首页 > 最新文献

2019 IEEE Globecom Workshops (GC Wkshps)最新文献

英文 中文
Two-Stream Time Sequential Network Based Hand Gesture Recognition Method Using Radar Sensor 基于双流时间序列网络的雷达传感器手势识别方法
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024691
Yong Wang, Shasha Wang, Mu Zhou, Wei Nie, Xiaolong Yang, Z. Tian
This paper proposes a deep learning based twostream time series hand gesture recognition method using the frequency modulated continuous wave (FMCW) radar. Firstly, we collect the hand gesture data by the FMCW radar, and the range and Doppler of the hand gesture are estimated by the 2 dimensional Fast Fourier Transform (2D-FFT). Then, the angle of hand gesture is estimated by Multiple Signal classification (MUSIC) algorithm. Afterward, we construct the Range- Doppler Map (RDM), and generate the Angle-Time Map (ATM) via multiframe accumulation. The interference in RDM is filtered out by peak interference cancellation, and the hand gesture feature in RDM and ATM are enhanced by wavelet transform. A systematic of two-stream time series neural network is designed for gesture feature extraction and classification. The experimental results show that the recognition accuracy rate for each type hand gesture of the proposed method is higher than 95%.
提出了一种基于深度学习的调频连续波(FMCW)雷达双流时间序列手势识别方法。首先,利用FMCW雷达采集手势数据,利用二维快速傅里叶变换(2D-FFT)估计手势的距离和多普勒。然后,通过多信号分类(MUSIC)算法估计手势的角度。然后,构造距离-多普勒图(RDM),并通过多帧累加生成角度-时间图(ATM)。采用峰值干扰对消的方法滤除RDM中的干扰,并用小波变换增强RDM和ATM中的手势特征。设计了一种用于手势特征提取和分类的双流时间序列神经网络系统。实验结果表明,该方法对各类手势的识别准确率均在95%以上。
{"title":"Two-Stream Time Sequential Network Based Hand Gesture Recognition Method Using Radar Sensor","authors":"Yong Wang, Shasha Wang, Mu Zhou, Wei Nie, Xiaolong Yang, Z. Tian","doi":"10.1109/GCWkshps45667.2019.9024691","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024691","url":null,"abstract":"This paper proposes a deep learning based twostream time series hand gesture recognition method using the frequency modulated continuous wave (FMCW) radar. Firstly, we collect the hand gesture data by the FMCW radar, and the range and Doppler of the hand gesture are estimated by the 2 dimensional Fast Fourier Transform (2D-FFT). Then, the angle of hand gesture is estimated by Multiple Signal classification (MUSIC) algorithm. Afterward, we construct the Range- Doppler Map (RDM), and generate the Angle-Time Map (ATM) via multiframe accumulation. The interference in RDM is filtered out by peak interference cancellation, and the hand gesture feature in RDM and ATM are enhanced by wavelet transform. A systematic of two-stream time series neural network is designed for gesture feature extraction and classification. The experimental results show that the recognition accuracy rate for each type hand gesture of the proposed method is higher than 95%.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123599945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Delay and Energy Efficiency in Fog Radio Access Networks with Hybrid Caching 基于混合缓存的雾状无线接入网延迟和能效分析
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024471
Chaoyi Wan, Yanxiang Jiang, F. Zheng, Pengcheng Zhu, Xiqi Gao, X. You
In this paper, delay and energy efficiency (EE) are investigated in three-tier fog radio access networks (F-RANs) with hybrid caching. By using tools from stochastic geometry, we firstly derive tractable expressions of delay for coded cached, non-partitioned cached and uncached files. Then, we derive tractable expressions of EE by jointly considering power consumed in circuits, transmissions and backhaul links. To balance delay and EE, the corresponding multi-objective optimization problem is formulated to obtain the optimal hybrid caching strategy. Numerical results show the flexibility of the proposed optimal hybrid caching strategy in delay-sensitive and EE-sensitive scenarios, and that fog access point (F-AP) density has a more significant impact on delay-sensitive scenarios than EE-sensitive scenarios.
