首页 > 最新文献

2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)最新文献

英文 中文
Implementation and Experimental Evaluation of the Rebalancing Algorithm for Folded Clos Networks 折叠Clos网络再平衡算法的实现与实验评价
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998384
S. Ohta, Daichi Miyamoto
Folded Clos network (FCN) is an important topology as it plays a significant role in building high-performance data center networks. To exchange packets over an FCN, traffic load must be uniformly diffused to fully utilize its high bandwidth. As a method to do this, the rebalancing algorithm was proposed. Previous studies have demonstrated the effectiveness of the method through theoretical analysis and computer simulation. However, its practical feasibility has not been elucidated. Moreover, its performance has not been confirmed on a physical experimental environment. This paper reports how the rebalancing algorithm is implemented on switches built on PCs using software tools supported by the Linux OS. This confirms that it is relatively easy to practically implement the algorithm. In addition, the performance of the implemented algorithm was assessed and compared with that of a conventional method through an experiment. As a result, the rebalancing algorithm was found to be more advantageous in avoiding traffic congestion for heavy traffic and flows with different sizes.
折叠Clos网络(FCN)是一种重要的拓扑结构,在构建高性能数据中心网络中起着重要作用。为了在FCN上交换报文,流量负载必须均匀分散,以充分利用FCN的高带宽。为此,提出了再平衡算法。已有研究通过理论分析和计算机仿真验证了该方法的有效性。然而,其实际可行性尚未得到阐明。此外,它的性能还没有在物理实验环境中得到证实。本文报告了如何使用Linux操作系统支持的软件工具在pc机上构建的交换机上实现再平衡算法。这证实了该算法的实际实现相对容易。此外,通过实验对所实现算法的性能进行了评估,并与传统方法进行了比较。结果表明,再平衡算法在大流量交通和不同规模流的情况下更有利于避免交通拥堵。
{"title":"Implementation and Experimental Evaluation of the Rebalancing Algorithm for Folded Clos Networks","authors":"S. Ohta, Daichi Miyamoto","doi":"10.1109/ITNAC55475.2022.9998384","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998384","url":null,"abstract":"Folded Clos network (FCN) is an important topology as it plays a significant role in building high-performance data center networks. To exchange packets over an FCN, traffic load must be uniformly diffused to fully utilize its high bandwidth. As a method to do this, the rebalancing algorithm was proposed. Previous studies have demonstrated the effectiveness of the method through theoretical analysis and computer simulation. However, its practical feasibility has not been elucidated. Moreover, its performance has not been confirmed on a physical experimental environment. This paper reports how the rebalancing algorithm is implemented on switches built on PCs using software tools supported by the Linux OS. This confirms that it is relatively easy to practically implement the algorithm. In addition, the performance of the implemented algorithm was assessed and compared with that of a conventional method through an experiment. As a result, the rebalancing algorithm was found to be more advantageous in avoiding traffic congestion for heavy traffic and flows with different sizes.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114564148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Adaptive Modulation for Symmetrically Clipped Band-Limited DCO-OFDM 对称裁剪带限DCO-OFDM的自适应调制优化
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998377
Alexander Frömming, L. Häring, A. Czylwik
A multicarrier transmission system with clipping distortion on the transmitting side, additive white Gaussian noise on the receiving side and a frequency-selective channel is considered with respect to adaptive modulation. The investigations are made based on an optical intensity modulated band-limited DC-offset orthogonal frequency-division multiplexing (DCO-OFDM) system. Usually, the frequency-selective channel transfer function determines the bit allocation. In the present scenario, this approach must be adapted, because the clipping noise is distorted by the same channel as the information signal. Therefore, adaptive modulation can no longer achieve a gain when clipping becomes the dominating source of distortion. In this paper, the total signal-to-interference-and-noise power ratio (SINR), considering clipping noise at the transmitter and additive noise at the receiver, is calculated. Based on this result, the optimal bit allocation table (BAT) for each scenario, ranging from no clipping to very strong clipping, can be determined. It is shown that the error probability of a band-limited DCO-OFDM transmission can be approximately halved based on this concept. Additionally, the optimal transmit power to achieve the lowest error probability in a given system can be theoretically calculated. The results are verified by simulations.
