首页 > 最新文献

Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems最新文献

英文 中文
On the (over)-Reactions and the Stability of a 6TiSCH Network in an Indoor Environment 室内环境下6TiSCH网络的(过)反应及稳定性研究
Rodrigo Teles Hermeto, A. Gallais, Fabrice Théoleyre
Industrial networks differ from others kinds of networks because they require real-time performance in order to meet strict requirements. With the rise of low-power wireless standards, the industrial applications have started to use wireless communications in order to reduce deployment and management costs. IEEE802.15.4-TSCH represents currently a promising standard relying on a strict schedule of the transmissions to provide strong guarantees. However, the radio environment still exhibits time-variable characteristics. Thus, the network has to provision sufficient resource (bandwidth) to cope with the worst case while still achieving high energy efficiency. The 6TiSCH IETF working group defines a stack to tune dynamically the TSCH schedule. In this paper, we analyze in depth the stability and the convergence of a 6TiSCH network in an indoor testbed. We identify the main causes of instabilities, and we propose solutions to address each of them. We show that our solutions improve significantly the stability.
工业网络不同于其他类型的网络,因为它们需要实时性能以满足严格的要求。随着低功耗无线标准的兴起,为了降低部署和管理成本,工业应用已经开始使用无线通信。IEEE802.15.4-TSCH是目前一个很有前途的标准,它依靠严格的传输时间表来提供强有力的保证。然而,无线电环境仍然表现出时变特征。因此,网络必须提供足够的资源(带宽)来应对最坏的情况,同时仍然实现高能效。6TiSCH IETF工作组定义了一个堆栈来动态调优TSCH调度。本文在室内实验台上对6TiSCH网络的稳定性和收敛性进行了深入的分析。我们确定了不稳定的主要原因,并提出了解决方案。我们表明,我们的解决方案显著提高了稳定性。
{"title":"On the (over)-Reactions and the Stability of a 6TiSCH Network in an Indoor Environment","authors":"Rodrigo Teles Hermeto, A. Gallais, Fabrice Théoleyre","doi":"10.1145/3242102.3242104","DOIUrl":"https://doi.org/10.1145/3242102.3242104","url":null,"abstract":"Industrial networks differ from others kinds of networks because they require real-time performance in order to meet strict requirements. With the rise of low-power wireless standards, the industrial applications have started to use wireless communications in order to reduce deployment and management costs. IEEE802.15.4-TSCH represents currently a promising standard relying on a strict schedule of the transmissions to provide strong guarantees. However, the radio environment still exhibits time-variable characteristics. Thus, the network has to provision sufficient resource (bandwidth) to cope with the worst case while still achieving high energy efficiency. The 6TiSCH IETF working group defines a stack to tune dynamically the TSCH schedule. In this paper, we analyze in depth the stability and the convergence of a 6TiSCH network in an indoor testbed. We identify the main causes of instabilities, and we propose solutions to address each of them. We show that our solutions improve significantly the stability.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126832272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
WiDet
Hua Huang, Shane Lin
To achieve device-free person detection, various types of signal features, such as moving statistics and wavelet representations, have been extracted from the Wi-Fi Received Signal Strength Index (RSSI), whose value fluctuates when human subjects move near the Wi-Fi transceivers. However, these features do not work effectively under different deployments of Wi-Fi transceivers because each transceiver has a unique RSSI fluctuation pattern that depends on its specific wireless channel and hardware characteristics. To address this problem, we present WiDet, a system that uses a deep Convolutional Neural Network (CNN) approach for person detection. The CNN achieves effective and robust detection feature extraction by exploring distinguishable patterns in Wi-Fi RSSI data. With a large number of internal parameters, the CNN can record and recognize the different RSSI fluctuation patterns from different transceivers. We further apply the data augmentation method to improve the algorithm robustness to wireless interferences and pedestrian speed changes. To take advantage of the wide availability of the existing Wi-Fi devices, we design a collaborative sensing technique that can recognize the subject moving directions. To validate the proposed design, we implement a prototype system that consists of three Wi-Fi packet transmitters and one receiver on low-cost off-the-shelf embedded development boards. In a multi-day experiment with a total of 163 walking events, WiDet achieves 94.5% of detection accuracy in detecting pedestrians, which outperforms the moving statistics and the wavelet representation based approaches by 22% and 8%, respectively.
