首页 > 最新文献

2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)最新文献

英文 中文
Implementation and Experimental Evaluation of the Rebalancing Algorithm for Folded Clos Networks 折叠Clos网络再平衡算法的实现与实验评价
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998384
S. Ohta, Daichi Miyamoto
Folded Clos network (FCN) is an important topology as it plays a significant role in building high-performance data center networks. To exchange packets over an FCN, traffic load must be uniformly diffused to fully utilize its high bandwidth. As a method to do this, the rebalancing algorithm was proposed. Previous studies have demonstrated the effectiveness of the method through theoretical analysis and computer simulation. However, its practical feasibility has not been elucidated. Moreover, its performance has not been confirmed on a physical experimental environment. This paper reports how the rebalancing algorithm is implemented on switches built on PCs using software tools supported by the Linux OS. This confirms that it is relatively easy to practically implement the algorithm. In addition, the performance of the implemented algorithm was assessed and compared with that of a conventional method through an experiment. As a result, the rebalancing algorithm was found to be more advantageous in avoiding traffic congestion for heavy traffic and flows with different sizes.
折叠Clos网络(FCN)是一种重要的拓扑结构,在构建高性能数据中心网络中起着重要作用。为了在FCN上交换报文,流量负载必须均匀分散,以充分利用FCN的高带宽。为此,提出了再平衡算法。已有研究通过理论分析和计算机仿真验证了该方法的有效性。然而,其实际可行性尚未得到阐明。此外,它的性能还没有在物理实验环境中得到证实。本文报告了如何使用Linux操作系统支持的软件工具在pc机上构建的交换机上实现再平衡算法。这证实了该算法的实际实现相对容易。此外,通过实验对所实现算法的性能进行了评估,并与传统方法进行了比较。结果表明,再平衡算法在大流量交通和不同规模流的情况下更有利于避免交通拥堵。
{"title":"Implementation and Experimental Evaluation of the Rebalancing Algorithm for Folded Clos Networks","authors":"S. Ohta, Daichi Miyamoto","doi":"10.1109/ITNAC55475.2022.9998384","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998384","url":null,"abstract":"Folded Clos network (FCN) is an important topology as it plays a significant role in building high-performance data center networks. To exchange packets over an FCN, traffic load must be uniformly diffused to fully utilize its high bandwidth. As a method to do this, the rebalancing algorithm was proposed. Previous studies have demonstrated the effectiveness of the method through theoretical analysis and computer simulation. However, its practical feasibility has not been elucidated. Moreover, its performance has not been confirmed on a physical experimental environment. This paper reports how the rebalancing algorithm is implemented on switches built on PCs using software tools supported by the Linux OS. This confirms that it is relatively easy to practically implement the algorithm. In addition, the performance of the implemented algorithm was assessed and compared with that of a conventional method through an experiment. As a result, the rebalancing algorithm was found to be more advantageous in avoiding traffic congestion for heavy traffic and flows with different sizes.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114564148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Sequential Dispatching Policies 论顺序调度策略
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998339
Esa Hyytiä, Rhonda Righter
Job dispatching appears in many communication and computer systems. In this paper, we present a classification of dispatching policies according to their scalability, and introduce the class of sequential dispatching policies. These, highly scalable policies are a special case of index policies. By means of numerical examples, we show that efficient, practically optimal, dispatching may be achieved by a sequential policy, or a simple dynamic variant of such a policy, under heavy load. These numerical examples suggests that efficient and scalable load balancing can often be realized by simple primitive dispatching elements amenable also for machine learning based approaches.
