Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7511563
M. Senouci, S. Hoceini, A. Mellouk
In Heterogeneous Wireless Networks (HWNs), the mobile terminals are equipped with multiple access network interfaces (GSM, UMTS, LTE, WiFi, Bluetooth, etc.), to provide the possibility for mobile end-users to rank the networks and dynamically select the best one at anytime and anywhere, which is well known as Always Best Connected (ABC). In such environment, the major issue is network interface selection, which is a decision making problem with multiple alternatives (networks) and attributes (network characteristics, application requirements, terminal capacities, and user needs). In this context, many approaches have been proposed. Multi Attribute Decision Making (MADM) algorithms present a promising solution for multi-criteria decision making problems. Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is one of MADM algorithms, which is widely adopted. TOPSIS ranks the available networks based on their scores, with the highest being the best. TOPSIS suffers from couple limitations. First is the ranking abnormality, e.g. if a low ranking network is disconnected then the order of higher ranking networks changes, which results in the selection of a less desirable network. Second is the selection strategy, where TOPSIS simply selects the network with highest score regardless of whether or not it satisfies the user and/or application needs. In this paper, we propose a new strategy based on utility function to remedy these shortcomings. The effectiveness of our strategy is evaluated through simulations. Obtained results show clearly that our strategy eliminates the rank reversal (ranking abnormality) phenomenon, and enhances the ranking quality by considering application and/or user needs.
在异构无线网络(HWNs)中,移动终端配备了多种接入网络接口(GSM、UMTS、LTE、WiFi、蓝牙等),为移动终端用户提供了随时随地对网络进行排序和动态选择最佳网络的可能性,这就是我们所熟知的“始终最佳连接”(Always best Connected, ABC)。在这种环境下,主要的问题是网络接口的选择,这是一个具有多种选择(网络)和属性(网络特性、应用需求、终端容量和用户需求)的决策问题。在这方面,已经提出了许多方法。多属性决策算法为多准则决策问题提供了一种很有前途的解决方案。TOPSIS (Order Preference Technique of Similarity to Ideal Solution)是MADM算法中应用最广泛的一种。TOPSIS根据得分对可用的网络进行排名,得分最高的就是最好的。TOPSIS受到一对夫妇的限制。首先是排序异常,如果低排序网络断开,那么高排序网络的顺序会发生变化,从而导致选择不太理想的网络。第二是选择策略,TOPSIS简单地选择得分最高的网络,而不管它是否满足用户和/或应用程序的需求。本文提出了一种基于效用函数的策略来弥补这些不足。通过仿真对策略的有效性进行了评价。得到的结果清楚地表明,我们的策略消除了排名反转(排名异常)现象,并通过考虑应用和/或用户需求来提高排名质量。
{"title":"Utility function-based TOPSIS for network interface selection in Heterogeneous Wireless Networks","authors":"M. Senouci, S. Hoceini, A. Mellouk","doi":"10.1109/ICC.2016.7511563","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511563","url":null,"abstract":"In Heterogeneous Wireless Networks (HWNs), the mobile terminals are equipped with multiple access network interfaces (GSM, UMTS, LTE, WiFi, Bluetooth, etc.), to provide the possibility for mobile end-users to rank the networks and dynamically select the best one at anytime and anywhere, which is well known as Always Best Connected (ABC). In such environment, the major issue is network interface selection, which is a decision making problem with multiple alternatives (networks) and attributes (network characteristics, application requirements, terminal capacities, and user needs). In this context, many approaches have been proposed. Multi Attribute Decision Making (MADM) algorithms present a promising solution for multi-criteria decision making problems. Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is one of MADM algorithms, which is widely adopted. TOPSIS ranks the available networks based on their scores, with the highest being the best. TOPSIS suffers from couple limitations. First is the ranking abnormality, e.g. if a low ranking network is disconnected then the order of higher ranking networks changes, which results in the selection of a less desirable network. Second is the selection strategy, where TOPSIS simply selects the network with highest score regardless of whether or not it satisfies the user and/or application needs. In this paper, we propose a new strategy based on utility function to remedy these shortcomings. The effectiveness of our strategy is evaluated through simulations. Obtained results show clearly that our strategy eliminates the rank reversal (ranking abnormality) phenomenon, and enhances the ranking quality by considering application and/or user needs.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7511091
Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang
Noise aggregation is an efficient way of aggregating the inherent noises introduced during wireless transmissions over multiple channels to degrade the eavesdropper's channel quality. While the performance of channel aggregation has not been thoroughly studied over wireless fading channels, we in this paper concentrating on analyses of its achievable average secrecy rate with emphasis on binary symmetric channel (BSC), whose cross-over probability is a time-varying process. The advantage of noise aggregation over traditional transmission in fading environments is demonstrated by our analyses and simulations. Simulation results show that the noise aggregation scheme can achieve a remarkable increase in terms of average secrecy rate even if the eavesdropper has better average channel quality than the legitimate receiver.
