首页 > 最新文献

2019 IEEE Globecom Workshops (GC Wkshps)最新文献

英文 中文
Ethernet Transmission over a 100 Gb/s Real-Time Terahertz Wireless Link 通过100gb /s实时太赫兹无线链路传输
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024443
C. Castro, R. Elschner, José Machado, T. Merkle, C. Schubert, R. Freund
In this paper, we evaluate the transmission performance of a real-time 100 Gb/s digital-coherent THz wireless link, operating on a 300-GHz carrier over a LoS distance of 0.5 m in a 2x2 MIMO configuration. Using a 100 Gb/s Ethernet traffic generator, we evaluate throughput, frame losses and latency for different frame sizes and payloads. The link shows a stable long-term performance as reported by pre-FEC BER measurements taken from the real-time modem's DSP over a period of 96 hours.
在本文中,我们评估了实时100gb /s数字相干太赫兹无线链路的传输性能,该链路在300ghz载波上运行,在2x2 MIMO配置下,LoS距离为0.5 m。使用100gb /s以太网流量生成器,我们评估了不同帧大小和有效负载下的吞吐量、帧损失和延迟。根据实时调制解调器的DSP在96小时内进行的fec前误码率测量,该链路显示出稳定的长期性能。
{"title":"Ethernet Transmission over a 100 Gb/s Real-Time Terahertz Wireless Link","authors":"C. Castro, R. Elschner, José Machado, T. Merkle, C. Schubert, R. Freund","doi":"10.1109/GCWkshps45667.2019.9024443","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024443","url":null,"abstract":"In this paper, we evaluate the transmission performance of a real-time 100 Gb/s digital-coherent THz wireless link, operating on a 300-GHz carrier over a LoS distance of 0.5 m in a 2x2 MIMO configuration. Using a 100 Gb/s Ethernet traffic generator, we evaluate throughput, frame losses and latency for different frame sizes and payloads. The link shows a stable long-term performance as reported by pre-FEC BER measurements taken from the real-time modem's DSP over a period of 96 hours.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130590468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Threat Management Dashboard for a Blockchain Collaborative Defense 区块链协同防御的威胁管理仪表板
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024522
Christian Killer, B. Rodrigues, B. Stiller
The increasing number of Distributed Denial-of-Service (DDoS) attacks leads to a growing research and development interest in DDoS defense systems. As a response to the increasingly distributed nature of DDoS attacks, many organizations have demonstrated willingness to exchange information concerning threats, incidents, and mitigation strategies. Blockchain is, in this regard, a viable threat sharing platform, where different organizations can interact in a verifiable manner. This paper tackles the security visualization and management issue in a blockchain-based collaborative defense platform, defining an interactive dashboard displaying on-going threat mitigation status and enabling security analysts to react on threats on an individual or group level. The dashboard was implemented and evaluated on real hardware emulating the exchange of threats between three isolated Autonomous Systems (AS).