本文研究了具有混合缓存的三层雾无线接入网络(f - ran)的延迟和能效问题。利用随机几何工具,首先推导出编码缓存、非分区缓存和非缓存文件的可处理延迟表达式。然后,综合考虑电路、传输和回程链路的功耗,推导出易处理的EE表达式。为了平衡延迟和EE,制定了相应的多目标优化问题,以获得最优的混合缓存策略。数值结果表明,本文提出的混合缓存策略在延迟敏感和电子敏感场景下具有灵活性,雾接入点密度对延迟敏感场景的影响比电子敏感场景更显著。
{"title":"Analysis of Delay and Energy Efficiency in Fog Radio Access Networks with Hybrid Caching","authors":"Chaoyi Wan, Yanxiang Jiang, F. Zheng, Pengcheng Zhu, Xiqi Gao, X. You","doi":"10.1109/GCWkshps45667.2019.9024471","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024471","url":null,"abstract":"In this paper, delay and energy efficiency (EE) are investigated in three-tier fog radio access networks (F-RANs) with hybrid caching. By using tools from stochastic geometry, we firstly derive tractable expressions of delay for coded cached, non-partitioned cached and uncached files. Then, we derive tractable expressions of EE by jointly considering power consumed in circuits, transmissions and backhaul links. To balance delay and EE, the corresponding multi-objective optimization problem is formulated to obtain the optimal hybrid caching strategy. Numerical results show the flexibility of the proposed optimal hybrid caching strategy in delay-sensitive and EE-sensitive scenarios, and that fog access point (F-AP) density has a more significant impact on delay-sensitive scenarios than EE-sensitive scenarios.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122563439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Evolutionary-Based Algorithm for Smart-Living Applications Placement in Fog Networks 基于进化的雾网络智能生活应用布局算法
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024660
Raheleh Moallemi, Arash Bozorgchenani, D. Tarchi
Fog computing is an emerging model, complementing the cloud computing platform, introduced to support the Internet of Things (IoT) processing requests at the edge of the network. Smart-living IoT scenarios require the execution of multiple processing tasks at the edge of the network and leveraging on the Fog Computing approach results to be a worthwhile solution. Genetic Algorithms (GA) are a heuristic search and optimization class of techniques inspired by natural evolution. We propose two GA-based approaches for optimizing the processing task placement in a fog computing edge infrastructure aiming to support the Smart-living IoT nodes requests. The numerical results obtained in Matlab show that both GA-based approaches allow to maximize the covered areas while minimizing the resource wastage through the minimization of the overlapping areas.
雾计算是一种新兴的模型,与云计算平台相辅相成,旨在支持物联网(IoT)在网络边缘的处理请求。智能生活物联网场景需要在网络边缘执行多个处理任务,并利用雾计算方法成为一个有价值的解决方案。遗传算法是一种受自然进化启发的启发式搜索和优化技术。我们提出了两种基于遗传算法的方法来优化雾计算边缘基础设施中的处理任务放置,旨在支持智能生活物联网节点的请求。在Matlab中得到的数值结果表明,两种基于遗传算法的方法都可以通过最小化重叠区域来最大化覆盖面积,同时最小化资源浪费。
{"title":"An Evolutionary-Based Algorithm for Smart-Living Applications Placement in Fog Networks","authors":"Raheleh Moallemi, Arash Bozorgchenani, D. Tarchi","doi":"10.1109/GCWkshps45667.2019.9024660","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024660","url":null,"abstract":"Fog computing is an emerging model, complementing the cloud computing platform, introduced to support the Internet of Things (IoT) processing requests at the edge of the network. Smart-living IoT scenarios require the execution of multiple processing tasks at the edge of the network and leveraging on the Fog Computing approach results to be a worthwhile solution. Genetic Algorithms (GA) are a heuristic search and optimization class of techniques inspired by natural evolution. We propose two GA-based approaches for optimizing the processing task placement in a fog computing edge infrastructure aiming to support the Smart-living IoT nodes requests. The numerical results obtained in Matlab show that both GA-based approaches allow to maximize the covered areas while minimizing the resource wastage through the minimization of the overlapping areas.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Efficient Scheme for Wireless Charging of Electric Vehicles Using RFID with an Optimal Path Planning 基于最优路径规划的RFID电动汽车无线充电高效方案
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024537
Shubham Arora, S. Goel, P. Chhikara, Harpreet Singh, Neeraj Kumar, P. Rana