作业调度出现在许多通信和计算机系统中。本文根据调度策略的可扩展性对调度策略进行了分类,并引入了顺序调度策略的分类。这些高度可伸缩的策略是索引策略的一种特殊情况。通过数值实例,我们证明了在高负荷下,有效的、实际上最优的调度可以通过顺序策略或这种策略的简单动态变体来实现。这些数值例子表明,高效和可扩展的负载平衡通常可以通过简单的原始调度元素来实现,也适用于基于机器学习的方法。
{"title":"On Sequential Dispatching Policies","authors":"Esa Hyytiä, Rhonda Righter","doi":"10.1109/ITNAC55475.2022.9998339","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998339","url":null,"abstract":"Job dispatching appears in many communication and computer systems. In this paper, we present a classification of dispatching policies according to their scalability, and introduce the class of sequential dispatching policies. These, highly scalable policies are a special case of index policies. By means of numerical examples, we show that efficient, practically optimal, dispatching may be achieved by a sequential policy, or a simple dynamic variant of such a policy, under heavy load. These numerical examples suggests that efficient and scalable load balancing can often be realized by simple primitive dispatching elements amenable also for machine learning based approaches.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123415858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Channel Sounding Measurements for 5G Campus Networks in Industrial Environments 工业环境下5G校园网信道探测测量
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998355
M. Knitter, R. Kays
To allow 5G deployments in challenging environments and for special use cases like 5G radio positioning, authorities reserve a part of the radio spectrum for privately owned campus networks. Such deployments require a characterization of the communication channel in the specific environment to fit to application requirements. This paper presents results on a channel sounding measurement series in an industrial environment. The sounding approach, based on 5G wideband downlink test signal channel estimation, only uses widely available equipment and may serve as a template for easy but efficient channel sounding in such environments. The arriving measurement results give some insights on special challenges regarding network coverage and radio positioning in industrial environments.
为了允许5G在具有挑战性的环境中部署,以及5G无线电定位等特殊用例,当局为私有校园网保留了一部分无线电频谱。这样的部署需要对特定环境中的通信通道进行表征,以适应应用程序需求。本文介绍了在工业环境下通道测深系列测量的结果。基于5G宽带下行测试信号信道估计的探测方法只使用广泛可用的设备,可以作为在这种环境下简单而高效的信道探测模板。到达的测量结果对工业环境中网络覆盖和无线电定位的特殊挑战提供了一些见解。
{"title":"Channel Sounding Measurements for 5G Campus Networks in Industrial Environments","authors":"M. Knitter, R. Kays","doi":"10.1109/ITNAC55475.2022.9998355","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998355","url":null,"abstract":"To allow 5G deployments in challenging environments and for special use cases like 5G radio positioning, authorities reserve a part of the radio spectrum for privately owned campus networks. Such deployments require a characterization of the communication channel in the specific environment to fit to application requirements. This paper presents results on a channel sounding measurement series in an industrial environment. The sounding approach, based on 5G wideband downlink test signal channel estimation, only uses widely available equipment and may serve as a template for easy but efficient channel sounding in such environments. The arriving measurement results give some insights on special challenges regarding network coverage and radio positioning in industrial environments.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"30 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dispersion Compensating using Chirped Fiber Bragg Grating for Multiple Optical Bands 基于啁啾光纤光栅的多波段色散补偿
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998350
Muhammad Towfiqur Rahman, Tasnim Sabiha
Applications of fiber bragg gratings (FBG) in optical communication are a growing area. Recently, there has been a lot of interest in the creation and use of chirped FBGs, which are distinguished by a non-uniform modulation of the refractive index within an optical fiber core. Chromatic dispersion (CD) in pulse broadening and inter symbol interference (ISI) at the light detector significantly affect high-speed optical networks. The wavelength range where optical fibers have a low transmission loss is where fiber-optic communication is mostly carried out. Five wavelength bands make up this low-loss wavelength zone, which has a range of 1260 to 1625 nm. In this study we compared three different optical bands with different chirped FBG lengths to tackle the chromatic dispersion compensation containing 10 Gbps data speed. The single-mode fiber length and quality factor (Q) are minimally improved by the combination of four UFBG and CFBG design technique. By implementing quality factor (Q) of the available SMF are improved by using the combination. The best results have been seen for correcting chromatic dispersion by implementing quality factor (Q) of the available SMF are improved by using the combination. We consider Q-factor, eye diagram, and BER as a performance indicator of the system.
