首页 > 最新文献

2021 IEEE Global Communications Conference (GLOBECOM)最新文献

英文 中文
Machine Learning Aided Path Loss Estimator and Jammer Detector for Heterogeneous Vehicular Networks 异质车辆网络的机器学习辅助路径损失估计和干扰检测器
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685428
B. Turan, A. Uyrus, Osman Nuri Koç, Emrah Kar, S. Coleri
Heterogeneous vehicular communications aim to improve the reliability, security and delay performance of vehicle-to-vehicle (V2V) communications, by utilizing multiple commu-nication technologies. Predicting the path loss through conventional fitting based models and radio frequency (RF) jamming detection through rule based models of different communication schemes fail to address comprehensive mobility and jamming scenarios. In this paper, we propose a machine learning based adaptive link quality estimation and jamming detection scheme for the optimum selection and aggregation of IEEE 802.11p and Vehicular Visible Light Communications (V-VLC) technologies targeting reliable V2V communications. We propose to use Random Forest regression and classifier based algorithms, where multiple individual learners with diversity are trained by using measurement data and the final result is obtained by averaging outputs of all learners. We test our framework on real-world road measurement data, demonstrating up to 2.34 dB and 0.56 dB Mean Absolute Error (MAE) improvement for V-VLC and IEEE 802.11p path loss prediction compared to fitting based models, respectively. The proposed jamming presence detection scheme yields 88.3% accuracy to detect noise interference injection for IEEE 802.11p links, yielding 3% better prediction performance than previously proposed deep convolutional neural network (DCNN) based scheme.
异构车载通信旨在利用多种通信技术,提高车对车(V2V)通信的可靠性、安全性和时延。通过传统的基于拟合的模型预测路径损耗,通过基于规则的不同通信方案模型进行射频(RF)干扰检测,无法解决综合移动和干扰场景。在本文中,我们提出了一种基于机器学习的自适应链路质量估计和干扰检测方案,用于IEEE 802.11p和车辆可见光通信(V-VLC)技术的最佳选择和聚合,目标是可靠的V2V通信。我们建议使用随机森林回归和基于分类器的算法,其中使用测量数据训练多个具有多样性的个体学习器,并通过对所有学习器的输出进行平均获得最终结果。我们在实际道路测量数据上测试了我们的框架,与基于拟合的模型相比,V-VLC和IEEE 802.11p路径损耗预测的平均绝对误差(MAE)分别提高了2.34 dB和0.56 dB。提出的干扰存在检测方案对IEEE 802.11p链路的噪声注入检测准确率为88.3%,预测性能比之前提出的基于深度卷积神经网络(DCNN)的方案提高3%。
{"title":"Machine Learning Aided Path Loss Estimator and Jammer Detector for Heterogeneous Vehicular Networks","authors":"B. Turan, A. Uyrus, Osman Nuri Koç, Emrah Kar, S. Coleri","doi":"10.1109/GLOBECOM46510.2021.9685428","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685428","url":null,"abstract":"Heterogeneous vehicular communications aim to improve the reliability, security and delay performance of vehicle-to-vehicle (V2V) communications, by utilizing multiple commu-nication technologies. Predicting the path loss through conventional fitting based models and radio frequency (RF) jamming detection through rule based models of different communication schemes fail to address comprehensive mobility and jamming scenarios. In this paper, we propose a machine learning based adaptive link quality estimation and jamming detection scheme for the optimum selection and aggregation of IEEE 802.11p and Vehicular Visible Light Communications (V-VLC) technologies targeting reliable V2V communications. We propose to use Random Forest regression and classifier based algorithms, where multiple individual learners with diversity are trained by using measurement data and the final result is obtained by averaging outputs of all learners. We test our framework on real-world road measurement data, demonstrating up to 2.34 dB and 0.56 dB Mean Absolute Error (MAE) improvement for V-VLC and IEEE 802.11p path loss prediction compared to fitting based models, respectively. The proposed jamming presence detection scheme yields 88.3% accuracy to detect noise interference injection for IEEE 802.11p links, yielding 3% better prediction performance than previously proposed deep convolutional neural network (DCNN) based scheme.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of Ultra-Dense Millimeter Wave Cloud-RAN under Blockage and Interference 阻塞和干扰下超密毫米波云无线局域网性能分析
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685967
B. Maham
In this paper, we consider a downlink Cloud Radio Access Network (Cloud-RAN) transmission, served by multiple beamformed remote radio head (RRHs) coordinated by base band units (BBUs), toward a typical mobile user. Assuming ultra-dense 5G and beyond network operating in millimeter wave (mm-Waves) bands, we modeled channels as a concatenation of Nakagami-m and binary blockage. In addition, it is assumed there are multiple interfering nodes nearby. We evaluate the system performance in terms of outage probability, after calculating channel distributions. Moreover, the impact of random blockage and interference on the performance of Nakagami-blockage channels with multiple RRHs are investigated by simulations.
