Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024691
Yong Wang, Shasha Wang, Mu Zhou, Wei Nie, Xiaolong Yang, Z. Tian
This paper proposes a deep learning based twostream time series hand gesture recognition method using the frequency modulated continuous wave (FMCW) radar. Firstly, we collect the hand gesture data by the FMCW radar, and the range and Doppler of the hand gesture are estimated by the 2 dimensional Fast Fourier Transform (2D-FFT). Then, the angle of hand gesture is estimated by Multiple Signal classification (MUSIC) algorithm. Afterward, we construct the Range- Doppler Map (RDM), and generate the Angle-Time Map (ATM) via multiframe accumulation. The interference in RDM is filtered out by peak interference cancellation, and the hand gesture feature in RDM and ATM are enhanced by wavelet transform. A systematic of two-stream time series neural network is designed for gesture feature extraction and classification. The experimental results show that the recognition accuracy rate for each type hand gesture of the proposed method is higher than 95%.
{"title":"Two-Stream Time Sequential Network Based Hand Gesture Recognition Method Using Radar Sensor","authors":"Yong Wang, Shasha Wang, Mu Zhou, Wei Nie, Xiaolong Yang, Z. Tian","doi":"10.1109/GCWkshps45667.2019.9024691","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024691","url":null,"abstract":"This paper proposes a deep learning based twostream time series hand gesture recognition method using the frequency modulated continuous wave (FMCW) radar. Firstly, we collect the hand gesture data by the FMCW radar, and the range and Doppler of the hand gesture are estimated by the 2 dimensional Fast Fourier Transform (2D-FFT). Then, the angle of hand gesture is estimated by Multiple Signal classification (MUSIC) algorithm. Afterward, we construct the Range- Doppler Map (RDM), and generate the Angle-Time Map (ATM) via multiframe accumulation. The interference in RDM is filtered out by peak interference cancellation, and the hand gesture feature in RDM and ATM are enhanced by wavelet transform. A systematic of two-stream time series neural network is designed for gesture feature extraction and classification. The experimental results show that the recognition accuracy rate for each type hand gesture of the proposed method is higher than 95%.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123599945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024471
Chaoyi Wan, Yanxiang Jiang, F. Zheng, Pengcheng Zhu, Xiqi Gao, X. You
In this paper, delay and energy efficiency (EE) are investigated in three-tier fog radio access networks (F-RANs) with hybrid caching. By using tools from stochastic geometry, we firstly derive tractable expressions of delay for coded cached, non-partitioned cached and uncached files. Then, we derive tractable expressions of EE by jointly considering power consumed in circuits, transmissions and backhaul links. To balance delay and EE, the corresponding multi-objective optimization problem is formulated to obtain the optimal hybrid caching strategy. Numerical results show the flexibility of the proposed optimal hybrid caching strategy in delay-sensitive and EE-sensitive scenarios, and that fog access point (F-AP) density has a more significant impact on delay-sensitive scenarios than EE-sensitive scenarios.
{"title":"Analysis of Delay and Energy Efficiency in Fog Radio Access Networks with Hybrid Caching","authors":"Chaoyi Wan, Yanxiang Jiang, F. Zheng, Pengcheng Zhu, Xiqi Gao, X. You","doi":"10.1109/GCWkshps45667.2019.9024471","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024471","url":null,"abstract":"In this paper, delay and energy efficiency (EE) are investigated in three-tier fog radio access networks (F-RANs) with hybrid caching. By using tools from stochastic geometry, we firstly derive tractable expressions of delay for coded cached, non-partitioned cached and uncached files. Then, we derive tractable expressions of EE by jointly considering power consumed in circuits, transmissions and backhaul links. To balance delay and EE, the corresponding multi-objective optimization problem is formulated to obtain the optimal hybrid caching strategy. Numerical results show the flexibility of the proposed optimal hybrid caching strategy in delay-sensitive and EE-sensitive scenarios, and that fog access point (F-AP) density has a more significant impact on delay-sensitive scenarios than EE-sensitive scenarios.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122563439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024660
Raheleh Moallemi, Arash Bozorgchenani, D. Tarchi
Fog computing is an emerging model, complementing the cloud computing platform, introduced to support the Internet of Things (IoT) processing requests at the edge of the network. Smart-living IoT scenarios require the execution of multiple processing tasks at the edge of the network and leveraging on the Fog Computing approach results to be a worthwhile solution. Genetic Algorithms (GA) are a heuristic search and optimization class of techniques inspired by natural evolution. We propose two GA-based approaches for optimizing the processing task placement in a fog computing edge infrastructure aiming to support the Smart-living IoT nodes requests. The numerical results obtained in Matlab show that both GA-based approaches allow to maximize the covered areas while minimizing the resource wastage through the minimization of the overlapping areas.