{"title":"On achievable secrecy rate by noise aggregation over wireless fading channels","authors":"Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang","doi":"10.1109/ICC.2016.7511091","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511091","url":null,"abstract":"Noise aggregation is an efficient way of aggregating the inherent noises introduced during wireless transmissions over multiple channels to degrade the eavesdropper's channel quality. While the performance of channel aggregation has not been thoroughly studied over wireless fading channels, we in this paper concentrating on analyses of its achievable average secrecy rate with emphasis on binary symmetric channel (BSC), whose cross-over probability is a time-varying process. The advantage of noise aggregation over traditional transmission in fading environments is demonstrated by our analyses and simulations. Simulation results show that the noise aggregation scheme can achieve a remarkable increase in terms of average secrecy rate even if the eavesdropper has better average channel quality than the legitimate receiver.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124443930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7510901
R. Ganti, M. Haenggi
In this paper, we consider cellular networks with the base station locations modeled by a Poisson point process. However, unlike earlier works, we consider the cases of no fading and partial fading and analyze the asymptotic behavior of the distribution of the downlink signal-to-interference ratio (SIR) of a typical user. This non-fading case has been elusive since the standard Laplace trick cannot be used. We provide the asymptotics of the SIR distribution FSIR(θ) = P(SIR <; θ) as θ → 0 for the cases of no-fading and partial fading, where only the interfering base stations are subject to fading. We also introduce a new point process-the squared relative distance process-that facilitates the asymptotic analysis of the SIR and expedites simulations.
{"title":"SIR asymptotics in poisson cellular networks without fading and with partial fading","authors":"R. Ganti, M. Haenggi","doi":"10.1109/ICC.2016.7510901","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510901","url":null,"abstract":"In this paper, we consider cellular networks with the base station locations modeled by a Poisson point process. However, unlike earlier works, we consider the cases of no fading and partial fading and analyze the asymptotic behavior of the distribution of the downlink signal-to-interference ratio (SIR) of a typical user. This non-fading case has been elusive since the standard Laplace trick cannot be used. We provide the asymptotics of the SIR distribution FSIR(θ) = P(SIR <; θ) as θ → 0 for the cases of no-fading and partial fading, where only the interfering base stations are subject to fading. We also introduce a new point process-the squared relative distance process-that facilitates the asymptotic analysis of the SIR and expedites simulations.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7511605
Chenwei Liu, Jiawei Wang, Kai Lei
The high popularity of Weibo has greatly enriched people's lives, allowing online users to share their feelings through posting comments. However, more and more spam comments are also being posted in users' blogs on this social media. In this paper, in order to effectively detect spam comments in Chinese micro-blogs, we introduce semantic analysis to construct a Self-Extensible Spam Dictionary which automatically expands itself when new words emerge on the micro-blogs frequently. The use of semantic analysis can provide us with additional features which are beneficial to detecting spam comments. A Proportion-Weight Filter (PWF) model is also proposed to detect two kinds of spam comments (AD and vulgar comments), by filtering the spam-weight and the spam-proportion of the Weibo comments based on our Self-Extensible Spam Dictionary criteria. Our experimental results demonstrate that when detecting a combination of both AD and vulgar spam comments, we can achieve an average detection accuracy of 87.9%. Particularly for AD spam comments detection, we can achieve an average accuracy of 96.2%, which is preferable compared to when using machine learning methods. The statistical analysis of the results verifies that our proposed methods can identify the spam comments effectively and to relatively high degrees of accuracy.