随着分布式拒绝服务(DDoS)攻击数量的不断增加,人们对DDoS防御系统的研究和开发越来越感兴趣。为了应对日益分散的DDoS攻击,许多组织都表示愿意交换有关威胁、事件和缓解策略的信息。在这方面,区块链是一个可行的威胁共享平台,不同的组织可以以可验证的方式进行交互。本文解决了基于区块链的协同防御平台中的安全可视化和管理问题,定义了一个交互式仪表板,显示正在进行的威胁缓解状态,并使安全分析师能够在个人或群体层面上对威胁做出反应。仪表板在真实硬件上实现和评估,模拟三个孤立的自治系统(AS)之间的威胁交换。
{"title":"Threat Management Dashboard for a Blockchain Collaborative Defense","authors":"Christian Killer, B. Rodrigues, B. Stiller","doi":"10.1109/GCWkshps45667.2019.9024522","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024522","url":null,"abstract":"The increasing number of Distributed Denial-of-Service (DDoS) attacks leads to a growing research and development interest in DDoS defense systems. As a response to the increasingly distributed nature of DDoS attacks, many organizations have demonstrated willingness to exchange information concerning threats, incidents, and mitigation strategies. Blockchain is, in this regard, a viable threat sharing platform, where different organizations can interact in a verifiable manner. This paper tackles the security visualization and management issue in a blockchain-based collaborative defense platform, defining an interactive dashboard displaying on-going threat mitigation status and enabling security analysts to react on threats on an individual or group level. The dashboard was implemented and evaluated on real hardware emulating the exchange of threats between three isolated Autonomous Systems (AS).","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secrecy-Driven Energy-Efficient Multi-User Computation Offloading via Mobile Edge Computing 基于移动边缘计算的秘密驱动节能多用户计算卸载
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024695
Yuan Wu, Daohang Wang, Xu Xu, L. Qian, Liang Huang, Wei-dang Lu
Mobile edge computing (MEC) has been envisioned as a promising scheme to address the explosive growth of computation-hungry mobile applications in future cellular systems. In this paper, we investigate the secrecy-driven energy-efficient computation offloading via MEC. Specifically, we take the secrecy-outage into account when an eavesdropper overhears the mobile terminal's (MT's) offloaded data to the edge server (ES) and formate a joint optimization of the MT's computation offloading, radio transmission, and secrecy-outage level, with the objective of minimizing the MT's energy consumption for completing its required workload. Despite the non-convexity of the joint optimization problem, we propose an efficient algorithm to find the optimal offloading solution. Based on the optimal solution for an arbitrary offloading pair of MT and ES, we further consider the scenario of multi-MT and multi-ES, and investigate the optimal pairing between the MTs and ESs for computation offloading, with the objective of minimizing all MTs' total energy consumption. Exploiting the matching structure of the pairing problem, we propose an efficient auction-based time-division scheduling algorithm to find the optimal pairing solution. Numerical results are provided to validate the effectiveness and efficiency of our proposed algorithms and the advantage of our computation offloading with secrecy-provisioning.
移动边缘计算(MEC)已被设想为一种有前途的方案,以解决未来蜂窝系统中计算密集型移动应用程序的爆炸式增长。本文研究了基于MEC的保密驱动的节能计算卸载。具体而言,我们考虑了窃听者偷听到移动终端向边缘服务器(ES)卸载数据时的保密中断,并形成了移动终端计算卸载、无线电传输和保密中断水平的联合优化,目标是最小化移动终端完成所需工作所需的能耗。尽管联合优化问题具有非凸性,但我们提出了一种寻找最优卸载解的有效算法。在求解任意MT和ES卸载对最优解的基础上,进一步考虑多MT和多ES的情况,以最小化所有MT和ES的总能耗为目标,研究MT和ES之间的最优配对进行计算卸载。利用配对问题的匹配结构,提出了一种高效的基于拍卖的分时调度算法来寻找配对的最优解。数值结果验证了所提算法的有效性和高效性,以及采用保密配置的计算卸载的优势。
{"title":"Secrecy-Driven Energy-Efficient Multi-User Computation Offloading via Mobile Edge Computing","authors":"Yuan Wu, Daohang Wang, Xu Xu, L. Qian, Liang Huang, Wei-dang Lu","doi":"10.1109/GCWkshps45667.2019.9024695","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024695","url":null,"abstract":"Mobile edge computing (MEC) has been envisioned as a promising scheme to address the explosive growth of computation-hungry mobile applications in future cellular systems. In this paper, we investigate the secrecy-driven energy-efficient computation offloading via MEC. Specifically, we take the secrecy-outage into account when an eavesdropper overhears the mobile terminal's (MT's) offloaded data to the edge server (ES) and formate a joint optimization of the MT's computation offloading, radio transmission, and secrecy-outage level, with the objective of minimizing the MT's energy consumption for completing its required workload. Despite the non-convexity of the joint optimization problem, we propose an efficient algorithm to find the optimal offloading solution. Based on the optimal solution for an arbitrary offloading pair of MT and ES, we further consider the scenario of multi-MT and multi-ES, and investigate the optimal pairing between the MTs and ESs for computation offloading, with the objective of minimizing all MTs' total energy consumption. Exploiting the matching structure of the pairing problem, we propose an efficient auction-based time-division scheduling algorithm to find the optimal pairing solution. Numerical results are provided to validate the effectiveness and efficiency of our proposed algorithms and the advantage of our computation offloading with secrecy-provisioning.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Upload in Mobile Edge Computing over ICN 基于ICN的移动边缘计算数据上传
