首页 > 最新文献

2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)最新文献

英文 中文
5G New Radio Numerologies and their Impact on the End-To-End Latency 5G新无线电数字命理及其对端到端延迟的影响
Natale Patriciello, S. Lagén, L. Giupponi, Biljana Bojović
In this paper, we use a New Radio (NR) simulator, based on ns-3, to assess the impact of 5G NR numerologies on the end-to-end (E2E) latencies in a realistic and complex scenario, including TCP and UDP flows. As expected, we found that TCP goodput increases with the numerology, since a larger numerology allows reducing the round-trip-time. However, although counter-intuitive, simulation results exhibit that the E2E latency of uplink (UL) UDP flows may not be reduced with the numerology. In fact, it depends on two key factors and their relationship: the processing delays (fixed or numerologydependent) and the inter-packet arrival time, which depends on the UDP flow rate and the packet size. We demonstrate how, in some cases, the latency is worsened by an increasing signaling exchange that grows with the numerology. In particular, this is due to a handshake mechanism in UL (scheduling request and UL grant) that is performed each time a data packet encounters empty RLC buffers. For some combination of flow rate, packet size, and processing delays that are not numerology dependent, increasing the numerology may not reduce the E2E delay. Therefore, we conclude that the selection of the numerology in an NR system should be carefully made by taking into account the traffic patterns and the processing delays.
在本文中,我们使用基于ns-3的新无线电(NR)模拟器来评估5G NR数字对现实和复杂场景中端到端(E2E)延迟的影响,包括TCP和UDP流。正如预期的那样,我们发现TCP goodput随着数字命理数的增加而增加,因为更大的数字命理数可以减少往返时间。然而,尽管与直觉相反,仿真结果表明上行(UL) UDP流的端到端延迟可能不会随着数字学而减少。事实上,它取决于两个关键因素及其关系:处理延迟(固定或依赖于数字)和包间到达时间,这取决于UDP流速率和包大小。我们演示了在某些情况下,随着数字命理学的增长,不断增加的信号交换如何使延迟恶化。特别是,这是由于UL中的握手机制(调度请求和UL授予),每次数据包遇到空的RLC缓冲区时都会执行该机制。对于一些与数字无关的流速率、包大小和处理延迟的组合,增加数字可能不会减少端到端延迟。因此,我们得出结论,在NR系统中,数字系统的选择应该仔细考虑交通模式和处理延迟。
{"title":"5G New Radio Numerologies and their Impact on the End-To-End Latency","authors":"Natale Patriciello, S. Lagén, L. Giupponi, Biljana Bojović","doi":"10.1109/CAMAD.2018.8514979","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514979","url":null,"abstract":"In this paper, we use a New Radio (NR) simulator, based on ns-3, to assess the impact of 5G NR numerologies on the end-to-end (E2E) latencies in a realistic and complex scenario, including TCP and UDP flows. As expected, we found that TCP goodput increases with the numerology, since a larger numerology allows reducing the round-trip-time. However, although counter-intuitive, simulation results exhibit that the E2E latency of uplink (UL) UDP flows may not be reduced with the numerology. In fact, it depends on two key factors and their relationship: the processing delays (fixed or numerologydependent) and the inter-packet arrival time, which depends on the UDP flow rate and the packet size. We demonstrate how, in some cases, the latency is worsened by an increasing signaling exchange that grows with the numerology. In particular, this is due to a handshake mechanism in UL (scheduling request and UL grant) that is performed each time a data packet encounters empty RLC buffers. For some combination of flow rate, packet size, and processing delays that are not numerology dependent, increasing the numerology may not reduce the E2E delay. Therefore, we conclude that the selection of the numerology in an NR system should be carefully made by taking into account the traffic patterns and the processing delays.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks 基于深度强化学习的软件定义网络DDoS洪水智能缓解
Yandong Liu, M. Dong, K. Ota, Jianhua Li, Jun Wu
Distributed Denial-of-Service (DDoS) flooding attack has remained as one of the most destructive attacks for more than two decades. Although great efforts have been made to design the defense mechanism, it is still difficult to mitigate these attacks in real time smartly and effectively for the reason that attack traffic may mix with benign traffic. Software-Defined Networks (SDN) decouples control and data plane in the network. Its centralized control paradigm and global view of the network bring some new chances to enhance the defense ability against network attacks. In this paper, we propose a deep reinforcement learning based framework, which can smartly learn the optimal mitigation policies under different attack scenarios and mitigate the DDoS flooding attack in real time. This framework is an effective system to defend against a wide range of DDoS flooding attacks such as TCP SYN, UDP, and ICMP flooding. It can intelligently learn the patterns of attack traffic and throttle the attack traffic, while the traffic of benign users is forwarded normally. We compare our proposed framework with a baseline along with a popular state-of-the-art router throttling method. The experimental results show that our approach can outperform both of them in five attacking scenarios with different attack dynamics significantly.