The emission of the harmful CO2 in the environ- mental from the traditional fuel based vehicles is one of the major factors for the rise and popularity of electric vehicles (EVs) in the modern smart cities in the recent years. In this context, EVs provide an eco-friendly environment in the modern smart city. But, there exists many challenges (such as smart charging, path planning, information dissemination etc) for the usage of EVs in the modern smart city. So, there is a need for the new techniques and solutions to improve the efficiency of the existing charging system of the EVs. Keeping focus on these points, this paper proposes a new technique for the electric vehicle wireless charging using RFID tags alongwith an optimized path planning to have an optimal charging cost. In the proposed scheme, the application of RFID tags located at various points across the city is used to have an efficient payment system during EVs charging. To illustrate the proposed scheme, an algorithm which provides the navigation is also designed. The performance of the proposed scheme is tested keeping in view of the mobility of the EVs for an optimal path finding. The results obtained prove the effectiveness of the proposed solution.
传统燃油汽车对环境有害的CO2排放是近年来电动汽车在现代智慧城市兴起和普及的主要因素之一。在这种背景下,电动汽车为现代智慧城市提供了一个生态友好的环境。但是,在现代智慧城市中,电动汽车的使用存在许多挑战(如智能充电、路径规划、信息传播等)。因此,需要新的技术和解决方案来提高现有电动汽车充电系统的效率。针对这些问题,本文提出了一种基于RFID标签的电动汽车无线充电新技术,并通过优化路径规划使充电成本达到最优。在提出的方案中,在城市的各个地点应用RFID标签,用于在电动汽车充电期间建立有效的支付系统。为了说明所提出的方案,还设计了一种提供导航的算法。考虑到电动汽车的移动性,对所提出方案的性能进行了测试,以获得最优寻径。仿真结果证明了该方法的有效性。
{"title":"An Efficient Scheme for Wireless Charging of Electric Vehicles Using RFID with an Optimal Path Planning","authors":"Shubham Arora, S. Goel, P. Chhikara, Harpreet Singh, Neeraj Kumar, P. Rana","doi":"10.1109/GCWkshps45667.2019.9024537","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024537","url":null,"abstract":"The emission of the harmful CO2 in the environ- mental from the traditional fuel based vehicles is one of the major factors for the rise and popularity of electric vehicles (EVs) in the modern smart cities in the recent years. In this context, EVs provide an eco-friendly environment in the modern smart city. But, there exists many challenges (such as smart charging, path planning, information dissemination etc) for the usage of EVs in the modern smart city. So, there is a need for the new techniques and solutions to improve the efficiency of the existing charging system of the EVs. Keeping focus on these points, this paper proposes a new technique for the electric vehicle wireless charging using RFID tags alongwith an optimized path planning to have an optimal charging cost. In the proposed scheme, the application of RFID tags located at various points across the city is used to have an efficient payment system during EVs charging. To illustrate the proposed scheme, an algorithm which provides the navigation is also designed. The performance of the proposed scheme is tested keeping in view of the mobility of the EVs for an optimal path finding. The results obtained prove the effectiveness of the proposed solution.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Shifting Hash Table: An Efficient Hash Table with Delicate Summary 移动哈希表:一个具有精致摘要的高效哈希表
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024392
Jie Jiang, Yibo Yan, Mengyu Zhang, Binchao Yin, Yumeng Jiang, Tong Yang, Xiaoming Li, Tengjiao Wang
Hash tables have been broadly used in many security applications. These applications require fast query speed and high memory efficiency. However, the query speed degrades when hash collisions happen. The design goal of this paper is to achieve high load factor as well as fast query at the same time. In this paper, we propose a novel hashing scheme, namely the Shifting Hash Table (SHT), which consists of two parts. The first part is an enhanced version of the Bloom filter checking which subtable(s) may contain the incoming items, and the second part contains a cuckoo hashing based hash table which stores the key-value pairs. The key technique of this paper is that we divide items into two categories: at-home and abroad. We only insert the second kind of items (abroad) into the Bloom filter, thus the memory usage of the filter is significantly reduced. We conducted extensive experiments and the results show that SHT significantly outperforms the state-of-the-art. Specifically, SHT can query an item using on average less than 1.05 bucket probes and even using 1 bit per entry in the fast memory, and achieve a high load factor which is 95% at the same time.
