首页 > 最新文献

2016 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Utility function-based TOPSIS for network interface selection in Heterogeneous Wireless Networks 异构无线网络中基于实用函数的TOPSIS网络接口选择
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511563
M. Senouci, S. Hoceini, A. Mellouk
In Heterogeneous Wireless Networks (HWNs), the mobile terminals are equipped with multiple access network interfaces (GSM, UMTS, LTE, WiFi, Bluetooth, etc.), to provide the possibility for mobile end-users to rank the networks and dynamically select the best one at anytime and anywhere, which is well known as Always Best Connected (ABC). In such environment, the major issue is network interface selection, which is a decision making problem with multiple alternatives (networks) and attributes (network characteristics, application requirements, terminal capacities, and user needs). In this context, many approaches have been proposed. Multi Attribute Decision Making (MADM) algorithms present a promising solution for multi-criteria decision making problems. Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is one of MADM algorithms, which is widely adopted. TOPSIS ranks the available networks based on their scores, with the highest being the best. TOPSIS suffers from couple limitations. First is the ranking abnormality, e.g. if a low ranking network is disconnected then the order of higher ranking networks changes, which results in the selection of a less desirable network. Second is the selection strategy, where TOPSIS simply selects the network with highest score regardless of whether or not it satisfies the user and/or application needs. In this paper, we propose a new strategy based on utility function to remedy these shortcomings. The effectiveness of our strategy is evaluated through simulations. Obtained results show clearly that our strategy eliminates the rank reversal (ranking abnormality) phenomenon, and enhances the ranking quality by considering application and/or user needs.
在异构无线网络(HWNs)中,移动终端配备了多种接入网络接口(GSM、UMTS、LTE、WiFi、蓝牙等),为移动终端用户提供了随时随地对网络进行排序和动态选择最佳网络的可能性,这就是我们所熟知的“始终最佳连接”(Always best Connected, ABC)。在这种环境下,主要的问题是网络接口的选择,这是一个具有多种选择(网络)和属性(网络特性、应用需求、终端容量和用户需求)的决策问题。在这方面,已经提出了许多方法。多属性决策算法为多准则决策问题提供了一种很有前途的解决方案。TOPSIS (Order Preference Technique of Similarity to Ideal Solution)是MADM算法中应用最广泛的一种。TOPSIS根据得分对可用的网络进行排名,得分最高的就是最好的。TOPSIS受到一对夫妇的限制。首先是排序异常,如果低排序网络断开,那么高排序网络的顺序会发生变化,从而导致选择不太理想的网络。第二是选择策略,TOPSIS简单地选择得分最高的网络,而不管它是否满足用户和/或应用程序的需求。本文提出了一种基于效用函数的策略来弥补这些不足。通过仿真对策略的有效性进行了评价。得到的结果清楚地表明,我们的策略消除了排名反转(排名异常)现象,并通过考虑应用和/或用户需求来提高排名质量。
{"title":"Utility function-based TOPSIS for network interface selection in Heterogeneous Wireless Networks","authors":"M. Senouci, S. Hoceini, A. Mellouk","doi":"10.1109/ICC.2016.7511563","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511563","url":null,"abstract":"In Heterogeneous Wireless Networks (HWNs), the mobile terminals are equipped with multiple access network interfaces (GSM, UMTS, LTE, WiFi, Bluetooth, etc.), to provide the possibility for mobile end-users to rank the networks and dynamically select the best one at anytime and anywhere, which is well known as Always Best Connected (ABC). In such environment, the major issue is network interface selection, which is a decision making problem with multiple alternatives (networks) and attributes (network characteristics, application requirements, terminal capacities, and user needs). In this context, many approaches have been proposed. Multi Attribute Decision Making (MADM) algorithms present a promising solution for multi-criteria decision making problems. Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is one of MADM algorithms, which is widely adopted. TOPSIS ranks the available networks based on their scores, with the highest being the best. TOPSIS suffers from couple limitations. First is the ranking abnormality, e.g. if a low ranking network is disconnected then the order of higher ranking networks changes, which results in the selection of a less desirable network. Second is the selection strategy, where TOPSIS simply selects the network with highest score regardless of whether or not it satisfies the user and/or application needs. In this paper, we propose a new strategy based on utility function to remedy these shortcomings. The effectiveness of our strategy is evaluated through simulations. Obtained results show clearly that our strategy eliminates the rank reversal (ranking abnormality) phenomenon, and enhances the ranking quality by considering application and/or user needs.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
On achievable secrecy rate by noise aggregation over wireless fading channels 基于噪声聚合的无线衰落信道保密率研究
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511091
Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang
Noise aggregation is an efficient way of aggregating the inherent noises introduced during wireless transmissions over multiple channels to degrade the eavesdropper's channel quality. While the performance of channel aggregation has not been thoroughly studied over wireless fading channels, we in this paper concentrating on analyses of its achievable average secrecy rate with emphasis on binary symmetric channel (BSC), whose cross-over probability is a time-varying process. The advantage of noise aggregation over traditional transmission in fading environments is demonstrated by our analyses and simulations. Simulation results show that the noise aggregation scheme can achieve a remarkable increase in terms of average secrecy rate even if the eavesdropper has better average channel quality than the legitimate receiver.
噪声聚合是将多信道无线传输过程中引入的固有噪声进行聚合以降低窃听者信道质量的一种有效方法。由于对无线衰落信道的信道聚合性能研究还不够深入,本文重点分析了其可实现的平均保密率,并着重研究了交叉概率是时变过程的二进制对称信道。通过分析和仿真,证明了在衰落环境下噪声聚合优于传统传输的优点。仿真结果表明,即使窃听者的平均信道质量优于合法接收方,噪声聚合方案也能显著提高平均保密率。
{"title":"On achievable secrecy rate by noise aggregation over wireless fading channels","authors":"Qian Xu, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang","doi":"10.1109/ICC.2016.7511091","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511091","url":null,"abstract":"Noise aggregation is an efficient way of aggregating the inherent noises introduced during wireless transmissions over multiple channels to degrade the eavesdropper's channel quality. While the performance of channel aggregation has not been thoroughly studied over wireless fading channels, we in this paper concentrating on analyses of its achievable average secrecy rate with emphasis on binary symmetric channel (BSC), whose cross-over probability is a time-varying process. The advantage of noise aggregation over traditional transmission in fading environments is demonstrated by our analyses and simulations. Simulation results show that the noise aggregation scheme can achieve a remarkable increase in terms of average secrecy rate even if the eavesdropper has better average channel quality than the legitimate receiver.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124443930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SIR asymptotics in poisson cellular networks without fading and with partial fading 无衰落和部分衰落泊松细胞网络的SIR渐近性
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510901
R. Ganti, M. Haenggi
In this paper, we consider cellular networks with the base station locations modeled by a Poisson point process. However, unlike earlier works, we consider the cases of no fading and partial fading and analyze the asymptotic behavior of the distribution of the downlink signal-to-interference ratio (SIR) of a typical user. This non-fading case has been elusive since the standard Laplace trick cannot be used. We provide the asymptotics of the SIR distribution FSIR(θ) = P(SIR <; θ) as θ → 0 for the cases of no-fading and partial fading, where only the interfering base stations are subject to fading. We also introduce a new point process-the squared relative distance process-that facilitates the asymptotic analysis of the SIR and expedites simulations.