在本文中,我们考虑了一种下行云无线接入网(Cloud- ran)传输,该传输由基带单元(BBUs)协调的多个波束形成的远程无线电头(RRHs)向典型的移动用户提供服务。假设在毫米波(mm-Waves)频带中运行的超密集5G及以上网络,我们将信道建模为Nakagami-m和二进制阻塞的串联。另外,假设附近有多个干扰节点。在计算信道分布之后,我们根据中断概率来评估系统性能。此外,通过仿真研究了随机阻塞和干扰对具有多个RRHs的中上阻塞信道性能的影响。
{"title":"Performance Analysis of Ultra-Dense Millimeter Wave Cloud-RAN under Blockage and Interference","authors":"B. Maham","doi":"10.1109/GLOBECOM46510.2021.9685967","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685967","url":null,"abstract":"In this paper, we consider a downlink Cloud Radio Access Network (Cloud-RAN) transmission, served by multiple beamformed remote radio head (RRHs) coordinated by base band units (BBUs), toward a typical mobile user. Assuming ultra-dense 5G and beyond network operating in millimeter wave (mm-Waves) bands, we modeled channels as a concatenation of Nakagami-m and binary blockage. In addition, it is assumed there are multiple interfering nodes nearby. We evaluate the system performance in terms of outage probability, after calculating channel distributions. Moreover, the impact of random blockage and interference on the performance of Nakagami-blockage channels with multiple RRHs are investigated by simulations.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129497206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effective interoperability and security support for constrained IoT networks 为受限物联网网络提供有效的互操作性和安全支持
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685592
Marion Dumay, D. Barthel, L. Toutain, Julien Lecoeuvre
The Internet of Things (IoT) paradigm brings together various applications and use cases, in several domains such as Smart City, e-Health, Industrial IoT, etc. The characteristics of these applications range from high-data rate streams to sporadic transmissions of small packets, including critical and low-latency traffic. Some of them such as telemetering, smart agriculture, asset tracking and environment monitoring also require an extended coverage and a long battery life (up to 10 years). Both non-3GPP and 3GPP technologies, such as Sigfox, LoraWAN, NB-IoT and LTE-M, were specifically designed to meet these specific requirements, by reducing for instance the bandwidth and the achievable data rate. These networks are so constrained that it is very challenging for them to support a standard, interoperable network stack, including security protocols. Nevertheless, these features would be highly desirable in order to ease and accelerate the deployment of IoT solutions involving various types of devices, from very constrained low-power sensors to high data rate cameras and critical actuators. In this paper, we study standard, interoperable and secure solutions and we show how Static Context Header Compression (SCHC), a generic compression and fragmentation mechanism, can be used to enable their support over constrained IoT networks. With our implementation, typical messages are shrunk from 80-100 bytes down to as little as 20-30 bytes.