考虑了一种多载波传输系统的自适应调制,该系统在发射端存在裁剪失真,在接收端存在加性高斯白噪声,并具有频率选择信道。本文基于光强调制带限dc偏置正交频分复用(DCO-OFDM)系统进行了研究。通常,选频信道传递函数决定比特分配。在目前的情况下,必须采用这种方法,因为裁剪噪声被与信息信号相同的信道所扭曲。因此,当裁剪成为失真的主要来源时,自适应调制不再能够获得增益。本文计算了考虑发送端裁剪噪声和接收端加性噪声的总信噪比(SINR)。基于此结果,可以确定每个场景的最佳位分配表(BAT),范围从无裁剪到非常强的裁剪。结果表明,基于此概念,带限DCO-OFDM传输的误差概率可以减半。此外,还可以从理论上计算出在给定系统中实现最小误差概率的最优发射功率。仿真结果验证了结果的正确性。
{"title":"Optimizing Adaptive Modulation for Symmetrically Clipped Band-Limited DCO-OFDM","authors":"Alexander Frömming, L. Häring, A. Czylwik","doi":"10.1109/ITNAC55475.2022.9998377","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998377","url":null,"abstract":"A multicarrier transmission system with clipping distortion on the transmitting side, additive white Gaussian noise on the receiving side and a frequency-selective channel is considered with respect to adaptive modulation. The investigations are made based on an optical intensity modulated band-limited DC-offset orthogonal frequency-division multiplexing (DCO-OFDM) system. Usually, the frequency-selective channel transfer function determines the bit allocation. In the present scenario, this approach must be adapted, because the clipping noise is distorted by the same channel as the information signal. Therefore, adaptive modulation can no longer achieve a gain when clipping becomes the dominating source of distortion. In this paper, the total signal-to-interference-and-noise power ratio (SINR), considering clipping noise at the transmitter and additive noise at the receiver, is calculated. Based on this result, the optimal bit allocation table (BAT) for each scenario, ranging from no clipping to very strong clipping, can be determined. It is shown that the error probability of a band-limited DCO-OFDM transmission can be approximately halved based on this concept. Additionally, the optimal transmit power to achieve the lowest error probability in a given system can be theoretically calculated. The results are verified by simulations.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130571394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimum NN Algorithms Parameters on the UJIIndoorLoc for Wi-Fi Fingerprinting Indoor Positioning Systems 基于UJIIndoorLoc的Wi-Fi指纹室内定位系统最优NN算法参数
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998385
Eman Ebaid, K. Navaie
Wi-Fi fingerprinting techniques are commonly used in Indoor Positioning Systems (IPS) as Wi-Fi signal is available in most indoor settings. In such systems, the position is estimated based on a matching algorithm between the enquiry points and the recorded fingerprint data. In this paper, our objective is to investigate and provide quantitative insight into the performance of various Nearest Neighbour (NN) algorithms. The NN algorithms such as KNN are also often employed in IPS. We extensively study the performance of several NN algorithms on a publicly available dataset, UJIIndoorLoc. Furthermore, we propose an improved version of the Weighted KNN algorithm. The proposed model outperforms the existing works on the UJIIndoorLoc dataset and achieves better results for the success rate and the mean positioning error.