本文考虑了用泊松点过程建模基站位置的蜂窝网络。然而,与先前的工作不同,我们考虑了无衰落和部分衰落的情况,并分析了典型用户的下行信干扰比(SIR)分布的渐近行为。这种非衰落的情况是难以捉摸的,因为不能使用标准拉普拉斯技巧。给出了SIR分布的渐近性FSIR(θ) = P(SIR <;在无衰落和部分衰落情况下,θ)为θ→0,其中只有干扰基站受到衰落。我们还引入了一个新的点过程,即相对距离的平方过程,这有利于SIR的渐近分析,并加快了模拟速度。
{"title":"SIR asymptotics in poisson cellular networks without fading and with partial fading","authors":"R. Ganti, M. Haenggi","doi":"10.1109/ICC.2016.7510901","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510901","url":null,"abstract":"In this paper, we consider cellular networks with the base station locations modeled by a Poisson point process. However, unlike earlier works, we consider the cases of no fading and partial fading and analyze the asymptotic behavior of the distribution of the downlink signal-to-interference ratio (SIR) of a typical user. This non-fading case has been elusive since the standard Laplace trick cannot be used. We provide the asymptotics of the SIR distribution FSIR(θ) = P(SIR <; θ) as θ → 0 for the cases of no-fading and partial fading, where only the interfering base stations are subject to fading. We also introduce a new point process-the squared relative distance process-that facilitates the asymptotic analysis of the SIR and expedites simulations.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting spam comments posted in micro-blogs using the self-extensible spam dictionary 利用自扩展垃圾邮件字典检测微博上的垃圾评论
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511605
Chenwei Liu, Jiawei Wang, Kai Lei
The high popularity of Weibo has greatly enriched people's lives, allowing online users to share their feelings through posting comments. However, more and more spam comments are also being posted in users' blogs on this social media. In this paper, in order to effectively detect spam comments in Chinese micro-blogs, we introduce semantic analysis to construct a Self-Extensible Spam Dictionary which automatically expands itself when new words emerge on the micro-blogs frequently. The use of semantic analysis can provide us with additional features which are beneficial to detecting spam comments. A Proportion-Weight Filter (PWF) model is also proposed to detect two kinds of spam comments (AD and vulgar comments), by filtering the spam-weight and the spam-proportion of the Weibo comments based on our Self-Extensible Spam Dictionary criteria. Our experimental results demonstrate that when detecting a combination of both AD and vulgar spam comments, we can achieve an average detection accuracy of 87.9%. Particularly for AD spam comments detection, we can achieve an average accuracy of 96.2%, which is preferable compared to when using machine learning methods. The statistical analysis of the results verifies that our proposed methods can identify the spam comments effectively and to relatively high degrees of accuracy.
微博的高度普及极大地丰富了人们的生活,允许在线用户通过发表评论来分享他们的感受。然而,在这个社交媒体上,用户的博客上也出现了越来越多的垃圾评论。为了有效地检测中文微博中的垃圾评论,本文引入语义分析,构建了一个自扩展的垃圾评论词典,该词典在微博频繁出现新词时自动扩展。使用语义分析可以为我们提供额外的功能,这些功能有助于检测垃圾评论。提出了一种比例权重过滤器(PWF)模型,通过基于自扩展垃圾邮件词典标准对微博评论的垃圾邮件权重和垃圾邮件比例进行过滤,检测两种垃圾邮件评论(AD和庸俗评论)。我们的实验结果表明,当我们同时检测广告和低俗垃圾评论时,我们可以达到87.9%的平均检测准确率。特别是对于广告垃圾评论检测,我们可以达到96.2%的平均准确率,这比使用机器学习方法更可取。统计分析结果表明,本文提出的方法能够有效地识别垃圾评论,并具有较高的准确率。
{"title":"Detecting spam comments posted in micro-blogs using the self-extensible spam dictionary","authors":"Chenwei Liu, Jiawei Wang, Kai Lei","doi":"10.1109/ICC.2016.7511605","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511605","url":null,"abstract":"The high popularity of Weibo has greatly enriched people's lives, allowing online users to share their feelings through posting comments. However, more and more spam comments are also being posted in users' blogs on this social media. In this paper, in order to effectively detect spam comments in Chinese micro-blogs, we introduce semantic analysis to construct a Self-Extensible Spam Dictionary which automatically expands itself when new words emerge on the micro-blogs frequently. The use of semantic analysis can provide us with additional features which are beneficial to detecting spam comments. A Proportion-Weight Filter (PWF) model is also proposed to detect two kinds of spam comments (AD