{"title":"Detecting spam comments posted in micro-blogs using the self-extensible spam dictionary","authors":"Chenwei Liu, Jiawei Wang, Kai Lei","doi":"10.1109/ICC.2016.7511605","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511605","url":null,"abstract":"The high popularity of Weibo has greatly enriched people's lives, allowing online users to share their feelings through posting comments. However, more and more spam comments are also being posted in users' blogs on this social media. In this paper, in order to effectively detect spam comments in Chinese micro-blogs, we introduce semantic analysis to construct a Self-Extensible Spam Dictionary which automatically expands itself when new words emerge on the micro-blogs frequently. The use of semantic analysis can provide us with additional features which are beneficial to detecting spam comments. A Proportion-Weight Filter (PWF) model is also proposed to detect two kinds of spam comments (AD and vulgar comments), by filtering the spam-weight and the spam-proportion of the Weibo comments based on our Self-Extensible Spam Dictionary criteria. Our experimental results demonstrate that when detecting a combination of both AD and vulgar spam comments, we can achieve an average detection accuracy of 87.9%. Particularly for AD spam comments detection, we can achieve an average accuracy of 96.2%, which is preferable compared to when using machine learning methods. The statistical analysis of the results verifies that our proposed methods can identify the spam comments effectively and to relatively high degrees of accuracy.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115128958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7511229
Daehyun Ban, Sangsoon Lim, Woojin Park, Chong-kwon Kim
This paper deals with the problem of severe wireless performance degradation when multiple wireless technologies are concurrently utilized in a same user device. This type of usage is already frequent in most smartphones and laptops, such as streaming Bluetooth audio while using a Wi-Fi download, and is more intensifying with IoT device deployment which triggers the coexistence of heterogeneous wireless technologies. To lower the form factor and the cost, chip vendors package multiple wireless interfaces into a single combo-chip where a common antenna is shared by multiple network technologies in a time division multiplexing manner. We issue that the careless operations of combo-chip design incur indeed performance degradation for in-device wireless coexistence and show the experimental results via TCP performance measurements in several smartphones and laptops. Our analysis reveals that the behavior negatively affects not only on the transmit power management of wireless access point, but also on the congestion control of TCP sender. We propose a cooperative switching scheme which incorporates TCP control behaviors for better coexistence and implement it on Android and Linux devices. Under the simultaneous use of in-device network interfaces, our approach led a WLAN throughput increment up to eight times without the mentioned issues. Further, this does not require any modification of TCP sender and wireless access point. Thus, the approach is directly applicable to existing mobile devices and also easily extendable to the combination of other in-device wireless technologies.
