首页 > 最新文献

2019 IEEE Globecom Workshops (GC Wkshps)最新文献

英文 中文
Security-Reliability Tradeoff Analysis of Spectrum-Sharing Aided Satellite-Terrestrial Networks 频谱共享辅助星-地网络安全-可靠性权衡分析
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024465
Xiaojin Ding, Gengxin Zhang, Dexin Qu, Tiecheng Song
In this paper, we investigate the physical-layer security of a spectrum-sharing aided satellite-terrestrial integrated network comprised of a pair of satellite system and terrestrial system, which can utilize the shared spectrum in the presence of an eavesdropper. We propose a specifically designed satellite scheduling scheme to guarantee wireless transmission of the satellite system against eavesdropping attacks in the face of co-channel interference generated by the terrestrial communication system, where the specifically designed satellite scheduling scheme is represented by multi-satellite scheduling (MSS). We analyze the security-reliability tradeoff (SRT) of the MSS scheme, where the security and the reliability are characterized by the intercept probability and the outage probability, respectively. For comparison purposes, we also provide the SRT analysis of the round-robin satellite scheduling (RSS) scheme. In addition, numerical SRT results demonstrate that the proposed MSS scheme significantly outperform the RSS scheme in terms of their SRT.
本文研究了由一对卫星系统和地面系统组成的频谱共享辅助星地集成网络的物理层安全问题,该网络可以在窃听者存在的情况下利用共享频谱。在面对地面通信系统产生的同信道干扰时,为了保证卫星系统的无线传输不受窃听攻击,提出了一种专门设计的卫星调度方案,其中专门设计的卫星调度方案用多卫星调度(MSS)来表示。我们分析了MSS方案的安全可靠性权衡(SRT),其中安全性和可靠性分别由拦截概率和中断概率表征。为了便于比较,我们还提供了轮循卫星调度(RSS)方案的SRT分析。此外,数值SRT结果表明,所提出的MSS方案在SRT方面明显优于RSS方案。
{"title":"Security-Reliability Tradeoff Analysis of Spectrum-Sharing Aided Satellite-Terrestrial Networks","authors":"Xiaojin Ding, Gengxin Zhang, Dexin Qu, Tiecheng Song","doi":"10.1109/GCWkshps45667.2019.9024465","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024465","url":null,"abstract":"In this paper, we investigate the physical-layer security of a spectrum-sharing aided satellite-terrestrial integrated network comprised of a pair of satellite system and terrestrial system, which can utilize the shared spectrum in the presence of an eavesdropper. We propose a specifically designed satellite scheduling scheme to guarantee wireless transmission of the satellite system against eavesdropping attacks in the face of co-channel interference generated by the terrestrial communication system, where the specifically designed satellite scheduling scheme is represented by multi-satellite scheduling (MSS). We analyze the security-reliability tradeoff (SRT) of the MSS scheme, where the security and the reliability are characterized by the intercept probability and the outage probability, respectively. For comparison purposes, we also provide the SRT analysis of the round-robin satellite scheduling (RSS) scheme. In addition, numerical SRT results demonstrate that the proposed MSS scheme significantly outperform the RSS scheme in terms of their SRT.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Real-Time Network Traffic Identifier for Open 5G/B5G Networks via Prototype Analysis 基于原型分析的开放5G/B5G网络实时网络流量标识
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024421
Zhichao Zou, Shunqing Zhang, Shugong Xu, Shan Cao
Nowadays real-time traffic occupies lots of network resources, thus identification and analysis for this network traffic becomes urgent for operator and commercial company. With the identified traffic types, quality of experience (QoE) monitoring and optimization, user behavior analysis and network resource allocation are more beneficial for open 5G/Beyond 5G (5G/B5G) networks. Exiting studies usually adopt transport or application layer information to identify traffic, while we jointly consider them simultaneously to achieve general purpose identifier. Besides, we also analyze the flow-based features to reduce the corresponding complexity for low-complexity implementation. Based on anatomy of network traffic identification, we propose a traffic type identification framework for real-time traffic. In mainstream voice over Internet protocol (VoIP) call and video streaming services, the proposed method can achieve as much as 30% identification accuracy improvement and have more than 20% reduction in terms of the identification delay if compared with other conventional schemes.