Wi-Fi指纹识别技术通常用于室内定位系统(IPS),因为大多数室内环境都有Wi-Fi信号。在这种系统中,根据查询点与所记录的指纹数据之间的匹配算法估计所述位置。在本文中,我们的目标是调查并提供对各种最近邻(NN)算法性能的定量洞察。像KNN这样的神经网络算法也经常被用于IPS。我们在一个公开可用的数据集UJIIndoorLoc上广泛研究了几种神经网络算法的性能。此外,我们提出了加权KNN算法的改进版本。该模型在UJIIndoorLoc数据集上优于已有的工作,在成功率和平均定位误差方面都取得了更好的结果。
{"title":"Optimum NN Algorithms Parameters on the UJIIndoorLoc for Wi-Fi Fingerprinting Indoor Positioning Systems","authors":"Eman Ebaid, K. Navaie","doi":"10.1109/ITNAC55475.2022.9998385","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998385","url":null,"abstract":"Wi-Fi fingerprinting techniques are commonly used in Indoor Positioning Systems (IPS) as Wi-Fi signal is available in most indoor settings. In such systems, the position is estimated based on a matching algorithm between the enquiry points and the recorded fingerprint data. In this paper, our objective is to investigate and provide quantitative insight into the performance of various Nearest Neighbour (NN) algorithms. The NN algorithms such as KNN are also often employed in IPS. We extensively study the performance of several NN algorithms on a publicly available dataset, UJIIndoorLoc. Furthermore, we propose an improved version of the Weighted KNN algorithm. The proposed model outperforms the existing works on the UJIIndoorLoc dataset and achieves better results for the success rate and the mean positioning error.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128809990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Low-Complexity Approach for Constructing the Optimal Binary Finite-Length Block Code 构造最优二进制有限长分组码的一种低复杂度方法
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998390
Dongsheng Zheng, Zijiang Zhou, Wenyao Li, B. Jiao
Improving the bit error rate (BER) performance of finite-length block code is required in the scenarios of ultra-reliable and low latency communications. Nonetheless, the complexity of algorithms to find such a high performance block code increases dramatically as blocklength increases. Towards this end, the paper proposes a low-complexity recursive algorithm to search the optimal binary block codes subject to the requirement of the minimum Hamming distance. As a result, two optimal code sets of code-length 16 and 32 are found with code rate of 1/2. The simulation results show that the constructed codes under binary phase shift keying (BPSK) modulation outperform the systematic polar codes in the same blocklength in terms of the BER performance.
提高有限长度分组码的误码率(BER)性能是实现超可靠、低时延通信的迫切要求。尽管如此,随着块长度的增加,寻找这样一个高性能块代码的算法的复杂性急剧增加。为此,本文提出了一种低复杂度的递归算法,在最小汉明距离的要求下搜索最优二进制分组码。结果发现两个码长为16和32的最优码集,码率为1/2。仿真结果表明,在二进制相移键控(BPSK)调制下构造的码在误码率方面优于相同块长度的系统极性码。
{"title":"A Low-Complexity Approach for Constructing the Optimal Binary Finite-Length Block Code","authors":"Dongsheng Zheng, Zijiang Zhou, Wenyao Li, B. Jiao","doi":"10.1109/ITNAC55475.2022.9998390","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998390","url":null,"abstract":"Improving the bit error rate (BER) performance of finite-length block code is required in the scenarios of ultra-reliable and low latency communications. Nonetheless, the complexity of algorithms to find such a high performance block code increases dramatically as blocklength increases. Towards this end, the paper proposes a low-complexity recursive algorithm to search the optimal binary block codes subject to the requirement of the minimum Hamming distance. As a result, two optimal code sets of code-length 16 and 32 are found with code rate of 1/2. The simulation results show that the constructed codes under binary phase shift keying (BPSK) modulation outperform the systematic polar codes in the same blocklength in terms of the BER performance.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Approaching Objects at Intersection Using on-Vehicle 3D-LiDAR for Automated Driving Vehicle 基于车载3d激光雷达的自动驾驶车辆交叉口逼近物体探测
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998404
Yuki Komatsu, Shin Kato, M. Itami
In our research, we developed a method for detecting approaching objects at intersection by focusing on geometric features of point cloud obtained from 3D-LiDAR, without using pre-generated maps to understand the environment. This method can be applied to intersection with diagonal crossings, and can detect approaching vehicles and pedestrians at distances of up to 49 m and 38 m, respectively. The results also showed that the detection was robust and continuous. Furthermore, this process can be used in 50 ms per a frame, so that can be used in real time. This will lead to collision prediction and judgment of starting for automated vehicles.