and vulgar comments), by filtering the spam-weight and the spam-proportion of the Weibo comments based on our Self-Extensible Spam Dictionary criteria. Our experimental results demonstrate that when detecting a combination of both AD and vulgar spam comments, we can achieve an average detection accuracy of 87.9%. Particularly for AD spam comments detection, we can achieve an average accuracy of 96.2%, which is preferable compared to when using machine learning methods. The statistical analysis of the results verifies that our proposed methods can identify the spam comments effectively and to relatively high degrees of accuracy.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115128958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The synergic enhancement of coexistence performance in wireless mobile combo-chips 无线移动组合芯片共存性能的协同增强
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511229
Daehyun Ban, Sangsoon Lim, Woojin Park, Chong-kwon Kim
This paper deals with the problem of severe wireless performance degradation when multiple wireless technologies are concurrently utilized in a same user device. This type of usage is already frequent in most smartphones and laptops, such as streaming Bluetooth audio while using a Wi-Fi download, and is more intensifying with IoT device deployment which triggers the coexistence of heterogeneous wireless technologies. To lower the form factor and the cost, chip vendors package multiple wireless interfaces into a single combo-chip where a common antenna is shared by multiple network technologies in a time division multiplexing manner. We issue that the careless operations of combo-chip design incur indeed performance degradation for in-device wireless coexistence and show the experimental results via TCP performance measurements in several smartphones and laptops. Our analysis reveals that the behavior negatively affects not only on the transmit power management of wireless access point, but also on the congestion control of TCP sender. We propose a cooperative switching scheme which incorporates TCP control behaviors for better coexistence and implement it on Android and Linux devices. Under the simultaneous use of in-device network interfaces, our approach led a WLAN throughput increment up to eight times without the mentioned issues. Further, this does not require any modification of TCP sender and wireless access point. Thus, the approach is directly applicable to existing mobile devices and also easily extendable to the combination of other in-device wireless technologies.
本文研究了在同一用户设备中同时使用多种无线技术时,无线性能严重下降的问题。这种类型的使用在大多数智能手机和笔记本电脑中已经很常见,例如在使用Wi-Fi下载时流式传输蓝牙音频,并且随着物联网设备的部署而加剧,这引发了异构无线技术的共存。为了降低外形尺寸和成本,芯片供应商将多个无线接口封装到一个组合芯片中,其中一个公共天线由多种网络技术以时分多路复用的方式共享。我们提出,组合芯片设计的粗心操作确实会导致设备内无线共存的性能下降,并通过几种智能手机和笔记本电脑的TCP性能测量显示了实验结果。我们的分析表明,这种行为不仅对无线接入点的发射功率管理产生负面影响,而且对TCP发送方的拥塞控制产生负面影响。本文提出了一种融合TCP控制行为的协同交换方案,并在Android和Linux设备上实现。在同时使用设备内网络接口的情况下,我们的方法使WLAN吞吐量增加了8倍,而没有出现上述问题。此外,这不需要对TCP发送方和无线接入点进行任何修改。因此,该方法直接适用于现有的移动设备,也很容易扩展到其他设备内无线技术的组合。
{"title":"The synergic enhancement of coexistence performance in wireless mobile combo-chips","authors":"Daehyun Ban, Sangsoon Lim, Woojin Park, Chong-kwon Kim","doi":"10.1109/ICC.2016.7511229","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511229","url":null,"abstract":"This paper deals with the problem of severe wireless performance degradation when multiple wireless technologies are concurrently utilized in a same user device. This type of usage is already frequent in most smartphones and laptops, such as streaming Bluetooth audio while using a Wi-Fi download, and is more intensifying with IoT device deployment which triggers the coexistence of heterogeneous wireless technologies. To lower the form factor and the cost, chip vendors package multiple wireless interfaces into a single combo-chip where a common antenna is shared by multiple network technologies in a time division multiplexing manner. We issue that the careless operations of combo-chip design incur indeed performance degradation for in-device wireless coexistence and show the experimental results via TCP performance measurements in