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024397
Christopher Scherb, Samuel Emde, Claudio Marxer, C. Tschudin
Limited energy capacity and computation power is a common characteristic of mobile but connected devices. Edge computing, i.e. outsourcing computation task to close-by stationary service providers, is a widespread approach to still deploy computation-intensive applications on such devices. However, if moving at high speed (like for instance vehicles or trains), the contact time with network access points are very short (in the range of 3-5sec). Based on this fact, we identify the two challenging situations which are expected to happen very frequently and therefore should be considered when designing the communication system's architecture: (a) A client is connected via different network access points when scheduling a computation and when the result is ready for delivery. (b) A client's network access point changes (potentially several times) while uploading computation arguments or downloading computation results. In this paper, we pursue an information-centric and named-function networking approach to tackle these challenges.
有限的能量容量和计算能力是移动互联设备的共同特征。边缘计算,即将计算任务外包给附近的固定服务提供商,是在此类设备上部署计算密集型应用程序的一种广泛方法。然而,如果在高速移动(例如车辆或火车),与网络接入点的接触时间非常短(在3-5秒的范围内)。基于这一事实,我们确定了两种具有挑战性的情况,这两种情况预计会经常发生,因此在设计通信系统架构时应该考虑到:(a)当调度计算和当结果准备好交付时,客户端通过不同的网络接入点连接。(b)在上传计算参数或下载计算结果时,客户端的网络接入点发生变化(可能多次)。在本文中,我们采用以信息为中心和命名功能的网络方法来解决这些挑战。
{"title":"Data Upload in Mobile Edge Computing over ICN","authors":"Christopher Scherb, Samuel Emde, Claudio Marxer, C. Tschudin","doi":"10.1109/GCWkshps45667.2019.9024397","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024397","url":null,"abstract":"Limited energy capacity and computation power is a common characteristic of mobile but connected devices. Edge computing, i.e. outsourcing computation task to close-by stationary service providers, is a widespread approach to still deploy computation-intensive applications on such devices. However, if moving at high speed (like for instance vehicles or trains), the contact time with network access points are very short (in the range of 3-5sec). Based on this fact, we identify the two challenging situations which are expected to happen very frequently and therefore should be considered when designing the communication system's architecture: (a) A client is connected via different network access points when scheduling a computation and when the result is ready for delivery. (b) A client's network access point changes (potentially several times) while uploading computation arguments or downloading computation results. In this paper, we pursue an information-centric and named-function networking approach to tackle these challenges.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129657168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Gradient Boosted Trees Based Mode Selection Decision for Moving D2D-Enabled Heterogeneous Ultra-Dense Networks 基于梯度增强树的移动d2d异构超密集网络模式选择决策
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024605
Bingying Xu, Xiaodong Xu, Ruolan Zhu
With the evolution of fifth-generation (5G) communication systems toward to heterogeneous ultra-dense networks (H-UDNs). Device-to-device (D2D) communications have been proposed as a promising technology to improve system capacity and user experiences. However, in moving D2D-enabled H- UDNs, it will cause heavy system overhead from the frequent mode selection between D2D mode and cellular mode. In this paper, in order to achieve a trade off between the advantages of D2D communications and system overhead, we propose a Gradient Boosted Trees (GBT) based multi-attribute D2D mode selection decision strategy. The proposed strategy combines Received Signal Strength (RSS), the Signal to Interference plus Noise Ratio (SINR) and moving angle of users to assist base stations (BSs) in selecting the optimal communication mode for user equipments (UEs) in mode selection decision process. Simulation results show that our proposed strategy brings improvements to the mode selection performance, which can be reflected in reducing the mode selection probability and increasing the D2D mode dwell time. Moreover, the system overhead is further reduced and system throughput increases significantly.
