首页 > 最新文献

2022 IEEE Latin-American Conference on Communications (LATINCOM)最新文献

英文 中文
Effectiveness of Coherent Pluggable Interfaces in Brownfield Optical Network Deployments 相干可插拔接口在棕场光网络部署中的有效性
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000668
João Pedro, H. Bock
The emergence of coherent pluggable interfaces is enabling to streamline the network architecture and is raising the prospect of extra reductions in both capital and operational expenditures. Nevertheless, the relatively long lifecycle of line systems (e.g., 10 years), when compared to the shorter lifecycle of line interfaces (e.g., 3 years), means a large fraction of network operators will be looking to leverage these pluggable devices in brownfield deployment scenarios. In this case, the legacy line system can hamper the effectiveness of exploiting the pluggable interfaces. This paper describes a comprehensive framework to estimate the impact of the line system on key network capacity and cost-related metrics when pluggable line interfaces are deployed. The framework is used on a reference optical transport network with growing demand for capacity and assuming a set of possible line systems, including legacy and modern ones. The simulation results highlight that although there are clear benefits in terms of usable capacity when these interfaces are deployed over modern line systems (greenfield scenario), it is still possible to reach competitive capacity figures with legacy line systems (brownfield scenario), particularly via exploiting a trade-off between capacity and the number of line interfaces used as regenerators.
连贯的可插拔接口的出现有助于简化网络架构,并提高了额外减少资本和业务支出的前景。然而,与线路接口的较短生命周期(例如3年)相比,线路系统的生命周期相对较长(例如10年),这意味着很大一部分网络运营商将寻求在棕色地带部署场景中利用这些可插拔设备。在这种情况下,遗留线路系统可能会妨碍利用可插拔接口的有效性。本文描述了一个全面的框架来评估线路系统对关键网络容量和成本相关指标的影响,当部署可插拔线路接口时。该框架用于对容量需求不断增长的参考光传输网络,并假设一组可能的线路系统,包括传统的和现代的。模拟结果强调,尽管在现代线路系统(绿地方案)上部署这些接口在可用容量方面有明显的好处,但与传统线路系统(棕地方案)相比,仍然有可能达到具有竞争力的容量数字,特别是通过利用容量和用作再生器的线路接口数量之间的权衡。
{"title":"Effectiveness of Coherent Pluggable Interfaces in Brownfield Optical Network Deployments","authors":"João Pedro, H. Bock","doi":"10.1109/LATINCOM56090.2022.10000668","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000668","url":null,"abstract":"The emergence of coherent pluggable interfaces is enabling to streamline the network architecture and is raising the prospect of extra reductions in both capital and operational expenditures. Nevertheless, the relatively long lifecycle of line systems (e.g., 10 years), when compared to the shorter lifecycle of line interfaces (e.g., 3 years), means a large fraction of network operators will be looking to leverage these pluggable devices in brownfield deployment scenarios. In this case, the legacy line system can hamper the effectiveness of exploiting the pluggable interfaces. This paper describes a comprehensive framework to estimate the impact of the line system on key network capacity and cost-related metrics when pluggable line interfaces are deployed. The framework is used on a reference optical transport network with growing demand for capacity and assuming a set of possible line systems, including legacy and modern ones. The simulation results highlight that although there are clear benefits in terms of usable capacity when these interfaces are deployed over modern line systems (greenfield scenario), it is still possible to reach competitive capacity figures with legacy line systems (brownfield scenario), particularly via exploiting a trade-off between capacity and the number of line interfaces used as regenerators.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124828304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LATINCOM 2022 Title Page LATINCOM 2022标题页
Pub Date : 2022-11-30 DOI: 10.1109/latincom56090.2022.10000564
{"title":"LATINCOM 2022 Title Page","authors":"","doi":"10.1109/latincom56090.2022.10000564","DOIUrl":"https://doi.org/10.1109/latincom56090.2022.10000564","url":null,"abstract":"","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125444476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OMINACS: Online ML-Based IoT Network Attack Detection and Classification System OMINACS:基于ml的在线物联网网络攻击检测和分类系统
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000544
Diego Abreu, A. Abelém
Severa1 Machine Learning (ML) methodologies have been proposed to improve security in Internet Of Things (IoT) networks and reduce the damage caused by the action of malicious agents. However, detecting and classifying attacks with high accuracy and precision is still a major challenge. This paper proposes an online attack detection and network traffic classification system, which combines stream Machine Learning, Deep Learning, and Ensemble Learning technique. Using multiple stages of data analysis, the system can detect the presence of malicious traffic flows and classify them according to the type of attack they represent. Furthermore, we show how to implement this system both in an IoT network and from an ML point of view. The system was evaluated in three IoT network security datasets, in which it obtained accuracy and precision above 90% with a reduced false alarm rate.