二十多年来,分布式拒绝服务(DDoS)洪水攻击一直是最具破坏性的攻击之一。尽管在防御机制的设计上做了很大的努力,但由于攻击流量可能与良性流量混合,仍然难以实时、智能、有效地缓解这些攻击。软件定义网络(SDN)将网络中的控制和数据平面解耦。它的集中控制模式和网络全局视图为提高网络攻击防御能力带来了新的机遇。在本文中,我们提出了一个基于深度强化学习的框架,该框架可以智能学习不同攻击场景下的最优缓解策略,实时缓解DDoS洪水攻击。该框架可以有效防御TCP SYN、UDP、ICMP泛洪等多种类型的DDoS泛洪攻击。它可以智能学习攻击流量模式,对攻击流量进行节流,同时正常转发良性用户的流量。我们将我们提出的框架与基线以及流行的最先进的路由器节流方法进行比较。实验结果表明,在五种不同攻击动态的攻击场景下,我们的方法明显优于这两种方法。
{"title":"Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks","authors":"Yandong Liu, M. Dong, K. Ota, Jianhua Li, Jun Wu","doi":"10.1109/CAMAD.2018.8514971","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514971","url":null,"abstract":"Distributed Denial-of-Service (DDoS) flooding attack has remained as one of the most destructive attacks for more than two decades. Although great efforts have been made to design the defense mechanism, it is still difficult to mitigate these attacks in real time smartly and effectively for the reason that attack traffic may mix with benign traffic. Software-Defined Networks (SDN) decouples control and data plane in the network. Its centralized control paradigm and global view of the network bring some new chances to enhance the defense ability against network attacks. In this paper, we propose a deep reinforcement learning based framework, which can smartly learn the optimal mitigation policies under different attack scenarios and mitigate the DDoS flooding attack in real time. This framework is an effective system to defend against a wide range of DDoS flooding attacks such as TCP SYN, UDP, and ICMP flooding. It can intelligently learn the patterns of attack traffic and throttle the attack traffic, while the traffic of benign users is forwarded normally. We compare our proposed framework with a baseline along with a popular state-of-the-art router throttling method. The experimental results show that our approach can outperform both of them in five attacking scenarios with different attack dynamics significantly.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions 受监管的循环医疗管辖区基于区块链的电子患者记录
S. Alexaki, G. Alexandris, Vasilis Katos, N. Petroulakis
Circular, data-driven healthcare is increasingly being considered as an effective model to provide efficient, cost-effective and sustainable healthcare services in the future. Central to this model is the service-dominant “building-block”-type provision of care services to patients, paired with the collaboration of healthcare providers through a common infrastructure. This combination enables the forming of a decentralized, holistic care cycle. Sharing of patient medical informationis pivotal towards reaching this goal; however, preserving medical record integrity and privacy, while at the same time allowing provider interoperability are often conflicting requirements. Blockchains and Smart Contracts can provide the underlying technology to support the decentralized care cycle by addressing patient privacy and medical record integrity, while simultaneously offering efficient interoperability between providers. To demonstrate how this could be achieved, a conceptual medical record access and sharing mechanism is presented which is suitable for a system operating within a regulated healthcare jurisdiction.