{"title":"An Evolutionary-Based Algorithm for Smart-Living Applications Placement in Fog Networks","authors":"Raheleh Moallemi, Arash Bozorgchenani, D. Tarchi","doi":"10.1109/GCWkshps45667.2019.9024660","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024660","url":null,"abstract":"Fog computing is an emerging model, complementing the cloud computing platform, introduced to support the Internet of Things (IoT) processing requests at the edge of the network. Smart-living IoT scenarios require the execution of multiple processing tasks at the edge of the network and leveraging on the Fog Computing approach results to be a worthwhile solution. Genetic Algorithms (GA) are a heuristic search and optimization class of techniques inspired by natural evolution. We propose two GA-based approaches for optimizing the processing task placement in a fog computing edge infrastructure aiming to support the Smart-living IoT nodes requests. The numerical results obtained in Matlab show that both GA-based approaches allow to maximize the covered areas while minimizing the resource wastage through the minimization of the overlapping areas.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024537
Shubham Arora, S. Goel, P. Chhikara, Harpreet Singh, Neeraj Kumar, P. Rana
The emission of the harmful CO2 in the environ- mental from the traditional fuel based vehicles is one of the major factors for the rise and popularity of electric vehicles (EVs) in the modern smart cities in the recent years. In this context, EVs provide an eco-friendly environment in the modern smart city. But, there exists many challenges (such as smart charging, path planning, information dissemination etc) for the usage of EVs in the modern smart city. So, there is a need for the new techniques and solutions to improve the efficiency of the existing charging system of the EVs. Keeping focus on these points, this paper proposes a new technique for the electric vehicle wireless charging using RFID tags alongwith an optimized path planning to have an optimal charging cost. In the proposed scheme, the application of RFID tags located at various points across the city is used to have an efficient payment system during EVs charging. To illustrate the proposed scheme, an algorithm which provides the navigation is also designed. The performance of the proposed scheme is tested keeping in view of the mobility of the EVs for an optimal path finding. The results obtained prove the effectiveness of the proposed solution.
{"title":"An Efficient Scheme for Wireless Charging of Electric Vehicles Using RFID with an Optimal Path Planning","authors":"Shubham Arora, S. Goel, P. Chhikara, Harpreet Singh, Neeraj Kumar, P. Rana","doi":"10.1109/GCWkshps45667.2019.9024537","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024537","url":null,"abstract":"The emission of the harmful CO2 in the environ- mental from the traditional fuel based vehicles is one of the major factors for the rise and popularity of electric vehicles (EVs) in the modern smart cities in the recent years. In this context, EVs provide an eco-friendly environment in the modern smart city. But, there exists many challenges (such as smart charging, path planning, information dissemination etc) for the usage of EVs in the modern smart city. So, there is a need for the new techniques and solutions to improve the efficiency of the existing charging system of the EVs. Keeping focus on these points, this paper proposes a new technique for the electric vehicle wireless charging using RFID tags alongwith an optimized path planning to have an optimal charging cost. In the proposed scheme, the application of RFID tags located at various points across the city is used to have an efficient payment system during EVs charging. To illustrate the proposed scheme, an algorithm which provides the navigation is also designed. The performance of the proposed scheme is tested keeping in view of the mobility of the EVs for an optimal path finding. The results obtained prove the effectiveness of the proposed solution.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024392
Jie Jiang, Yibo Yan, Mengyu Zhang, Binchao Yin, Yumeng Jiang, Tong Yang, Xiaoming Li, Tengjiao Wang
Hash tables have been broadly used in many security applications. These applications require fast query speed and high memory efficiency. However, the query speed degrades when hash collisions happen. The design goal of this paper is to achieve high load factor as well as fast query at the same time. In this paper, we propose a novel hashing scheme, namely the Shifting Hash Table (SHT), which consists of two parts. The first part is an enhanced version of the Bloom filter checking which subtable(s) may contain the incoming items, and the second part contains a cuckoo hashing based hash table which stores the key-value pairs. The key technique of this paper is that we divide items into two categories: at-home and abroad. We only insert the second kind of items (abroad) into the Bloom filter, thus the memory usage of the filter is significantly reduced. We conducted extensive experiments and the results show that SHT significantly outperforms the state-of-the-art. Specifically, SHT can query an item using on average less than 1.05 bucket probes and even using 1 bit per entry in the fast memory, and achieve a high load factor which is 95% at the same time.