several smartphones and laptops. Our analysis reveals that the behavior negatively affects not only on the transmit power management of wireless access point, but also on the congestion control of TCP sender. We propose a cooperative switching scheme which incorporates TCP control behaviors for better coexistence and implement it on Android and Linux devices. Under the simultaneous use of in-device network interfaces, our approach led a WLAN throughput increment up to eight times without the mentioned issues. Further, this does not require any modification of TCP sender and wireless access point. Thus, the approach is directly applicable to existing mobile devices and also easily extendable to the combination of other in-device wireless technologies.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of packetization and functional split on C-RAN fronthaul performance 分组化和功能分裂对C-RAN前传性能的影响
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511579
Chia-Yu Chang, Ruggero Schiavi, N. Nikaein, T. Spyropoulos, C. Bonnet
Cloud-RAN (CRAN) is considered as one key enabler for beyond 4G networks, offering multiplexing gains, and advanced cooperation and coordinated signal processing. However, a key obstacle in the adoption of the CRAN architecture is that it requires very high capacity and low latency fronthaul (FH) links to carry raw I/Q samples between remote radio heads (RRH) and the baseband units (BBUs). These capacity requirements could be reduced by a more flexible split of baseband processing between BBUs and RRHs. Nevertheless, while moving some of the processing back into the RRH is expected to reduce FH rates, the amount of reduction mainly depends on the split, cell load, scenario and it might also introduce some delays. To this end, this paper studies the impact of different functional splits on the FH capacity for representative scenarios. Furthermore, we propose the use of a packet-based fronthaul network and study the joint impact of different packetization methods and RRH-BBU functional splits on the FH rate and latency. Based on this study, we provide some insights on the feasibility and optimality of different combinations, and the potential multiplexing benefits in terms of numbers of RRHs one could support over a single Ethernet-based FH network.
云- ran (CRAN)被认为是超越4G网络的关键推动者,提供多路复用增益、高级合作和协调信号处理。然而,采用CRAN架构的一个关键障碍是,它需要非常高容量和低延迟的前传(FH)链路来在远程无线电头(RRH)和基带单元(bbu)之间传输原始I/Q样本。通过在bbu和rrh之间更灵活地分割基带处理,可以减少这些容量需求。然而,虽然将一些处理移回RRH有望降低跳频率,但减少的数量主要取决于分裂、单元负载和场景,并且还可能引入一些延迟。为此,本文研究了不同功能分割对代表性场景跳频容量的影响。此外,我们建议使用基于分组的前传网络,并研究了不同的分组方法和RRH-BBU功能分裂对跳频速率和延迟的共同影响。基于这项研究,我们提供了一些关于不同组合的可行性和最优性的见解,以及在基于单个以太网的跳频网络上可以支持的rrh数量方面的潜在多路复用优势。
{"title":"Impact of packetization and functional split on C-RAN fronthaul performance","authors":"Chia-Yu Chang, Ruggero Schiavi, N. Nikaein, T. Spyropoulos, C. Bonnet","doi":"10.1109/ICC.2016.7511579","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511579","url":null,"abstract":"Cloud-RAN (CRAN) is considered as one key enabler for beyond 4G networks, offering multiplexing gains, and advanced cooperation and coordinated signal processing. However, a key obstacle in the adoption of the CRAN architecture is that it requires very high capacity and low latency fronthaul (FH) links to carry raw I/Q samples between remote radio heads (RRH) and the baseband units (BBUs). These capacity requirements could be reduced by a more flexible split of baseband processing between BBUs and RRHs. Nevertheless, while moving some of the processing back into the RRH is expected to reduce FH rates, the amount of reduction mainly depends on the split, cell load, scenario and it might also introduce some delays. To this end, this paper studies the impact of different functional splits on the FH capacity for representative scenarios. Furthermore, we propose the use of a packet-based fronthaul network and study the joint impact of different packetization methods and RRH-BBU functional splits on the FH rate and latency. Based on this study, we provide some insights on the feasibility and optimality of different combinations, and the potential multiplexing benefits in terms of numbers of RRHs one could support over a single Ethernet-based FH network.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115022970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Distributed wireless energy scheduling for wireless powered sensor networks 面向无线供电传感器网络的分布式无线能量调度