随着第五代(5G)通信系统向异构超密集网络(h- udn)演进。设备到设备(D2D)通信被认为是一种很有前途的技术,可以提高系统容量和用户体验。然而,在移动支持D2D的H- udn时,由于D2D模式和蜂窝模式之间的频繁模式选择,将导致沉重的系统开销。为了在D2D通信优势和系统开销之间取得平衡,本文提出了一种基于梯度提升树(Gradient boosting Trees, GBT)的多属性D2D模式选择决策策略。该策略结合接收信号强度(RSS)、信噪比(SINR)和用户移动角度,帮助基站在模式选择决策过程中为用户设备选择最优通信模式。仿真结果表明,该策略提高了模态选择性能,降低了模态选择概率,增加了D2D模态停留时间。此外,系统开销进一步降低,系统吞吐量显著提高。
{"title":"Gradient Boosted Trees Based Mode Selection Decision for Moving D2D-Enabled Heterogeneous Ultra-Dense Networks","authors":"Bingying Xu, Xiaodong Xu, Ruolan Zhu","doi":"10.1109/GCWkshps45667.2019.9024605","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024605","url":null,"abstract":"With the evolution of fifth-generation (5G) communication systems toward to heterogeneous ultra-dense networks (H-UDNs). Device-to-device (D2D) communications have been proposed as a promising technology to improve system capacity and user experiences. However, in moving D2D-enabled H- UDNs, it will cause heavy system overhead from the frequent mode selection between D2D mode and cellular mode. In this paper, in order to achieve a trade off between the advantages of D2D communications and system overhead, we propose a Gradient Boosted Trees (GBT) based multi-attribute D2D mode selection decision strategy. The proposed strategy combines Received Signal Strength (RSS), the Signal to Interference plus Noise Ratio (SINR) and moving angle of users to assist base stations (BSs) in selecting the optimal communication mode for user equipments (UEs) in mode selection decision process. Simulation results show that our proposed strategy brings improvements to the mode selection performance, which can be reflected in reducing the mode selection probability and increasing the D2D mode dwell time. Moreover, the system overhead is further reduced and system throughput increases significantly.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129799533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Roadside Sensor Based Vehicle Counting Incomplex Traffic Environment 复杂交通环境下基于路边传感器的车辆计数
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024473
Zhiqiang Chen, Z. Liu, Yilong Hui, Wengang Li, Changle Li, T. Luan, Guoqiang Mao
The 5G networks are expected to support autonomous driving to enhance driving experience and travel efficiency. Toward this goal, the valuable data generated by the complex and dynamic transportation system need to be collected. In this paper, we propose a roadside sensor-based vehicle counting scheme for collecting traffic flow information in complex traffic environment. In the scheme, the roadside sensor can sense the magnetic data, where the magnetic flux magnitude will be changed if a vehicle passes though the sense coverage of the sensor. Based on this, we first analyze the change of the magnetic signals in the complex traffic environment and process the magnetic signals collected by the roadside sensor. Then, an integrated algorithm is designed to detect and count the traffic flow by considering the features of the collected signals. After this, we carry out experiments to evaluate the performance of the proposed vehicle counting scheme and analyze the vehicle counting error. According to the features of the error, we further design the error compensation strategy to correct the experiment results. Experimental verification results show that the vehicle counting accuracy before and after the error compensation in the complex traffic environment are 97.07% and 98.5%, respectively.