已经提出了几种机器学习(ML)方法来提高物联网(IoT)网络的安全性并减少恶意代理行为造成的损害。然而,对攻击进行高精度的检测和分类仍然是一个重大挑战。本文提出了一种结合流机器学习、深度学习和集成学习技术的在线攻击检测和网络流量分类系统。通过多个阶段的数据分析,系统可以检测到恶意流量的存在,并根据其所代表的攻击类型对其进行分类。此外,我们展示了如何在物联网网络和机器学习的角度实现这个系统。在三个物联网网络安全数据集中对系统进行了评估,在降低误报率的情况下,系统的准确率和精密度均在90%以上。
{"title":"OMINACS: Online ML-Based IoT Network Attack Detection and Classification System","authors":"Diego Abreu, A. Abelém","doi":"10.1109/LATINCOM56090.2022.10000544","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000544","url":null,"abstract":"Severa1 Machine Learning (ML) methodologies have been proposed to improve security in Internet Of Things (IoT) networks and reduce the damage caused by the action of malicious agents. However, detecting and classifying attacks with high accuracy and precision is still a major challenge. This paper proposes an online attack detection and network traffic classification system, which combines stream Machine Learning, Deep Learning, and Ensemble Learning technique. Using multiple stages of data analysis, the system can detect the presence of malicious traffic flows and classify them according to the type of attack they represent. Furthermore, we show how to implement this system both in an IoT network and from an ML point of view. The system was evaluated in three IoT network security datasets, in which it obtained accuracy and precision above 90% with a reduced false alarm rate.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123832394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Method to Protect User Privacy Against Traffic-based Attacks on Smart Home 基于流量攻击的智能家居用户隐私保护动态方法
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000503
B. V. D. Santos, Andressa Vergütz, R. Macedo, M. N. Lima
The Internet of Things (IoT) has revolutionized how people interact with their living spaces. However, attackers can perform traffic-based attacks to reveal the behavior of legitimate users, seriously compromising their privacy. Studies have proposed to obfuscate network traffic to avoid these attacks. However, there is still the challenge of ensuring a trade-off between privacy and network overhead. This work introduces the MITRA method to protect user privacy in smart homes while keeping IoT network overhead low. The method relies on the dummy traffic injection following different levels of obfuscation. The different levels mask network traffic, improving privacy without harming network performance unnecessarily. Results show that the obfuscation of IoT device traffic reduces the traffic identification accuracy by up to 42%.
物联网(IoT)彻底改变了人们与生活空间的互动方式。然而,攻击者可以执行基于流量的攻击来暴露合法用户的行为,从而严重损害其隐私。有研究建议混淆网络流量以避免这些攻击。然而,确保在隐私和网络开销之间进行权衡仍然是一个挑战。这项工作介绍了MITRA方法,以保护智能家居中的用户隐私,同时保持低物联网网络开销。该方法依赖于不同混淆级别的虚拟流量注入。不同的级别屏蔽网络流量,在不不必要地损害网络性能的情况下提高隐私。结果表明,物联网设备流量的混淆使流量识别准确率降低了42%。
{"title":"A Dynamic Method to Protect User Privacy Against Traffic-based Attacks on Smart Home","authors":"B. V. D. Santos, Andressa Vergütz, R. Macedo, M. N. Lima","doi":"10.1109/LATINCOM56090.2022.10000503","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000503","url":null,"abstract":"The Internet of Things (IoT) has revolutionized how people interact with their living spaces. However, attackers can perform traffic-based attacks to reveal the behavior of legitimate users, seriously compromising their privacy. Studies have proposed to obfuscate network traffic to avoid these attacks. However, there is still the challenge of ensuring a trade-off between privacy and network overhead. This work introduces the MITRA method to protect user privacy in smart homes while keeping IoT network overhead low. The method relies on the dummy traffic injection following different levels of obfuscation. The different levels mask network traffic, improving privacy without harming network performance unnecessarily. Results show that the obfuscation of IoT device traffic reduces the traffic identification accuracy by up to 42%.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Soft Actor Critic Framework for Resource Allocation in Backscatter-NOMA Networks 后向散射- noma网络资源分配的软行为者评价框架
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000455
Abdullah Alajmi, M. Fayaz, Waleed Ahsan, A. Nallanathan