当前,实时流量占用了大量的网络资源,因此对实时流量的识别和分析成为运营商和商业公司迫切需要解决的问题。通过对流量类型的识别,对体验质量(QoE)的监控和优化、用户行为分析以及网络资源的分配,更有利于开放的5G/超5G (5G/B5G)网络。现有的研究通常采用传输层或应用层信息来识别流量,而我们将两者同时考虑,以实现通用标识。此外,我们还分析了基于流的特征,以降低相应的复杂度,实现低复杂度。在分析网络流量识别的基础上,提出了一种实时流量类型识别框架。在主流的VoIP (voice over Internet protocol)呼叫和视频流业务中,与其他传统方案相比,该方法的识别精度提高了30%以上,识别延迟降低了20%以上。
{"title":"A Real-Time Network Traffic Identifier for Open 5G/B5G Networks via Prototype Analysis","authors":"Zhichao Zou, Shunqing Zhang, Shugong Xu, Shan Cao","doi":"10.1109/GCWkshps45667.2019.9024421","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024421","url":null,"abstract":"Nowadays real-time traffic occupies lots of network resources, thus identification and analysis for this network traffic becomes urgent for operator and commercial company. With the identified traffic types, quality of experience (QoE) monitoring and optimization, user behavior analysis and network resource allocation are more beneficial for open 5G/Beyond 5G (5G/B5G) networks. Exiting studies usually adopt transport or application layer information to identify traffic, while we jointly consider them simultaneously to achieve general purpose identifier. Besides, we also analyze the flow-based features to reduce the corresponding complexity for low-complexity implementation. Based on anatomy of network traffic identification, we propose a traffic type identification framework for real-time traffic. In mainstream voice over Internet protocol (VoIP) call and video streaming services, the proposed method can achieve as much as 30% identification accuracy improvement and have more than 20% reduction in terms of the identification delay if compared with other conventional schemes.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125421300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
First Experimental Ambient Backscatter Communication Using a Compact Reconfigurable Tag Antenna 首次使用紧凑型可重构标签天线的环境后向散射通信实验
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024698
Y. Kokar, D. P. Huy, Romain Fara, K. Rachedi, A. Ourir, J. Rosny, M. D. Renzo, Jean-Christophe Prévotet, M. Hélard
Ambient backscatter communications have emerged as a promising technology for a sustainable development of the Internet of Things (IoT). In such system, a radio frequency (RF) tag can transmit data to a receiver without battery and without generating any new RF wave, just by backscattering the incident RF wave originated by an ambient RF source. The simplest tag is a dipole that is either in an absorbing mode or in reflecting mode to send "0" or "1", and thus leads to a modulation order of 2. Previous solutions to reach higher modulation order, so as to achieve higher data rate, are based on antenna arrays. However, such solutions are not suitable for connected objects, due to their sizes. In this paper, for the first time, we propose a new tag that uses a compact antenna with reconfigurable radiation patterns to provide a high modulation order. We present experimental bit error rate measurements obtained with an experimental test-bed and two tag antennas, both providing 4 states and thus being able to convey 2 bits per symbol. These measurements show that the performance improves with increasing number of receive antennas, and lead to the conclusion that a tag antenna with low cross-correlations between reconfigurable radiation patterns is suitable for backscattering applications in IoT.