在我们的研究中,我们开发了一种方法,通过关注从3D-LiDAR获得的点云的几何特征来检测交叉口接近的物体,而不使用预生成的地图来了解环境。该方法可应用于具有对角线交叉路口的交叉口,可以分别检测距离为49米和38米的接近车辆和行人。结果表明,该方法具有较好的鲁棒性和连续性。此外,这个过程可以在每帧50毫秒内使用,因此可以实时使用。这将导致自动驾驶汽车的碰撞预测和启动判断。
{"title":"Detecting Approaching Objects at Intersection Using on-Vehicle 3D-LiDAR for Automated Driving Vehicle","authors":"Yuki Komatsu, Shin Kato, M. Itami","doi":"10.1109/ITNAC55475.2022.9998404","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998404","url":null,"abstract":"In our research, we developed a method for detecting approaching objects at intersection by focusing on geometric features of point cloud obtained from 3D-LiDAR, without using pre-generated maps to understand the environment. This method can be applied to intersection with diagonal crossings, and can detect approaching vehicles and pedestrians at distances of up to 49 m and 38 m, respectively. The results also showed that the detection was robust and continuous. Furthermore, this process can be used in 50 ms per a frame, so that can be used in real time. This will lead to collision prediction and judgment of starting for automated vehicles.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault-Tolerant Static Scheduling and Routing for In-vehicle Networks 车载网络的容错静态调度与路由
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998340
Ammad Ali Syed, S. Ayaz, T. Leinmüller, Madhu Chandra
Reliability is considered the paramount requirement of the future vehicle which requires a huge amount of safety-critical data traversing through the in-vehicle network (IVN). To achieve reliability in Ethernet-based IVN, time-sensitive network (TSN) proposes a fault-tolerant mechanism called frame replication and elimination for reliability (FRER) in IEEE 802.1 CB standard. In this paper, fault-tolerant joint scheduling and routing of static applications is developed which considers TSN's time-aware shaper (TAS) and FRER standards. The fault-tolerant scheduling and routing problem is formulated as a mixed-integer programming (MIP) model and solved with a CPLEX optimizer. Furthermore, a cuckoo search based meta-heuristic is developed to achieve scalable schedule solutions. Experimental results show that the cuckoo search takes 5.7 min to schedules 90 flows and utilizes 8% more bins as compared to the optimal solution.
可靠性被认为是未来车辆的首要要求,这需要通过车载网络(IVN)传输大量安全关键数据。为了实现基于以太网的IVN的可靠性,时间敏感网络TSN (time-sensitive network)在IEEE 802.1 CB标准中提出了帧复制和消除可靠性(frame replication and elimination for reliability, FRER)的容错机制。考虑TSN的时间感知整形器(TAS)和FRER标准,研究了静态应用的容错联合调度和路由问题。将容错调度和路由问题表述为一个混合整数规划(MIP)模型,并用CPLEX优化器进行求解。在此基础上,提出了一种基于布谷鸟搜索的元启发式算法。实验结果表明,与最优方案相比,布谷鸟搜索调度90个流需要5.7 min,使用的箱数增加了8%。
{"title":"Fault-Tolerant Static Scheduling and Routing for In-vehicle Networks","authors":"Ammad Ali Syed, S. Ayaz, T. Leinmüller, Madhu Chandra","doi":"10.1109/ITNAC55475.2022.9998340","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998340","url":null,"abstract":"Reliability is considered the paramount requirement of the future vehicle which requires a huge amount of safety-critical data traversing through the in-vehicle network (IVN). To achieve reliability in Ethernet-based IVN, time-sensitive network (TSN) proposes a fault-tolerant mechanism called frame replication and elimination for reliability (FRER) in IEEE 802.1 CB standard. In this paper, fault-tolerant joint scheduling and routing of static applications is developed which considers TSN's time-aware shaper (TAS) and FRER standards. The fault-tolerant scheduling and routing problem is formulated as a mixed-integer programming (MIP) model and solved with a CPLEX optimizer. Furthermore, a cuckoo search based meta-heuristic is developed to achieve scalable schedule solutions. Experimental results show that the cuckoo search takes 5.7 min to schedules 90 flows and utilizes 8% more bins as compared to the optimal solution.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"9 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120999131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling Road Side Units with Optical Access Networks: Planning and Techno-Economic Analysis 用光接入网实现路旁单元:规划和技术经济分析
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998406
Camilo Anzola-Rojas, R. J. D. Barroso, I. de Miguel, J. Aguado, N. Merayo, P. Fernández, R. Lorenzo, E. Abril
The upcoming Connected and cooperative and automated mobility paradigm (CCAM) requires the deployment of road-side units (RSUs) beside the roads to provide wireless communication to connected-vehicle on board units. The deployment of RSUs along the highways provide low-latency communication, suitable for applications where high-speed response is needed, such as autonomous driving and crash avoidance. These RSUs must be connected to the Internet through a high-bandwidth and reliable access network being the optical fiber technologies the most convenient technology for that. In this paper, we propose a planning scheme for enabling RSUs with optical access networks. The method starts choosing the locations of the access network headers (the connection points to the local service provider facilities), and then defines the connections between the headers and the RSUs in a convenient manner considering the road infrastructure. Then, two deployment technologies based on optical fibers are compared: Point to Point (P2P) and Passive Optical Network (PON). A techno-economic analysis was performed, and results show that P2P and PON approaches are very similar in terms of cost, therefore, due to technical advantages, P2P is recommended as deployment strategy for the described scenario.
