首页 > 最新文献

2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)最新文献

英文 中文
Minimum Length Scheduling for Wireless Powered Communication Networks with Discrete Rates 离散速率无线供电通信网络的最小长度调度
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9234963
Elif Dilek Salik, S. Coleri
Radio frequency energy harvesting is an alternative solution to power the next generation wireless networks. The vast majority of the existing works focus on continuous rate transmission model, although discrete rate model is more realistic for practical communication networks. We study the joint optimization of energy harvesting and information transmission times with the objective of minimizing the total schedule length of a multi-user, harvest-then-transmit, wireless powered communication network while following discrete Signal-to-Noise Ratio and rate transmission model. The users are required to transmit a minimum amount of data to the access point under a maximum transmit power limit. The formulated problem is mixed integer, non-linear and non-convex. First, we solve the case where the rate allocations are given. Then, we exploit given rate allocation problem’s optimality characteristics to achieve the global optimal solution for the original problem. We propose an exponential time optimal algorithm which exhibits practical superiority to the brute force algorithm, and two polynomial time heuristics, one of which prioritizes minimizing information transmission times, while the other focuses on improving energy harvesting time. Performances of the proposed algorithms are compared both to an algorithm which assigns continuous rates to the user, i.e., best lower bound, and to an algorithm which discretize the former continuous rate solution. Simulation results show that the proposed heuristic algorithms perform close to the optimal solution, and the proposed algorithms outperform the algorithm that discretize the continuous rate solution up to 56.9% for smaller access point power and 46.7% for higher number of users. This proves the importance of optimizing the total schedule length for discrete rate model as the users will be forced to transmit at discrete rates practically.
射频能量收集是为下一代无线网络供电的另一种解决方案。尽管离散速率模型对于实际通信网络更为现实,但现有的绝大多数工作都集中在连续速率传输模型上。在离散信噪比和速率传输模型下,以最小的总调度长度为目标,研究了能量收集和信息传输时间的联合优化问题。要求用户在最大发射功率限制下向接入点传输最少量的数据。所表述的问题是混合整数、非线性和非凸问题。首先,我们解决了费率分配给定的情况。然后,利用给定速率分配问题的最优性特征,实现原问题的全局最优解。我们提出了一种指数时间最优算法,该算法比蛮力算法具有实际优势;提出了两种多项式时间启发式算法,其中一种优先考虑最小化信息传输时间,另一种侧重于提高能量收集时间。将所提算法的性能与一种为用户分配连续速率的算法(即最佳下界)和一种将前连续速率解离散化的算法进行了比较。仿真结果表明,所提启发式算法的性能接近于最优解,且在接入点功率较小的情况下,所提算法的性能优于连续速率解离散算法的性能达56.9%,在用户数量较大的情况下,该算法的性能优于连续速率解离散算法的性能达46.7%。这证明了优化离散速率模型总调度长度的重要性,因为实际中用户将被迫以离散速率传输。
{"title":"Minimum Length Scheduling for Wireless Powered Communication Networks with Discrete Rates","authors":"Elif Dilek Salik, S. Coleri","doi":"10.1109/BlackSeaCom48709.2020.9234963","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9234963","url":null,"abstract":"Radio frequency energy harvesting is an alternative solution to power the next generation wireless networks. The vast majority of the existing works focus on continuous rate transmission model, although discrete rate model is more realistic for practical communication networks. We study the joint optimization of energy harvesting and information transmission times with the objective of minimizing the total schedule length of a multi-user, harvest-then-transmit, wireless powered communication network while following discrete Signal-to-Noise Ratio and rate transmission model. The users are required to transmit a minimum amount of data to the access point under a maximum transmit power limit. The formulated problem is mixed integer, non-linear and non-convex. First, we solve the case where the rate allocations are given. Then, we exploit given rate allocation problem’s optimality characteristics to achieve the global optimal solution for the original problem. We propose an exponential time optimal algorithm which exhibits practical superiority to the brute force algorithm, and two polynomial time heuristics, one of which prioritizes minimizing information transmission times, while the other focuses on improving energy harvesting time. Performances of the proposed algorithms are compared both to an algorithm which assigns continuous rates to the user, i.e., best lower bound, and to an algorithm which discretize the former continuous rate solution. Simulation results show that the proposed heuristic algorithms perform close to the optimal solution, and the proposed algorithms outperform the algorithm that discretize the continuous rate solution up to 56.9% for smaller access point power and 46.7% for higher number of users. This proves the importance of optimizing the total schedule length for discrete rate model as the users will be forced to transmit at discrete rates practically.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coverage Probability of Cell-Free Massive MIMO Systems 无小区大规模MIMO系统的覆盖概率