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510699
D. Niyato, Xiao Lu, Ping Wang, Dong In Kim, Zhu Han
A wireless powered communication network is a potential application of wireless energy harvesting to improve convenience and flexibility. However, wireless energy transfer from a wireless energy source has to be scheduled to minimize energy usage while meeting quality of service (QoS) requirements of sensor nodes in the network. In this paper, we consider wireless powered sensor network whose sensor nodes have auxiliary energy sources in addition to dedicated wireless energy transfer. We propose a distributed wireless energy transfer scheduling to achieve the aforementioned objective and meet the requirements. We formulate a constrained stochastic game model to obtain a multi-policy constrained Nash equilibrium of wireless energy transfer request. This equilibrium instructs the sensor node to request for wireless energy transfer based on its local state. The performance evaluation shows that the analytical model is well verified by numerical simulations.
无线供电通信网络是无线能量收集的潜在应用,可提高便利性和灵活性。然而,必须对来自无线能源的无线能量传输进行调度,以最小化能量消耗,同时满足网络中传感器节点的服务质量(QoS)要求。本文考虑无线供电传感器网络,其传感器节点除了具有专用的无线能量传输外,还具有辅助能量源。为此,我们提出了一种分布式无线能量传输调度方法。建立了一个约束随机博弈模型,得到了无线能量传输请求的多策略约束纳什均衡。该平衡指示传感器节点根据其局部状态请求无线能量传输。性能评价表明,数值模拟结果很好地验证了分析模型的正确性。
{"title":"Distributed wireless energy scheduling for wireless powered sensor networks","authors":"D. Niyato, Xiao Lu, Ping Wang, Dong In Kim, Zhu Han","doi":"10.1109/ICC.2016.7510699","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510699","url":null,"abstract":"A wireless powered communication network is a potential application of wireless energy harvesting to improve convenience and flexibility. However, wireless energy transfer from a wireless energy source has to be scheduled to minimize energy usage while meeting quality of service (QoS) requirements of sensor nodes in the network. In this paper, we consider wireless powered sensor network whose sensor nodes have auxiliary energy sources in addition to dedicated wireless energy transfer. We propose a distributed wireless energy transfer scheduling to achieve the aforementioned objective and meet the requirements. We formulate a constrained stochastic game model to obtain a multi-policy constrained Nash equilibrium of wireless energy transfer request. This equilibrium instructs the sensor node to request for wireless energy transfer based on its local state. The performance evaluation shows that the analytical model is well verified by numerical simulations.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Identification of visible industrial control devices at Internet scale 互联网规模可见工业控制设备的识别
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511426
Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Limin Sun
Nowadays industrial control devices are crucial for infrastructure-critical systems such as factories, power plants, and water treatment facilities. Devices with IP addresses are visible on the Internet and they connect cyber space and physical world. The first step in protecting devices from attackers is a deep understanding of the devices' characteristics in the cyber space. In this paper, we take a first step in this direction by investigating physical devices running one of the two specific protocols that are widely adopted in industrial control systems. In order to detect these devices in real-time, we propose a two-stage discovery mechanism: first filtering out unqualified hosts from 4 billion remote hosts and then identifying physical devices from qualified candidates. We have conducted a real-world experiment to verify the mechanism and identified dozens of thousands of physical devices from the entire Internet. Results show that our method discovers all devices in 20 hours with 89.5% precision and 79.3% recall.