预计5G网络将支持自动驾驶,以提高驾驶体验和出行效率。为了实现这一目标,需要收集复杂而动态的交通系统产生的有价值的数据。本文提出了一种基于路边传感器的车辆计数方案,用于复杂交通环境下的交通流信息采集。在该方案中,路边传感器可以感知磁场数据,当车辆通过传感器的感知覆盖范围时,其磁通量大小会发生变化。在此基础上,我们首先分析了复杂交通环境中磁信号的变化,并对路边传感器采集到的磁信号进行处理。然后,结合采集信号的特征,设计了一种综合的交通流检测和计数算法。在此之后,我们进行了实验来评估所提出的车辆计数方案的性能,并分析了车辆计数误差。根据误差的特点,进一步设计了误差补偿策略,对实验结果进行校正。实验验证结果表明,在复杂交通环境下,误差补偿前后的车辆计数准确率分别为97.07%和98.5%。
{"title":"Roadside Sensor Based Vehicle Counting Incomplex Traffic Environment","authors":"Zhiqiang Chen, Z. Liu, Yilong Hui, Wengang Li, Changle Li, T. Luan, Guoqiang Mao","doi":"10.1109/GCWkshps45667.2019.9024473","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024473","url":null,"abstract":"The 5G networks are expected to support autonomous driving to enhance driving experience and travel efficiency. Toward this goal, the valuable data generated by the complex and dynamic transportation system need to be collected. In this paper, we propose a roadside sensor-based vehicle counting scheme for collecting traffic flow information in complex traffic environment. In the scheme, the roadside sensor can sense the magnetic data, where the magnetic flux magnitude will be changed if a vehicle passes though the sense coverage of the sensor. Based on this, we first analyze the change of the magnetic signals in the complex traffic environment and process the magnetic signals collected by the roadside sensor. Then, an integrated algorithm is designed to detect and count the traffic flow by considering the features of the collected signals. After this, we carry out experiments to evaluate the performance of the proposed vehicle counting scheme and analyze the vehicle counting error. According to the features of the error, we further design the error compensation strategy to correct the experiment results. Experimental verification results show that the vehicle counting accuracy before and after the error compensation in the complex traffic environment are 97.07% and 98.5%, respectively.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
New Degrees of Freedom for Beamforming Manipulation in MIMO Transmission with OAM 基于OAM的MIMO传输波束形成操作的新自由度
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024467
Chao Zhang, Jin Jiang, Yufei Zhao, Xuefeng Jiang
Orbital Angular Momentum (OAM) has been considered as a new dimension in wireless transmission. In Multiple Input Multiple Output (MIMO) system, OAM can also be utilized as the new Degrees of Freedom (DoF) to manipulate the beamforming instead of the traditional Channel State Information (CSI) feedback, so that the computation complexity of the beamforming dramatically decreases, as well as the capacity of the transmission is maintained approaching the upper bound of the MIMO system. For example, this beamforming manipulation with OAM is extremely efficient in the Line of Sight (LoS) MIMO system. In this paper, the mathematical model of the DoF in beamforming manipulation in MIMO with OAM is established. The computation complexity is evaluated, and compared in LoS environment within MIMO, MIMO-OAM, and OAM. The quantitatively simulation confirms the fact that MIMO-OAM has the best trade-off between the capacity and the computation complexity, which gives a consolidated evidence that the MIMOOAM scheme can be adopted as an efficient beamforming scheme in LoS backhaul links between the base station and the self backhaul small cell station, or Near Field Communications (NFC) directly between mobile terminals. Due to these promising applications, MIMO-OAM may become one of the candidate technologies in Beyond 5G (B5G) mobile communications.