光纤bragg光栅在光通信中的应用是一个新兴的领域。最近,人们对啁啾光纤光栅的创建和使用产生了很大的兴趣,这种光纤光栅的特点是光纤芯内折射率的非均匀调制。脉冲展宽中的色散和光探测器的码间干扰对高速光网络有重要影响。光纤传输损耗低的波长范围是光纤通信主要进行的波长范围。五个波段组成了这个低损耗波长区,其范围为1260至1625纳米。在本研究中,我们比较了三种不同啁啾光纤光栅长度的不同光学波段,以解决包含10 Gbps数据速度的色散补偿问题。采用四种UFBG和CFBG相结合的设计技术,对单模光纤长度和品质因子(Q)的改善最小。通过实现质量因子(Q)的有效SMF使用组合提高。通过对可用SMF的质量因子Q进行校正,获得了较好的色散校正效果。我们考虑了q因子、眼图和误码率作为系统的性能指标。
{"title":"Dispersion Compensating using Chirped Fiber Bragg Grating for Multiple Optical Bands","authors":"Muhammad Towfiqur Rahman, Tasnim Sabiha","doi":"10.1109/ITNAC55475.2022.9998350","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998350","url":null,"abstract":"Applications of fiber bragg gratings (FBG) in optical communication are a growing area. Recently, there has been a lot of interest in the creation and use of chirped FBGs, which are distinguished by a non-uniform modulation of the refractive index within an optical fiber core. Chromatic dispersion (CD) in pulse broadening and inter symbol interference (ISI) at the light detector significantly affect high-speed optical networks. The wavelength range where optical fibers have a low transmission loss is where fiber-optic communication is mostly carried out. Five wavelength bands make up this low-loss wavelength zone, which has a range of 1260 to 1625 nm. In this study we compared three different optical bands with different chirped FBG lengths to tackle the chromatic dispersion compensation containing 10 Gbps data speed. The single-mode fiber length and quality factor (Q) are minimally improved by the combination of four UFBG and CFBG design technique. By implementing quality factor (Q) of the available SMF are improved by using the combination. The best results have been seen for correcting chromatic dispersion by implementing quality factor (Q) of the available SMF are improved by using the combination. We consider Q-factor, eye diagram, and BER as a performance indicator of the system.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125882684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Approaching Objects at Intersection Using on-Vehicle 3D-LiDAR for Automated Driving Vehicle 基于车载3d激光雷达的自动驾驶车辆交叉口逼近物体探测
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998404
Yuki Komatsu, Shin Kato, M. Itami
In our research, we developed a method for detecting approaching objects at intersection by focusing on geometric features of point cloud obtained from 3D-LiDAR, without using pre-generated maps to understand the environment. This method can be applied to intersection with diagonal crossings, and can detect approaching vehicles and pedestrians at distances of up to 49 m and 38 m, respectively. The results also showed that the detection was robust and continuous. Furthermore, this process can be used in 50 ms per a frame, so that can be used in real time. This will lead to collision prediction and judgment of starting for automated vehicles.