{"title":"WiDet","authors":"Hua Huang, Shane Lin","doi":"10.1145/3242102.3242119","DOIUrl":"https://doi.org/10.1145/3242102.3242119","url":null,"abstract":"To achieve device-free person detection, various types of signal features, such as moving statistics and wavelet representations, have been extracted from the Wi-Fi Received Signal Strength Index (RSSI), whose value fluctuates when human subjects move near the Wi-Fi transceivers. However, these features do not work effectively under different deployments of Wi-Fi transceivers because each transceiver has a unique RSSI fluctuation pattern that depends on its specific wireless channel and hardware characteristics. To address this problem, we present WiDet, a system that uses a deep Convolutional Neural Network (CNN) approach for person detection. The CNN achieves effective and robust detection feature extraction by exploring distinguishable patterns in Wi-Fi RSSI data. With a large number of internal parameters, the CNN can record and recognize the different RSSI fluctuation patterns from different transceivers. We further apply the data augmentation method to improve the algorithm robustness to wireless interferences and pedestrian speed changes. To take advantage of the wide availability of the existing Wi-Fi devices, we design a collaborative sensing technique that can recognize the subject moving directions. To validate the proposed design, we implement a prototype system that consists of three Wi-Fi packet transmitters and one receiver on low-cost off-the-shelf embedded development boards. In a multi-day experiment with a total of 163 walking events, WiDet achieves 94.5% of detection accuracy in detecting pedestrians, which outperforms the moving statistics and the wavelet representation based approaches by 22% and 8%, respectively.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122614941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
TRAILS - A Trace-Based Probabilistic Mobility Model TRAILS -基于跟踪的概率迁移模型
Anna Förster, Anas Bin Muslim, A. Udugama
Modeling mobility is a key aspect when simulating different types of networks. To cater to this requirement, a large number of models has emerged in the last years. They are typically (a) trace-based, where GPS recordings are re-run in simulation, (b) synthetic models, which describe mobility with formal methods, or (c) hybrid models, which are synthetic models based on statistically evaluated traces. All these families of models have advantages and disadvantages. For example, trace-based models are very inflexible in terms of simulation scenarios, but have realistic behaviour, while synthetic models are very flexible, but lack realism. In this paper, we propose a new mobility model, called TRAILS (TRAce-based ProbabILiStic Mobility Model), which bridges the gap between these families and combines their advantages into a single model. The main idea is to extract a mobility graph from real traces and to use it in simulation to create scalable, flexible simulation scenarios. We show that TRAILS is more realistic than synthetic models, while achieving full scalability and flexibility. We have implemented and evaluated TRAILS in the OMNeT++ simulation framework.
在模拟不同类型的网络时,移动性建模是一个关键方面。为了满足这一需求,在过去的几年里出现了大量的模型。它们通常是(a)基于轨迹,在模拟中重新运行GPS记录,(b)合成模型,用正式方法描述机动性,或(c)混合模型,这是基于统计评估轨迹的合成模型。所有这些模型家族都有优点和缺点。例如,基于追踪的模型在模拟场景方面非常不灵活,但具有逼真的行为,而合成模型非常灵活,但缺乏现实性。在本文中,我们提出了一种新的流动性模型,称为TRAILS (TRAce-based ProbabILiStic mobility model),它弥合了这些家庭之间的差距,并将它们的优势整合到一个单一的模型中。主要思想是从真实的轨迹中提取移动图,并在仿真中使用它来创建可扩展的、灵活的仿真场景。我们证明TRAILS比合成模型更真实,同时实现了充分的可扩展性和灵活性。我们已经在omnet++仿真框架中实现并评估了TRAILS。
{"title":"TRAILS - A Trace-Based Probabilistic Mobility Model","authors":"Anna Förster, Anas Bin Muslim, A. Udugama","doi":"10.1145/3242102.3242134","DOIUrl":"https://doi.org/10.1145/3242102.3242134","url":null,"abstract":"Modeling mobility is a key aspect when simulating different types of networks. To cater to this requirement, a large number of models has emerged in the last years. They are typically (a) trace-based, where GPS recordings are re-run in simulation, (b) synthetic models, which describe mobility with formal methods, or (c) hybrid models, which are synthetic models based on statistically evaluated traces. All these families of models have advantages and disadvantages. For example, trace-based models are very inflexible in terms of simulation scenarios, but have realistic behaviour, while synthetic models are very flexible, but lack realism. In this paper, we propose a new mobility model, called TRAILS (TRAce-based ProbabILiStic Mobility Model), which bridges the gap between these families and combines their advantages into a single model. The main idea is to extract a mobility graph from real traces and to use it in simulation to create scalable, flexible simulation scenarios. We show that TRAILS is more realistic than synthetic models, while achieving full scalability and flexibility. We have implemented and evaluated TRAILS in the OMNeT++ simulation framework.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129460973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