循环的、数据驱动的医疗保健越来越被认为是未来提供高效、具有成本效益和可持续的医疗保健服务的有效模式。该模式的核心是以服务为主导的“构建块”类型的护理服务,通过共同的基础设施与医疗保健提供者的合作相结合。这种结合形成了一个分散的整体护理循环。共享患者医疗信息对实现这一目标至关重要;然而,保持医疗记录的完整性和隐私,同时允许提供者互操作性,往往是相互冲突的需求。区块链和智能合约可以通过解决患者隐私和医疗记录完整性问题,提供底层技术来支持分散的护理周期,同时在提供者之间提供有效的互操作性。为了演示如何实现这一点,提出了一个概念性的医疗记录访问和共享机制,该机制适用于在受监管的医疗保健管辖范围内运行的系统。
{"title":"Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions","authors":"S. Alexaki, G. Alexandris, Vasilis Katos, N. Petroulakis","doi":"10.1109/CAMAD.2018.8514954","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514954","url":null,"abstract":"Circular, data-driven healthcare is increasingly being considered as an effective model to provide efficient, cost-effective and sustainable healthcare services in the future. Central to this model is the service-dominant “building-block”-type provision of care services to patients, paired with the collaboration of healthcare providers through a common infrastructure. This combination enables the forming of a decentralized, holistic care cycle. Sharing of patient medical informationis pivotal towards reaching this goal; however, preserving medical record integrity and privacy, while at the same time allowing provider interoperability are often conflicting requirements. Blockchains and Smart Contracts can provide the underlying technology to support the decentralized care cycle by addressing patient privacy and medical record integrity, while simultaneously offering efficient interoperability between providers. To demonstrate how this could be achieved, a conceptual medical record access and sharing mechanism is presented which is suitable for a system operating within a regulated healthcare jurisdiction.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133550385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
On the performance of SIP-based next generation emergency services 基于sip的下一代应急服务性能研究
Eleftherios Sigioltzakis, I. Politis
The fifth generation of mobile networks is rapidly gaining momentum as the new paradigm of broadband communications. Mature pilots are already being implemented and tested across Europe. The plethora of applications and services supported by such novel networking architectures are characterized by high reliability, ultra-low delay and high throughput across heterogeneous access technologies and diverse user equipment. In this context, emergency services and emergency service operators are required to adapt rapidly by firstly adopting IP based architectures and secondly incorporate cloud-based and edge-based computing prototypes. This paper focuses on SIP based emergency architectures that are capable of exchanging added value services and data over legacy All-IP infrastructures. Moreover, the proposed emergency services architecture is studied as a multi-edge computing scenario and several useful observation are made for its applicability in today’s emergency services. The performance evaluation is based on a set of key performance indicators, which reveal that next generation SIPbased emergency services architectures could be easily be adopted and integrated into the legacy systems.
作为宽带通信的新范式,第五代移动网络正迅速获得动力。成熟的试点已经在欧洲各地实施和测试。这种新型网络架构支持的大量应用和服务具有高可靠性、超低延迟和跨异构访问技术和不同用户设备的高吞吐量的特点。在这种情况下,应急服务和应急服务运营商必须迅速适应,首先采用基于IP的架构,其次纳入基于云和基于边缘的计算原型。本文的重点是基于SIP的应急架构,它能够在传统的全ip基础设施上交换增值服务和数据。此外,将所提出的应急服务架构作为多边缘计算场景进行了研究,并对其在当今应急服务中的适用性进行了一些有益的观察。性能评估基于一组关键性能指标,这些指标表明下一代基于sip的应急服务体系结构可以很容易地被采用并集成到遗留系统中。
{"title":"On the performance of SIP-based next generation emergency services","authors":"Eleftherios Sigioltzakis, I. Politis","doi":"10.1109/CAMAD.2018.8514939","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514939","url":null,"abstract":"The fifth generation of mobile networks is rapidly gaining momentum as the new paradigm of broadband communications. Mature pilots are already being implemented and tested across Europe. The plethora of applications and services supported by such novel networking architectures are characterized by high reliability, ultra-low delay and high throughput across heterogeneous access