环境反向散射通信已成为物联网可持续发展的一项有前途的技术。在这种系统中,射频(RF)标签可以在没有电池的情况下将数据传输到接收器,并且不产生任何新的射频波,只是通过反向散射来自环境射频源的入射射频波。最简单的标签是一个偶极子,它要么处于吸收模式,要么处于反射模式,发送“0”或“1”,从而导致调制顺序为2。为了达到更高的调制阶数,从而实现更高的数据速率,以前的解决方案都是基于天线阵列。然而,由于它们的尺寸,这种解决方案不适合连接对象。在本文中,我们首次提出了一种新的标签,它使用具有可重构辐射方向图的紧凑天线来提供高调制阶数。我们介绍了实验误码率测量结果,通过实验测试平台和两个标签天线获得,它们都提供4种状态,因此每个符号能够传输2比特。这些测量表明,随着接收天线数量的增加,性能有所提高,并得出结论,具有可重构辐射方向图之间低互相关的标签天线适合物联网中的后向散射应用。
{"title":"First Experimental Ambient Backscatter Communication Using a Compact Reconfigurable Tag Antenna","authors":"Y. Kokar, D. P. Huy, Romain Fara, K. Rachedi, A. Ourir, J. Rosny, M. D. Renzo, Jean-Christophe Prévotet, M. Hélard","doi":"10.1109/GCWkshps45667.2019.9024698","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024698","url":null,"abstract":"Ambient backscatter communications have emerged as a promising technology for a sustainable development of the Internet of Things (IoT). In such system, a radio frequency (RF) tag can transmit data to a receiver without battery and without generating any new RF wave, just by backscattering the incident RF wave originated by an ambient RF source. The simplest tag is a dipole that is either in an absorbing mode or in reflecting mode to send \"0\" or \"1\", and thus leads to a modulation order of 2. Previous solutions to reach higher modulation order, so as to achieve higher data rate, are based on antenna arrays. However, such solutions are not suitable for connected objects, due to their sizes. In this paper, for the first time, we propose a new tag that uses a compact antenna with reconfigurable radiation patterns to provide a high modulation order. We present experimental bit error rate measurements obtained with an experimental test-bed and two tag antennas, both providing 4 states and thus being able to convey 2 bits per symbol. These measurements show that the performance improves with increasing number of receive antennas, and lead to the conclusion that a tag antenna with low cross-correlations between reconfigurable radiation patterns is suitable for backscattering applications in IoT.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126599082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Joint Channel Equalization and Tracking for V2X Communications Using SC-FDE Schemes 基于SC-FDE方案的V2X通信联合信道均衡与跟踪
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024432
P. Pedrosa, R. Dinis, D. Castanheira, Adão Silva, A. Gameiro
In this paper we consider the use of a single- carrier with frequency-domain equalization (SC-FDE) scheme for vehicle-to-everything (V2X) communications. To cope with the doubly-selective nature of the V2X channel we propose a receiver structure for the joint channel equalization and tracking. We use a low-complexity iterative frequency-domain equalizer based on the iterative block decision-feedback equalization (IB-DFE) concept for the channel equalization and an extended Kalman filter (EKF) for the channel tracking. The tracking procedure works by, first, observing (estimating) the channel state using training symbols and then predicting the channel state using a state-transition model during the transmission of the data symbols. Alternatively, decision-directed channel estimation also can be used, resulting in improved performance.