在我们的研究中,我们开发了一种方法,通过关注从3D-LiDAR获得的点云的几何特征来检测交叉口接近的物体,而不使用预生成的地图来了解环境。该方法可应用于具有对角线交叉路口的交叉口,可以分别检测距离为49米和38米的接近车辆和行人。结果表明,该方法具有较好的鲁棒性和连续性。此外,这个过程可以在每帧50毫秒内使用,因此可以实时使用。这将导致自动驾驶汽车的碰撞预测和启动判断。
{"title":"Detecting Approaching Objects at Intersection Using on-Vehicle 3D-LiDAR for Automated Driving Vehicle","authors":"Yuki Komatsu, Shin Kato, M. Itami","doi":"10.1109/ITNAC55475.2022.9998404","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998404","url":null,"abstract":"In our research, we developed a method for detecting approaching objects at intersection by focusing on geometric features of point cloud obtained from 3D-LiDAR, without using pre-generated maps to understand the environment. This method can be applied to intersection with diagonal crossings, and can detect approaching vehicles and pedestrians at distances of up to 49 m and 38 m, respectively. The results also showed that the detection was robust and continuous. Furthermore, this process can be used in 50 ms per a frame, so that can be used in real time. This will lead to collision prediction and judgment of starting for automated vehicles.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault-Tolerant Static Scheduling and Routing for In-vehicle Networks 车载网络的容错静态调度与路由
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998340
Ammad Ali Syed, S. Ayaz, T. Leinmüller, Madhu Chandra
Reliability is considered the paramount requirement of the future vehicle which requires a huge amount of safety-critical data traversing through the in-vehicle network (IVN). To achieve reliability in Ethernet-based IVN, time-sensitive network (TSN) proposes a fault-tolerant mechanism called frame replication and elimination for reliability (FRER) in IEEE 802.1 CB standard. In this paper, fault-tolerant joint scheduling and routing of static applications is developed which considers TSN's time-aware shaper (TAS) and FRER standards. The fault-tolerant scheduling and routing problem is formulated as a mixed-integer programming (MIP) model and solved with a CPLEX optimizer. Furthermore, a cuckoo search based meta-heuristic is developed to achieve scalable schedule solutions. Experimental results show that the cuckoo search takes 5.7 min to schedules 90 flows and utilizes 8% more bins as compared to the optimal solution.
可靠性被认为是未来车辆的首要要求,这需要通过车载网络(IVN)传输大量安全关键数据。为了实现基于以太网的IVN的可靠性,时间敏感网络TSN (time-sensitive network)在IEEE 802.1 CB标准中提出了帧复制和消除可靠性(frame replication and elimination for reliability, FRER)的容错机制。考虑TSN的时间感知整形器(TAS)和FRER标准,研究了静态应用的容错联合调度和路由问题。将容错调度和路由问题表述为一个混合整数规划(MIP)模型,并用CPLEX优化器进行求解。在此基础上,提出了一种基于布谷鸟搜索的元启发式算法。实验结果表明,与最优方案相比,布谷鸟搜索调度90个流需要5.7 min,使用的箱数增加了8%。
{"title":"Fault-Tolerant Static Scheduling and Routing for In-vehicle Networks","authors":"Ammad Ali Syed, S. Ayaz, T. Leinmüller, Madhu Chandra","doi":"10.1109/ITNAC55475.2022.9998340","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998340","url":null,"abstract":"Reliability is considered the paramount requirement of the future vehicle which requires a huge amount of safety-critical data traversing through the in-vehicle network (IVN). To achieve reliability in Ethernet-based IVN, time-sensitive network (TSN) proposes a fault-tolerant mechanism called frame replication and elimination for reliability (FRER) in IEEE 802.1 CB standard. In this paper, fault-tolerant joint scheduling and routing of static applications is developed which considers TSN's time-aware shaper (TAS) and FRER standards. The fault-tolerant scheduling and routing problem is formulated as a mixed-integer programming (MIP) model and solved with a CPLEX optimizer. Furthermore, a cuckoo search based meta-heuristic is developed to achieve scalable schedule solutions. Experimental results show that the cuckoo search takes 5.7 min to schedules 90 flows and utilizes 8% more bins as compared to the optimal solution.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"9 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120999131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling Road Side Units with Optical Access Networks: Planning and Techno-Economic Analysis 用光接入网实现路旁单元:规划和技术经济分析
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998406
Camilo Anzola-Rojas, R. J. D. Barroso, I. de Miguel, J. Aguado, N. Merayo, P. Fernández, R. Lorenzo, E. Abril
The upcoming Connected and cooperative and automated mobility paradigm (CCAM) requires the deployment of road-side units (RSUs) beside the roads to provide wireless communication to connected-vehicle on board units. The deployment of RSUs along the highways provide low-latency communication, suitable for applications where high-speed response is needed, such as autonomous driving and crash avoidance. These RSUs must be connected to the Internet through a high-bandwidth and reliable access network being the optical fiber technologies the most convenient technology for that. In this paper, we propose a planning scheme for enabling RSUs with optical access networks. The method starts choosing the locations of the access network headers (the connection points to the local service provider facilities), and then defines the connections between the headers and the RSUs in a convenient manner considering the road infrastructure. Then, two deployment technologies based on optical fibers are compared: Point to Point (P2P) and Passive Optical Network (PON). A techno-economic analysis was performed, and results show that P2P and PON approaches are very similar in terms of cost, therefore, due to technical advantages, P2P is recommended as deployment strategy for the described scenario.