technologies and diverse user equipment. In this context, emergency services and emergency service operators are required to adapt rapidly by firstly adopting IP based architectures and secondly incorporate cloud-based and edge-based computing prototypes. This paper focuses on SIP based emergency architectures that are capable of exchanging added value services and data over legacy All-IP infrastructures. Moreover, the proposed emergency services architecture is studied as a multi-edge computing scenario and several useful observation are made for its applicability in today’s emergency services. The performance evaluation is based on a set of key performance indicators, which reveal that next generation SIPbased emergency services architectures could be easily be adopted and integrated into the legacy systems.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bringing LTE to Unlicensed Spectrum: Technical Solutions and Deployment Considerations 将LTE引入非授权频谱:技术解决方案和部署考虑
Bolin Chen, Zheng Chen, N. Pappas, D. Yuan, Jie Zhang
Unlicensed spectrum utilization in LTE networks has been under extensive discussions and standardization attempts for its potential to handle the rapidly increasing data traffic. Various technologies for the utilization of unlicensed spectrum in LTE networks have emerged recently, and each of them has their potentials in certain aspects and critical issues to be solved. In this article, we provide a survey on the potential enabling solutions for the unlicensed spectrum utilization in LTE networks, including the direct usage of LTE infrastructures and protocols in unlicensed spectrum and LTE-WLAN integration. We highlight the differences between different LTE technologies in unlicensed spectrum and open up potential research directions related to the usage of unlicensed bands in cellular networks
LTE网络中未经许可的频谱利用已经进行了广泛的讨论和标准化尝试,因为它具有处理快速增长的数据流量的潜力。在LTE网络中利用免授权频谱的各种技术近年来不断涌现,每种技术都有各自的潜力和需要解决的关键问题。在本文中,我们对LTE网络中非授权频谱利用的潜在实现解决方案进行了调查,包括在非授权频谱和LTE- wlan集成中直接使用LTE基础设施和协议。我们强调了不同LTE技术在非授权频谱中的差异,并开辟了与蜂窝网络中非授权频段使用相关的潜在研究方向
{"title":"Bringing LTE to Unlicensed Spectrum: Technical Solutions and Deployment Considerations","authors":"Bolin Chen, Zheng Chen, N. Pappas, D. Yuan, Jie Zhang","doi":"10.1109/CAMAD.2018.8514992","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514992","url":null,"abstract":"Unlicensed spectrum utilization in LTE networks has been under extensive discussions and standardization attempts for its potential to handle the rapidly increasing data traffic. Various technologies for the utilization of unlicensed spectrum in LTE networks have emerged recently, and each of them has their potentials in certain aspects and critical issues to be solved. In this article, we provide a survey on the potential enabling solutions for the unlicensed spectrum utilization in LTE networks, including the direct usage of LTE infrastructures and protocols in unlicensed spectrum and LTE-WLAN integration. We highlight the differences between different LTE technologies in unlicensed spectrum and open up potential research directions related to the usage of unlicensed bands in cellular networks","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indoor Multiple-User MIMO Channel Measurement and Characterization 室内多用户MIMO信道测量与表征
Jiliang Zhang, Yang Wang, Liqin Ding, Xiaoli Chu, Jie Zhang
In a Multi-User Multiple-Input Multiple-Output (MU-MIMO) system, the throughput depends on both the eigenvalues and the eigenspace alignment of the desired and the interference wireless channels. In this paper, a channel measurement campaign under a typical indoor environment is carried out, where five possible scenarios are taken into account. On the basis of measurement, fundamental trends about the ultimate performance of the MU-MIMO system is highlighted. Measurement results indicate that whether the desired transmitter and the interference transmitter are located in same cavity (e.g., room or corridor) impacts on the throughput of MU-MIMO transmission significantly due to common scatterers.