轨道角动量(OAM)被认为是无线传输中的一个新维度。在多输入多输出(MIMO)系统中,利用OAM作为新的自由度(DoF)来控制波束形成,而不是传统的信道状态信息(CSI)反馈,从而大大降低波束形成的计算复杂度,并保持接近MIMO系统的上界的传输容量。例如,这种波束形成操作与OAM是非常有效的视线(LoS) MIMO系统。本文建立了带OAM的MIMO波束形成操作中自由度的数学模型。对MIMO、MIMO-OAM和OAM三种算法在LoS环境下的计算复杂度进行了比较。定量仿真结果证实了MIMO-OAM在容量和计算复杂度之间具有最佳的权衡,进一步证明了MIMO-OAM方案可以作为一种高效的波束形成方案用于基站与自回程小蜂窝站之间的LoS回程链路,或直接用于移动终端之间的近场通信(NFC)。由于这些有前景的应用,MIMO-OAM可能成为超越5G (B5G)移动通信的候选技术之一。
{"title":"New Degrees of Freedom for Beamforming Manipulation in MIMO Transmission with OAM","authors":"Chao Zhang, Jin Jiang, Yufei Zhao, Xuefeng Jiang","doi":"10.1109/GCWkshps45667.2019.9024467","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024467","url":null,"abstract":"Orbital Angular Momentum (OAM) has been considered as a new dimension in wireless transmission. In Multiple Input Multiple Output (MIMO) system, OAM can also be utilized as the new Degrees of Freedom (DoF) to manipulate the beamforming instead of the traditional Channel State Information (CSI) feedback, so that the computation complexity of the beamforming dramatically decreases, as well as the capacity of the transmission is maintained approaching the upper bound of the MIMO system. For example, this beamforming manipulation with OAM is extremely efficient in the Line of Sight (LoS) MIMO system. In this paper, the mathematical model of the DoF in beamforming manipulation in MIMO with OAM is established. The computation complexity is evaluated, and compared in LoS environment within MIMO, MIMO-OAM, and OAM. The quantitatively simulation confirms the fact that MIMO-OAM has the best trade-off between the capacity and the computation complexity, which gives a consolidated evidence that the MIMOOAM scheme can be adopted as an efficient beamforming scheme in LoS backhaul links between the base station and the self backhaul small cell station, or Near Field Communications (NFC) directly between mobile terminals. Due to these promising applications, MIMO-OAM may become one of the candidate technologies in Beyond 5G (B5G) mobile communications.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134224540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PhishFry - A Proactive Approach to Classify Phishing Sites Using SCIKIT Learn PhishFry -一个主动的方法来分类使用SCIKIT学习的网络钓鱼网站
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024428
D. Brites, Mingkui Wei
Phishing is a type of malicious attack that involves the fooling of unsuspecting victims into providing or sharing personal information such as names, addresses, and banking information, which may lead to damages to the individual such as identity theft and financial losses. To combat phishing attacks, there have been many strides toward the use of newer technologies instead of conventional approaches such as personnel training and physical security. These technologies involve a proactive approach towards identifying Phishing websites that utilize machine learning and have become more and more efficient. In this paper, a more proactive and online machine learning approach is proposed that utilize features that have been well-accepted among industries and academia. Within the algorithm, prioritizing of features will be broken up into layers, and the output of the tool will be a digital tag that could be included in web browsers for quick identification and classification. If a site is tagged, the website owner will have the opportunity to legitimize the website through a detailed informational session and will allow them to fix any features that may be classified as malevolent in nature.