DCNs-2: A Cloud Network Simulator Extension for ns-2 dnns -2: ns-2的云网络模拟器扩展
P. Bellavista, L. Foschini, S. Luciano, M. Solimando
The widespread exploitation of cloud technologies forces cloud providers to forecast peaks of requests to guarantee always the adequate quality of service to their currently served customers. Static resource provisioning is rarely affordable for large Data Center Networks (DCNs) and dynamic resource management can be rather complex, in particular for networking. Hence, we claim the relevance of simulator-based approaches, helpful in planning DCN deployment and in analyzing performance behaviors in response to expected traffic patterns. However, existing cloud simulators exhibit non-negligible limitations for what relates to the modeling of networking issues of cloud Infrastructure as a Service (IaaS) deployments. Therefore, we propose DCNs-2, a novel extension package for the ns-2 simulator, as a valid solution to efficiently simulate DCNs with all their primary entities, such as switches, physical machines, racks, virtual machines, and so on.
云技术的广泛应用迫使云提供商预测请求高峰,以保证始终为其当前服务的客户提供足够的服务质量。对于大型数据中心网络(dcn)来说,静态资源配置很少负担得起,而动态资源管理可能相当复杂,特别是对于网络。因此,我们声称基于模拟器的方法的相关性,有助于规划DCN部署和分析响应预期流量模式的性能行为。然而,现有的云模拟器在与云基础设施即服务(IaaS)部署的网络问题建模相关的方面显示出不可忽视的局限性。因此,我们提出了ns-2模拟器的新颖扩展包DCNs-2,作为有效的解决方案,以有效地模拟DCNs及其所有主要实体,如交换机,物理机,机架,虚拟机等。
{"title":"DCNs-2: A Cloud Network Simulator Extension for ns-2","authors":"P. Bellavista, L. Foschini, S. Luciano, M. Solimando","doi":"10.1145/3242102.3242136","DOIUrl":"https://doi.org/10.1145/3242102.3242136","url":null,"abstract":"The widespread exploitation of cloud technologies forces cloud providers to forecast peaks of requests to guarantee always the adequate quality of service to their currently served customers. Static resource provisioning is rarely affordable for large Data Center Networks (DCNs) and dynamic resource management can be rather complex, in particular for networking. Hence, we claim the relevance of simulator-based approaches, helpful in planning DCN deployment and in analyzing performance behaviors in response to expected traffic patterns. However, existing cloud simulators exhibit non-negligible limitations for what relates to the modeling of networking issues of cloud Infrastructure as a Service (IaaS) deployments. Therefore, we propose DCNs-2, a novel extension package for the ns-2 simulator, as a valid solution to efficiently simulate DCNs with all their primary entities, such as switches, physical machines, racks, virtual machines, and so on.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PRMS 人口、难民和移民事务局
Huatao Xu, Run Zhao, Qian Zhang, Dong Wang
In the future, libraries and warehouses will gain benefits from the spatial location of books and merchandises attached with RFID tags. Existing localization algorithms, however, usually focus on improving positioning accuracy or the ordering one for RFID tags on the same layer. Nevertheless, books or merchandises are placed on the multilayer in reality and the layer of RFID tagged object is also an important position indication. To this end, we design PRMS, an RFID based localization system which utilizes both phase and RSSI values of the backscattered signal provided by a single antenna to estimate the spatial position for RFID tags. Our basic idea is to gain initial estimated locations of RFID tags through a basic model which extracts the phase differences between received signals to locate tags. Then an advanced model is proposed to improve the positioning accuracy combined with RF hologram based on basic model. We further change traditional deployment of a single antenna to distinguish the features of RFID tags on multilayer and adopt a machine learning algorithm to get the layer information of tagged objects. The experiment results show that the average accuracy of layer detection and sorting at low tag spacing ($2sim8$cm) are about 93% and 84% respectively.