在多用户多输入多输出(MU-MIMO)系统中,吞吐量取决于期望和干扰无线信道的特征值和特征空间对齐。本文在典型的室内环境下进行了信道测量活动,其中考虑了五种可能的情况。在测量的基础上,强调了MU-MIMO系统最终性能的基本趋势。测量结果表明,由于共散射体的存在,期望发射机和干扰发射机是否位于同一空腔(如房间或走廊)对MU-MIMO传输的吞吐量有显著影响。
{"title":"Indoor Multiple-User MIMO Channel Measurement and Characterization","authors":"Jiliang Zhang, Yang Wang, Liqin Ding, Xiaoli Chu, Jie Zhang","doi":"10.1109/CAMAD.2018.8514994","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514994","url":null,"abstract":"In a Multi-User Multiple-Input Multiple-Output (MU-MIMO) system, the throughput depends on both the eigenvalues and the eigenspace alignment of the desired and the interference wireless channels. In this paper, a channel measurement campaign under a typical indoor environment is carried out, where five possible scenarios are taken into account. On the basis of measurement, fundamental trends about the ultimate performance of the MU-MIMO system is highlighted. Measurement results indicate that whether the desired transmitter and the interference transmitter are located in same cavity (e.g., room or corridor) impacts on the throughput of MU-MIMO transmission significantly due to common scatterers.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Roaming Consortium Discovery and Routing for Large-Scale Wireless LAN Roaming Systems 大规模无线局域网漫游系统的自动漫游联盟发现和路由
K. Irie, Hideaki Goto
The Next Generation Hotspot (NGH), based on the Hotspot 2.0 specification, is being introduced as a new conceptual standard that brings higher security and usability to Public Wireless LAN. There has been a movement in recent years for connecting some Roaming Consortia (RC) by NGH to develop a Large-Scale Wireless LAN roaming system. However, a routing problem has been identified in the identity federation system when an RC consisting of multiple operators is being connected. A typical example is eduroam, the roaming system for research and education institutions, having thousands of different realms. It is hard for wireless Service Providers (SPs) to find which RC the authentication requests should be sent to. To deal with this problem, this paper develops a Hub Proxy with learning-based automatic RC discovery and routing. The effectiveness of the system has been confirmed through some experiments using a virtual inter-roaming federation network.
基于Hotspot 2.0规范的下一代热点(NGH)作为一种新的概念标准被引入,为公共无线局域网带来更高的安全性和可用性。近年来出现了一种利用NGH连接一些漫游联盟(RC)来开发大规模无线局域网漫游系统的运动。然而,在身份联合系统中,当由多个操作员组成的RC被连接时,存在路由问题。一个典型的例子是eduroam,这是一个为研究和教育机构提供的漫游系统,拥有数千个不同的领域。无线服务提供商(sp)很难找到应该将身份验证请求发送到哪个RC。为了解决这一问题,本文开发了一种基于学习的集线器代理,该代理具有RC自动发现和路由功能。通过虚拟漫游联合网络的实验,验证了该系统的有效性。
{"title":"Automatic Roaming Consortium Discovery and Routing for Large-Scale Wireless LAN Roaming Systems","authors":"K. Irie, Hideaki Goto","doi":"10.1109/CAMAD.2018.8514987","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514987","url":null,"abstract":"The Next Generation Hotspot (NGH), based on the Hotspot 2.0 specification, is being introduced as a new conceptual standard that brings higher security and usability to Public Wireless LAN. There has been a movement in recent years for connecting some Roaming Consortia (RC) by NGH to develop a Large-Scale Wireless LAN roaming system. However, a routing problem has been identified in the identity federation system when an RC consisting of multiple operators is being connected. A typical example is eduroam, the roaming system for research and education institutions, having thousands of different realms. It is hard for wireless Service Providers (SPs) to find which RC the authentication requests should be sent to. To deal with this problem, this paper develops a Hub Proxy with learning-based automatic RC discovery and routing. The effectiveness of the system has been confirmed through some experiments using a virtual inter-roaming federation network.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"507 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123422854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward Intelligent Detection Modelling for Adversarial Samples in Convolutional Neural Networks 卷积神经网络对抗样本智能检测建模研究
Zhuobiao Qiao, M. Dong, K. Ota, Jun Wu
Deep Neural Networks (DNNs) are hierarchical nonlinear architectures that have been widely used in artificial intelligence applications. However, these models are vulnerable to adversarial perturbations which add changes slightly and are crafted explicitly to fool the model. Such attacks will cause the neural network to completely change its classification of data. Although various defense strategies have been proposed, existing defense methods have two limitations. First, the discovery success rate is not very high. Second, existing methods depend on the output of a particular layer in a specific learning structure. In this paper, we propose a powerful method for adversarial samples using Large Margin Cosine Estimate(LMCE). By iteratively calculating the large-margin cosine uncertainty estimates between the model predictions, the results can be regarded as a novel measurement of model uncertainty estimation and is available to detect adversarial samples by training using a simple machine learning algorithm. Comparing it with the way in which adversar- ial samples are generated, it is confirmed that this measurement can better distinguish hostile disturbances. We modeled deep neural network attacks and established defense mechanisms against various types of adversarial attacks. Classifier gets better performance than the baseline model. The approach is validated on a series of standard datasets including MNIST and CIFAR −10, outperforming previous ensemble method with strong statistical significance. Experiments indicate that our approach generalizes better across different architectures and attacks.