如今,工业控制设备对于工厂、发电厂和水处理设施等基础设施关键系统至关重要。具有IP地址的设备在互联网上是可见的,它们连接着网络空间和物理世界。保护设备免受攻击者攻击的第一步是深入了解网络空间中设备的特征。在本文中,我们通过研究运行在工业控制系统中广泛采用的两种特定协议之一的物理设备,朝着这个方向迈出了第一步。为了实时检测这些设备,我们提出了一个两阶段的发现机制:首先从40亿个远程主机中过滤掉不合格的主机,然后从合格的候选者中识别物理设备。我们已经进行了真实世界的实验来验证该机制,并从整个互联网中识别了数十个物理设备。结果表明,该方法在20小时内发现所有设备,准确率为89.5%,召回率为79.3%。
{"title":"Identification of visible industrial control devices at Internet scale","authors":"Xuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Limin Sun","doi":"10.1109/ICC.2016.7511426","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511426","url":null,"abstract":"Nowadays industrial control devices are crucial for infrastructure-critical systems such as factories, power plants, and water treatment facilities. Devices with IP addresses are visible on the Internet and they connect cyber space and physical world. The first step in protecting devices from attackers is a deep understanding of the devices' characteristics in the cyber space. In this paper, we take a first step in this direction by investigating physical devices running one of the two specific protocols that are widely adopted in industrial control systems. In order to detect these devices in real-time, we propose a two-stage discovery mechanism: first filtering out unqualified hosts from 4 billion remote hosts and then identifying physical devices from qualified candidates. We have conducted a real-world experiment to verify the mechanism and identified dozens of thousands of physical devices from the entire Internet. Results show that our method discovers all devices in 20 hours with 89.5% precision and 79.3% recall.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RF beamforming for secrecy millimeter wave MISO-OFDM systems 保密毫米波MISO-OFDM系统的射频波束形成
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511623
Yahia R. Ramadan, A. Ibrahim, M. Khairy
Due to the tiny wavelength of millimeter waves (mmWave), tens of antennas can be packed into a small area in mmWave transceivers. However, implementing a radio-frequency (RF) chain for each antenna is impractical due to the high cost and power of mixed-signal devices. To reduce the cost and get benefit from the antennas, an analog RF beamformer is implemented using variable gain amplifiers and analog phase shifters. In this paper, we design the RF precoder for physical layer security. We consider two degrees of channel knowledge at the transmitter. For full channel knowledge at the transmitter, the RF precoder is optimized to maximize the secrecy rate. Two solution algorithms, with different computational complexity, are proposed based on semidefinite relaxation and gradient ascent. For partial channel knowledge at the transmitter, the RF precoder is designed to maximize the secrecy rate under secrecy outage constraint. The problem is safely approximated, and solved by a gradient ascent algorithm within bisection search. Numerical results show that the proposed algorithms converge quickly, and outperform the conventional secrecy schemes.