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9235025
Anastasios K. Papazafeiropoulos, P. Kourtessis, M. Renzo, S. Chatzinotas, J. Senior
Despite that ongoing and future networks become denser and increasingly irregular, prior works in the area of cell-free (CF) massive multiple-input-multiple-output (mMIMO) systems relied on the strong assumption of uniformly distributed access points (APs). Actually, this randomness was accounted for only during the simulation and not in the analysis. Consequently, the direction of this paper is towards the application and investigation of a more realistic model for the spatial randomness of the APs in terms of a Poisson point process (PPP). Specifically, we derive the downlink coverage probability (CP) of CF mMIMO systems by means of stochastic geometry and deterministic equivalent tools. Notably, it is the only work having derived the CP for CF mMIMO systems. Among the results, we highlight the outperformance of CF mMIMO systems against small cells (SCs), which increases with the density of the APs due to channel hardening, favorable propagation, and interference suppression. Moreover, we observe the saturation of the CP at high AP density.
尽管目前和未来的网络变得越来越密集和不规则,但在无蜂窝(CF)大规模多输入多输出(mMIMO)系统领域的先前工作依赖于均匀分布接入点(ap)的强假设。实际上,这种随机性只是在模拟过程中才被考虑到,而不是在分析中。因此,本文的方向是在泊松点过程(PPP)方面应用和研究一个更现实的ap空间随机性模型。具体来说,我们利用随机几何和确定性等效工具推导了CF mMIMO系统的下行覆盖概率。值得注意的是,它是唯一一个为CF mMIMO系统导出CP的工作。在结果中,我们强调了CF mMIMO系统对小细胞(SCs)的优异性能,由于通道硬化,有利的传播和干扰抑制,小细胞(SCs)随着ap密度的增加而增加。此外,我们观察到高AP密度下CP的饱和。
{"title":"Coverage Probability of Cell-Free Massive MIMO Systems","authors":"Anastasios K. Papazafeiropoulos, P. Kourtessis, M. Renzo, S. Chatzinotas, J. Senior","doi":"10.1109/BlackSeaCom48709.2020.9235025","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9235025","url":null,"abstract":"Despite that ongoing and future networks become denser and increasingly irregular, prior works in the area of cell-free (CF) massive multiple-input-multiple-output (mMIMO) systems relied on the strong assumption of uniformly distributed access points (APs). Actually, this randomness was accounted for only during the simulation and not in the analysis. Consequently, the direction of this paper is towards the application and investigation of a more realistic model for the spatial randomness of the APs in terms of a Poisson point process (PPP). Specifically, we derive the downlink coverage probability (CP) of CF mMIMO systems by means of stochastic geometry and deterministic equivalent tools. Notably, it is the only work having derived the CP for CF mMIMO systems. Among the results, we highlight the outperformance of CF mMIMO systems against small cells (SCs), which increases with the density of the APs due to channel hardening, favorable propagation, and interference suppression. Moreover, we observe the saturation of the CP at high AP density.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Utility Proportional Resource Allocation for Users with Diverse SLAs in Virtualized Radio Access Networks 虚拟化无线接入网中不同sla用户的效用比例资源分配
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9235011
B. Rouzbehani, V. Marbukh, K. Sayrafian-Pour
A virtualization platform is responsible for allocation and aggregation of radio resources from different access technologies as well as the distribution of the total capacity among Virtual Network Operators (VNOs). The Radio Resource Management (RRM) employed by each VNO should comply with the requirements specified in the Service Level Agreements (SLAs) of each user. A joint admission control and resource management scheme based on proportionally fair rate allocation among different users was proposed in our previous publication. Although, all SLAs are satisfied in that scheme, users with vastly different QoS requirements might not necessary be treated fairly in terms of the allocated rates. This is especially the case when the available capacities of the VNOs cannot support the maximum requested rates for all such users. This paper attempts to overcome this weakness by replacing the proportional fairness strategy with a more general concept of utility-proportional fairness. The proposed approach is evaluated by simulations under increasing congestion scenarios and the results show improved fairness in the allocated rates.