深度神经网络(Deep Neural Networks, dnn)是一种层次非线性结构,在人工智能应用中得到了广泛的应用。然而,这些模型很容易受到对抗性扰动的影响,这些扰动会轻微地增加变化,并被明确地设计成欺骗模型。这种攻击会导致神经网络完全改变其对数据的分类。虽然提出了各种防御策略,但现有的防御方法有两个局限性。首先,发现成功率不是很高。其次,现有的方法依赖于特定学习结构中特定层的输出。在本文中,我们提出了一种使用大余弦估计(Large Margin Cosine estimation, LMCE)的对抗性样本的强大方法。通过迭代计算模型预测之间的大余弦不确定性估计,结果可以被视为模型不确定性估计的一种新的测量方法,并且可以通过使用简单的机器学习算法进行训练来检测对抗样本。将该方法与生成敌对样本的方法进行比较,证实了该方法能更好地识别敌对干扰。我们对深度神经网络攻击进行了建模,并建立了针对各种类型对抗性攻击的防御机制。分类器的性能优于基线模型。该方法在包括MNIST和CIFAR−10在内的一系列标准数据集上进行了验证,优于先前的集成方法,具有很强的统计显著性。实验表明,我们的方法可以更好地泛化不同的架构和攻击。
{"title":"Toward Intelligent Detection Modelling for Adversarial Samples in Convolutional Neural Networks","authors":"Zhuobiao Qiao, M. Dong, K. Ota, Jun Wu","doi":"10.1109/CAMAD.2018.8514982","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514982","url":null,"abstract":"Deep Neural Networks (DNNs) are hierarchical nonlinear architectures that have been widely used in artificial intelligence applications. However, these models are vulnerable to adversarial perturbations which add changes slightly and are crafted explicitly to fool the model. Such attacks will cause the neural network to completely change its classification of data. Although various defense strategies have been proposed, existing defense methods have two limitations. First, the discovery success rate is not very high. Second, existing methods depend on the output of a particular layer in a specific learning structure. In this paper, we propose a powerful method for adversarial samples using Large Margin Cosine Estimate(LMCE). By iteratively calculating the large-margin cosine uncertainty estimates between the model predictions, the results can be regarded as a novel measurement of model uncertainty estimation and is available to detect adversarial samples by training using a simple machine learning algorithm. Comparing it with the way in which adversar- ial samples are generated, it is confirmed that this measurement can better distinguish hostile disturbances. We modeled deep neural network attacks and established defense mechanisms against various types of adversarial attacks. Classifier gets better performance than the baseline model. The approach is validated on a series of standard datasets including MNIST and CIFAR −10, outperforming previous ensemble method with strong statistical significance. Experiments indicate that our approach generalizes better across different architectures and attacks.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133170409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
End-to-End Simulation of Integrated Access and Backhaul at mmWaves 毫米波综合接入和回程的端到端仿真
Michele Polese, M. Giordani, A. Roy, Sanjay Goyal, D. Castor, M. Zorzi
Recently, the millimeter wave (mmWave) bands have been investigated as a means to support the foreseen extreme data rate demands of next-generation cellular networks (5G). However, in order to overcome the severe isotropic path loss and the harsh propagation experienced at such high frequencies, a dense base station deployment is required, which may be infeasible because of the unavailability of fiber drops to provide wired backhauling. To address this challenge, the 3GPP is investigating the concept of Integrated Access and Backhaul (IAB), i.e., the possibility of providing wireless backhaul to the mobile terminals. In this paper, we (i) extend the capabilities of the existing mmWave module for ns-3 to support advanced IAB functionalities, and (ii) evaluate the end-to-end performance of the IAB architecture through system-level full-stack simulations in terms of experienced throughput and communication latency. We finally provide guidelines on how to design optimal wireless backhaul solutions in the presence of resource-constrained and traffic-congested mmWave scenarios.