在本文中,我们考虑使用单载波频域均衡(SC-FDE)方案进行车辆对一切(V2X)通信。为了应对V2X信道的双选择特性,我们提出了一种用于联合信道均衡和跟踪的接收器结构。我们使用基于迭代块决策反馈均衡(IB-DFE)概念的低复杂度迭代频域均衡器进行信道均衡,并使用扩展卡尔曼滤波器(EKF)进行信道跟踪。跟踪过程的工作原理是,首先使用训练符号观察(估计)信道状态,然后在数据符号传输过程中使用状态转移模型预测信道状态。另外,还可以使用决策导向的信道估计,从而提高性能。
{"title":"Joint Channel Equalization and Tracking for V2X Communications Using SC-FDE Schemes","authors":"P. Pedrosa, R. Dinis, D. Castanheira, Adão Silva, A. Gameiro","doi":"10.1109/GCWkshps45667.2019.9024432","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024432","url":null,"abstract":"In this paper we consider the use of a single- carrier with frequency-domain equalization (SC-FDE) scheme for vehicle-to-everything (V2X) communications. To cope with the doubly-selective nature of the V2X channel we propose a receiver structure for the joint channel equalization and tracking. We use a low-complexity iterative frequency-domain equalizer based on the iterative block decision-feedback equalization (IB-DFE) concept for the channel equalization and an extended Kalman filter (EKF) for the channel tracking. The tracking procedure works by, first, observing (estimating) the channel state using training symbols and then predicting the channel state using a state-transition model during the transmission of the data symbols. Alternatively, decision-directed channel estimation also can be used, resulting in improved performance.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage 面向云存储数据共享的高效Key-Aggregate关键字可搜索加密
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024540
Xuqi Wang, Yu Xie, Xiangguo Cheng, Zhengtao Jiang
One key focus of cloud storage is keyword search on encrypted data. In a cloud-based secure data sharing system, users need to search keywords on encrypted data in order to data confidentiality and query privacy. Moreover, a large number of trapdoors should be generated by users with his/her keys and submitted to the cloud. Some researches on searchable encryption with key-aggregate have been conducted in recent years, which shortened the number of keys and trapdoors to a constant. However, the computational overhead and communication costs are largely neglected in the literature. In this paper, we propose an efficient key-aggregate keyword searchable encryption (eKAKSE) scheme. Generally, this scheme does not need to generate substantial parameters when the system is established. It dramatically reduces the computational overhead in the case of resisting the eavesdropping problem. We formulate the security definitions for eKAKSE and prove its security. The simulation results show that the computational overhead of the proposed scheme is more efficient than that of other schemes.
云存储的一个重点是对加密数据的关键字搜索。在基于云的安全数据共享系统中,用户需要对加密后的数据进行关键字搜索,以保证数据的保密性和查询隐私性。此外,用户需要使用自己的密钥生成大量的活板门,并提交给云。近年来进行了一些基于密钥聚合的可搜索加密研究,将密钥和活门的数量缩短到一个常数。然而,在文献中,计算开销和通信成本在很大程度上被忽视。本文提出了一种高效的密钥聚合关键字可搜索加密(eKAKSE)方案。一般情况下,该方案在系统建立时不需要产生实质性的参数。它极大地减少了在抵抗窃听问题的情况下的计算开销。给出了eKAKSE的安全定义,并证明了其安全性。仿真结果表明,该方案的计算量比其他方案更高效。
{"title":"An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage","authors":"Xuqi Wang, Yu Xie, Xiangguo Cheng, Zhengtao Jiang","doi":"10.1109/GCWkshps45667.2019.9024540","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024540","url":null,"abstract":"One key focus of cloud storage is keyword search on encrypted data. In a cloud-based secure data sharing system, users need to search keywords on encrypted data in order to data confidentiality and query privacy. Moreover, a large number of trapdoors should be generated by users with his/her keys and submitted to the cloud. Some researches on searchable encryption with key-aggregate have been conducted in recent years, which shortened the number of keys and trapdoors to a constant. However, the computational overhead and communication costs are largely neglected in the literature. In this paper, we propose an efficient key-aggregate keyword searchable encryption (eKAKSE) scheme. Generally, this scheme does not need to generate substantial parameters when the system is established. It dramatically reduces the computational overhead in the case of resisting the eavesdropping problem. We formulate the security definitions for eKAKSE and prove its security. The simulation results show that the computational overhead of the proposed scheme is more efficient than that of other schemes.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Capacity Analysis of Multi-Pair Orbital Angular Momentum Interference Networks 多对轨道角动量干涉网络容量分析
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024376
Woong Son, Howon Lee, B. Jung
In this paper, we investigate a multi-pair orbital angular momentum (OAM) interference network adopting mode- division multiplexing (MDM) at each transmitter, where multiple transmitter-receiver pairs exploit the same multiple OAM modes. Even though many previous studies on the OAM-MDM exist in literature, they only focused on a single transmitter-receiver pair and did not consider the inter-pair interference. In practice, wireless fronthaul and backhaul links reuse the same frequency band and they may interfere with each other. We first mathematically characterize the Laguerre-Gaussian (LG) beam-based OAM wireless channel and then analyze the channel capacity of the multi-pair OAM interference channel. It is worth noting that this is the first theoretical result in literature. Through extensive computer simulations, we validate the channel capacity of the multi-pair OAM-MDM interference channel by considering the interference among different OAM beams according to various system parameters such as the number of OAM modes, the distance between the transmitter and receiver, the distance between adjacent transmit antennas, the waist of the OAM beams, etc.