虚拟化平台负责分配和聚合来自不同接入技术的无线资源,并在虚拟网络运营商(vno)之间分配总容量。每个VNO所采用的无线电资源管理(RRM)应符合每个用户的服务水平协议(sla)中规定的要求。我们在上一篇文章中提出了一种基于在不同用户之间按比例公平分配费率的联合准入控制和资源管理方案。尽管在该方案中可以满足所有sla,但在分配速率方面,可能没有必要公平对待具有巨大不同QoS需求的用户。当vno的可用容量不能支持所有此类用户的最大请求速率时,情况尤其如此。本文试图通过用一个更一般的效用-比例公平概念取代比例公平策略来克服这一弱点。在日益增加的拥塞情况下,通过仿真对该方法进行了评估,结果表明分配速率的公平性得到了提高。
{"title":"Utility Proportional Resource Allocation for Users with Diverse SLAs in Virtualized Radio Access Networks","authors":"B. Rouzbehani, V. Marbukh, K. Sayrafian-Pour","doi":"10.1109/BlackSeaCom48709.2020.9235011","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9235011","url":null,"abstract":"A virtualization platform is responsible for allocation and aggregation of radio resources from different access technologies as well as the distribution of the total capacity among Virtual Network Operators (VNOs). The Radio Resource Management (RRM) employed by each VNO should comply with the requirements specified in the Service Level Agreements (SLAs) of each user. A joint admission control and resource management scheme based on proportionally fair rate allocation among different users was proposed in our previous publication. Although, all SLAs are satisfied in that scheme, users with vastly different QoS requirements might not necessary be treated fairly in terms of the allocated rates. This is especially the case when the available capacities of the VNOs cannot support the maximum requested rates for all such users. This paper attempts to overcome this weakness by replacing the proportional fairness strategy with a more general concept of utility-proportional fairness. The proposed approach is evaluated by simulations under increasing congestion scenarios and the results show improved fairness in the allocated rates.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132014947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Resource Management in Next Generation Networks with Dense User Traffic 下一代用户流量密集网络中的动态资源管理
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9235006
Aysun Aslan, Gulce Bal, C. Toker
With the era of the fifth generation (5G) networks, supporting all mobile service users who have different Quality of Service (QoS) requirements becomes the main challenge. To manage and satisfy the heterogeneous requirements, network slicing concept can be a solution over a common physical infrastructure. Splitting the network into slices which have different properties (e.g., bandwidth requirements, delay tolerance, user density, etc.) allows to schedule and optimize the requests under the constraint of limited resources. The network has to decide to accept or reject the requests, and scale up/down the slices by considering the user density in accepted requests, and then, schedule the accepted requests to serve them in an order. In this paper, it is verified that slicing the network and scaling up/down the slices by using deep reinforcement learning (DRL) algorithms with consideration of user density, improve the speed of satisfaction of users with respect to the classical baseline scheduling algorithms.