{"title":"The synergic enhancement of coexistence performance in wireless mobile combo-chips","authors":"Daehyun Ban, Sangsoon Lim, Woojin Park, Chong-kwon Kim","doi":"10.1109/ICC.2016.7511229","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511229","url":null,"abstract":"This paper deals with the problem of severe wireless performance degradation when multiple wireless technologies are concurrently utilized in a same user device. This type of usage is already frequent in most smartphones and laptops, such as streaming Bluetooth audio while using a Wi-Fi download, and is more intensifying with IoT device deployment which triggers the coexistence of heterogeneous wireless technologies. To lower the form factor and the cost, chip vendors package multiple wireless interfaces into a single combo-chip where a common antenna is shared by multiple network technologies in a time division multiplexing manner. We issue that the careless operations of combo-chip design incur indeed performance degradation for in-device wireless coexistence and show the experimental results via TCP performance measurements in several smartphones and laptops. Our analysis reveals that the behavior negatively affects not only on the transmit power management of wireless access point, but also on the congestion control of TCP sender. We propose a cooperative switching scheme which incorporates TCP control behaviors for better coexistence and implement it on Android and Linux devices. Under the simultaneous use of in-device network interfaces, our approach led a WLAN throughput increment up to eight times without the mentioned issues. Further, this does not require any modification of TCP sender and wireless access point. Thus, the approach is directly applicable to existing mobile devices and also easily extendable to the combination of other in-device wireless technologies.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7511579
Chia-Yu Chang, Ruggero Schiavi, N. Nikaein, T. Spyropoulos, C. Bonnet
Cloud-RAN (CRAN) is considered as one key enabler for beyond 4G networks, offering multiplexing gains, and advanced cooperation and coordinated signal processing. However, a key obstacle in the adoption of the CRAN architecture is that it requires very high capacity and low latency fronthaul (FH) links to carry raw I/Q samples between remote radio heads (RRH) and the baseband units (BBUs). These capacity requirements could be reduced by a more flexible split of baseband processing between BBUs and RRHs. Nevertheless, while moving some of the processing back into the RRH is expected to reduce FH rates, the amount of reduction mainly depends on the split, cell load, scenario and it might also introduce some delays. To this end, this paper studies the impact of different functional splits on the FH capacity for representative scenarios. Furthermore, we propose the use of a packet-based fronthaul network and study the joint impact of different packetization methods and RRH-BBU functional splits on the FH rate and latency. Based on this study, we provide some insights on the feasibility and optimality of different combinations, and the potential multiplexing benefits in terms of numbers of RRHs one could support over a single Ethernet-based FH network.
云- ran (CRAN)被认为是超越4G网络的关键推动者,提供多路复用增益、高级合作和协调信号处理。然而,采用CRAN架构的一个关键障碍是,它需要非常高容量和低延迟的前传(FH)链路来在远程无线电头(RRH)和基带单元(bbu)之间传输原始I/Q样本。通过在bbu和rrh之间更灵活地分割基带处理,可以减少这些容量需求。然而,虽然将一些处理移回RRH有望降低跳频率,但减少的数量主要取决于分裂、单元负载和场景,并且还可能引入一些延迟。为此,本文研究了不同功能分割对代表性场景跳频容量的影响。此外,我们建议使用基于分组的前传网络,并研究了不同的分组方法和RRH-BBU功能分裂对跳频速率和延迟的共同影响。基于这项研究,我们提供了一些关于不同组合的可行性和最优性的见解,以及在基于单个以太网的跳频网络上可以支持的rrh数量方面的潜在多路复用优势。
{"title":"Impact of packetization and functional split on C-RAN fronthaul performance","authors":"Chia-Yu Chang, Ruggero Schiavi, N. Nikaein, T. Spyropoulos, C. Bonnet","doi":"10.1109/ICC.2016.7511579","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511579","url":null,"abstract":"Cloud-RAN (CRAN) is considered as one key enabler for beyond 4G networks, offering multiplexing gains, and advanced cooperation and coordinated signal processing. However, a key obstacle in the adoption of the CRAN architecture is that it requires very high capacity and low latency fronthaul (FH) links to carry raw I/Q samples between remote radio heads (RRH) and the baseband units (BBUs). These capacity requirements could be reduced by a more flexible split of baseband processing between BBUs and RRHs. Nevertheless, while moving some of the processing back into the RRH is expected to reduce FH rates, the amount of reduction mainly depends on the split, cell load, scenario and it might also introduce some delays. To this end, this paper studies the impact of different functional splits on the FH capacity for representative scenarios. Furthermore, we propose the use of a packet-based fronthaul network and study the joint impact of different packetization methods and RRH-BBU functional splits on the FH rate and latency. Based on this study, we provide some insights on the feasibility and optimality of different combinations, and the potential multiplexing benefits in terms of numbers of RRHs one could support over a single Ethernet-based FH network.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115022970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7510699
D. Niyato, Xiao Lu, Ping Wang, Dong In Kim, Zhu Han
A wireless powered communication network is a potential application of wireless energy harvesting to improve convenience and flexibility. However, wireless energy transfer from a wireless energy source has to be scheduled to minimize energy usage while meeting quality of service (QoS) requirements of sensor nodes in the network. In this paper, we consider wireless powered sensor network whose sensor nodes have auxiliary energy sources in addition to dedicated wireless energy transfer. We propose a distributed wireless energy transfer scheduling to achieve the aforementioned objective and meet the requirements. We formulate a constrained stochastic game model to obtain a multi-policy constrained Nash equilibrium of wireless energy transfer request. This equilibrium instructs the sensor node to request for wireless energy transfer based on its local state. The performance evaluation shows that the analytical model is well verified by numerical simulations.