本文研究了一种多对轨道角动量(OAM)干扰网络,该网络在每个发射端采用模分复用(MDM),其中多个发射端-接收端对利用相同的多个OAM模式。尽管文献中有很多关于OAM-MDM的研究,但它们只关注单个收发对,没有考虑收发对间的干扰。在实际应用中,无线前传和回程链路重复使用相同的频带,它们可能会相互干扰。首先对基于Laguerre-Gaussian (LG)波束的OAM无线信道进行了数学表征,然后分析了多对OAM干扰信道的信道容量。值得注意的是,这是文献中第一个理论结果。通过大量的计算机模拟,我们根据各种系统参数,如OAM模式个数、收发距离、相邻发射天线之间的距离、OAM波束腰等,考虑不同OAM波束之间的干扰,验证了多对OAM- mdm干扰信道的信道容量。
{"title":"Capacity Analysis of Multi-Pair Orbital Angular Momentum Interference Networks","authors":"Woong Son, Howon Lee, B. Jung","doi":"10.1109/GCWkshps45667.2019.9024376","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024376","url":null,"abstract":"In this paper, we investigate a multi-pair orbital angular momentum (OAM) interference network adopting mode- division multiplexing (MDM) at each transmitter, where multiple transmitter-receiver pairs exploit the same multiple OAM modes. Even though many previous studies on the OAM-MDM exist in literature, they only focused on a single transmitter-receiver pair and did not consider the inter-pair interference. In practice, wireless fronthaul and backhaul links reuse the same frequency band and they may interfere with each other. We first mathematically characterize the Laguerre-Gaussian (LG) beam-based OAM wireless channel and then analyze the channel capacity of the multi-pair OAM interference channel. It is worth noting that this is the first theoretical result in literature. Through extensive computer simulations, we validate the channel capacity of the multi-pair OAM-MDM interference channel by considering the interference among different OAM beams according to various system parameters such as the number of OAM modes, the distance between the transmitter and receiver, the distance between adjacent transmit antennas, the waist of the OAM beams, etc.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124494878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QR Approximation for Fronthaul Compression in Uplink Massive MIMO 面向上行海量MIMO的前传压缩QR逼近
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024609
P. Aswathylakshmi, R. Ganti
Massive MIMO's immense potential to expand the capacity of base stations also comes with the caveat of requiring tremendous processing power. This favours a centralized radio access network (C-RAN) architecture that concentrates the processing power at a common baseband unit (BBU) connected to multiple remote radio heads (RRH) via fronthaul links. The large bandwidths of 5G make the fronthaul data rate a major bottleneck. Since the number of active users in a massive MIMO system is much smaller than the number of antennas, we propose a dimension reduction scheme based on QR approximation for fronthaul data compression. Link level simulations show that the proposed method achieves more than 17Ã- compression while also improving the error performance of the system through denoising.