哈希表在许多安全应用中得到了广泛的应用。这些应用程序需要快速的查询速度和高内存效率。但是,当发生哈希冲突时,查询速度会降低。本文的设计目标是在实现高负载系数的同时实现快速查询。在本文中,我们提出了一种新的哈希方案,即移位哈希表(SHT),它由两部分组成。第一部分是Bloom过滤器的增强版本,检查哪些子表可能包含传入的项目,第二部分包含基于布谷鸟哈希的哈希表,该哈希表存储键值对。本文的关键技术是我们将项目分为两类:国内和国外。我们只将第二类项目(国外)插入到Bloom过滤器中,因此过滤器的内存使用显著减少。我们进行了大量的实验,结果表明,SHT明显优于最先进的技术。具体来说,SHT可以使用平均少于1.05个桶探测来查询一个项目,甚至在快速内存中每个条目使用1位,同时实现高达95%的高负载系数。
{"title":"Shifting Hash Table: An Efficient Hash Table with Delicate Summary","authors":"Jie Jiang, Yibo Yan, Mengyu Zhang, Binchao Yin, Yumeng Jiang, Tong Yang, Xiaoming Li, Tengjiao Wang","doi":"10.1109/GCWkshps45667.2019.9024392","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024392","url":null,"abstract":"Hash tables have been broadly used in many security applications. These applications require fast query speed and high memory efficiency. However, the query speed degrades when hash collisions happen. The design goal of this paper is to achieve high load factor as well as fast query at the same time. In this paper, we propose a novel hashing scheme, namely the Shifting Hash Table (SHT), which consists of two parts. The first part is an enhanced version of the Bloom filter checking which subtable(s) may contain the incoming items, and the second part contains a cuckoo hashing based hash table which stores the key-value pairs. The key technique of this paper is that we divide items into two categories: at-home and abroad. We only insert the second kind of items (abroad) into the Bloom filter, thus the memory usage of the filter is significantly reduced. We conducted extensive experiments and the results show that SHT significantly outperforms the state-of-the-art. Specifically, SHT can query an item using on average less than 1.05 bucket probes and even using 1 bit per entry in the fast memory, and achieve a high load factor which is 95% at the same time.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124879218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Vehicular Link Performance Using Directional Antennas at the Terminal 利用终端定向天线增强车载链路性能
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024558
Michel Massanet Ginard, T. Izydorczyk, P. Mogensen, Gilberto Berardinelli
Cellular networks will be one of the main pillars in the development of future vehicular communications. However, downlink (DL) and uplink (UL) channels must be improved to cope with the required reliability and high throughput of the coming vehicular use cases. Vehicle side solutions which benefit from the high antenna gains could improve the performance of the UL channel whose coverage is limited by UL transmit power. In this paper we experimentally evaluate the performance of a directional antennas switching system based on live Long Term Evolution (LTE) measurements. A total of more than 150 km have been driven comprising different radio propagation scenarios. The results show considerable improvements of Reference Signal Received Power (RSRP) and Reference Signal Received Quality (RSRQ), together with a reduction of handovers specially in scenarios with high Line-Of-Sight probability. Additionally, it has been found that the UL throughput does not improve with the increase of antenna gain probably due to the UL Power Control mechanism used in LTE.