{"title":"PRMS","authors":"Huatao Xu, Run Zhao, Qian Zhang, Dong Wang","doi":"10.1145/3242102.3242138","DOIUrl":"https://doi.org/10.1145/3242102.3242138","url":null,"abstract":"In the future, libraries and warehouses will gain benefits from the spatial location of books and merchandises attached with RFID tags. Existing localization algorithms, however, usually focus on improving positioning accuracy or the ordering one for RFID tags on the same layer. Nevertheless, books or merchandises are placed on the multilayer in reality and the layer of RFID tagged object is also an important position indication. To this end, we design PRMS, an RFID based localization system which utilizes both phase and RSSI values of the backscattered signal provided by a single antenna to estimate the spatial position for RFID tags. Our basic idea is to gain initial estimated locations of RFID tags through a basic model which extracts the phase differences between received signals to locate tags. Then an advanced model is proposed to improve the positioning accuracy combined with RF hologram based on basic model. We further change traditional deployment of a single antenna to distinguish the features of RFID tags on multilayer and adopt a machine learning algorithm to get the layer information of tagged objects. The experiment results show that the average accuracy of layer detection and sorting at low tag spacing ($2sim8$cm) are about 93% and 84% respectively.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A 3GPP NR Compliant Beam Management Framework to Simulate End-to-End mmWave Networks 模拟端到端毫米波网络的3GPP NR兼容波束管理框架
Carlos Herranz, Menglei Zhang, M. Mezzavilla, David Martín-Sacristán, S. Rangan, J. Monserrat
The advent of the next iteration of mobile and wireless communication standards, the so called 5G, is already a reality. 3GPP released in December 2017 the first set of specifications of the 5G New Radio (NR), which introduced important innovations with respect to legacy networks. One of the main novelties is the use of very-high frequencies in the radio access, which requires highly-directional transmissions or beams to overcome the severe propagation losses. Therefore, it is paramount to manage these beams in an efficient manner in order to always choose the optimum set of beams. In this work, we describe the first NR-compliant beam management framework for the ns-3 network simulator. We aim at providing an open-source and fully-customizable solution to let the scientific community implement their solutions and assess their impact on the end-to-end network performance. Additionally, we describe the necessary modifications in ns-3 to align the radio frame structure to what the 3GPP standards mandate. Finally, we validate our results by running a simple mobility scenario.
下一代移动和无线通信标准,即所谓的5G,已经成为现实。3GPP于2017年12月发布了5G新无线电(NR)的第一套规范,该规范在传统网络方面引入了重要的创新。其中一个主要的新颖之处是在无线电接入中使用非常高的频率,这需要高度定向的传输或波束来克服严重的传播损耗。因此,为了始终选择最优的梁组,以有效的方式管理这些梁是至关重要的。在这项工作中,我们描述了ns-3网络模拟器的第一个nr兼容波束管理框架。我们的目标是提供一个开源和完全可定制的解决方案,让科学界实现他们的解决方案,并评估他们对端到端网络性能的影响。此外,我们描述了ns-3中必要的修改,以使无线电帧结构与3GPP标准的要求保持一致。最后,我们通过运行一个简单的移动性场景来验证结果。
{"title":"A 3GPP NR Compliant Beam Management Framework to Simulate End-to-End mmWave Networks","authors":"Carlos Herranz, Menglei Zhang, M. Mezzavilla, David Martín-Sacristán, S. Rangan, J. Monserrat","doi":"10.1145/3242102.3242117","DOIUrl":"https://doi.org/10.1145/3242102.3242117","url":null,"abstract":"The advent of the next iteration of mobile and wireless communication standards, the so called 5G, is already a reality. 3GPP released in December 2017 the first set of specifications of the 5G New Radio (NR), which introduced important innovations with respect to legacy networks. One of the main novelties is the use of very-high frequencies in the radio access, which requires highly-directional transmissions or beams to overcome the severe propagation losses. Therefore, it is paramount to manage these beams in an efficient manner in order to always choose the optimum set of beams. In this work, we describe the first NR-compliant beam management framework for the ns-3 network simulator. We aim at providing an open-source and fully-customizable solution to let the scientific community implement their solutions and assess their impact on the end-to-end network performance. Additionally, we describe the necessary modifications in ns-3 to align the radio frame structure to what the 3GPP standards mandate. Finally, we validate our results by running a simple mobility scenario.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
GreenLoading: Using the Citizens Band Radio for Energy-Efficient Offloading of Shared Interests 绿色负荷:利用公民波段无线电实现共享利益的节能负荷
Pengfei Cui, S. Chen, J. Camp