大规模MIMO在扩大基站容量方面的巨大潜力,也伴随着需要巨大处理能力的警告。这有利于集中式无线电接入网(C-RAN)架构,该架构将处理能力集中在通过前传链路连接到多个远程无线电头(RRH)的公共基带单元(BBU)上。5G的大带宽使前传数据速率成为主要瓶颈。针对大规模MIMO系统中活跃用户数量远小于天线数量的问题,提出了一种基于QR逼近的前传数据降维压缩方案。链路级仿真结果表明,该方法在实现17Ã-以上压缩的同时,还通过去噪改善了系统的误差性能。
{"title":"QR Approximation for Fronthaul Compression in Uplink Massive MIMO","authors":"P. Aswathylakshmi, R. Ganti","doi":"10.1109/GCWkshps45667.2019.9024609","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024609","url":null,"abstract":"Massive MIMO's immense potential to expand the capacity of base stations also comes with the caveat of requiring tremendous processing power. This favours a centralized radio access network (C-RAN) architecture that concentrates the processing power at a common baseband unit (BBU) connected to multiple remote radio heads (RRH) via fronthaul links. The large bandwidths of 5G make the fronthaul data rate a major bottleneck. Since the number of active users in a massive MIMO system is much smaller than the number of antennas, we propose a dimension reduction scheme based on QR approximation for fronthaul data compression. Link level simulations show that the proposed method achieves more than 17Ã- compression while also improving the error performance of the system through denoising.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"47 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection 基于TLS检测的物联网设备自启动安全配置
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024325
V. Danilchenko, Matthew S. Theobald, Daniel Cohen
In the modern security-conscious world, Deep Packet Inspection (DPI) proxies are increasingly often used on industrial and enterprise networks to perform TLS unwrapping on all outbound connections. However, enabling TLS unwrapping requires local devices to have the DPI proxy Certificate Authority certificates installed. While for conventional computing devices this is addressed via enterprise management, it's a difficult problem for Internet of Things ("IoT") devices which are generally not under enterprise management, and may not even be capable of it due to their resource-constrained nature. Thus, for typical IoT devices, being installed on a network with DPI requires either manual device configuration or custom DPI proxy configuration, both of which solutions have significant shortcomings. This poses a serious challenge to the deployment of IoT devices on DPI-enabled intranets. The authors propose a solution to this problem: a method of installing on IoT devices the CA certificates for DPI proxy CAs, as well as other security configuration ("security bootstrapping"). The proposed solution respects the DPI policies, while allowing the commissioning of IoT and IIoT devices without the need for additional manual configuration either at device scope or at network scope. This is accomplished by performing the bootstrap operation over unsecured connection, and downloading certificates using TLS validation at application level. The resulting solution is light-weight and secure, yet does not require validation of the DPI proxy's CA certificates in order to perform the security bootstrapping, thus avoiding the chicken-and-egg problem inherent in using TLS on DPI-enabled intranets.