{"title":"Distributed wireless energy scheduling for wireless powered sensor networks","authors":"D. Niyato, Xiao Lu, Ping Wang, Dong In Kim, Zhu Han","doi":"10.1109/ICC.2016.7510699","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510699","url":null,"abstract":"A wireless powered communication network is a potential application of wireless energy harvesting to improve convenience and flexibility. However, wireless energy transfer from a wireless energy source has to be scheduled to minimize energy usage while meeting quality of service (QoS) requirements of sensor nodes in the network. In this paper, we consider wireless powered sensor network whose sensor nodes have auxiliary energy sources in addition to dedicated wireless energy transfer. We propose a distributed wireless energy transfer scheduling to achieve the aforementioned objective and meet the requirements. We formulate a constrained stochastic game model to obtain a multi-policy constrained Nash equilibrium of wireless energy transfer request. This equilibrium instructs the sensor node to request for wireless energy transfer based on its local state. The performance evaluation shows that the analytical model is well verified by numerical simulations.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7511426
Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Limin Sun
Nowadays industrial control devices are crucial for infrastructure-critical systems such as factories, power plants, and water treatment facilities. Devices with IP addresses are visible on the Internet and they connect cyber space and physical world. The first step in protecting devices from attackers is a deep understanding of the devices' characteristics in the cyber space. In this paper, we take a first step in this direction by investigating physical devices running one of the two specific protocols that are widely adopted in industrial control systems. In order to detect these devices in real-time, we propose a two-stage discovery mechanism: first filtering out unqualified hosts from 4 billion remote hosts and then identifying physical devices from qualified candidates. We have conducted a real-world experiment to verify the mechanism and identified dozens of thousands of physical devices from the entire Internet. Results show that our method discovers all devices in 20 hours with 89.5% precision and 79.3% recall.
{"title":"Identification of visible industrial control devices at Internet scale","authors":"Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Limin Sun","doi":"10.1109/ICC.2016.7511426","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511426","url":null,"abstract":"Nowadays industrial control devices are crucial for infrastructure-critical systems such as factories, power plants, and water treatment facilities. Devices with IP addresses are visible on the Internet and they connect cyber space and physical world. The first step in protecting devices from attackers is a deep understanding of the devices' characteristics in the cyber space. In this paper, we take a first step in this direction by investigating physical devices running one of the two specific protocols that are widely adopted in industrial control systems. In order to detect these devices in real-time, we propose a two-stage discovery mechanism: first filtering out unqualified hosts from 4 billion remote hosts and then identifying physical devices from qualified candidates. We have conducted a real-world experiment to verify the mechanism and identified dozens of thousands of physical devices from the entire Internet. Results show that our method discovers all devices in 20 hours with 89.5% precision and 79.3% recall.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7511623
Yahia R. Ramadan, A. Ibrahim, M. Khairy
Due to the tiny wavelength of millimeter waves (mmWave), tens of antennas can be packed into a small area in mmWave transceivers. However, implementing a radio-frequency (RF) chain for each antenna is impractical due to the high cost and power of mixed-signal devices. To reduce the cost and get benefit from the antennas, an analog RF beamformer is implemented using variable gain amplifiers and analog phase shifters. In this paper, we design the RF precoder for physical layer security. We consider two degrees of channel knowledge at the transmitter. For full channel knowledge at the transmitter, the RF precoder is optimized to maximize the secrecy rate. Two solution algorithms, with different computational complexity, are proposed based on semidefinite relaxation and gradient ascent. For partial channel knowledge at the transmitter, the RF precoder is designed to maximize the secrecy rate under secrecy outage constraint. The problem is safely approximated, and solved by a gradient ascent algorithm within bisection search. Numerical results show that the proposed algorithms converge quickly, and outperform the conventional secrecy schemes.