随着第五代(5G)网络时代的到来,支持所有具有不同服务质量(QoS)需求的移动业务用户成为主要挑战。为了管理和满足异构需求,网络切片概念可以作为公共物理基础设施的解决方案。将网络分割成具有不同属性(例如,带宽要求,延迟容忍度,用户密度等)的片,可以在有限资源的约束下调度和优化请求。网络必须决定接受或拒绝请求,并通过考虑接受请求中的用户密度来向上/向下扩展切片,然后调度接受的请求以顺序为它们提供服务。本文验证了在考虑用户密度的情况下,使用深度强化学习(deep reinforcement learning, DRL)算法对网络进行切片并对切片进行上下缩放,相对于经典的基线调度算法,提高了用户满意度的速度。
{"title":"Dynamic Resource Management in Next Generation Networks with Dense User Traffic","authors":"Aysun Aslan, Gulce Bal, C. Toker","doi":"10.1109/BlackSeaCom48709.2020.9235006","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9235006","url":null,"abstract":"With the era of the fifth generation (5G) networks, supporting all mobile service users who have different Quality of Service (QoS) requirements becomes the main challenge. To manage and satisfy the heterogeneous requirements, network slicing concept can be a solution over a common physical infrastructure. Splitting the network into slices which have different properties (e.g., bandwidth requirements, delay tolerance, user density, etc.) allows to schedule and optimize the requests under the constraint of limited resources. The network has to decide to accept or reject the requests, and scale up/down the slices by considering the user density in accepted requests, and then, schedule the accepted requests to serve them in an order. In this paper, it is verified that slicing the network and scaling up/down the slices by using deep reinforcement learning (DRL) algorithms with consideration of user density, improve the speed of satisfaction of users with respect to the classical baseline scheduling algorithms.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122847411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multimedia Traffic Prediction Based on Wavelet-and Spline-extrapolation 基于小波和样条外推的多媒体流量预测
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9234998
I. Strelkovskaya, I. Solovskaya, A. Makoganiuk, T. Rodionova
The task of predicting self-similar traffic of IoT network objects with a significant number of pulsations and the property of long-term dependence is considered, which makes it difficult to predict in practice. Using the methods of wavelet- and spline-extrapolation based on Haar-wavelet, quadratic and B-spline function, the results of prediction of multimedia traffic are obtained. We compare the results of traffic prediction based on the Haar-wavelet and the quadratic and B-spline function using wavelet- and spline-extrapolation. This will allow the choice of one or another extrapolation method to improve the accuracy of the prediction, while ensuring scalability and the ability to use it for various IoT applications to prevent network overloads.
考虑了具有大量脉动和长期依赖特性的物联网网络对象的自相似流量预测任务,这给实际预测带来了困难。采用基于haar -小波、二次和b样条函数的小波和样条外推方法,对多媒体流量进行了预测。我们比较了基于haar小波的流量预测结果和基于小波和样条外推的二次和b样条函数的流量预测结果。这将允许选择一种或另一种外推方法来提高预测的准确性,同时确保可扩展性和将其用于各种物联网应用的能力,以防止网络过载。
{"title":"Multimedia Traffic Prediction Based on Wavelet-and Spline-extrapolation","authors":"I. Strelkovskaya, I. Solovskaya, A. Makoganiuk, T. Rodionova","doi":"10.1109/BlackSeaCom48709.2020.9234998","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9234998","url":null,"abstract":"The task of predicting self-similar traffic of IoT network objects with a significant number of pulsations and the property of long-term dependence is considered, which makes it difficult to predict in practice. Using the methods of wavelet- and spline-extrapolation based on Haar-wavelet, quadratic and B-spline function, the results of prediction of multimedia traffic are obtained. We compare the results of traffic prediction based on the Haar-wavelet and the quadratic and B-spline function using wavelet- and spline-extrapolation. This will allow the choice of one or another extrapolation method to improve the accuracy of the prediction, while ensuring scalability and the ability to use it for various IoT applications to prevent network overloads.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Link Adaptation Method for NB-IoT Downlink Control Channel 一种新的NB-IoT下行控制信道链路自适应方法
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9234961
I. Altin, Emre Bilican, O. Çelikel, Yağmur Coşkun
Resource utilization is of high importance in Nar-rowband Internet of Things (NB-IoT) due to the large number of users. In this paper, a novel link adaptation method for the downlink control channel (NPDCCH) is proposed. We show that the NPDCCH resource utilization is improved significantly by the proposed link adaptation method compared to the standard system with no link adaptation, while satisfying the required NPDCCH decoding rates in the specifications. The proposed algorithm has very low complexity, and uses the NPDCCH decoding success ratio of the uplink channel which is already calculated in the system.