With the use of power domain non-orthogonal multiple access (NOMA) and backscatter communication (BAC), future sixth-generation ultra massive machine type communications networks are expected to connect large-scale Internet of things (IoT) devices. However, due to NOMA co-channel interference, the power allocation to large-scale IoT devices becomes critical. The existing convex optimization-based solutions are highly complex hence, it is difficult to find the optimal solution to the resource allocation problem in a highly dynamic environment. Therefore, this work develops an efficient model-free BACNOMA system to assist the base station for complex resource scheduling tasks in a dynamic BAC-NOMA IoT network. More specifically, we jointly optimize the transmit power of downlink IoT users and the reflection coefficient of uplink backscatter devices using a reinforcement learning algorithm, namely, softactor critic. Numerical results show that the proposed algorithm obtained a higher reward and converges to an optimal solution with respect to a large number of iterations. The proposed algorithm increases the sum rate by 57.6% as compared to the conventional optimization (benchmark) approach. Moreover, we show that the proposed algorithm outperforms the conventional BAC-NOMA scheme and BAC with orthogonal multiple access in terms of average sum rate with the increasing number of backscatter devices.
随着功率域非正交多址(NOMA)和反向散射通信(BAC)技术的应用,未来第六代超大型机器型通信网络有望连接大规模物联网(IoT)设备。然而,由于NOMA共信道干扰,大规模物联网设备的功率分配变得至关重要。现有的基于凸优化的求解方法非常复杂,难以在高度动态的环境中找到资源分配问题的最优解。因此,本工作开发了一种高效的无模型BACNOMA系统,以协助基站在动态BAC-NOMA物联网网络中完成复杂的资源调度任务。更具体地说,我们使用强化学习算法,即软因子批评,共同优化下行物联网用户的发射功率和上行后向散射设备的反射系数。数值结果表明,该算法获得了较高的回报,且迭代次数多时收敛于最优解。与传统的优化(基准)方法相比,该算法的和速率提高了57.6%。此外,随着后向散射器件数量的增加,该算法在平均和速率方面优于传统的BAC- noma方案和正交多址BAC方案。
{"title":"Soft Actor Critic Framework for Resource Allocation in Backscatter-NOMA Networks","authors":"Abdullah Alajmi, M. Fayaz, Waleed Ahsan, A. Nallanathan","doi":"10.1109/LATINCOM56090.2022.10000455","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000455","url":null,"abstract":"With the use of power domain non-orthogonal multiple access (NOMA) and backscatter communication (BAC), future sixth-generation ultra massive machine type communications networks are expected to connect large-scale Internet of things (IoT) devices. However, due to NOMA co-channel interference, the power allocation to large-scale IoT devices becomes critical. The existing convex optimization-based solutions are highly complex hence, it is difficult to find the optimal solution to the resource allocation problem in a highly dynamic environment. Therefore, this work develops an efficient model-free BACNOMA system to assist the base station for complex resource scheduling tasks in a dynamic BAC-NOMA IoT network. More specifically, we jointly optimize the transmit power of downlink IoT users and the reflection coefficient of uplink backscatter devices using a reinforcement learning algorithm, namely, softactor critic. Numerical results show that the proposed algorithm obtained a higher reward and converges to an optimal solution with respect to a large number of iterations. The proposed algorithm increases the sum rate by 57.6% as compared to the conventional optimization (benchmark) approach. Moreover, we show that the proposed algorithm outperforms the conventional BAC-NOMA scheme and BAC with orthogonal multiple access in terms of average sum rate with the increasing number of backscatter devices.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134062709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Straightforward Method to Promote Effective Interoperability in Wi-SUN FAN Smart Grid Networks 一种促进Wi-SUN FAN智能电网有效互操作性的简单方法
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000542
C. Dias, Lucas D. de Mendonça, Karoline Ferreira Tornisiello, A. S. Guerreiro, E. Lima, G. Fraidenraich
With the growing power grid needs in recent years, several different Smart Meters (SMs) have evolved to address diverse challenges. However, interoperability for SMs suppliers is challenging due to the diversity of protocols, data models, and interfaces. In this way, the Wireless Smart Ubiquitous Network (Wi-SUN) is the straightforward solution to address such issue.In this work, we present a simple, low-cost, open-source platform to assess the interoperability with Wi-SUN Field Area Network (FAN) devices. This platform allows the testing of devices under different conditions to check their conformance with the Wi-SUN standard.