物联网(IoT)范式汇集了智能城市、电子医疗、工业物联网等多个领域的各种应用和用例。这些应用程序的特征范围从高数据速率流到小数据包的零星传输,包括关键和低延迟流量。其中一些技术,如遥测、智能农业、资产跟踪和环境监测,还需要更长的覆盖范围和更长的电池寿命(长达10年)。非3GPP和3GPP技术,如Sigfox、LoraWAN、NB-IoT和LTE-M,都是专门为满足这些特定要求而设计的,例如通过降低带宽和可实现的数据速率。这些网络是如此受限,以至于对它们来说,支持一个标准的、可互操作的网络堆栈(包括安全协议)是非常具有挑战性的。然而,为了简化和加速涉及各种类型设备的物联网解决方案的部署,从非常受限的低功耗传感器到高数据速率相机和关键执行器,这些功能将是非常可取的。在本文中,我们研究了标准,可互操作和安全的解决方案,并展示了如何使用静态上下文报头压缩(SCHC),一种通用的压缩和碎片机制,来支持受约束的物联网网络。通过我们的实现,典型的消息从80-100字节缩减到20-30字节。
{"title":"Effective interoperability and security support for constrained IoT networks","authors":"Marion Dumay, D. Barthel, L. Toutain, Julien Lecoeuvre","doi":"10.1109/GLOBECOM46510.2021.9685592","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685592","url":null,"abstract":"The Internet of Things (IoT) paradigm brings together various applications and use cases, in several domains such as Smart City, e-Health, Industrial IoT, etc. The characteristics of these applications range from high-data rate streams to sporadic transmissions of small packets, including critical and low-latency traffic. Some of them such as telemetering, smart agriculture, asset tracking and environment monitoring also require an extended coverage and a long battery life (up to 10 years). Both non-3GPP and 3GPP technologies, such as Sigfox, LoraWAN, NB-IoT and LTE-M, were specifically designed to meet these specific requirements, by reducing for instance the bandwidth and the achievable data rate. These networks are so constrained that it is very challenging for them to support a standard, interoperable network stack, including security protocols. Nevertheless, these features would be highly desirable in order to ease and accelerate the deployment of IoT solutions involving various types of devices, from very constrained low-power sensors to high data rate cameras and critical actuators. In this paper, we study standard, interoperable and secure solutions and we show how Static Context Header Compression (SCHC), a generic compression and fragmentation mechanism, can be used to enable their support over constrained IoT networks. With our implementation, typical messages are shrunk from 80-100 bytes down to as little as 20-30 bytes.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"42 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VehicleCIDS: An Efficient Vehicle Intrusion Detection System Based on Clock Behavior 基于时钟行为的车辆入侵检测系统
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685130
Yilin Zhao, Yijie Xun, Jiajia Liu
Nowadays, more and more external interfaces are added into intelligent and connected vehicles. The in-vehicle network, especially the controller area network (CAN), is no longer a closed environment, which provides more approaches for attackers to invade. To resist attacks, numerous researchers have proposed intrusion detection systems (IDSs). However, attackers can intrude CAN bus in a more advanced way, such as masquerade attack, which leads to failures of most IDS. To counter masquerade attacks, we propose an efficient vehicle IDS based on clock behavior, called VehicleCIDS. First, the system uses recursive least squares (RLS) algorithm to estimate the clock behavior of each electronic control unit (ECU). Then, a statistical method called empirical rule is used to detect attack messages. Finally, it utilizes dynamic time warping (DTW) to identify attackers. The experimental results on real vehicles show that the recognition rate of VehicleCIDS can achieve 98.52% in intrusion detection and 87.71% in attacker identification.