在窄带物联网(NB-IoT)中,由于用户数量庞大,资源利用率非常重要。本文提出了一种新的下行控制信道(NPDCCH)链路自适应方法。结果表明,与没有链路自适应的标准系统相比,该方法在满足规范要求的NPDCCH译码率的同时,显著提高了NPDCCH的资源利用率。该算法具有非常低的复杂度,并且使用了系统中已经计算好的上行信道的NPDCCH解码成功率。
{"title":"A Novel Link Adaptation Method for NB-IoT Downlink Control Channel","authors":"I. Altin, Emre Bilican, O. Çelikel, Yağmur Coşkun","doi":"10.1109/BlackSeaCom48709.2020.9234961","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9234961","url":null,"abstract":"Resource utilization is of high importance in Nar-rowband Internet of Things (NB-IoT) due to the large number of users. In this paper, a novel link adaptation method for the downlink control channel (NPDCCH) is proposed. We show that the NPDCCH resource utilization is improved significantly by the proposed link adaptation method compared to the standard system with no link adaptation, while satisfying the required NPDCCH decoding rates in the specifications. The proposed algorithm has very low complexity, and uses the NPDCCH decoding success ratio of the uplink channel which is already calculated in the system.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132318065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication supervision function for verticals in 4G networks and beyond: Traffic anomaly detection from aggregated LTE MAC layer reports using a LSTM-RNN 垂直4G网络及以后的通信监督功能:使用LSTM-RNN从聚合LTE MAC层报告中检测流量异常
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9234967
S. Lembo, H. Kokkoniemi-Tarkkanen, S. Horsmanheimo
We study the feasibility of developing a Communication Supervision Function for a 4G LTE wireless communications network system, to allow a vertical to monitor from its domain the Quality of Service (QoS) of the communication traversing the wireless domain. Communication supervision is performed by detecting traffic anomalies of a reference, healthy, transmission of packets uniformly spaced at intervals with ms resolution, and transmitted in uplink direction. Traffic at the base station is monitored with a LTE Medium Access Control (MAC) layer monitoring tool that aggregates traffic at intervals with seconds resolution. Measurements are performed in an operating LTE network. We use a deep learning method implementing a Long Short-Term Memory (LSTM) Recurrent Neural Network (RNN), to determine if the traffic pattern is the healthy one, or it is anomalous, with missing packets and jitter. We identify key metrics in the monitoring data, that are selected as features in the RNN, which enable the detection of fine time resolution traffic anomalies hidden in the aggregated and coarse measurements reported by the monitoring tool. We find that applying the proposed approach, a vertical is able to determine whether the communication over the wireless network is healthy or anomalous. Finally, we discuss on the use of the proposed monitoring approach in 4G networks, and learning possibilities for 5G standardization in terms of monitoring metrics, features, monitoring resolution, service concepts, etc.
我们研究了为4G LTE无线通信网络系统开发通信监控功能的可行性,以允许垂直从其域监控穿越无线域的通信的服务质量(QoS)。通信监控是通过检测参考、健康、以ms分辨率间隔均匀间隔传输的数据包的流量异常,并在上行方向上传输。基站的流量由LTE介质访问控制(MAC)层监控工具监控,该工具以秒级分辨率的间隔聚合流量。测量是在运行的LTE网络中进行的。我们使用深度学习方法实现长短期记忆(LSTM)递归神经网络(RNN),以确定流量模式是健康的,还是异常的,有丢失的数据包和抖动。我们确定监控数据中的关键指标,这些指标被选为RNN中的特征,从而能够检测隐藏在监控工具报告的汇总和粗测量中的精细时间分辨率交通异常。我们发现,应用所提出的方法,垂直能够确定无线网络上的通信是健康的还是异常的。最后,我们讨论了所提出的监控方法在4G网络中的使用,并从监控指标、功能、监控分辨率、服务概念等方面学习5G标准化的可能性。
{"title":"Communication supervision function for verticals in 4G networks and beyond: Traffic anomaly detection from aggregated LTE MAC layer reports using a LSTM-RNN","authors":"S. Lembo, H. Kokkoniemi-Tarkkanen, S. Horsmanheimo","doi":"10.1109/BlackSeaCom48709.2020.9234967","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9234967","url":null,"abstract":"We study the feasibility of developing a Communication Supervision Function for a 4G LTE wireless communications network system, to allow a vertical to monitor from its domain the Quality of Service (QoS) of the communication traversing the wireless domain. Communication supervision is performed by detecting traffic anomalies of a reference, healthy, transmission of packets uniformly spaced at intervals with ms resolution, and transmitted in uplink direction. Traffic at the base station is monitored with a LTE