由于毫米波(mmWave)的波长很小,在毫米波收发器中可以将数十个天线塞进一个很小的区域。然而,由于混合信号设备的高成本和高功率,为每个天线实现射频(RF)链是不切实际的。为了降低成本并从天线中获益,采用变增益放大器和模拟移相器实现了模拟射频波束形成器。本文设计了一种用于物理层安全的射频预编码器。我们在发射机上考虑两个程度的信道知识。对于发射机的全信道知识,射频预编码器被优化以最大限度地提高保密率。提出了基于半定松弛和梯度上升的两种不同计算复杂度的求解算法。对于发射机的部分信道知识,射频预编码器被设计为在保密中断约束下最大化保密率。对问题进行了安全逼近,并在等分搜索范围内采用梯度上升算法求解。数值结果表明,该算法收敛速度快,优于传统的保密方案。
{"title":"RF beamforming for secrecy millimeter wave MISO-OFDM systems","authors":"Yahia R. Ramadan, A. Ibrahim, M. Khairy","doi":"10.1109/ICC.2016.7511623","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511623","url":null,"abstract":"Due to the tiny wavelength of millimeter waves (mmWave), tens of antennas can be packed into a small area in mmWave transceivers. However, implementing a radio-frequency (RF) chain for each antenna is impractical due to the high cost and power of mixed-signal devices. To reduce the cost and get benefit from the antennas, an analog RF beamformer is implemented using variable gain amplifiers and analog phase shifters. In this paper, we design the RF precoder for physical layer security. We consider two degrees of channel knowledge at the transmitter. For full channel knowledge at the transmitter, the RF precoder is optimized to maximize the secrecy rate. Two solution algorithms, with different computational complexity, are proposed based on semidefinite relaxation and gradient ascent. For partial channel knowledge at the transmitter, the RF precoder is designed to maximize the secrecy rate under secrecy outage constraint. The problem is safely approximated, and solved by a gradient ascent algorithm within bisection search. Numerical results show that the proposed algorithms converge quickly, and outperform the conventional secrecy schemes.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An analysis on relay assisted millimeter wave networks 中继辅助毫米波网络分析
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510705
S. Biswas, Satyanarayana Vuppala, J. Xue, T. Ratnarajah
The potential benefits of deploying relays in outdoor millimeter-wave (mmWave) networks are investigated. We derive the coverage probability from sources to a typical destination for such systems aided by relays. The sources and the relays are modeled as independent homogeneous Poisson point processes. We present a relay modeling technique for mmWave networks considering blockages and compute the density of active relays that aid the transmission. Closed form expressions for end-to-end signal to noise ratio for two relay selection techniques, namely best path selection and best relay selection are derived. Finally, we analyze the coverage probability and transmission capacity of the network and validate them with simulation results. Our results show that the coverage probability and transmission capacity of mmWave systems, which are often affected by extensive blockages can be increased considerably with the aid of relays.
研究了在室外毫米波(mmWave)网络中部署中继的潜在好处。我们推导了由中继辅助的这类系统从源到典型目的地的覆盖概率。源和继电器被建模为独立的齐次泊松点过程。我们提出了一种考虑阻塞的毫米波网络中继建模技术,并计算了有助于传输的有源中继的密度。推导了最佳路径选择和最佳中继选择两种中继选择技术端到端信噪比的封闭表达式。最后,对网络的覆盖概率和传输容量进行了分析,并用仿真结果进行了验证。我们的研究结果表明,毫米波系统经常受到广泛阻塞的影响,在中继的帮助下可以大大提高其覆盖概率和传输容量。
{"title":"An analysis on relay assisted millimeter wave networks","authors":"S. Biswas, Satyanarayana Vuppala, J. Xue, T. Ratnarajah","doi":"10.1109/ICC.2016.7510705","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510705","url":null,"abstract":"The potential benefits of deploying relays in outdoor millimeter-wave (mmWave) networks are investigated. We derive the coverage probability from sources to a typical destination for such systems aided by relays. The sources and the relays are modeled as independent homogeneous Poisson point processes. We present a relay modeling technique for mmWave networks considering blockages and compute the density of active relays that aid the transmission. Closed form expressions for end-to-end signal to noise ratio for two relay selection techniques, namely best path selection and best relay selection are derived. Finally, we analyze the coverage probability and transmission capacity of the network and validate them with simulation results. Our results show that the coverage probability and transmission capacity of mmWave systems, which are often affected by extensive blockages can be increased considerably with the aid of relays.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117273100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2016 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1