近年来,随着电网需求的不断增长,几种不同的智能电表(SMs)已经发展到应对各种挑战。然而,由于协议、数据模型和接口的多样性,SMs供应商的互操作性具有挑战性。在这种情况下,无线智能无处不在网络(Wi-SUN)是解决这些问题的直接解决方案。在这项工作中,我们提出了一个简单、低成本、开源的平台来评估与Wi-SUN场域网络(FAN)设备的互操作性。该平台允许在不同条件下测试设备,以检查其是否符合Wi-SUN标准。
{"title":"A Straightforward Method to Promote Effective Interoperability in Wi-SUN FAN Smart Grid Networks","authors":"C. Dias, Lucas D. de Mendonça, Karoline Ferreira Tornisiello, A. S. Guerreiro, E. Lima, G. Fraidenraich","doi":"10.1109/LATINCOM56090.2022.10000542","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000542","url":null,"abstract":"With the growing power grid needs in recent years, several different Smart Meters (SMs) have evolved to address diverse challenges. However, interoperability for SMs suppliers is challenging due to the diversity of protocols, data models, and interfaces. In this way, the Wireless Smart Ubiquitous Network (Wi-SUN) is the straightforward solution to address such issue.In this work, we present a simple, low-cost, open-source platform to assess the interoperability with Wi-SUN Field Area Network (FAN) devices. This platform allows the testing of devices under different conditions to check their conformance with the Wi-SUN standard.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPS Spoofing Detection by Leveraging 5G Positioning Capabilities 利用5G定位能力进行GPS欺骗检测
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000569
A. Famili, M. Foruhandeh, Tolga O. Atalay, A. Stavrou, Haining Wang
Global Positioning System (GPS) is the most predominant non-authenticated navigation system used in transportation networks for geolocation and timing. The security of GPS is not addressed at the design level, and its implementation is public knowledge, making all GPS-equipped devices susceptible to GPS spoofing attacks. Existing solutions such as cryptography are either not backward compatible or too expensive to implement. Here, we propose an approach without such drawbacks. We present a novel technique to detect GPS spoofing attacks by comparing the final estimated location based on the GPS measurements with that derived by 5G New Radio positioning signals. In case of discrepancy, we detect the GPS spoofing attack and bypass the attacker by replacing the GPS-based localization with 5G-based localization. Our experiments show a detection rate above 98%.
全球定位系统(GPS)是交通网络中用于地理定位和授时的最主要的非认证导航系统。GPS的安全性并没有在设计层面得到解决,其实现是众所周知的,这使得所有配备GPS的设备都容易受到GPS欺骗攻击。现有的解决方案(如加密)要么不向后兼容,要么实现起来太昂贵。在这里,我们提出了一种没有这些缺点的方法。我们提出了一种检测GPS欺骗攻击的新技术,通过比较基于GPS测量的最终估计位置与5G新无线电定位信号得出的最终估计位置。在不一致的情况下,我们检测GPS欺骗攻击,用5g定位取代GPS定位,绕过攻击者。我们的实验表明,检测率在98%以上。
{"title":"GPS Spoofing Detection by Leveraging 5G Positioning Capabilities","authors":"A. Famili, M. Foruhandeh, Tolga O. Atalay, A. Stavrou, Haining Wang","doi":"10.1109/LATINCOM56090.2022.10000569","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000569","url":null,"abstract":"Global Positioning System (GPS) is the most predominant non-authenticated navigation system used in transportation networks for geolocation and timing. The security of GPS is not addressed at the design level, and its implementation is public knowledge, making all GPS-equipped devices susceptible to GPS spoofing attacks. Existing solutions such as cryptography are either not backward compatible or too expensive to implement. Here, we propose an approach without such drawbacks. We present a novel technique to detect GPS spoofing attacks by comparing the final estimated location based on the GPS measurements with that derived by 5G New Radio positioning signals. In case of discrepancy, we detect the GPS spoofing attack and bypass the attacker by replacing the GPS-based localization with 5G-based localization. Our experiments show a detection rate above 98%.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Routing in Challenged Networks with Graph Neural Networks 基于图神经网络的挑战网络动态路由
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000566
R. Lent
Challenged networks are characterized by a time-varying operational environment that constrains the optimality of standard routing algorithms. This work investigates a deep learning method that tackles the bundle routing problem by taking advantage of the available network metrics and performance data through a graph neural network (GNN). A cognitive routing decision unit is formulated by defining a GNN structure that accepts both edge and node input features, and that is trained with reinforcement learning. The GNN allows the inputs to be permutation invariant and independent of the network size and connectivity. Simulation results demonstrate that the proposed cognitive routing method is able to learn how to optimize the next-hop for each data bundle of a flow to achieve lower end-to-end delivery latency than the standard Contact Graph Routing algorithm. The GNN achieves the optimization by detecting and avoiding the extended wait times caused by both butter congestion and the stall times for the next contact when long link disruptions occur.