如今,越来越多的外部接口加入到智能网联汽车中。车载网络特别是控制器局域网(CAN)已不再是一个封闭的环境,这为攻击者提供了更多的入侵途径。为了抵御攻击,许多研究人员提出了入侵检测系统(ids)。然而,攻击者可以通过更高级的方式入侵can总线,例如伪装攻击,这导致大多数IDS失败。为了对抗伪装攻击,我们提出了一种基于时钟行为的高效车辆IDS,称为VehicleCIDS。首先,该系统采用递推最小二乘(RLS)算法来估计每个电子控制单元(ECU)的时钟行为。然后,使用一种称为经验规则的统计方法来检测攻击消息。最后,利用动态时间扭曲(DTW)识别攻击者。在真实车辆上的实验结果表明,车辆识别率在入侵检测中达到98.52%,在攻击者识别中达到87.71%。
{"title":"VehicleCIDS: An Efficient Vehicle Intrusion Detection System Based on Clock Behavior","authors":"Yilin Zhao, Yijie Xun, Jiajia Liu","doi":"10.1109/GLOBECOM46510.2021.9685130","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685130","url":null,"abstract":"Nowadays, more and more external interfaces are added into intelligent and connected vehicles. The in-vehicle network, especially the controller area network (CAN), is no longer a closed environment, which provides more approaches for attackers to invade. To resist attacks, numerous researchers have proposed intrusion detection systems (IDSs). However, attackers can intrude CAN bus in a more advanced way, such as masquerade attack, which leads to failures of most IDS. To counter masquerade attacks, we propose an efficient vehicle IDS based on clock behavior, called VehicleCIDS. First, the system uses recursive least squares (RLS) algorithm to estimate the clock behavior of each electronic control unit (ECU). Then, a statistical method called empirical rule is used to detect attack messages. Finally, it utilizes dynamic time warping (DTW) to identify attackers. The experimental results on real vehicles show that the recognition rate of VehicleCIDS can achieve 98.52% in intrusion detection and 87.71% in attacker identification.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129959141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Remote Sensing of Heartbeat based on Space Diversity Using MIMO FMCW Radar 基于空间分集的MIMO FMCW雷达心跳遥感
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685033
Kohei Yamamoto, Koji Endo, T. Ohtsuki
Remote sensing of heartbeat offers various applications in the medical and health care fields. To realize non-contact heartbeat detection, an FMCW (Frequency Modulated Continuous Wave) radar-based heartbeat detection method has been investigated. The conventional FMCW radar-based heartbeat detection method estimates a range from an FMCW radar to a subject and extracts heartbeat components from phase changes for the range. However, the range suitable for extracting heartbeat components can change over time due to respiration and body fluctuation. Thus, when the SNR (Signal-to-Noise Ratio) of heartbeat components over phase changes is low at the estimated range, the accuracy of heartbeat detection tends to degrade. In this paper, we propose a MIMO (Multiple-Input Multiple-Output) FMCW radar-based heartbeat detection method based on space diversity. A MIMO FMCW radar can estimate the range for multiple beam directions and obtain phase changes for a space specified with the range and the beam direction. The SNR of heartbeat components over phase changes differs from one space to another. Taking it into account, the proposed method detects heartbeat by exploiting the space diversity of phase changes. The experimental results showed that compared to the detection method using only one phase change, the proposed method using phase changes for multiple spaces detected heartbeat accurately, which is brought by the diversity effect of phase changes for multiple spaces.
心跳遥感在医疗卫生领域有着广泛的应用。为了实现非接触式心跳检测,研究了一种基于调频连续波雷达的心跳检测方法。传统的基于FMCW雷达的心跳检测方法估计从FMCW雷达到目标的距离,并从该距离的相位变化中提取心跳分量。然而,由于呼吸和身体波动,适合提取心跳成分的范围会随着时间的推移而改变。因此,在估计范围内,当心跳分量在相位变化范围内的信噪比较低时,心跳检测的准确性就会下降。本文提出了一种基于空间分集的MIMO (Multiple-Input Multiple-Output) FMCW雷达心跳检测方法。MIMO FMCW雷达可以估计多个波束方向的距离,并在给定距离和波束方向的空间内获得相位变化。不同空间的心跳分量在相位变化时的信噪比不同。考虑到这一点,该方法利用相位变化的空间分集来检测心跳。实验结果表明,与单相位变化的检测方法相比,多空间相位变化的检测方法能够准确地检测到心跳,这是由多空间相位变化的分集效应带来的。
{"title":"Remote Sensing of Heartbeat based on Space Diversity Using MIMO FMCW Radar","authors":"Kohei Yamamoto, Koji Endo, T. Ohtsuki","doi":"10.1109/GLOBECOM46510.2021.9685033","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685033","url":null,"abstract":"Remote sensing of heartbeat offers various applications in the medical and health care fields. To realize non-contact heartbeat detection, an FMCW (Frequency Modulated Continuous Wave) radar-based heartbeat detection method has been investigated. The conventional FMCW radar-based heartbeat detection method estimates a range from an FMCW radar to a subject and extracts heartbeat components from phase changes for the range. However, the range suitable for extracting heartbeat components can change over time due to respiration and body fluctuation. Thus, when the SNR (Signal-to-Noise Ratio) of heartbeat components over phase changes is low at the estimated range, the accuracy of heartbeat detection tends to degrade. In this paper, we propose a MIMO (Multiple-Input Multiple-Output) FMCW radar-based heartbeat detection method based on space diversity. A MIMO FMCW radar can estimate the range for multiple beam directions and obtain phase changes for a space specified with the range and the beam direction. The SNR of heartbeat components over phase changes differs from one space to another. Taking it into account, the proposed method detects heartbeat by exploiting the space diversity of phase changes. The experimental results showed that compared to the detection method using only one phase change, the proposed method using phase changes for multiple spaces detected heartbeat accurately, which is brought by the diversity effect of phase changes for multiple spaces.