即将到来的互联、协作和自动化移动范式(CCAM)要求在道路旁部署路侧单元(rsu),为车载连接单元提供无线通信。在高速公路沿线部署rsu可提供低延迟通信,适用于需要高速响应的应用,例如自动驾驶和防撞。这些rsu必须通过高带宽和可靠的接入网连接到互联网,而光纤技术是最方便的技术。在本文中,我们提出了一种使能rsu与光接入网的规划方案。该方法首先选择接入网头(到本地服务提供商设施的连接点)的位置,然后考虑到道路基础设施,以方便的方式定义头与rsu之间的连接。然后,比较了基于光纤的两种部署技术:点对点(P2P)和无源光网络(PON)。进行了技术经济分析,结果表明P2P和PON方法在成本方面非常相似,因此,由于技术优势,建议将P2P作为所描述场景的部署策略。
{"title":"Enabling Road Side Units with Optical Access Networks: Planning and Techno-Economic Analysis","authors":"Camilo Anzola-Rojas, R. J. D. Barroso, I. de Miguel, J. Aguado, N. Merayo, P. Fernández, R. Lorenzo, E. Abril","doi":"10.1109/ITNAC55475.2022.9998406","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998406","url":null,"abstract":"The upcoming Connected and cooperative and automated mobility paradigm (CCAM) requires the deployment of road-side units (RSUs) beside the roads to provide wireless communication to connected-vehicle on board units. The deployment of RSUs along the highways provide low-latency communication, suitable for applications where high-speed response is needed, such as autonomous driving and crash avoidance. These RSUs must be connected to the Internet through a high-bandwidth and reliable access network being the optical fiber technologies the most convenient technology for that. In this paper, we propose a planning scheme for enabling RSUs with optical access networks. The method starts choosing the locations of the access network headers (the connection points to the local service provider facilities), and then defines the connections between the headers and the RSUs in a convenient manner considering the road infrastructure. Then, two deployment technologies based on optical fibers are compared: Point to Point (P2P) and Passive Optical Network (PON). A techno-economic analysis was performed, and results show that P2P and PON approaches are very similar in terms of cost, therefore, due to technical advantages, P2P is recommended as deployment strategy for the described scenario.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks AAiBA:吸引对手增加无线传感器网络中的基站匿名性
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998341
S. Alsemairi
Wireless sensor networks (WSNs) have become one of the most interesting research areas in recent years. A WSN is mainly composed of a set of homogeneous sensor nodes and an in-situ base-station (BS) that are randomly deployed within a delimited area of interest. These sensor nodes sense the area and transmit the sensed data to the BS through multiple wireless communication hops. In addition to data collection, the BS performs highly complex management functions and controls the entire network. The importance of the BS in a WSN makes the BS a high-value target for an adversary that wants to disable the network. To launch a denial-of-service attack on the BS, an adversary intercepts the data transmissions sent to the BS and uses evidence theory as a technique of traffic analysis to find the BS. This paper proposes a technique to counter the attack and increase the BS's anonymity by creating cells and choosing HoneyCells from the created cells; the HoneyCells mimic the BS cell and attract the adversary's attention. Simulation results show that the proposed technique provides better BS anonymity.