挑战网络的特点是时变的运行环境,限制了标准路由算法的最优性。这项工作研究了一种深度学习方法,该方法通过图神经网络(GNN)利用可用的网络指标和性能数据来解决捆绑包路由问题。通过定义一个同时接受边缘和节点输入特征的GNN结构,并通过强化学习进行训练,形成了一个认知路由决策单元。GNN允许输入是排列不变的,并且独立于网络大小和连通性。仿真结果表明,所提出的认知路由方法能够学习如何优化流的每个数据包的下一跳,从而实现比标准接触图路由算法更低的端到端传输延迟。GNN通过检测和避免黄油拥塞和长链路中断时下一次接触的失速时间造成的延长等待时间来实现优化。
{"title":"Dynamic Routing in Challenged Networks with Graph Neural Networks","authors":"R. Lent","doi":"10.1109/LATINCOM56090.2022.10000566","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000566","url":null,"abstract":"Challenged networks are characterized by a time-varying operational environment that constrains the optimality of standard routing algorithms. This work investigates a deep learning method that tackles the bundle routing problem by taking advantage of the available network metrics and performance data through a graph neural network (GNN). A cognitive routing decision unit is formulated by defining a GNN structure that accepts both edge and node input features, and that is trained with reinforcement learning. The GNN allows the inputs to be permutation invariant and independent of the network size and connectivity. Simulation results demonstrate that the proposed cognitive routing method is able to learn how to optimize the next-hop for each data bundle of a flow to achieve lower end-to-end delivery latency than the standard Contact Graph Routing algorithm. The GNN achieves the optimization by detecting and avoiding the extended wait times caused by both butter congestion and the stall times for the next contact when long link disruptions occur.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115443373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Connectivity-based Fog Structure Management for Software-defined Vehicular Networks 基于连通性的软件定义车辆网络雾结构管理
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000541
Penghan Yan, R. Meneguette, R. E. Grande
Vehicle Fog computing combines intelligent and connected vehicles to form a mobile cloud. Several works have modelled link stability for data delivery in light of solving the issues originating from unstable vehicle connectivity. However, results have shown that some mobility patterns potentially misguide the uncertainty-based estimation process. We thus propose a region-based connectivity ranking strategy. A fog management approach dynamically defines and supervises regions delimited by vehicles; such regions are mapped over an urban centre. In addition, the model develops a software-defined vehicular network (SDVN) controller to select data from the vehicular heterogeneous network environment through V2X and C-V2X. Our model admits four parameters to describe vehicular connectivity, which evaluates vehicles’ potential for communication and performs dynamic vehicular clustering. The 5G and DSRC heterogeneous networks support a more precise connectivity model for vehicular classification. Simulated analyses allow observing vehicular mobility and connectivity data in real-time scenarios where the management efficiency of vehicular fog regions is assessed in SDVN context.