Cellular networks are susceptible to being severely capacity-constrained during peak traffic hours or at special events such as sports and concerts. Many other applications are emerging for LTE and 5G networks that inject machine-to-machine (M2M) communications for Internet of Things (IoT) devices that sense the environment and react to diurnal patterns observed. Both for users and devices, the high congestion levels frequently lead to numerous retransmissions and severe battery depletion. However, there are frequently social cues that could be gleaned from interactions from websites and social networks of shared interest to a particular region at a particular time. Cellular network operators have sought to address these high levels of fluctuations and traffic burstiness via the use of offloading to unlicensed bands, which may be instructed by these social cues. In this paper, we leverage shared interest information in a given area to conserve power via the use of offloading to the emerging Citizens Radio Band Service (CBRS). Our GreenLoading framework enables hierarchical data delivery to significantly reduce power consumption and includes a Broker Priority Assignment (BPA) algorithm to select data brokers for users. With the use of in-field measurements and web-based Google data across four diverse U.S. cities, we show that, on average, an order of magnitude power savings via GreenLoading over a 24-hour period and up to 35 times at peak traffic times. Finally, we consider the role that a relaxation of wait times can play in the power efficiency of a GreenLoaded network.
在交通高峰时段或在体育和音乐会等特殊活动期间,蜂窝网络容易受到严重的容量限制。LTE和5G网络的许多其他应用正在出现,这些应用为物联网(IoT)设备注入机器对机器(M2M)通信,这些设备可以感知环境并对观察到的日常模式做出反应。对于用户和设备来说,高拥塞水平经常导致大量重传和严重的电池耗尽。然而,在特定的时间、特定的地区,我们可以从网站和社交网络上的互动中收集到很多社交线索。蜂窝网络运营商试图通过使用卸载到未经许可的频段来解决这些高水平的波动和流量突发问题,这可能是由这些社交线索指示的。在本文中,我们利用给定区域的共享兴趣信息,通过使用卸载到新兴的公民无线电频带服务(CBRS)来节省电力。我们的GreenLoading框架支持分层数据传递,从而显著降低功耗,并包含代理优先级分配(BPA)算法,用于为用户选择数据代理。通过对美国四个不同城市的现场测量和基于网络的谷歌数据的使用,我们发现,平均而言,通过GreenLoading在24小时内节省了一个数量级的电力,在交通高峰时段节省了35倍。最后,我们考虑了等待时间的放松在GreenLoaded网络的功率效率中所起的作用。
{"title":"GreenLoading: Using the Citizens Band Radio for Energy-Efficient Offloading of Shared Interests","authors":"Pengfei Cui, S. Chen, J. Camp","doi":"10.1145/3242102.3242113","DOIUrl":"https://doi.org/10.1145/3242102.3242113","url":null,"abstract":"Cellular networks are susceptible to being severely capacity-constrained during peak traffic hours or at special events such as sports and concerts. Many other applications are emerging for LTE and 5G networks that inject machine-to-machine (M2M) communications for Internet of Things (IoT) devices that sense the environment and react to diurnal patterns observed. Both for users and devices, the high congestion levels frequently lead to numerous retransmissions and severe battery depletion. However, there are frequently social cues that could be gleaned from interactions from websites and social networks of shared interest to a particular region at a particular time. Cellular network operators have sought to address these high levels of fluctuations and traffic burstiness via the use of offloading to unlicensed bands, which may be instructed by these social cues. In this paper, we leverage shared interest information in a given area to conserve power via the use of offloading to the emerging Citizens Radio Band Service (CBRS). Our GreenLoading framework enables hierarchical data delivery to significantly reduce power consumption and includes a Broker Priority Assignment (BPA) algorithm to select data brokers for users. With the use of in-field measurements and web-based Google data across four diverse U.S. cities, we show that, on average, an order of magnitude power savings via GreenLoading over a 24-hour period and up to 35 times at peak traffic times. Finally, we consider the role that a relaxation of wait times can play in the power efficiency of a GreenLoaded network.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cascading Attacks on Wi-Fi Networks with Weak Interferers 弱干扰Wi-Fi网络的级联攻击
Liangxiao Xin, D. Starobinski
Recent work shows that an adversary can exploit a coupling effect induced by hidden nodes to launch a cascading attack causing global congestion in a Wi-Fi network. The underlying assumption is that the power of interference caused by a hidden node is an order of magnitude stronger than the signal sent to the receiver. In this paper, we investigate the feasibility of cascading attacks with weakly interfering hidden nodes, that is when the signal-to-interference ratio is high. Through extensive ns-3 simulations, including for an indoor building model, we show that cascading attacks are still feasible. The attacks leverage two PHY-layer phenomena: receiver capture and bit rate adaptation. We show that the attack relies on a coupling effect, whereby the average bit rate of a transmission pair drops sharply as the channel utilization of a neighboring pair gets higher. This coupling effect facilitates the propagation of the attack throughout the network.