最近,毫米波(mmWave)频段作为支持下一代蜂窝网络(5G)可预见的极端数据速率需求的手段进行了研究。然而,为了克服严重的各向同性路径损耗和在如此高的频率下经历的恶劣传播,需要密集的基站部署,这可能是不可行的,因为无法获得光纤下降来提供有线回传。为了应对这一挑战,3GPP正在研究综合接入和回程(IAB)的概念,即向移动终端提供无线回程的可能性。在本文中,我们(i)扩展了ns-3现有毫米波模块的功能,以支持先进的IAB功能,并且(ii)通过系统级全栈模拟,根据经验吞吐量和通信延迟来评估IAB架构的端到端性能。最后,我们提供了如何在资源受限和流量拥挤的毫米波场景下设计最佳无线回程解决方案的指导方针。
{"title":"End-to-End Simulation of Integrated Access and Backhaul at mmWaves","authors":"Michele Polese, M. Giordani, A. Roy, Sanjay Goyal, D. Castor, M. Zorzi","doi":"10.1109/CAMAD.2018.8514996","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514996","url":null,"abstract":"Recently, the millimeter wave (mmWave) bands have been investigated as a means to support the foreseen extreme data rate demands of next-generation cellular networks (5G). However, in order to overcome the severe isotropic path loss and the harsh propagation experienced at such high frequencies, a dense base station deployment is required, which may be infeasible because of the unavailability of fiber drops to provide wired backhauling. To address this challenge, the 3GPP is investigating the concept of Integrated Access and Backhaul (IAB), i.e., the possibility of providing wireless backhaul to the mobile terminals. In this paper, we (i) extend the capabilities of the existing mmWave module for ns-3 to support advanced IAB functionalities, and (ii) evaluate the end-to-end performance of the IAB architecture through system-level full-stack simulations in terms of experienced throughput and communication latency. We finally provide guidelines on how to design optimal wireless backhaul solutions in the presence of resource-constrained and traffic-congested mmWave scenarios.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132788165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Towards a Circular Economy via Intelligent Metamaterials 通过智能超材料实现循环经济
C. Liaskos, A. Tsioliaridou, S. Ioannidis
The present study proposes the use of intelligent metasurfaces in the design of products, as enforcers of circular economy principles. Intelligent metasurfaces can tune their physical properties (electromagnetic, acoustic, mechanical) by receiving software commands. When incorporated within products and spaces they can mitigate the resource waste caused by inefficient, partially optimized designs and security concerns. Thus, circular economy and fast-paced product design become compatible. The study begins by considering electromagnetic metamaterials, and proposes a complete methodology for their deployment. Finally, it is shown that the same principles can be extended to the control of mechanical properties of objects, exemplary enabling the micro-management of vibrations and heat, with unprecedented circular economy potential.
本研究提出在产品设计中使用智能元表面,作为循环经济原则的执行者。智能元表面可以通过接收软件命令来调整其物理特性(电磁、声学、机械)。当集成到产品和空间中时,它们可以减少由低效、部分优化的设计和安全问题引起的资源浪费。因此,循环经济和快节奏的产品设计变得兼容。该研究从考虑电磁超材料开始,并提出了一种完整的部署方法。最后,研究表明,同样的原理可以扩展到控制物体的机械性能,例如振动和热量的微观管理,具有前所未有的循环经济潜力。
{"title":"Towards a Circular Economy via Intelligent Metamaterials","authors":"C. Liaskos, A. Tsioliaridou, S. Ioannidis","doi":"10.1109/CAMAD.2018.8514986","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514986","url":null,"abstract":"The present study proposes the use of intelligent metasurfaces in the design of products, as enforcers of circular economy principles. Intelligent metasurfaces can tune their physical properties (electromagnetic, acoustic, mechanical) by receiving software commands. When incorporated within products and spaces they can mitigate the resource waste caused by inefficient, partially optimized designs and security concerns. Thus, circular economy and fast-paced product design become compatible. The study begins by considering electromagnetic metamaterials, and proposes a complete methodology for their deployment. Finally, it is shown that the same principles can be extended to the control of mechanical properties of objects, exemplary enabling the micro-management of vibrations and heat, with unprecedented circular economy potential.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1