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach 基于信令博弈方法保护物联网交易免受双重支出攻击
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685598
Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, A. Benslimane
With considerable demand for higher throughput, greater capacity, and lower latency for consumers, the Internet of Things (IoT) network is anticipated to meet the desired security and privacy requirements. This study provides high transaction throughput on critical IoT applications, particularly Bitcoin security against double-spending attacks. To this end, we investigated the signaling game approach to model the interaction between two miners while considering players behavior (malicious or honest miners) and the incoming transaction throughput. To the best of our knowledge, this is the first work that exploits the signaling game to cover the incoming transactions randomness waiting for validation, which influences the honest miners behavior. With extensive simulations, we show that our proposed signaling game reduces the impact of double-spending attacks on IoT transactions. The results also illustrate the benefit of using the signaling game to model the interaction between two miners while handling the incomplete information of the incoming transactions and the type of miners.
随着消费者对更高吞吐量、更大容量和更低延迟的大量需求,物联网(IoT)网络有望满足所需的安全和隐私要求。这项研究为关键的物联网应用提供了高交易吞吐量,特别是针对双重支出攻击的比特币安全性。为此,我们研究了信号博弈方法,在考虑玩家行为(恶意或诚实的矿工)和传入交易吞吐量的同时,对两个矿工之间的交互进行建模。据我们所知,这是第一个利用信号博弈来覆盖等待验证的传入交易随机性的工作,这会影响诚实矿工的行为。通过广泛的模拟,我们证明了我们提出的信令游戏减少了双重支出攻击对物联网交易的影响。结果还说明了在处理传入交易和矿工类型的不完整信息时,使用信号博弈来模拟两个矿工之间的交互的好处。
{"title":"Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach","authors":"Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, A. Benslimane","doi":"10.1109/GLOBECOM46510.2021.9685598","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685598","url":null,"abstract":"With considerable demand for higher throughput, greater capacity, and lower latency for consumers, the Internet of Things (IoT) network is anticipated to meet the desired security and privacy requirements. This study provides high transaction throughput on critical IoT applications, particularly Bitcoin security against double-spending attacks. To this end, we investigated the signaling game approach to model the interaction between two miners while considering players behavior (malicious or honest miners) and the incoming transaction throughput. To the best of our knowledge, this is the first work that exploits the signaling game to cover the incoming transactions randomness waiting for validation, which influences the honest miners behavior. With extensive simulations, we show that our proposed signaling game reduces the impact of double-spending attacks on IoT transactions. The results also illustrate the benefit of using the signaling game to model the interaction between two miners while handling the incomplete information of the incoming transactions and the type of miners.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Heterogeneous Transfer Learning for Improved Network Service Performance Prediction 基于异构迁移学习的改进网络服务性能预测
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685059
Fernando García Sanz, M. Ebrahimi, A. Johnsson
Transfer learning has been proposed as an approach for leveraging already learned knowledge in a new environment, especially when the amount of training data is limited. However, due to the dynamic nature of future networks and cloud infrastructures, a new environment may differ from the one the model is trained and transferred from. In this paper, we propose and evaluate an approach based on neural networks for heterogeneous transfer learning that addresses model transfer between environments with different input feature sets, which is a natural consequence of network and cloud re-orchestration. We quantify the transfer gain, and empirically show positive gain in a majority of cases. Further, we study the impact of neural-network architectures on the transfer gain, providing tradeoff insights for multiple cases. The evaluation of the approach is performed using data traces collected from a testbed that runs a Video-on-Demand service and a Key-Value Store under various load conditions.