蜂窝网络将成为未来车载通信发展的主要支柱之一。然而,下行链路(DL)和上行链路(UL)信道必须得到改进,以应对即将到来的车辆用例所要求的可靠性和高吞吐量。受益于高天线增益的车载侧解决方案可以改善受UL发射功率限制的UL信道的性能。在本文中,我们实验评估了基于实时长期演进(LTE)测量的定向天线切换系统的性能。总共行驶了150多公里,包括不同的无线电传播方案。结果表明,参考信号接收功率(RSRP)和参考信号接收质量(RSRQ)有了相当大的提高,特别是在视距概率高的情况下,切换次数减少了。此外,研究发现,UL吞吐量并没有随着天线增益的增加而提高,这可能是由于LTE中使用的UL功率控制机制。
{"title":"Enhancing Vehicular Link Performance Using Directional Antennas at the Terminal","authors":"Michel Massanet Ginard, T. Izydorczyk, P. Mogensen, Gilberto Berardinelli","doi":"10.1109/GCWkshps45667.2019.9024558","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024558","url":null,"abstract":"Cellular networks will be one of the main pillars in the development of future vehicular communications. However, downlink (DL) and uplink (UL) channels must be improved to cope with the required reliability and high throughput of the coming vehicular use cases. Vehicle side solutions which benefit from the high antenna gains could improve the performance of the UL channel whose coverage is limited by UL transmit power. In this paper we experimentally evaluate the performance of a directional antennas switching system based on live Long Term Evolution (LTE) measurements. A total of more than 150 km have been driven comprising different radio propagation scenarios. The results show considerable improvements of Reference Signal Received Power (RSRP) and Reference Signal Received Quality (RSRQ), together with a reduction of handovers specially in scenarios with high Line-Of-Sight probability. Additionally, it has been found that the UL throughput does not improve with the increase of antenna gain probably due to the UL Power Control mechanism used in LTE.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance of Covert Surveillance in Jamming-Aided Eavesdropping System with Channel Uncertainty 信道不确定干扰辅助窃听系统隐蔽监视性能研究
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024437
Jiangbo Si, Zihao Cheng, Lei Guan, Zan Li, Jia Shi
A wireless legitimate surveillance system is studied for a proactive eavesdropping scheme, where a full- duplex legitimate monitor eavesdrops a suspicious link by injecting artificial noise (AN) towards the suspicious receiver. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, it stops transmission. Hence, to improve the surveillance performance, AN should be transmitted covertly with low detection probability by the suspicious receiver. To achieve this goal, an optimal problem is first formulated to maximize the eavesdropping rate under covert constraint. Then, according to the derived detection error probability, the optimal detection threshold is determined under Rayleigh fading channels. A novel scheme is proposed to solve the optimization problem under both perfect and imperfect channel state informations (CSIs). Finally, simulation is performed to verify the analyses. It is shown that the imperfect CSI of the suspicious link can benefit the surveillance performance.