{"title":"Shifting Hash Table: An Efficient Hash Table with Delicate Summary","authors":"Jie Jiang, Yibo Yan, Mengyu Zhang, Binchao Yin, Yumeng Jiang, Tong Yang, Xiaoming Li, Tengjiao Wang","doi":"10.1109/GCWkshps45667.2019.9024392","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024392","url":null,"abstract":"Hash tables have been broadly used in many security applications. These applications require fast query speed and high memory efficiency. However, the query speed degrades when hash collisions happen. The design goal of this paper is to achieve high load factor as well as fast query at the same time. In this paper, we propose a novel hashing scheme, namely the Shifting Hash Table (SHT), which consists of two parts. The first part is an enhanced version of the Bloom filter checking which subtable(s) may contain the incoming items, and the second part contains a cuckoo hashing based hash table which stores the key-value pairs. The key technique of this paper is that we divide items into two categories: at-home and abroad. We only insert the second kind of items (abroad) into the Bloom filter, thus the memory usage of the filter is significantly reduced. We conducted extensive experiments and the results show that SHT significantly outperforms the state-of-the-art. Specifically, SHT can query an item using on average less than 1.05 bucket probes and even using 1 bit per entry in the fast memory, and achieve a high load factor which is 95% at the same time.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124879218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024558
Michel Massanet Ginard, T. Izydorczyk, P. Mogensen, Gilberto Berardinelli
Cellular networks will be one of the main pillars in the development of future vehicular communications. However, downlink (DL) and uplink (UL) channels must be improved to cope with the required reliability and high throughput of the coming vehicular use cases. Vehicle side solutions which benefit from the high antenna gains could improve the performance of the UL channel whose coverage is limited by UL transmit power. In this paper we experimentally evaluate the performance of a directional antennas switching system based on live Long Term Evolution (LTE) measurements. A total of more than 150 km have been driven comprising different radio propagation scenarios. The results show considerable improvements of Reference Signal Received Power (RSRP) and Reference Signal Received Quality (RSRQ), together with a reduction of handovers specially in scenarios with high Line-Of-Sight probability. Additionally, it has been found that the UL throughput does not improve with the increase of antenna gain probably due to the UL Power Control mechanism used in LTE.
{"title":"Enhancing Vehicular Link Performance Using Directional Antennas at the Terminal","authors":"Michel Massanet Ginard, T. Izydorczyk, P. Mogensen, Gilberto Berardinelli","doi":"10.1109/GCWkshps45667.2019.9024558","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024558","url":null,"abstract":"Cellular networks will be one of the main pillars in the development of future vehicular communications. However, downlink (DL) and uplink (UL) channels must be improved to cope with the required reliability and high throughput of the coming vehicular use cases. Vehicle side solutions which benefit from the high antenna gains could improve the performance of the UL channel whose coverage is limited by UL transmit power. In this paper we experimentally evaluate the performance of a directional antennas switching system based on live Long Term Evolution (LTE) measurements. A total of more than 150 km have been driven comprising different radio propagation scenarios. The results show considerable improvements of Reference Signal Received Power (RSRP) and Reference Signal Received Quality (RSRQ), together with a reduction of handovers specially in scenarios with high Line-Of-Sight probability. Additionally, it has been found that the UL throughput does not improve with the increase of antenna gain probably due to the UL Power Control mechanism used in LTE.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024437
Jiangbo Si, Zihao Cheng, Lei Guan, Zan Li, Jia Shi
A wireless legitimate surveillance system is studied for a proactive eavesdropping scheme, where a full- duplex legitimate monitor eavesdrops a suspicious link by injecting artificial noise (AN) towards the suspicious receiver. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, it stops transmission. Hence, to improve the surveillance performance, AN should be transmitted covertly with low detection probability by the suspicious receiver. To achieve this goal, an optimal problem is first formulated to maximize the eavesdropping rate under covert constraint. Then, according to the derived detection error probability, the optimal detection threshold is determined under Rayleigh fading channels. A novel scheme is proposed to solve the optimization problem under both perfect and imperfect channel state informations (CSIs). Finally, simulation is performed to verify the analyses. It is shown that the imperfect CSI of the suspicious link can benefit the surveillance performance.