即将到来的互联、协作和自动化移动范式(CCAM)要求在道路旁部署路侧单元(rsu),为车载连接单元提供无线通信。在高速公路沿线部署rsu可提供低延迟通信,适用于需要高速响应的应用,例如自动驾驶和防撞。这些rsu必须通过高带宽和可靠的接入网连接到互联网,而光纤技术是最方便的技术。在本文中,我们提出了一种使能rsu与光接入网的规划方案。该方法首先选择接入网头(到本地服务提供商设施的连接点)的位置,然后考虑到道路基础设施,以方便的方式定义头与rsu之间的连接。然后,比较了基于光纤的两种部署技术:点对点(P2P)和无源光网络(PON)。进行了技术经济分析,结果表明P2P和PON方法在成本方面非常相似,因此,由于技术优势,建议将P2P作为所描述场景的部署策略。
{"title":"Enabling Road Side Units with Optical Access Networks: Planning and Techno-Economic Analysis","authors":"Camilo Anzola-Rojas, R. J. D. Barroso, I. de Miguel, J. Aguado, N. Merayo, P. Fernández, R. Lorenzo, E. Abril","doi":"10.1109/ITNAC55475.2022.9998406","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998406","url":null,"abstract":"The upcoming Connected and cooperative and automated mobility paradigm (CCAM) requires the deployment of road-side units (RSUs) beside the roads to provide wireless communication to connected-vehicle on board units. The deployment of RSUs along the highways provide low-latency communication, suitable for applications where high-speed response is needed, such as autonomous driving and crash avoidance. These RSUs must be connected to the Internet through a high-bandwidth and reliable access network being the optical fiber technologies the most convenient technology for that. In this paper, we propose a planning scheme for enabling RSUs with optical access networks. The method starts choosing the locations of the access network headers (the connection points to the local service provider facilities), and then defines the connections between the headers and the RSUs in a convenient manner considering the road infrastructure. Then, two deployment technologies based on optical fibers are compared: Point to Point (P2P) and Passive Optical Network (PON). A techno-economic analysis was performed, and results show that P2P and PON approaches are very similar in terms of cost, therefore, due to technical advantages, P2P is recommended as deployment strategy for the described scenario.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks AAiBA:吸引对手增加无线传感器网络中的基站匿名性
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998341
S. Alsemairi
Wireless sensor networks (WSNs) have become one of the most interesting research areas in recent years. A WSN is mainly composed of a set of homogeneous sensor nodes and an in-situ base-station (BS) that are randomly deployed within a delimited area of interest. These sensor nodes sense the area and transmit the sensed data to the BS through multiple wireless communication hops. In addition to data collection, the BS performs highly complex management functions and controls the entire network. The importance of the BS in a WSN makes the BS a high-value target for an adversary that wants to disable the network. To launch a denial-of-service attack on the BS, an adversary intercepts the data transmissions sent to the BS and uses evidence theory as a technique of traffic analysis to find the BS. This paper proposes a technique to counter the attack and increase the BS's anonymity by creating cells and choosing HoneyCells from the created cells; the HoneyCells mimic the BS cell and attract the adversary's attention. Simulation results show that the proposed technique provides better BS anonymity.