研究了一种无线合法监控系统的主动窃听方案,其中全双工合法监控通过向可疑接收方注入人工噪声(AN)来窃听可疑链路。与现有的工作不同,假定可疑的接收方能够检测到AN的存在。一旦这样的接收器检测到AN,它就停止传输。因此,为了提高监视性能,应该隐蔽地传输AN,使可疑接收方的检测概率较低。为了实现这一目标,首先构造了一个隐约束下窃听率最大化的最优问题。然后,根据导出的检测误差概率,确定瑞利衰落信道下的最优检测阈值。提出了一种解决完全信道状态信息和不完全信道状态信息下的优化问题的新方案。最后,通过仿真验证了分析结果。研究表明,可疑链路的不完美CSI有利于提高监控性能。
{"title":"Performance of Covert Surveillance in Jamming-Aided Eavesdropping System with Channel Uncertainty","authors":"Jiangbo Si, Zihao Cheng, Lei Guan, Zan Li, Jia Shi","doi":"10.1109/GCWkshps45667.2019.9024437","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024437","url":null,"abstract":"A wireless legitimate surveillance system is studied for a proactive eavesdropping scheme, where a full- duplex legitimate monitor eavesdrops a suspicious link by injecting artificial noise (AN) towards the suspicious receiver. Different from the existing work, the suspicious receiver is assumed to be capable of detecting the presence of AN. Once such receiver detects the AN, it stops transmission. Hence, to improve the surveillance performance, AN should be transmitted covertly with low detection probability by the suspicious receiver. To achieve this goal, an optimal problem is first formulated to maximize the eavesdropping rate under covert constraint. Then, according to the derived detection error probability, the optimal detection threshold is determined under Rayleigh fading channels. A novel scheme is proposed to solve the optimization problem under both perfect and imperfect channel state informations (CSIs). Finally, simulation is performed to verify the analyses. It is shown that the imperfect CSI of the suspicious link can benefit the surveillance performance.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130937845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Alexandria: A Proof-of-Concept Implementation and Evaluation of Generalised Data Deduplication 亚历山大:广义数据重复删除的概念验证实现和评估
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024368
Lars Nielsen, Rasmus Vestergaard, N. Yazdani, Prasad Talasila, D. Lucani, M. Sipos
The amount of data generated worldwide is expected to grow from 33 to 175 ZB by 2025 in part driven by the growth of Internet of Things (IoT) and cyber-physical systems (CPS). To cope with this enormous amount of data, new cloud storage techniques must be developed. Generalised Data Deduplication (GDD) is a new paradigm for reducing the cost of storage by systematically identifying near identical data chunks, storing their common component once, and a compact representation of the deviation to the original chunk for each chunk. This paper presents a system architecture for GDD and a proof-of-concept implementation. We evaluated the compression gain of Generalised Data Deduplication using three data sets of varying size and content and compared to the performance of the EXT4 and ZFS file systems, where the latter employs classic deduplication. We show that Generalised Data Deduplication provide up to 16.75% compression gain compared to both EXT4 and ZFS with data sets with less than 5 GB of data.
到2025年,全球产生的数据量预计将从33 ZB增长到175 ZB,部分原因是物联网(IoT)和网络物理系统(CPS)的增长。为了处理如此庞大的数据量,必须开发新的云存储技术。广义数据重复删除(GDD)是一种新的范式,通过系统地识别几乎相同的数据块,存储它们的公共组件一次,并为每个块提供与原始块的偏差的紧凑表示,从而降低存储成本。本文提出了GDD的系统架构和概念验证实现。我们使用三个不同大小和内容的数据集评估了广义数据重复数据删除的压缩增益,并与EXT4和ZFS文件系统的性能进行了比较,后者采用了经典的重复数据删除。我们表明,对于数据集小于5 GB的数据集,与EXT4和ZFS相比,广义数据重复数据删除提供了高达16.75%的压缩增益。
{"title":"Alexandria: A Proof-of-Concept Implementation and Evaluation of Generalised Data Deduplication","authors":"Lars Nielsen, Rasmus Vestergaard, N. Yazdani, Prasad Talasila, D. Lucani, M. Sipos","doi":"10.1109/GCWkshps45667.2019.9024368","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024368","url":null,"abstract":"The amount of data generated worldwide is expected to grow from 33 to 175 ZB by 2025 in part driven by the growth of Internet of Things (IoT) and cyber-physical systems (CPS). To cope with this enormous amount of data, new cloud storage techniques must be developed. Generalised Data Deduplication (GDD) is a new paradigm for reducing the cost of storage by systematically identifying near identical data chunks, storing their common component once, and a compact representation of the deviation to the original chunk for each chunk. This paper presents a system architecture for GDD and a proof-of-concept implementation. We evaluated the compression gain of Generalised Data Deduplication using three data sets of varying size and content and compared to the performance of the EXT4 and ZFS file systems, where the latter employs classic deduplication. We show that Generalised Data Deduplication provide up to 16.75% compression gain compared to both EXT4 and ZFS with data sets with less than 5 GB of data.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122317937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Joint Reactive and Proactive SDN Controller Assignment for Load Balancing 负载平衡的联合被动和主动SDN控制器分配
