能耗。此外,先前估计的交通统计数据在未来的场景中被利用,这加快了学习过程,并在节能方面提供了额外的改进。所提出的方案导致高达82%的能源消耗下降,这是一个相当可观的数字。在此基础上,对系统延迟和节能权衡进行了分析。
{"title":"Energy saving in heterogeneous cellular network via transfer reinforcement learning based policy","authors":"Shreyata Sharma, S. Darak, A. Srivastava","doi":"10.1109/COMSNETS.2017.7945411","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945411","url":null,"abstract":"Energy efficient operation of heterogeneous networks (HetNets) has become extremely crucial owing to their fast increasing deployment. This work presents a novel approach in which an actor-critic (AC) reinforcement learning (RL) framework is used to enable traffic based ON/OFF switching of base stations (BSs) in a HetNet leading to a reduction in overall energy consumption. Further, previously estimated traffic statistics is exploited in future scenarios which speeds up the learning process and provide additional improvement in energy saving. The presented scheme leads to up to 82% drop in energy consumption which is a quite significant amount. Furthermore, the analysis of system delay and energy saving trade-off is done.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Epidemic model based evaluation of malware propagation in Twitter 基于流行模型的Twitter恶意软件传播评估
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945416
M. Giri, S. Jyothi, C. Vorugunti
Twitter, an Internet based social networking application has gained a tremendous popularity as a means of convenient social networking. The inherent structure and possibility of rapid information propagation provides an opportunity for adversaries to use Twitter as a medium to spread malware. It is critical to examine the data dissemination process in Twitter in terms of speed and reachability. Existing literature proposed a mathematical model for malware propagation in Twitter based on the malicious code propagation in Wireless Sensor Networks. In this context, we thought that the malicious code propagation model based on WSN doesn't suit for Twitter. Therefore, we have proposed a first of its kind of a mathematical framework for malware propagation in Twitter based on epidemic theory. Our preliminary analysis demonstrates that even with users having a lower degree of connectivity and lower probability of clicking links, Twitter and its communication structure can be exploited to spread malware and infect many accounts.
Twitter是一种基于Internet的社交网络应用程序,作为一种方便的社交网络手段获得了极大的普及。Twitter的固有结构和信息快速传播的可能性为攻击者提供了利用Twitter作为传播恶意软件的媒介的机会。从速度和可及性方面检查Twitter的数据传播过程是至关重要的。现有文献基于无线传感器网络中恶意代码的传播,提出了Twitter中恶意软件传播的数学模型。在这种情况下,我们认为基于WSN的恶意代码传播模型并不适合Twitter。因此,我们提出了一个基于流行理论的Twitter恶意软件传播的数学框架。我们的初步分析表明,即使用户的连接程度较低,点击链接的可能性较低,Twitter及其通信结构也可以被利用来传播恶意软件并感染许多账户。
{"title":"Epidemic model based evaluation of malware propagation in Twitter","authors":"M. Giri, S. Jyothi, C. Vorugunti","doi":"10.1109/COMSNETS.2017.7945416","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945416","url":null,"abstract":"Twitter, an Internet based social networking application has gained a tremendous popularity as a means of convenient social networking. The inherent structure and possibility of rapid information propagation provides an opportunity for adversaries to use Twitter as a medium to spread malware. It is critical to examine the data dissemination process in Twitter in terms of speed and reachability. Existing literature proposed a mathematical model for malware propagation in Twitter based on the malicious code propagation in Wireless Sensor Networks. In this context, we thought that the malicious code propagation model based on WSN doesn't suit for Twitter. Therefore, we have proposed a first of its kind of a mathematical framework for malware propagation in Twitter based on epidemic theory. Our preliminary analysis demonstrates that even with users having a lower degree of connectivity and lower probability of clicking links, Twitter and its communication structure can be exploited to spread malware and infect many accounts.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124235824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PHY layer security for IOT in κ-μ fading channel κ-μ衰落信道中物联网物理层安全性研究
Pub Date : 1900-01-01 DOI: 10.1109/COMSNETS.2017.7945436
A. Roy, Pranabesh Maji, Gowthamkrishnan Cherukuri, S. Kundu
In this paper, we analyze the secrecy performance of a two hop communication system with a Decode-and-Forward (DF) relay in a k-μ fading channel for Internet of Things (IOT) applications in the presence of an eavesdropper. The eavesdropper wiretaps from a single hop in the first case and from both the hops in second case. Analytical expressions for Secrecy Outage Probability (SOP) and Strictly Positive Secrecy Capacity (SPSC) have been derived. MATLAB based simulation has been carried out to evaluate the secrecy performance following our analytical formulation. Effects of channel and network parameters on secrecy performance are indicated.
在本文中,我们分析了一种在k μ衰落信道中具有译码转发(DF)中继的两跳通信系统在窃听者存在下的保密性能。在第一种情况下,窃听者从单跳进行窃听,在第二种情况下,窃听者从两个跳进行窃听。导出了保密中断概率(SOP)和严格正保密能力(SPSC)的解析表达式。根据我们的分析公式进行了基于MATLAB的仿真,以评估保密性能。指出了信道和网络参数对保密性能的影响。
{"title":"PHY layer security for IOT in κ-μ fading channel","authors":"A. Roy, Pranabesh Maji, Gowthamkrishnan Cherukuri, S. Kundu","doi":"10.1109/COMSNETS.2017.7945436","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945436","url":null,"abstract":"In this paper, we analyze the secrecy performance of a two hop communication system with a Decode-and-Forward (DF) relay in a k-μ fading channel for Internet of Things (IOT) applications in the presence of an eavesdropper. The eavesdropper wiretaps from a single hop in the first case and from both the hops in second case. Analytical expressions for Secrecy Outage Probability (SOP) and Strictly Positive Secrecy Capacity (SPSC) have been derived. MATLAB based simulation has been carried out to evaluate the secrecy performance following our analytical formulation. Effects of channel and network parameters on secrecy performance are indicated.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126986821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 9th International Conference on Communication Systems and Networks (COMSNETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1