无线传感器网络(WSNs)是近年来最受关注的研究领域之一。WSN主要由一组均匀传感器节点和一个原位基站(BS)组成,这些节点随机部署在指定的感兴趣区域内。这些传感器节点感知区域,并通过多个无线通信跳将感知到的数据传输到BS。除了数据收集之外,BS还执行高度复杂的管理功能,控制整个网络。无线传感器网络中BS的重要性使其成为攻击者想要破坏网络的高价值目标。攻击者拦截发送到服务器的数据传输,并利用证据理论作为流量分析技术找到服务器,从而对服务器发起拒绝服务攻击。本文提出了一种通过创建蜂窝并从所创建的蜂窝中选择honeycell来对抗攻击并增加BS匿名性的技术;蜂蜜细胞模仿BS细胞,吸引对手的注意力。仿真结果表明,该方法具有较好的BS匿名性。
{"title":"AAiBA: Attracting an Adversary for Increasing Base-Station Anonymity in Wireless Sensor Networks","authors":"S. Alsemairi","doi":"10.1109/ITNAC55475.2022.9998341","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998341","url":null,"abstract":"Wireless sensor networks (WSNs) have become one of the most interesting research areas in recent years. A WSN is mainly composed of a set of homogeneous sensor nodes and an in-situ base-station (BS) that are randomly deployed within a delimited area of interest. These sensor nodes sense the area and transmit the sensed data to the BS through multiple wireless communication hops. In addition to data collection, the BS performs highly complex management functions and controls the entire network. The importance of the BS in a WSN makes the BS a high-value target for an adversary that wants to disable the network. To launch a denial-of-service attack on the BS, an adversary intercepts the data transmissions sent to the BS and uses evidence theory as a technique of traffic analysis to find the BS. This paper proposes a technique to counter the attack and increase the BS's anonymity by creating cells and choosing HoneyCells from the created cells; the HoneyCells mimic the BS cell and attract the adversary's attention. Simulation results show that the proposed technique provides better BS anonymity.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partitioning and Placement of Deep Neural Networks on Distributed Edge Devices to Maximize Inference Throughput 深度神经网络在分布式边缘设备上的划分和放置以最大化推理吞吐量
Pub Date : 2022-10-21 DOI: 10.1109/ITNAC55475.2022.9998427
Arjun Parthasarathy, B. Krishnamachari
Edge inference has become more widespread, as its diverse applications range from retail to wearable technology. Clusters of networked resource-constrained edge devices are becoming common, yet no system exists to split a DNN across these clusters while maximizing the inference throughput of the system. We present an algorithm which partitions DNNs and distributes them across a set of edge devices with the goal of minimizing the bottleneck latency and therefore maximizing inference throughput. The system scales well to systems of different node memory capacities and numbers of nodes. We find that we can reduce the bottleneck latency by 10× over a random algorithm and 35% over a greedy joint partitioning-placement algorithm. Furthermore we find empirically that for the set of representative models we tested, the algorithm produces results within 9.2% of the optimal bottleneck latency.