最近的研究表明,攻击者可以利用隐藏节点引起的耦合效应发动级联攻击,导致Wi-Fi网络的全球拥塞。潜在的假设是,隐藏节点引起的干扰功率比发送到接收器的信号强一个数量级。本文研究了弱干扰隐藏节点级联攻击的可行性,即在信噪比较高的情况下。通过广泛的ns-3模拟,包括室内建筑模型,我们表明级联攻击仍然是可行的。这些攻击利用了两个物理层现象:接收器捕获和比特率适应。我们表明,这种攻击依赖于耦合效应,即传输对的平均比特率随着相邻对的信道利用率提高而急剧下降。这种耦合效应有利于攻击在整个网络中传播。
{"title":"Cascading Attacks on Wi-Fi Networks with Weak Interferers","authors":"Liangxiao Xin, D. Starobinski","doi":"10.1145/3242102.3242142","DOIUrl":"https://doi.org/10.1145/3242102.3242142","url":null,"abstract":"Recent work shows that an adversary can exploit a coupling effect induced by hidden nodes to launch a cascading attack causing global congestion in a Wi-Fi network. The underlying assumption is that the power of interference caused by a hidden node is an order of magnitude stronger than the signal sent to the receiver. In this paper, we investigate the feasibility of cascading attacks with weakly interfering hidden nodes, that is when the signal-to-interference ratio is high. Through extensive ns-3 simulations, including for an indoor building model, we show that cascading attacks are still feasible. The attacks leverage two PHY-layer phenomena: receiver capture and bit rate adaptation. We show that the attack relies on a coupling effect, whereby the average bit rate of a transmission pair drops sharply as the channel utilization of a neighboring pair gets higher. This coupling effect facilitates the propagation of the attack throughout the network.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Protocol for Securing Network Slice Component Association and Slice Isolation in 5G Networks 一种保护5G网络分片组件关联和分片隔离的新协议
Vipin N. Sathi, Manikantan Srinivasan, P. Thiruvasagam, C. Murthy
Slicing of a 5G network by creating virtualized instances of network functions facilitates the support of different service types with varying requirements. The management and orchestration layer identifies the components in the virtualization infrastructure to form an end-to-end slice for an intended service type. The key security challenges for the softwarized 5G networks are, (i) ensuring availability of a centralized controller/orchestrator, (ii) association between legitimate network slice components, and (iii) network slice isolation. To address these challenges, in this paper, we propose a novel implicit mutual authentication and key establishment with group anonymity protocol using proxy re-encryption on elliptic curve. The protocol provides (i) controller independent distributed association between components of a network slice, (ii) implicit authentication between network slice components to allow secure association, (iii) secure key establishment between component pairs for secure slice isolation, and (iv) service group anonymity. The proposed protocol's robustness is validated with necessary security analysis. The computation and bandwidth overheads of the proposed protocol are compared with that of the certificate based protocol, and our proposed protocol has 9.52% less computation overhead and 13.64% less bandwidth overhead for Type A1 pairing.