迁移学习被认为是一种在新环境中利用已有知识的方法,特别是在训练数据量有限的情况下。然而,由于未来网络和云基础设施的动态性,新环境可能与模型训练和转移的环境不同。在本文中,我们提出并评估了一种基于神经网络的异构迁移学习方法,该方法解决了具有不同输入特征集的环境之间的模型迁移问题,这是网络和云重新编排的自然结果。我们量化了转移增益,并且在大多数情况下经验显示了正增益。此外,我们研究了神经网络架构对转移增益的影响,为多种情况提供了权衡的见解。该方法的评估是使用从测试平台收集的数据跟踪来执行的,该测试平台在各种负载条件下运行视频点播服务和键值存储。
{"title":"On Heterogeneous Transfer Learning for Improved Network Service Performance Prediction","authors":"Fernando García Sanz, M. Ebrahimi, A. Johnsson","doi":"10.1109/GLOBECOM46510.2021.9685059","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685059","url":null,"abstract":"Transfer learning has been proposed as an approach for leveraging already learned knowledge in a new environment, especially when the amount of training data is limited. However, due to the dynamic nature of future networks and cloud infrastructures, a new environment may differ from the one the model is trained and transferred from. In this paper, we propose and evaluate an approach based on neural networks for heterogeneous transfer learning that addresses model transfer between environments with different input feature sets, which is a natural consequence of network and cloud re-orchestration. We quantify the transfer gain, and empirically show positive gain in a majority of cases. Further, we study the impact of neural-network architectures on the transfer gain, providing tradeoff insights for multiple cases. The evaluation of the approach is performed using data traces collected from a testbed that runs a Video-on-Demand service and a Key-Value Store under various load conditions.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Average Age of Information in Two-Way Relay Networks with Service Preemptions 具有服务抢占的双向中继网络中信息的平均年龄
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685463
Masoumeh Moradian, Aresh Dadlani
In this paper, we aim to derive the average age of information (AAoI) associated with the static link scheduling policies in a buffer-aided two-way relay network, where two sources exchange their updates through an intermediate relay equipped with data buffers. With regard to buffer-aided relaying, we consider the two-mode relaying scheme, where each time slot is dedicated to either broadcast or multiple access mode. Moreover, the link scheduling policy is considered to be static, which randomizes between broadcast and multiple access modes when the relay is backlogged and chooses the multiple access mode, otherwise. We establish AAoI corresponding to the sources in terms of steady-state probabilities of buffers at the relay for different instants of the network. Through numerical results, we show that the joint status of the queues at the relay has a significant effect on determining the optimal static link scheduling policy and further validate our analytical approach via simulations.