{"title":"Performance of Covert Surveillance in Jamming-Aided Eavesdropping System with Channel Uncertainty","authors":"Jiangbo Si, Zihao Cheng, Lei Guan, Zan Li, Jia Shi","doi":"10.1109/GCWkshps45667.2019.9024437","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024437","url":null,"abstract":"A wireless legitimate surveillance system is studied for a proactive eavesdropping scheme, where a full- duplex legitimate monitor eavesdrops a suspicious link by injecting artificial noise (AN) towards the suspicious receiver. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, it stops transmission. Hence, to improve the surveillance performance, AN should be transmitted covertly with low detection probability by the suspicious receiver. To achieve this goal, an optimal problem is first formulated to maximize the eavesdropping rate under covert constraint. Then, according to the derived detection error probability, the optimal detection threshold is determined under Rayleigh fading channels. A novel scheme is proposed to solve the optimization problem under both perfect and imperfect channel state informations (CSIs). Finally, simulation is performed to verify the analyses. It is shown that the imperfect CSI of the suspicious link can benefit the surveillance performance.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130937845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024368
Lars Nielsen, Rasmus Vestergaard, N. Yazdani, Prasad Talasila, D. Lucani, M. Sipos
The amount of data generated worldwide is expected to grow from 33 to 175 ZB by 2025 in part driven by the growth of Internet of Things (IoT) and cyber-physical systems (CPS). To cope with this enormous amount of data, new cloud storage techniques must be developed. Generalised Data Deduplication (GDD) is a new paradigm for reducing the cost of storage by systematically identifying near identical data chunks, storing their common component once, and a compact representation of the deviation to the original chunk for each chunk. This paper presents a system architecture for GDD and a proof-of-concept implementation. We evaluated the compression gain of Generalised Data Deduplication using three data sets of varying size and content and compared to the performance of the EXT4 and ZFS file systems, where the latter employs classic deduplication. We show that Generalised Data Deduplication provide up to 16.75% compression gain compared to both EXT4 and ZFS with data sets with less than 5 GB of data.
{"title":"Alexandria: A Proof-of-Concept Implementation and Evaluation of Generalised Data Deduplication","authors":"Lars Nielsen, Rasmus Vestergaard, N. Yazdani, Prasad Talasila, D. Lucani, M. Sipos","doi":"10.1109/GCWkshps45667.2019.9024368","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024368","url":null,"abstract":"The amount of data generated worldwide is expected to grow from 33 to 175 ZB by 2025 in part driven by the growth of Internet of Things (IoT) and cyber-physical systems (CPS). To cope with this enormous amount of data, new cloud storage techniques must be developed. Generalised Data Deduplication (GDD) is a new paradigm for reducing the cost of storage by systematically identifying near identical data chunks, storing their common component once, and a compact representation of the deviation to the original chunk for each chunk. This paper presents a system architecture for GDD and a proof-of-concept implementation. We evaluated the compression gain of Generalised Data Deduplication using three data sets of varying size and content and compared to the performance of the EXT4 and ZFS file systems, where the latter employs classic deduplication. We show that Generalised Data Deduplication provide up to 16.75% compression gain compared to both EXT4 and ZFS with data sets with less than 5 GB of data.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122317937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024555
Racha Gouareb, V. Friderikos, H. Aghvami, M. Tatipamula
In Software Defined Networks (SDN), the controller is considered as a critical network element with respect to the overall operation of the network. The inherent centralized nature of the SDN controller brings sufficient flexibility to network management, but in the case of congestion episodes or failure, the whole system can be affected. In that respect, the spatiotemporal variation of the network traffic affects the network performance by increasing the response time of the control plane when it is overloaded, raising in that respect the issues of reliability and scalability. In this work, we are aiming to tackle the problem of load balancing in the control plane. The proposed approach aims to balance the load among multiple controllers by assigning switches to controllers. By considering both reactive and proactive assignment in a multi-controller setting, two costs are studied. The bi- objective function is composed of the cost of load balancing within controllers and the cost of traffic load migration. The problem of controller assignment is formulated as a Quadratic Programming, constrained by computing resources. Finally, to overcome the curse of dimensionality due to the increasing number of variables, a min-max model is presented as a mixed-integer linear programming problem minimizing the maximum load of controllers. Simulation results shed light on the trade-off between load balancing and migration cost, and the performance evaluation is demonstrating the efficiency of the proposed model compared to previously proposed algorithms in the literature.