无线传感器网络(WSNs)是近年来最受关注的研究领域之一。WSN主要由一组均匀传感器节点和一个原位基站(BS)组成,这些节点随机部署在指定的感兴趣区域内。这些传感器节点感知区域,并通过多个无线通信跳将感知到的数据传输到BS。除了数据收集之外,BS还执行高度复杂的管理功能,控制整个网络。无线传感器网络中BS的重要性使其成为攻击者想要破坏网络的高价值目标。攻击者拦截发送到服务器的数据传输,并利用证据理论作为流量分析技术找到服务器,从而对服务器发起拒绝服务攻击。本文提出了一种通过创建蜂窝并从所创建的蜂窝中选择honeycell来对抗攻击并增加BS匿名性的技术;蜂蜜细胞模仿BS细胞,吸引对手的注意力。仿真结果表明,该方法具有较好的BS匿名性。
{"title":"AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks","authors":"S. Alsemairi","doi":"10.1109/ITNAC55475.2022.9998341","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998341","url":null,"abstract":"Wireless sensor networks (WSNs) have become one of the most interesting research areas in recent years. A WSN is mainly composed of a set of homogeneous sensor nodes and an in-situ base-station (BS) that are randomly deployed within a delimited area of interest. These sensor nodes sense the area and transmit the sensed data to the BS through multiple wireless communication hops. In addition to data collection, the BS performs highly complex management functions and controls the entire network. The importance of the BS in a WSN makes the BS a high-value target for an adversary that wants to disable the network. To launch a denial-of-service attack on the BS, an adversary intercepts the data transmissions sent to the BS and uses evidence theory as a technique of traffic analysis to find the BS. This paper proposes a technique to counter the attack and increase the BS's anonymity by creating cells and choosing HoneyCells from the created cells; the HoneyCells mimic the BS cell and attract the adversary's attention. Simulation results show that the proposed technique provides better BS anonymity.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partitioning and Placement of Deep Neural Networks on Distributed Edge Devices to Maximize Inference Throughput 深度神经网络在分布式边缘设备上的划分和放置以最大化推理吞吐量
Pub Date : 2022-10-21 DOI: 10.1109/ITNAC55475.2022.9998427
Arjun Parthasarathy, B. Krishnamachari
Edge inference has become more widespread, as its diverse applications range from retail to wearable technology. Clusters of networked resource-constrained edge devices are becoming common, yet no system exists to split a DNN across these clusters while maximizing the inference throughput of the system. We present an algorithm which partitions DNNs and distributes them across a set of edge devices with the goal of minimizing the bottleneck latency and therefore maximizing inference throughput. The system scales well to systems of different node memory capacities and numbers of nodes. We find that we can reduce the bottleneck latency by 10× over a random algorithm and 35% over a greedy joint partitioning-placement algorithm. Furthermore we find empirically that for the set of representative models we tested, the algorithm produces results within 9.2% of the optimal bottleneck latency.