Medium Access Control (MAC) layer monitoring tool that aggregates traffic at intervals with seconds resolution. Measurements are performed in an operating LTE network. We use a deep learning method implementing a Long Short-Term Memory (LSTM) Recurrent Neural Network (RNN), to determine if the traffic pattern is the healthy one, or it is anomalous, with missing packets and jitter. We identify key metrics in the monitoring data, that are selected as features in the RNN, which enable the detection of fine time resolution traffic anomalies hidden in the aggregated and coarse measurements reported by the monitoring tool. We find that applying the proposed approach, a vertical is able to determine whether the communication over the wireless network is healthy or anomalous. Finally, we discuss on the use of the proposed monitoring approach in 4G networks, and learning possibilities for 5G standardization in terms of monitoring metrics, features, monitoring resolution, service concepts, etc.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115123080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Federated Mimic Learning for Privacy Preserving Intrusion Detection 隐私保护入侵检测的联邦模拟学习
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9234959
Noor Ali Al-Athba Al-Marri, Bekir Sait Ciftler, M. Abdallah
Internet of things (IoT) devices are prone to attacks due to the limitation of their privacy and security components. These attacks vary from exploiting backdoors to disrupting the communication network of the devices. Intrusion Detection Systems (IDS) play an essential role in ensuring information privacy and security of IoT devices against these attacks. Recently, deep learning-based IDS techniques are becoming more prominent due to their high classification accuracy. However, conventional deep learning techniques jeopardize user privacy due to the transfer of user data to a centralized server. Federated learning (FL) is a popular privacy-preserving decentralized learning method. FL enables training models locally at the edge devices and transferring local models to a centralized server instead of transferring sensitive data. Nevertheless, FL can suffer from reverse engineering ML attacks that can learn information about the user's data from model. To overcome the problem of reverse engineering, mimic learning is another way to preserve the privacy of ML-based IDS. In mimic learning, a student model is trained with the public dataset, which is labeled with the teacher model that is trained by sensitive user data. In this work, we propose a novel approach that combines the advantages of FL and mimic learning, namely federated mimic learning to create a distributed IDS while minimizing the risk of jeopardizing users' privacy, and benchmark its performance compared to other ML-based IDS techniques using NSL-KDD dataset. Our results show that we can achieve 98.11% detection accuracy with federated mimic learning.
物联网(IoT)设备由于其隐私和安全组件的限制,容易受到攻击。这些攻击从利用后门到破坏设备的通信网络各不相同。入侵检测系统(IDS)在确保物联网设备的信息隐私和安全免受这些攻击方面发挥着至关重要的作用。近年来,基于深度学习的入侵检测技术因其较高的分类准确率而越来越受到重视。然而,传统的深度学习技术由于将用户数据传输到集中式服务器而危及用户隐私。联邦学习(FL)是一种流行的保护隐私的分散学习方法。FL支持在边缘设备上本地训练模型,并将本地模型传输到集中式服务器,而不是传输敏感数据。然而,FL可能会遭受反向工程ML攻击,这种攻击可以从模型中学习有关用户数据的信息。为了克服逆向工程的问题,模仿学习是另一种保护基于ml的IDS隐私的方法。在模拟学习中,使用公共数据集训练学生模型,并用敏感用户数据训练的教师模型进行标记。在这项工作中,我们提出了一种结合FL和模拟学习优势的新方法,即联邦模拟学习来创建分布式IDS,同时最大限度地降低危害用户隐私的风险,并使用NSL-KDD数据集将其性能与其他基于ml的IDS技术进行比较。实验结果表明,采用联合模拟学习方法,检测准确率可达98.11%。
{"title":"Federated Mimic Learning for Privacy Preserving Intrusion Detection","authors":"Noor Ali Al-Athba Al-Marri, Bekir Sait Ciftler, M. Abdallah","doi":"10.1109/BlackSeaCom48709.2020.9234959","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9234959","url":null,"abstract":"Internet of things (IoT) devices are prone to attacks due to the limitation of their privacy and security components. These attacks vary from exploiting backdoors to disrupting the communication network of the devices. Intrusion Detection Systems (IDS) play an essential role in ensuring information privacy and security of IoT devices against these attacks. Recently, deep learning-based IDS techniques are becoming more prominent due to their high classification accuracy. However, conventional deep learning techniques jeopardize user privacy due to the