在本文中,我们的目标是推导与缓冲辅助双向中继网络中静态链路调度策略相关的平均信息年龄(AAoI),其中两个源通过配备数据缓冲区的中间中继交换其更新。对于缓冲辅助中继,我们考虑了双模中继方案,其中每个时隙专用于广播或多址模式。链路调度策略被认为是静态的,当中继积压时,链路调度策略在广播模式和多址模式之间随机选择,反之则选择多址模式。我们根据网络不同时刻中继处缓冲区的稳态概率建立了与源对应的AAoI。通过数值结果表明,中继上队列的联合状态对确定最优静态链路调度策略有重要影响,并通过仿真进一步验证了本文的分析方法。
{"title":"Average Age of Information in Two-Way Relay Networks with Service Preemptions","authors":"Masoumeh Moradian, Aresh Dadlani","doi":"10.1109/GLOBECOM46510.2021.9685463","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685463","url":null,"abstract":"In this paper, we aim to derive the average age of information (AAoI) associated with the static link scheduling policies in a buffer-aided two-way relay network, where two sources exchange their updates through an intermediate relay equipped with data buffers. With regard to buffer-aided relaying, we consider the two-mode relaying scheme, where each time slot is dedicated to either broadcast or multiple access mode. Moreover, the link scheduling policy is considered to be static, which randomizes between broadcast and multiple access modes when the relay is backlogged and chooses the multiple access mode, otherwise. We establish AAoI corresponding to the sources in terms of steady-state probabilities of buffers at the relay for different instants of the network. Through numerical results, we show that the joint status of the queues at the relay has a significant effect on determining the optimal static link scheduling policy and further validate our analytical approach via simulations.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Weighted Centroid Location Based Spectrum Status Identification in Cognitive Radio Network 基于加权质心定位的认知无线电网络频谱状态识别
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685882
Xiaowei Liang, Bin Shen, Taiping Cui, Longyang Huang
Due to the non-cooperative coexistence mechanism between the primary users (PUs) and secondary users (SUs), seeking secondary spectrum opportunities is usually unreliable by merely relying on traditional spectrum sensing technology. As one kind of auxiliary information, the mutual location information of the PUs and SUs can assist in determining whether the SU's access to the licensed frequency band (LFB) will interfere the PU. Aiming to identify the LFB status at different locations, we propose a low-complexity neighborhood-based weighted centroid localization (NB-WCL) algorithm to first solve the SU localization problem in the cognitive radio network (CRN). The proposed algorithm is therefore capable of setting the LFB-access flag for the SUs subsequently, based on their positioning results. The root mean square error (RMSE) of the proposed two-dimensional position estimation algorithm is analyzed. Theoretical analysis and experimental results suggest that the proposed algorithm outperforms some existing conventional localization algorithms with more robustness and better error performance. The proposed algorithm can serve as a practically effective candidate solution for LFB status identification in the CRN.
由于主用户(pu)和次用户(su)之间存在非合作共存机制,单纯依靠传统的频谱感知技术寻求次频谱机会往往是不可靠的。作为一种辅助信息,PU和SU之间的相互位置信息可以帮助判断SU对LFB (license frequency band)的接入是否会对PU造成干扰。为了识别不同位置的LFB状态,我们提出了一种低复杂度的基于邻域的加权质心定位(NB-WCL)算法,首次解决了认知无线网络(CRN)中的SU定位问题。因此,该算法能够根据su的定位结果,随后为su设置lfb访问标志。分析了二维位置估计算法的均方根误差(RMSE)。理论分析和实验结果表明,该算法比现有的传统定位算法具有更强的鲁棒性和更好的误差性能。该算法可作为CRN中LFB状态识别的一种实际有效的候选解决方案。
{"title":"Weighted Centroid Location Based Spectrum Status Identification in Cognitive Radio Network","authors":"Xiaowei Liang, Bin Shen, Taiping Cui, Longyang Huang","doi":"10.1109/GLOBECOM46510.2021.9685882","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685882","url":null,"abstract":"Due to the non-cooperative coexistence mechanism between the primary users (PUs) and secondary users (SUs), seeking secondary spectrum opportunities is usually unreliable by merely relying on traditional spectrum sensing technology. As one kind of auxiliary information, the mutual location information of the PUs and SUs can assist in determining whether the SU's access to the licensed frequency band (LFB) will interfere the PU. Aiming to identify the LFB status at different locations, we propose a low-complexity neighborhood-based weighted centroid localization (NB-WCL) algorithm to first solve the SU localization problem in the cognitive radio network (CRN). The proposed algorithm is therefore capable of setting the LFB-access flag for the SUs subsequently, based on their positioning results. The root mean square error (RMSE) of the proposed two-dimensional position estimation algorithm is analyzed. Theoretical analysis and experimental results suggest that the proposed algorithm outperforms some existing conventional localization algorithms with more robustness and better error performance. The proposed algorithm can serve as a practically effective candidate solution for LFB status identification in the CRN.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Leader Selection in a Master-Slave Architecture-Based Micro UAV Swarm 基于主从架构的微型无人机群动态领导者选择