网络钓鱼是一种恶意攻击,它涉及欺骗毫无防备的受害者提供或共享个人信息,如姓名、地址和银行信息,这可能导致个人损失,如身份盗窃和经济损失。为了打击网络钓鱼攻击,在使用新技术取代人员培训和物理安全等传统方法方面取得了许多进展。这些技术涉及一种主动识别利用机器学习的网络钓鱼网站的方法,并且变得越来越高效。在本文中,提出了一种更积极主动的在线机器学习方法,该方法利用了工业界和学术界已经广泛接受的特征。在该算法中,特征的优先级将被分解为多个层,该工具的输出将是一个数字标签,可以包含在web浏览器中,以便快速识别和分类。如果网站被标记,网站所有者将有机会通过详细的信息会话使网站合法化,并允许他们修复任何可能被归类为恶意性质的功能。
{"title":"PhishFry - A Proactive Approach to Classify Phishing Sites Using SCIKIT Learn","authors":"D. Brites, Mingkui Wei","doi":"10.1109/GCWkshps45667.2019.9024428","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024428","url":null,"abstract":"Phishing is a type of malicious attack that involves the fooling of unsuspecting victims into providing or sharing personal information such as names, addresses, and banking information, which may lead to damages to the individual such as identity theft and financial losses. To combat phishing attacks, there have been many strides toward the use of newer technologies instead of conventional approaches such as personnel training and physical security. These technologies involve a proactive approach towards identifying Phishing websites that utilize machine learning and have become more and more efficient. In this paper, a more proactive and online machine learning approach is proposed that utilize features that have been well-accepted among industries and academia. Within the algorithm, prioritizing of features will be broken up into layers, and the output of the tool will be a digital tag that could be included in web browsers for quick identification and classification. If a site is tagged, the website owner will have the opportunity to legitimize the website through a detailed informational session and will allow them to fix any features that may be classified as malevolent in nature.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133200433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fungus Detection System for Greenhouses Using Wireless Visual Sensor Networks and Machine Learning 基于无线视觉传感器网络和机器学习的温室真菌检测系统
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024412
Asmaa Ali, H. Hassanein
Greenhouses are proliferating across Canada. Greenhouse crop production requires considerable attention. The only way to maintain the production growth is by controlling the greenhouse atmosphere and monitoring the plants so that they remain healthy in the greenhouse. In this paper, we utilize a Wireless Visual Sensor Network (WVSN) with machine learning and image processing to observe any deficiency, pest, or disease presenting on the leaves of the plants. We distribute camera sensors throughout the greenhouse. Each camera sensor node captures an image from inside the greenhouse and use machine learning and image processing techniques to detect the presence of fungus. When a fungus is detected, the camera sensor node sends a message to the sensor node via the wireless sensor network to measure the humidity and then send a message to the actuator to re-set accordingly. This paper demonstrates how Hough forest machine learning and image processing can be successful in detecting fungus present on crop plant leaves from the images taken from camera sensors in the greenhouse. Cross-validation was applied to measure the performance of the system. The results are highly promising. There was a 94% success rate in detecting the fungus.
温室在加拿大遍地开花。温室作物生产需要相当的注意。保持产量增长的唯一方法是控制温室大气和监测植物,使它们在温室中保持健康。在本文中,我们利用具有机器学习和图像处理的无线视觉传感器网络(WVSN)来观察植物叶片上出现的任何缺陷,害虫或疾病。我们在温室里布置了摄像头。每个摄像头传感器节点捕捉温室内部的图像,并使用机器学习和图像处理技术来检测真菌的存在。当检测到真菌时,摄像头传感器节点通过无线传感器网络向传感器节点发送消息,测量湿度,然后发送消息给执行器进行相应的重新设置。本文演示了霍夫森林机器学习和图像处理如何成功地从温室摄像机传感器拍摄的图像中检测出作物叶片上存在的真菌。采用交叉验证来衡量系统的性能。结果非常有希望。检测真菌的成功率为94%。
{"title":"A Fungus Detection System for Greenhouses Using Wireless Visual Sensor Networks and Machine Learning","authors":"Asmaa Ali, H. Hassanein","doi":"10.1109/GCWkshps45667.2019.9024412","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024412","url":null,"abstract":"Greenhouses are proliferating across Canada. Greenhouse crop production requires considerable attention. The only way to maintain the production growth is by controlling the greenhouse atmosphere and monitoring the plants so that they remain healthy in the greenhouse. In this paper, we utilize a Wireless Visual Sensor Network (WVSN) with machine learning and image processing to observe any deficiency, pest, or disease presenting on the leaves of the plants. We distribute