边缘推理已经变得越来越广泛,因为它的应用范围从零售到可穿戴技术。网络资源受限边缘设备集群正变得越来越普遍,但目前还没有系统能够在这些集群之间分割DNN,同时最大限度地提高系统的推理吞吐量。我们提出了一种算法,该算法将dnn分区并将它们分布在一组边缘设备上,目的是最大限度地减少瓶颈延迟,从而最大化推理吞吐量。该系统可以很好地扩展到具有不同节点内存容量和节点数量的系统。我们发现我们可以将瓶颈延迟比随机算法减少10倍,比贪婪联合分区-放置算法减少35%。此外,我们从经验上发现,对于我们测试的一组代表性模型,该算法产生的结果在最佳瓶颈延迟的9.2%以内。
{"title":"Partitioning and Placement of Deep Neural Networks on Distributed Edge Devices to Maximize Inference Throughput","authors":"Arjun Parthasarathy, B. Krishnamachari","doi":"10.1109/ITNAC55475.2022.9998427","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998427","url":null,"abstract":"Edge inference has become more widespread, as its diverse applications range from retail to wearable technology. Clusters of networked resource-constrained edge devices are becoming common, yet no system exists to split a DNN across these clusters while maximizing the inference throughput of the system. We present an algorithm which partitions DNNs and distributes them across a set of edge devices with the goal of minimizing the bottleneck latency and therefore maximizing inference throughput. The system scales well to systems of different node memory capacities and numbers of nodes. We find that we can reduce the bottleneck latency by 10× over a random algorithm and 35% over a greedy joint partitioning-placement algorithm. Furthermore we find empirically that for the set of representative models we tested, the algorithm produces results within 9.2% of the optimal bottleneck latency.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Intrusion Detection System in a Light Bulb 一个灯泡中的网络入侵检测系统
Pub Date : 2022-10-06 DOI: 10.1109/ITNAC55475.2022.9998371
Liam Daly Manocchio, S. Layeghy, Marius Portmann
Internet of Things (IoT) devices are progressively being utilised in a variety of edge applications to monitor and control home and industry infrastructure. Due to the limited compute and energy resources, active security protections are usually minimal in many IoT devices. This has created a critical security challenge that has attracted researchers' attention in the field of network security. Despite a large number of proposed Network Intrusion Detection Systems (NIDSs), there is limited research into practical IoT implementations, and to the best of our knowledge, no edge-based NIDS has been demonstrated to operate on common low-power chipsets found in the majority of IoT devices, such as the ESP8266. This research aims to address this gap by pushing the boundaries on low-power Machine Learning (ML) based NIDSs. We propose and develop an efficient and low-power ML-based NIDS, and demonstrate its applicability for IoT edge applications by running it on a typical smart light bulb. We also evaluate our system against other proposed edge-based NIDSs and show that our model has a higher detection performance, and is significantly faster and smaller, and therefore more applicable to a wider range of IoT edge devices.
物联网(IoT)设备正逐步应用于各种边缘应用,以监控家庭和工业基础设施。由于有限的计算和能源资源,在许多物联网设备中,主动安全保护通常是最小的。这给网络安全领域带来了严峻的安全挑战,引起了研究人员的关注。尽管提出了大量的网络入侵检测系统(NIDS),但对实际物联网实施的研究有限,据我们所知,没有基于边缘的NIDS被证明可以在大多数物联网设备(如ESP8266)中的常见低功耗芯片组上运行。本研究旨在通过推动基于低功耗机器学习(ML)的nids的边界来解决这一差距。我们提出并开发了一种高效、低功耗的基于ml的NIDS,并通过在典型的智能灯泡上运行它来演示其对物联网边缘应用的适用性。我们还针对其他提出的基于边缘的nids评估了我们的系统,并表明我们的模型具有更高的检测性能,并且速度更快,体积更小,因此更适用于更广泛的物联网边缘设备。
{"title":"Network Intrusion Detection System in a Light Bulb","authors":"Liam Daly Manocchio, S. Layeghy, Marius Portmann","doi":"10.1109/ITNAC55475.2022.9998371","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998371","url":null,"abstract":"Internet of Things (IoT) devices are progressively being utilised in a variety of edge applications to monitor and control home and industry infrastructure. Due to the limited compute and energy resources, active security protections are usually minimal in many IoT devices. This has created a critical security challenge that has attracted researchers' attention in the field of network security. Despite a large number of proposed Network Intrusion Detection Systems (NIDSs), there is limited research into practical IoT implementations, and to the best of our knowledge, no edge-based NIDS has been demonstrated to operate on common low-power chipsets found in the majority of IoT devices, such as the ESP8266. This research aims to address this gap by pushing the boundaries on low-power Machine Learning (ML) based NIDSs. We propose and develop an efficient and low-power ML-based NIDS, and demonstrate its applicability for IoT edge applications by running it on a typical smart light bulb. We also evaluate our system against other proposed edge-based NIDSs and show that our model has a higher detection performance, and is significantly faster and smaller, and therefore more applicable to a wider range of IoT edge devices.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122561376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1