transfer of user data to a centralized server. Federated learning (FL) is a popular privacy-preserving decentralized learning method. FL enables training models locally at the edge devices and transferring local models to a centralized server instead of transferring sensitive data. Nevertheless, FL can suffer from reverse engineering ML attacks that can learn information about the user's data from model. To overcome the problem of reverse engineering, mimic learning is another way to preserve the privacy of ML-based IDS. In mimic learning, a student model is trained with the public dataset, which is labeled with the teacher model that is trained by sensitive user data. In this work, we propose a novel approach that combines the advantages of FL and mimic learning, namely federated mimic learning to create a distributed IDS while minimizing the risk of jeopardizing users' privacy, and benchmark its performance compared to other ML-based IDS techniques using NSL-KDD dataset. Our results show that we can achieve 98.11% detection accuracy with federated mimic learning.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132131678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Machine Learning Approach for Automatic Fault Detection and Diagnosis in Cellular Networks 基于机器学习的蜂窝网络故障自动检测与诊断方法
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9234962
Jamale Benitez Porch, C. Foh, H. Farooq, A. Imran
The capability for a network to self heal itself is a promising feature for future cellular networks. An essential function to achieve self healing is the ability to determine when a network is operating outside of normal state, and perhaps identify potential causes. This paper focuses on applying the supervised machine learning approach to detect fault symptoms and identify the cause. Our method utilizes referenced signal received power (RSRP) reported by users over a certain period of time to detect operational anomaly in a base station. We notice that certain faults at a base station create noticeable change in the RSRP readings and recognizable electromagnetic radiation pattern around the base station. To achieve fault analysis, we develop a framework that differentiates normal and abnormal operations under changing environment to avoid unnecessary fault alarms. Once abnormal operation is detected, the framework uses a supervised machine learning system to classify the detected fault. We develop convolutional neural network and random forest to test the fault classification. We show that both machine learning systems offer high accuracy.
网络自我修复的能力是未来蜂窝网络的一个很有前途的特性。实现自我修复的一个基本功能是能够确定网络何时在正常状态之外运行,并可能识别潜在原因。本文的重点是应用监督机器学习方法来检测故障症状并确定原因。我们的方法利用用户在一段时间内报告的参考信号接收功率(RSRP)来检测基站的运行异常。我们注意到,基站的某些故障会在RSRP读数和基站周围可识别的电磁辐射方向图中产生明显的变化。为了实现故障分析,我们开发了一个框架来区分在变化的环境下正常和异常的操作,以避免不必要的故障警报。一旦检测到异常操作,该框架使用监督机器学习系统对检测到的故障进行分类。我们开发了卷积神经网络和随机森林来测试故障分类。我们证明了这两种机器学习系统都提供了很高的准确性。
{"title":"Machine Learning Approach for Automatic Fault Detection and Diagnosis in Cellular Networks","authors":"Jamale Benitez Porch, C. Foh, H. Farooq, A. Imran","doi":"10.1109/BlackSeaCom48709.2020.9234962","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9234962","url":null,"abstract":"The capability for a network to self heal itself is a promising feature for future cellular networks. An essential function to achieve self healing is the ability to determine when a network is operating outside of normal state, and perhaps identify potential causes. This paper focuses on applying the supervised machine learning approach to detect fault symptoms and identify the cause. Our method utilizes referenced signal received power (RSRP) reported by users over a certain period of time to detect operational anomaly in a base station. We notice that certain faults at a base station create noticeable change in the RSRP readings and recognizable electromagnetic radiation pattern around the base station. To achieve fault analysis, we develop a framework that differentiates normal and abnormal operations under changing environment to avoid unnecessary fault alarms. Once abnormal operation is detected, the framework uses a supervised machine learning system to classify the detected fault. We develop convolutional neural network and random forest to test the fault classification. We show that both machine learning systems offer high accuracy.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124847819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-Efficient Deployment of UAV in V2X Network Considering Latency and Backhaul Issues 考虑延迟和回程问题的V2X网络中无人机的节能部署