camera sensors throughout the greenhouse. Each camera sensor node captures an image from inside the greenhouse and use machine learning and image processing techniques to detect the presence of fungus. When a fungus is detected, the camera sensor node sends a message to the sensor node via the wireless sensor network to measure the humidity and then send a message to the actuator to re-set accordingly. This paper demonstrates how Hough forest machine learning and image processing can be successful in detecting fungus present on crop plant leaves from the images taken from camera sensors in the greenhouse. Cross-validation was applied to measure the performance of the system. The results are highly promising. There was a 94% success rate in detecting the fungus.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Friendly Jamming Assisted Secure Cooperative Multicasting in Cognitive Radio-NOMA Networks 认知无线电- noma网络中友好干扰辅助的安全协同多播
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024423
S. Bhattacharjee
This paper studies physical layer security (PLS) based secure multicasting to a group of cell- edge users in the presence of a passive eavesdropper. In this view, the base station (BS) hires a pair of users from another multicast group located in its vicinity to perform simultaneous relaying and jamming for improving the reception reliability of the weaker users while ensuring minimum interception. The network is modeled using the spectrum efficient CR-NOMA framework whereby the cell-center group designated as secondary user multicast group (SU-MG) is incentivized with spectrum access opportunity for assisting the cell-edge group viewed as primary user multicast group (PU-MG). A secure cooperative multicast NOMA (SCMNOMA) protocol is proposed, and comparative performance analysis in terms of secrecy outage probability (SOP) is presented considering different strategies of relay and jammer selection. Numerical results highlight the importance of the joint selection of the best jammer and the best relay and sharing of total power between them for enhancing the SOP performance of the PUMG. Furthermore, the SOP reduces when the selected relay aims to minimize the interception from the eavesdropper rather than maximizing the capacity of the PU-MG.
本文研究了在无源窃听器存在的情况下,基于物理层安全(PLS)的蜂窝边缘用户安全组播。在这种情况下,基站(BS)从其附近的另一个多播组中租用一对用户进行中继和干扰,以提高较弱用户的接收可靠性,同时确保最小的拦截。该网络使用频谱高效CR-NOMA框架建模,其中指定为辅助用户组播组(SU-MG)的蜂窝中心组被激励为辅助用户组播组(PU-MG)的蜂窝边缘组提供频谱访问机会。提出了一种安全合作组播NOMA (SCMNOMA)协议,并在考虑中继和干扰器选择策略的情况下,从保密中断概率(SOP)的角度进行了性能比较分析。数值计算结果表明,选择最佳干扰器和最佳继电器并共享总功率对于提高脉冲调速器的SOP性能具有重要意义。此外,当所选中继的目标是最小化来自窃听者的拦截而不是最大化PU-MG的容量时,SOP会减少。
{"title":"Friendly Jamming Assisted Secure Cooperative Multicasting in Cognitive Radio-NOMA Networks","authors":"S. Bhattacharjee","doi":"10.1109/GCWkshps45667.2019.9024423","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024423","url":null,"abstract":"This paper studies physical layer security (PLS) based secure multicasting to a group of cell- edge users in the presence of a passive eavesdropper. In this view, the base station (BS) hires a pair of users from another multicast group located in its vicinity to perform simultaneous relaying and jamming for improving the reception reliability of the weaker users while ensuring minimum interception. The network is modeled using the spectrum efficient CR-NOMA framework whereby the cell-center group designated as secondary user multicast group (SU-MG) is incentivized with spectrum access opportunity for assisting the cell-edge group viewed as primary user multicast group (PU-MG). A secure cooperative multicast NOMA (SCMNOMA) protocol is proposed, and comparative performance analysis in terms of secrecy outage probability (SOP) is presented considering different strategies of relay and jammer selection. Numerical results highlight the importance of the joint selection of the best jammer and the best relay and sharing of total power between them for enhancing the SOP performance of the PUMG. Furthermore, the SOP reduces when the selected relay aims to minimize the interception from the eavesdropper rather than maximizing the capacity of the PU-MG.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":" 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132075695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 IEEE Globecom Workshops (GC Wkshps)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1