{"title":"RF beamforming for secrecy millimeter wave MISO-OFDM systems","authors":"Yahia R. Ramadan, A. Ibrahim, M. Khairy","doi":"10.1109/ICC.2016.7511623","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511623","url":null,"abstract":"Due to the tiny wavelength of millimeter waves (mmWave), tens of antennas can be packed into a small area in mmWave transceivers. However, implementing a radio-frequency (RF) chain for each antenna is impractical due to the high cost and power of mixed-signal devices. To reduce the cost and get benefit from the antennas, an analog RF beamformer is implemented using variable gain amplifiers and analog phase shifters. In this paper, we design the RF precoder for physical layer security. We consider two degrees of channel knowledge at the transmitter. For full channel knowledge at the transmitter, the RF precoder is optimized to maximize the secrecy rate. Two solution algorithms, with different computational complexity, are proposed based on semidefinite relaxation and gradient ascent. For partial channel knowledge at the transmitter, the RF precoder is designed to maximize the secrecy rate under secrecy outage constraint. The problem is safely approximated, and solved by a gradient ascent algorithm within bisection search. Numerical results show that the proposed algorithms converge quickly, and outperform the conventional secrecy schemes.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.1109/ICC.2016.7510705
S. Biswas, Satyanarayana Vuppala, J. Xue, T. Ratnarajah
The potential benefits of deploying relays in outdoor millimeter-wave (mmWave) networks are investigated. We derive the coverage probability from sources to a typical destination for such systems aided by relays. The sources and the relays are modeled as independent homogeneous Poisson point processes. We present a relay modeling technique for mmWave networks considering blockages and compute the density of active relays that aid the transmission. Closed form expressions for end-to-end signal to noise ratio for two relay selection techniques, namely best path selection and best relay selection are derived. Finally, we analyze the coverage probability and transmission capacity of the network and validate them with simulation results. Our results show that the coverage probability and transmission capacity of mmWave systems, which are often affected by extensive blockages can be increased considerably with the aid of relays.
{"title":"An analysis on relay assisted millimeter wave networks","authors":"S. Biswas, Satyanarayana Vuppala, J. Xue, T. Ratnarajah","doi":"10.1109/ICC.2016.7510705","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510705","url":null,"abstract":"The potential benefits of deploying relays in outdoor millimeter-wave (mmWave) networks are investigated. We derive the coverage probability from sources to a typical destination for such systems aided by relays. The sources and the relays are modeled as independent homogeneous Poisson point processes. We present a relay modeling technique for mmWave networks considering blockages and compute the density of active relays that aid the transmission. Closed form expressions for end-to-end signal to noise ratio for two relay selection techniques, namely best path selection and best relay selection are derived. Finally, we analyze the coverage probability and transmission capacity of the network and validate them with simulation results. Our results show that the coverage probability and transmission capacity of mmWave systems, which are often affected by extensive blockages can be increased considerably with the aid of relays.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117273100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}