Pub Date : 2021-12-01 DOI: 10.1109/GLOBECOM46510.2021.9685538
S. Misra, P. K. Deb, Kartik Saini
In this paper, we present a method for dynamically selecting leaders in a master-slave communication model in a swarm of micro-Unmanned Aerial Vehicles (UAVs). With the growing size of the UAV swarm in complex missions, it becomes a challenge to control them for efficient execution of missions. In a traditional centralized communication model where all UAVs in the swarm are controlled directly through ground control, channel capacity limits the number of UAVs in the swarm which restricts the scalability. In the context of low-power miniature drones, we limit the communication of the ground Base Station (gBS) with only one UAV (leader) which controls the rest of the UAVs (followers). Towards this, we propose a greedy heuristic method for selecting the UAV leader that requires minimal time to communicate with the gBS in real-time. The proposed master-slave model enhances the scalability of the swarm by improving the utilization of channel resources. Simulation results demonstrate that the proposed dynamic leader selection enhances the lifetime of the entire network with a multifold decrease in energy consumption, compared to the state-of-the-art. Additionally, the lifetime of the network also decreases on operating with a single UAV leader. We also observe reductions in delays by almost 60% and an increase in data rate by 50%.
本文提出了一种基于主从通信模型的微型无人机群中领导者的动态选择方法。随着复杂任务中无人机群规模的不断扩大,如何对其进行控制以有效执行任务成为一项挑战。在传统的集中式通信模型中,通过地面控制直接控制群中的所有无人机,信道容量限制了群中无人机的数量,从而限制了可扩展性。在低功耗微型无人机的背景下,我们限制了地面基站(gBS)的通信,只有一架无人机(领导者)控制其余的无人机(追随者)。为此,我们提出了一种贪心启发式方法来选择无人机领导者,该方法需要最少的时间与gBS进行实时通信。提出的主从模型通过提高信道资源利用率来增强群的可扩展性。仿真结果表明,与现有算法相比,所提出的动态领导者选择方法提高了整个网络的寿命,同时能耗降低了数倍。另外,网络的寿命也在使用单个UAV先导时减少。我们还观察到延迟减少了近60%,数据速率增加了50%。
{"title":"Dynamic Leader Selection in a Master-Slave Architecture-Based Micro UAV Swarm","authors":"S. Misra, P. K. Deb, Kartik Saini","doi":"10.1109/GLOBECOM46510.2021.9685538","DOIUrl":"https://doi.org/10.1109/GLOBECOM46510.2021.9685538","url":null,"abstract":"In this paper, we present a method for dynamically selecting leaders in a master-slave communication model in a swarm of micro-Unmanned Aerial Vehicles (UAVs). With the growing size of the UAV swarm in complex missions, it becomes a challenge to control them for efficient execution of missions. In a traditional centralized communication model where all UAVs in the swarm are controlled directly through ground control, channel capacity limits the number of UAVs in the swarm which restricts the scalability. In the context of low-power miniature drones, we limit the communication of the ground Base Station (gBS) with only one UAV (leader) which controls the rest of the UAVs (followers). Towards this, we propose a greedy heuristic method for selecting the UAV leader that requires minimal time to communicate with the gBS in real-time. The proposed master-slave model enhances the scalability of the swarm by improving the utilization of channel resources. Simulation results demonstrate that the proposed dynamic leader selection enhances the lifetime of the entire network with a multifold decrease in energy consumption, compared to the state-of-the-art. Additionally, the lifetime of the network also decreases on operating with a single UAV leader. We also observe reductions in delays by almost 60% and an increase in data rate by 50%.","PeriodicalId":200641,"journal":{"name":"2021 IEEE Global Communications Conference (GLOBECOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129315619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 IEEE Global Communications Conference (GLOBECOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1