Pub Date : 2020-05-26 DOI: 10.1109/BlackSeaCom48709.2020.9235026
Uygar Demir, C. Toker, Özgür Ekici
Unmanned aerial vehicles (UAV) take place in the communication field more and more. Since the energy efficiency will be one of the most important issues in regard to smart city applications, energy-efficient deployment of the UAVs becomes a critical topic. Besides, V2X communication stands out in smart city applications and has its own unique problems such as latency. In this paper, we have investigated the energy-efficient deployment problem of UAV as flying roadside unit (RSU) with considering latency of vehicular users (VUs) and backhaul link capacity constraints while making power control of VUs as well. First, we proposed a junction scenario that a UAV is integrated as RSU to provide V2I links in a region while connecting the core network with a backhaul link. Then, when the number of vehicular users is given, we propose a communication problem that aims to minimize the total power consumption including both hovering and communicating powers. In our scenario, the probability of that the latency of the vehicular users is greater than a given value is kept below a certain violation probability. In the numerical results, it is stated that communication packet size is an essential parameter for the latency constraint in the network configurations. It is also observed that as the delay constraint tightens and the average packet size increases, the sum of the data rates of VUs converges to the backhaul link capacity. At the end of the paper, results for the proposed communication problem are provided.
无人驾驶飞行器(UAV)越来越多地出现在通信领域。由于能源效率将成为智慧城市应用中最重要的问题之一,因此无人机的节能部署成为一个关键话题。此外,V2X通信在智慧城市应用中脱颖而出,并有其独特的问题,如延迟。本文研究了无人机作为路边飞行单元(RSU)的节能部署问题,同时考虑了车载用户(vu)的时延和回程链路容量约束,并对vu进行了功率控制。首先,我们提出了无人机作为RSU集成在一个区域内提供V2I链路,同时用回程链路连接核心网的连接方案。然后,当车辆用户数量给定时,我们提出了一个以最小化总功耗为目标的通信问题,包括悬停功率和通信功率。在我们的场景中,车辆用户的延迟大于给定值的概率保持在一定的违规概率以下。数值结果表明,通信数据包大小是网络配置中时延约束的重要参数。我们还观察到,随着延迟约束的收紧和平均数据包大小的增加,vu的数据速率总和收敛于回程链路容量。在论文的最后,给出了所提出的通信问题的结果。
{"title":"Energy-Efficient Deployment of UAV in V2X Network Considering Latency and Backhaul Issues","authors":"Uygar Demir, C. Toker, Özgür Ekici","doi":"10.1109/BlackSeaCom48709.2020.9235026","DOIUrl":"https://doi.org/10.1109/BlackSeaCom48709.2020.9235026","url":null,"abstract":"Unmanned aerial vehicles (UAV) take place in the communication field more and more. Since the energy efficiency will be one of the most important issues in regard to smart city applications, energy-efficient deployment of the UAVs becomes a critical topic. Besides, V2X communication stands out in smart city applications and has its own unique problems such as latency. In this paper, we have investigated the energy-efficient deployment problem of UAV as flying roadside unit (RSU) with considering latency of vehicular users (VUs) and backhaul link capacity constraints while making power control of VUs as well. First, we proposed a junction scenario that a UAV is integrated as RSU to provide V2I links in a region while connecting the core network with a backhaul link. Then, when the number of vehicular users is given, we propose a communication problem that aims to minimize the total power consumption including both hovering and communicating powers. In our scenario, the probability of that the latency of the vehicular users is greater than a given value is kept below a certain violation probability. In the numerical results, it is stated that communication packet size is an essential parameter for the latency constraint in the network configurations. It is also observed that as the delay constraint tightens and the average packet size increases, the sum of the data rates of VUs converges to the backhaul link capacity. At the end of the paper, results for the proposed communication problem are provided.","PeriodicalId":186939,"journal":{"name":"2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127129299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1