{"title":"Joint Reactive and Proactive SDN Controller Assignment for Load Balancing","authors":"Racha Gouareb, V. Friderikos, H. Aghvami, M. Tatipamula","doi":"10.1109/GCWkshps45667.2019.9024555","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024555","url":null,"abstract":"In Software Defined Networks (SDN), the controller is considered as a critical network element with respect to the overall operation of the network. The inherent centralized nature of the SDN controller brings sufficient flexibility to network management, but in the case of congestion episodes or failure, the whole system can be affected. In that respect, the spatiotemporal variation of the network traffic affects the network performance by increasing the response time of the control plane when it is overloaded, raising in that respect the issues of reliability and scalability. In this work, we are aiming to tackle the problem of load balancing in the control plane. The proposed approach aims to balance the load among multiple controllers by assigning switches to controllers. By considering both reactive and proactive assignment in a multi-controller setting, two costs are studied. The bi- objective function is composed of the cost of load balancing within controllers and the cost of traffic load migration. The problem of controller assignment is formulated as a Quadratic Programming, constrained by computing resources. Finally, to overcome the curse of dimensionality due to the increasing number of variables, a min-max model is presented as a mixed-integer linear programming problem minimizing the maximum load of controllers. Simulation results shed light on the trade-off between load balancing and migration cost, and the performance evaluation is demonstrating the efficiency of the proposed model compared to previously proposed algorithms in the literature.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"44 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125675149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024690
Himanshu Sharma, Neeraj Kumar, B. K. Panigrahi
Smart Grid (SG) is the next generation power sys- tem having automated mechanisms for transmission, distribution and generation. Advanced Metering Infrastructure (AMI) in SG, is used for the effective monitoring and controlling of the electric- ity consumption by the end users and is considered as one of the core components of SG. However, AMI is susceptible to various types of cyber-attacks, as it consists of components which are vulnerable to various types of attacks in SG . Therefore physical layer security becomes the important aspect in SG. Motivated from these facts, in this paper, we present Low Density parity check (LDPC) coding scheme for the Additive White Gaussian Noise (AWGN) channel to improve the security at physical layer used in AMI for bidirectional data transfer between meter and SG. Specifically, we designed the scheme for securing the wireless communication channel in AMI from the eavesdropping attack. The proposed scheme is efficient as it minimizes the Bit Error Rate (BER) at the legitimate receiver to lower values of Signal to Noise Ratio (SNR), thus making it difficult for an eavesdropper to listen and to modify the data transmission taking place bi- directionally. Moreover, it significantly reduces the usage of SNR, which leads to low power consumption. Numerical analysis shows that 25% and 41% improvements are observed in SNR using our proposed scheme as compared to the existing schemes i.e., hamming coded and uncoded data transmission.
{"title":"Physical Layer Security of AMI Data Transmission in Smart Grid Environment","authors":"Himanshu Sharma, Neeraj Kumar, B. K. Panigrahi","doi":"10.1109/GCWkshps45667.2019.9024690","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024690","url":null,"abstract":"Smart Grid (SG) is the next generation power sys- tem having automated mechanisms for transmission, distribution and generation. Advanced Metering Infrastructure (AMI) in SG, is used for the effective monitoring and controlling of the electric- ity consumption by the end users and is considered as one of the core components of SG. However, AMI is susceptible to various types of cyber-attacks, as it consists of components which are vulnerable to various types of attacks in SG . Therefore physical layer security becomes the important aspect in SG. Motivated from these facts, in this paper, we present Low Density parity check (LDPC) coding scheme for the Additive White Gaussian Noise (AWGN) channel to improve the security at physical layer used in AMI for bidirectional data transfer between meter and SG. Specifically, we designed the scheme for securing the wireless communication channel in AMI from the eavesdropping attack. The proposed scheme is efficient as it minimizes the Bit Error Rate (BER) at the legitimate receiver to lower values of Signal to Noise Ratio (SNR), thus making it difficult for an eavesdropper to listen and to modify the data transmission taking place bi- directionally. Moreover, it significantly reduces the usage of SNR, which leads to low power consumption. Numerical analysis shows that 25% and 41% improvements are observed in SNR using our proposed scheme as compared to the existing schemes i.e., hamming coded and uncoded data transmission.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130379613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}