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024555
Racha Gouareb, V. Friderikos, H. Aghvami, M. Tatipamula
In Software Defined Networks (SDN), the controller is considered as a critical network element with respect to the overall operation of the network. The inherent centralized nature of the SDN controller brings sufficient flexibility to network management, but in the case of congestion episodes or failure, the whole system can be affected. In that respect, the spatiotemporal variation of the network traffic affects the network performance by increasing the response time of the control plane when it is overloaded, raising in that respect the issues of reliability and scalability. In this work, we are aiming to tackle the problem of load balancing in the control plane. The proposed approach aims to balance the load among multiple controllers by assigning switches to controllers. By considering both reactive and proactive assignment in a multi-controller setting, two costs are studied. The bi- objective function is composed of the cost of load balancing within controllers and the cost of traffic load migration. The problem of controller assignment is formulated as a Quadratic Programming, constrained by computing resources. Finally, to overcome the curse of dimensionality due to the increasing number of variables, a min-max model is presented as a mixed-integer linear programming problem minimizing the maximum load of controllers. Simulation results shed light on the trade-off between load balancing and migration cost, and the performance evaluation is demonstrating the efficiency of the proposed model compared to previously proposed algorithms in the literature.
在软件定义网络(SDN)中,控制器被认为是与网络整体运行相关的关键网络元素。SDN控制器固有的集中性给网络管理带来了足够的灵活性,但一旦出现拥塞事件或故障,整个系统都会受到影响。在这方面,网络流量的时空变化通过增加控制平面过载时的响应时间来影响网络性能,从而在这方面提出了可靠性和可扩展性问题。在这项工作中,我们的目标是解决控制平面的负载平衡问题。该方法旨在通过为控制器分配开关来平衡多个控制器之间的负载。通过考虑多控制器环境下的被动和主动分配,研究了两种成本。该双目标函数由控制器内负载均衡的代价和流量负载迁移的代价组成。控制器分配问题是一个受计算资源约束的二次规划问题。最后,为了克服由于变量数量增加而导致的维数问题,将最小-最大模型描述为最小化控制器最大负载的混合整数线性规划问题。仿真结果揭示了负载平衡和迁移成本之间的权衡,性能评估显示了与文献中先前提出的算法相比,所提出模型的效率。
{"title":"Joint Reactive and Proactive SDN Controller Assignment for Load Balancing","authors":"Racha Gouareb, V. Friderikos, H. Aghvami, M. Tatipamula","doi":"10.1109/GCWkshps45667.2019.9024555","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024555","url":null,"abstract":"In Software Defined Networks (SDN), the controller is considered as a critical network element with respect to the overall operation of the network. The inherent centralized nature of the SDN controller brings sufficient flexibility to network management, but in the case of congestion episodes or failure, the whole system can be affected. In that respect, the spatiotemporal variation of the network traffic affects the network performance by increasing the response time of the control plane when it is overloaded, raising in that respect the issues of reliability and scalability. In this work, we are aiming to tackle the problem of load balancing in the control plane. The proposed approach aims to balance the load among multiple controllers by assigning switches to controllers. By considering both reactive and proactive assignment in a multi-controller setting, two costs are studied. The bi- objective function is composed of the cost of load balancing within controllers and the cost of traffic load migration. The problem of controller assignment is formulated as a Quadratic Programming, constrained by computing resources. Finally, to overcome the curse of dimensionality due to the increasing number of variables, a min-max model is presented as a mixed-integer linear programming problem minimizing the maximum load of controllers. Simulation results shed light on the trade-off between load balancing and migration cost, and the performance evaluation is demonstrating the efficiency of the proposed model compared to previously proposed algorithms in the literature.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"44 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125675149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Physical Layer Security of AMI Data Transmission in Smart Grid Environment 智能电网环境下AMI数据传输的物理层安全