在现代具有安全意识的世界中,深度包检测(DPI)代理越来越多地用于工业和企业网络,以在所有出站连接上执行TLS解包。但是,启用TLS展开要求本地设备安装DPI代理证书颁发机构证书。对于传统的计算设备来说,这是通过企业管理来解决的,而对于物联网(“IoT”)设备来说,这是一个难题,因为物联网设备通常不在企业管理之下,甚至可能由于其资源受限的性质而无法做到这一点。因此,对于典型的物联网设备,安装在带有DPI的网络上需要手动配置设备或自定义DPI代理配置,这两种解决方案都有明显的缺点。这对在支持dpi的内部网上部署物联网设备构成了严重挑战。作者提出了一个解决这个问题的方法:在物联网设备上安装DPI代理CA的CA证书,以及其他安全配置(“安全引导”)。提出的解决方案尊重DPI策略,同时允许IoT和IIoT设备的调试,而无需在设备范围或网络范围内进行额外的手动配置。这是通过在不安全的连接上执行引导操作,以及在应用程序级别使用TLS验证下载证书来实现的。由此产生的解决方案轻量级且安全,但不需要验证DPI代理的CA证书来执行安全引导,从而避免了在启用DPI的内部网上使用TLS所固有的先有鸡还是先有蛋的问题。
{"title":"Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection","authors":"V. Danilchenko, Matthew S. Theobald, Daniel Cohen","doi":"10.1109/GCWkshps45667.2019.9024325","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024325","url":null,"abstract":"In the modern security-conscious world, Deep Packet Inspection (DPI) proxies are increasingly often used on industrial and enterprise networks to perform TLS unwrapping on all outbound connections. However, enabling TLS unwrapping requires local devices to have the DPI proxy Certificate Authority certificates installed. While for conventional computing devices this is addressed via enterprise management, it's a difficult problem for Internet of Things (\"IoT\") devices which are generally not under enterprise management, and may not even be capable of it due to their resource-constrained nature. Thus, for typical IoT devices, being installed on a network with DPI requires either manual device configuration or custom DPI proxy configuration, both of which solutions have significant shortcomings. This poses a serious challenge to the deployment of IoT devices on DPI-enabled intranets. The authors propose a solution to this problem: a method of installing on IoT devices the CA certificates for DPI proxy CAs, as well as other security configuration (\"security bootstrapping\"). The proposed solution respects the DPI policies, while allowing the commissioning of IoT and IIoT devices without the need for additional manual configuration either at device scope or at network scope. This is accomplished by performing the bootstrap operation over unsecured connection, and downloading certificates using TLS validation at application level. The resulting solution is light-weight and secure, yet does not require validation of the DPI proxy's CA certificates in order to perform the security bootstrapping, thus avoiding the chicken-and-egg problem inherent in using TLS on DPI-enabled intranets.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122182276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduced-Complexity Quasi-Optimum Detection for MIMO-OFDM Signals with Strong Nonlinear Distortion 具有强非线性失真的MIMO-OFDM信号的低复杂度准最优检测
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024620
J. Felix, João Guerreiro, R. Dinis, P. Montezuma
MIMO-OFDM (Multi-Input, Multi-Output Orthogonal Frequency Division Multiplexing) signals are very prone to nonlinear distortion effects, which can lead to high irreducible error floors. This can be particularly serious when low-resolution quantizers are employed. In this paper we consider MIMO-OFDM schemes with low- resolution quantizers. It is shown that, although this leads to strong nonlinear distortion effects and very poor performance when conventional receivers are employed, this is not necessarily the case when optimum receivers are considered. Since the complexity of the optimum receiver for MIMO-OFDM is prohibitively high, we develop sub- optimum receivers with moderate complexity. It is shown that these receivers can have huge performance gains when the nonlinear distortion levels are high, eliminating irreducible error floors and even outperforming linear MIMO-OFDM schemes in some scenarios.