边缘推理已经变得越来越广泛,因为它的应用范围从零售到可穿戴技术。网络资源受限边缘设备集群正变得越来越普遍,但目前还没有系统能够在这些集群之间分割DNN,同时最大限度地提高系统的推理吞吐量。我们提出了一种算法,该算法将dnn分区并将它们分布在一组边缘设备上,目的是最大限度地减少瓶颈延迟,从而最大化推理吞吐量。该系统可以很好地扩展到具有不同节点内存容量和节点数量的系统。我们发现我们可以将瓶颈延迟比随机算法减少10倍,比贪婪联合分区-放置算法减少35%。此外,我们从经验上发现,对于我们测试的一组代表性模型,该算法产生的结果在最佳瓶颈延迟的9.2%以内。
{"title":"Partitioning and Placement of Deep Neural Networks on Distributed Edge Devices to Maximize Inference Throughput","authors":"Arjun Parthasarathy, B. Krishnamachari","doi":"10.1109/ITNAC55475.2022.9998427","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998427","url":null,"abstract":"Edge inference has become more widespread, as its diverse applications range from retail to wearable technology. Clusters of networked resource-constrained edge devices are becoming common, yet no system exists to split a DNN across these clusters while maximizing the inference throughput of the system. We present an algorithm which partitions DNNs and distributes them across a set of edge devices with the goal of minimizing the bottleneck latency and therefore maximizing inference throughput. The system scales well to systems of different node memory capacities and numbers of nodes. We find that we can reduce the bottleneck latency by 10× over a random algorithm and 35% over a greedy joint partitioning-placement algorithm. Furthermore we find empirically that for the set of representative models we tested, the algorithm produces results within 9.2% of the optimal bottleneck latency.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Intrusion Detection System in a Light Bulb 一个灯泡中的网络入侵检测系统
Pub Date : 2022-10-06 DOI: 10.1109/ITNAC55475.2022.9998371
Liam Daly Manocchio, S. Layeghy, Marius Portmann
Internet of Things (IoT) devices are progressively being utilised in a variety of edge applications to monitor and control home and industry infrastructure. Due to the limited compute and energy resources, active security protections are usually minimal in many IoT devices. This has created a critical security challenge that has attracted researchers' attention in the field of network security. Despite a large number of proposed Network Intrusion Detection Systems (NIDSs), there is limited research into practical IoT implementations, and to the best of our knowledge, no edge-based NIDS has been demonstrated to operate on common low-power chipsets found in the majority of IoT devices, such as the ESP8266. This research aims to address this gap by pushing the boundaries on low-power Machine Learning (ML) based NIDSs. We propose and develop an efficient and low-power ML-based NIDS, and demonstrate its applicability for IoT edge applications by running it on a typical smart light bulb. We also evaluate our system against other proposed edge-based NIDSs and show that our model has a higher detection performance, and is significantly faster and smaller, and therefore more applicable to a wider range of IoT edge devices.
物联网(IoT)设备正逐步应用于各种边缘应用,以监控家庭和工业基础设施。由于有限的计算和能源资源,在许多物联网设备中,主动安全保护通常是最小的。这给网络安全领域带来了严峻的安全挑战,引起了研究人员的关注。尽管提出了大量的网络入侵检测系统(NIDS),但对实际物联网实施的研究有限,据我们所知,没有基于边缘的NIDS被证明可以在大多数物联网设备(如ESP8266)中的常见低功耗芯片组上运行。本研究旨在通过推动基于低功耗机器学习(ML)的nids的边界来解决这一差距。我们提出并开发了一种高效、低功耗的基于ml的NIDS,并通过在典型的智能灯泡上运行它来演示其对物联网边缘应用的适用性。我们还针对其他提出的基于边缘的nids评估了我们的系统,并表明我们的模型具有更高的检测性能,并且速度更快,体积更小,因此更适用于更广泛的物联网边缘设备。
{"title":"Network Intrusion Detection System in a Light Bulb","authors":"Liam Daly Manocchio, S. Layeghy, Marius Portmann","doi":"10.1109/ITNAC55475.2022.9998371","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998371","url":null,"abstract":"Internet of Things (IoT) devices are progressively being utilised in a variety of edge applications to monitor and control home and industry infrastructure. Due to the limited compute and energy resources, active security protections are usually minimal in many IoT devices. This has created a critical security challenge that has attracted researchers' attention in the field of network security. Despite a large number of proposed Network Intrusion Detection Systems (NIDSs), there is limited research into practical IoT implementations, and to the best of our knowledge, no edge-based NIDS has been demonstrated to operate on common low-power chipsets found in the majority of IoT devices, such as the ESP8266. This research aims to address this gap by pushing the boundaries on low-power Machine Learning (ML) based NIDSs. We propose and develop an efficient and low-power ML-based NIDS, and demonstrate its applicability for IoT edge applications by running it on a typical smart light bulb. We also evaluate our system against other proposed edge-based NIDSs and show that our model has a higher detection performance, and is significantly faster and smaller, and therefore more applicable to a wider range of IoT edge devices.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122561376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1