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024690
Himanshu Sharma, Neeraj Kumar, B. K. Panigrahi
Smart Grid (SG) is the next generation power sys- tem having automated mechanisms for transmission, distribution and generation. Advanced Metering Infrastructure (AMI) in SG, is used for the effective monitoring and controlling of the electric- ity consumption by the end users and is considered as one of the core components of SG. However, AMI is susceptible to various types of cyber-attacks, as it consists of components which are vulnerable to various types of attacks in SG . Therefore physical layer security becomes the important aspect in SG. Motivated from these facts, in this paper, we present Low Density parity check (LDPC) coding scheme for the Additive White Gaussian Noise (AWGN) channel to improve the security at physical layer used in AMI for bidirectional data transfer between meter and SG. Specifically, we designed the scheme for securing the wireless communication channel in AMI from the eavesdropping attack. The proposed scheme is efficient as it minimizes the Bit Error Rate (BER) at the legitimate receiver to lower values of Signal to Noise Ratio (SNR), thus making it difficult for an eavesdropper to listen and to modify the data transmission taking place bi- directionally. Moreover, it significantly reduces the usage of SNR, which leads to low power consumption. Numerical analysis shows that 25% and 41% improvements are observed in SNR using our proposed scheme as compared to the existing schemes i.e., hamming coded and uncoded data transmission.
智能电网是具有自动传输、配电和发电机制的新一代电力系统。先进计量基础设施(Advanced Metering Infrastructure, AMI)用于对终端用户的用电量进行有效的监测和控制,是SG的核心组成部分之一。然而,AMI容易受到各种类型的网络攻击,因为它由易受SG中各种攻击的组件组成。因此,物理层的安全成为光纤传输中的一个重要方面。基于这些事实,本文提出了加性高斯白噪声(AWGN)信道的低密度奇偶校验(LDPC)编码方案,以提高AMI中用于仪表和SG之间双向数据传输的物理层安全性。具体来说,我们设计了保护AMI无线通信信道免受窃听攻击的方案。该方案有效地降低了合法接收端的误码率(BER),降低了信噪比(SNR)值,使得窃听者难以监听和修改发生在双向的数据传输。此外,它显著降低了信噪比的使用,从而降低了功耗。数值分析表明,与现有的汉明编码和非编码数据传输方案相比,我们提出的方案的信噪比提高了25%和41%。
{"title":"Physical Layer Security of AMI Data Transmission in Smart Grid Environment","authors":"Himanshu Sharma, Neeraj Kumar, B. K. Panigrahi","doi":"10.1109/GCWkshps45667.2019.9024690","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024690","url":null,"abstract":"Smart Grid (SG) is the next generation power sys- tem having automated mechanisms for transmission, distribution and generation. Advanced Metering Infrastructure (AMI) in SG, is used for the effective monitoring and controlling of the electric- ity consumption by the end users and is considered as one of the core components of SG. However, AMI is susceptible to various types of cyber-attacks, as it consists of components which are vulnerable to various types of attacks in SG . Therefore physical layer security becomes the important aspect in SG. Motivated from these facts, in this paper, we present Low Density parity check (LDPC) coding scheme for the Additive White Gaussian Noise (AWGN) channel to improve the security at physical layer used in AMI for bidirectional data transfer between meter and SG. Specifically, we designed the scheme for securing the wireless communication channel in AMI from the eavesdropping attack. The proposed scheme is efficient as it minimizes the Bit Error Rate (BER) at the legitimate receiver to lower values of Signal to Noise Ratio (SNR), thus making it difficult for an eavesdropper to listen and to modify the data transmission taking place bi- directionally. Moreover, it significantly reduces the usage of SNR, which leads to low power consumption. Numerical analysis shows that 25% and 41% improvements are observed in SNR using our proposed scheme as compared to the existing schemes i.e., hamming coded and uncoded data transmission.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130379613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 IEEE Globecom Workshops (GC Wkshps)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1