MIMO-OFDM(多输入多输出正交频分复用)信号非常容易产生非线性失真效应,从而导致高不可约误差层数。当使用低分辨率量化器时,这可能会特别严重。本文研究了具有低分辨率量化器的MIMO-OFDM方案。研究表明,尽管在使用常规接收机时,这会导致强烈的非线性失真效应和非常差的性能,但在考虑最佳接收机时,情况并非如此。由于MIMO-OFDM最优接收机的复杂性过高,我们开发了中等复杂度的次最优接收机。研究表明,当非线性失真水平较高时,这些接收机可以获得巨大的性能提升,消除了不可约的误差层,甚至在某些情况下优于线性MIMO-OFDM方案。
{"title":"Reduced-Complexity Quasi-Optimum Detection for MIMO-OFDM Signals with Strong Nonlinear Distortion","authors":"J. Felix, João Guerreiro, R. Dinis, P. Montezuma","doi":"10.1109/GCWkshps45667.2019.9024620","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024620","url":null,"abstract":"MIMO-OFDM (Multi-Input, Multi-Output Orthogonal Frequency Division Multiplexing) signals are very prone to nonlinear distortion effects, which can lead to high irreducible error floors. This can be particularly serious when low-resolution quantizers are employed. In this paper we consider MIMO-OFDM schemes with low- resolution quantizers. It is shown that, although this leads to strong nonlinear distortion effects and very poor performance when conventional receivers are employed, this is not necessarily the case when optimum receivers are considered. Since the complexity of the optimum receiver for MIMO-OFDM is prohibitively high, we develop sub- optimum receivers with moderate complexity. It is shown that these receivers can have huge performance gains when the nonlinear distortion levels are high, eliminating irreducible error floors and even outperforming linear MIMO-OFDM schemes in some scenarios.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131818706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Partitioned Controller Placement in SDWANs for Reliability Maximization with Latency Constraints 基于延迟约束的sdwan可靠性最大化分区控制器布局
Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024372
K. Yang, Bangning Zhang, D. Guo, Min Lin, Tomaso de Cola
The separation of the control plane from the data plane has made the novel paradigm, Software-Defined Networking (SDN), available in both small-scale and large-scale networks. Unlike small-scale networks with merely one controller for deployment, employing multiple controllers is essential to meet the requirements of reliability and scalability in Software- Defined WANs (SDWANs). However, the occurrence of the node or link failures in the control plane may severely deteriorate the system performance. Therefore, how to determine the number and locations of the distributed controllers in SDWANs for enhancing network reliability with propagation latency constraints worth in-depth study. In this paper, we formulate the controller placement problem in SDWANs mathematically and propose a heuristic algorithm with low computational complexity to address it. By incorporating the centroid-based network partition scheme, we further ameliorate the CPP for maximizing reliability with latency constraints. Experiments are performed on real network topologies to validate the effectiveness of our approach for controller placement problem in SDWANs.
控制平面与数据平面的分离使得软件定义网络(SDN)这一新的范例在小规模和大规模网络中都可用。与仅部署一个控制器的小规模网络不同,采用多个控制器对于满足软件定义广域网(sdwan)的可靠性和可扩展性要求至关重要。当控制平面出现节点故障或链路故障时,可能会导致系统性能严重下降。因此,如何确定sdwan中分布式控制器的数量和位置,以提高具有传播延迟约束的网络可靠性,值得深入研究。本文从数学的角度阐述了sdwan中的控制器布局问题,并提出了一种计算复杂度较低的启发式算法来解决该问题。通过结合基于质心的网络分区方案,我们进一步改进了CPP,以最大化延迟约束下的可靠性。在实际网络拓扑上进行了实验,以验证我们的方法对sdwan中控制器放置问题的有效性。
{"title":"Partitioned Controller Placement in SDWANs for Reliability Maximization with Latency Constraints","authors":"K. Yang, Bangning Zhang, D. Guo, Min Lin, Tomaso de Cola","doi":"10.1109/GCWkshps45667.2019.9024372","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024372","url":null,"abstract":"The separation of the control plane from the data plane has made the novel paradigm, Software-Defined Networking (SDN), available in both small-scale and large-scale networks. Unlike small-scale networks with merely one controller for deployment, employing multiple controllers is essential to meet the requirements of reliability and scalability in Software- Defined WANs (SDWANs). However, the occurrence of the node or link failures in the control plane may severely deteriorate the system performance. Therefore, how to determine the number and locations of the distributed controllers in SDWANs for enhancing network reliability with propagation latency constraints worth in-depth study. In this paper, we formulate the controller placement problem in SDWANs mathematically and propose a heuristic algorithm with low computational complexity to address it. By incorporating the centroid-based network partition scheme, we further ameliorate the CPP for maximizing reliability with latency constraints. Experiments are performed on real network topologies to validate the effectiveness of our approach for controller placement problem in SDWANs.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131855199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE Globecom Workshops (GC Wkshps)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1