汽车雾计算将智能汽车和网联汽车结合在一起,形成移动云。为了解决由车辆连接不稳定引起的问题,一些工作已经对数据传输的链路稳定性进行了建模。然而,结果表明,一些流动性模式可能会误导基于不确定性的估计过程。因此,我们提出了一种基于区域的连通性排序策略。雾管理方法动态定义和监督车辆划定的区域;这些区域被绘制在城市中心的地图上。此外,该模型还开发了软件定义车辆网络(SDVN)控制器,通过V2X和C-V2X从车辆异构网络环境中选择数据。该模型采用四个参数来描述车辆的连通性,评估车辆的通信潜力并执行动态车辆聚类。5G和DSRC异构网络支持更精确的车辆分类连接模型。模拟分析允许在实时场景中观察车辆移动性和连接数据,并在SDVN环境中评估车辆雾区的管理效率。
{"title":"Connectivity-based Fog Structure Management for Software-defined Vehicular Networks","authors":"Penghan Yan, R. Meneguette, R. E. Grande","doi":"10.1109/LATINCOM56090.2022.10000541","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000541","url":null,"abstract":"Vehicle Fog computing combines intelligent and connected vehicles to form a mobile cloud. Several works have modelled link stability for data delivery in light of solving the issues originating from unstable vehicle connectivity. However, results have shown that some mobility patterns potentially misguide the uncertainty-based estimation process. We thus propose a region-based connectivity ranking strategy. A fog management approach dynamically defines and supervises regions delimited by vehicles; such regions are mapped over an urban centre. In addition, the model develops a software-defined vehicular network (SDVN) controller to select data from the vehicular heterogeneous network environment through V2X and C-V2X. Our model admits four parameters to describe vehicular connectivity, which evaluates vehicles’ potential for communication and performs dynamic vehicular clustering. The 5G and DSRC heterogeneous networks support a more precise connectivity model for vehicular classification. Simulated analyses allow observing vehicular mobility and connectivity data in real-time scenarios where the management efficiency of vehicular fog regions is assessed in SDVN context.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115845593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The solid-body reverberating ultrasound communications channel and its OFDM interference 固体混响超声通信信道及其OFDM干扰
Pub Date : 2022-11-30 DOI: 10.1109/LATINCOM56090.2022.10000637
Asra Ashraf, J. Carlson, Jaap van de Beek
In this paper we present an analytical approach to the solid-state ultrasound communications channel. Channel reverberations and the long associated channel delay spreads pose the possibility that the channel length exceeds that of the moderate cyclic prefix in an orthogonal frequency division multiplexing (OFDM) system, resulting in intersymbol and intercarrier interference. We present a channel model based on the propagation material characteristics and evaluate the extent and impact of the intrinsic OFDM interferences. We derive an analytical expression and show with simulations that the intersymbol and intercarrier interference (ISI and ICI) are spectrally concentrated to the lower frequencies of the OFDM multiplex.
本文提出了一种固态超声通信信道的分析方法。在正交频分复用(OFDM)系统中,信道混响和相关的长信道延迟扩展可能导致信道长度超过中等循环前缀的长度,从而导致码间和载波间干扰。提出了一种基于传播材料特性的信道模型,并对固有OFDM干扰的程度和影响进行了评估。我们推导了一个解析表达式,并通过仿真证明了码间和载波间干扰(ISI和ICI)在频谱上集中在OFDM复用的较低频率上。
{"title":"The solid-body reverberating ultrasound communications channel and its OFDM interference","authors":"Asra Ashraf, J. Carlson, Jaap van de Beek","doi":"10.1109/LATINCOM56090.2022.10000637","DOIUrl":"https://doi.org/10.1109/LATINCOM56090.2022.10000637","url":null,"abstract":"In this paper we present an analytical approach to the solid-state ultrasound communications channel. Channel reverberations and the long associated channel delay spreads pose the possibility that the channel length exceeds that of the moderate cyclic prefix in an orthogonal frequency division multiplexing (OFDM) system, resulting in intersymbol and intercarrier interference. We present a channel model based on the propagation material characteristics and evaluate the extent and impact of the intrinsic OFDM interferences. We derive an analytical expression and show with simulations that the intersymbol and intercarrier interference (ISI and ICI) are spectrally concentrated to the lower frequencies of the OFDM multiplex.","PeriodicalId":221354,"journal":{"name":"2022 IEEE Latin-American Conference on Communications (LATINCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114789772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE Latin-American Conference on Communications (LATINCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1