通过创建网络功能的虚拟化实例,对5G网络进行切片,便于支持不同需求的不同业务类型。管理和编排层识别虚拟化基础设施中的组件,以形成预期服务类型的端到端切片。软件化5G网络的关键安全挑战是:(i)确保中央控制器/编排器的可用性,(ii)合法网络切片组件之间的关联,以及(iii)网络切片隔离。为了解决这些问题,本文提出了一种新的基于椭圆曲线上代理重加密的隐式互认证和密钥建立机制。该协议提供(i)独立于控制器的网络切片组件之间的分布式关联,(ii)网络切片组件之间的隐式认证以允许安全关联,(iii)组件对之间的安全密钥建立以实现安全切片隔离,以及(iv)服务组匿名。通过必要的安全分析验证了协议的鲁棒性。与基于证书的协议相比,我们提出的协议的计算开销和带宽开销减少了9.52%,对于Type A1配对,我们提出的协议的计算开销减少了13.64%。
{"title":"A Novel Protocol for Securing Network Slice Component Association and Slice Isolation in 5G Networks","authors":"Vipin N. Sathi, Manikantan Srinivasan, P. Thiruvasagam, C. Murthy","doi":"10.1145/3242102.3242135","DOIUrl":"https://doi.org/10.1145/3242102.3242135","url":null,"abstract":"Slicing of a 5G network by creating virtualized instances of network functions facilitates the support of different service types with varying requirements. The management and orchestration layer identifies the components in the virtualization infrastructure to form an end-to-end slice for an intended service type. The key security challenges for the softwarized 5G networks are, (i) ensuring availability of a centralized controller/orchestrator, (ii) association between legitimate network slice components, and (iii) network slice isolation. To address these challenges, in this paper, we propose a novel implicit mutual authentication and key establishment with group anonymity protocol using proxy re-encryption on elliptic curve. The protocol provides (i) controller independent distributed association between components of a network slice, (ii) implicit authentication between network slice components to allow secure association, (iii) secure key establishment between component pairs for secure slice isolation, and (iv) service group anonymity. The proposed protocol's robustness is validated with necessary security analysis. The computation and bandwidth overheads of the proposed protocol are compared with that of the certificate based protocol, and our proposed protocol has 9.52% less computation overhead and 13.64% less bandwidth overhead for Type A1 pairing.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123114013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Methodology for Performance Benchmarking of Mobile Networks for Internet Video Streaming 互联网视频流移动网络性能基准测试方法
Muhammad Jawad Khokhar, Thierry Spetebroot, C. Barakat
Video streaming is a dominant contributor to the global Internet traffic. Consequently, gauging network performance w.r.t. the video Quality of Experience (QoE) is of paramount importance to both telecom operators and regulators. Modern video streaming systems, e.g. YouTube, have huge catalogs of billions of different videos that vary significantly in content type. Owing to this difference, the QoE of different videos as perceived by end users can vary for the same network Quality of Service (QoS). In this paper, we present a methodology for benchmarking performance of mobile operators w.r.t Internet video that considers this variation in QoE. We take a data-driven approach to build a predictive model using supervised machine learning (ML) that takes into account a wide range of videos and network conditions. To that end, we first build and analyze a large catalog of YouTube videos. We then propose and demonstrate a framework of controlled experimentation based on active learning to build the training data for the targeted ML model. Using this model, we then devise YouScore, an estimate of the percentage of YouTube videos that may play out smoothly under a given network condition. Finally, to demonstrate the benchmarking utility of YouScore, we apply it on an open dataset of real user mobile network measurements to compare performance of mobile operators for video streaming.
视频流是全球互联网流量的主要贡献者。因此,除了视频体验质量(QoE)之外,衡量网络性能对电信运营商和监管机构都至关重要。现代视频流媒体系统,例如YouTube,拥有数十亿个不同视频的庞大目录,这些视频在内容类型上差异很大。由于这种差异,对于相同的网络服务质量(QoS),终端用户所感知的不同视频的QoE可能会有所不同。在本文中,我们提出了一种方法来对移动运营商的网络视频性能进行基准测试,该方法考虑了QoE中的这种变化。我们采用数据驱动的方法,使用监督机器学习(ML)构建预测模型,该模型考虑了广泛的视频和网络条件。为此,我们首先建立并分析了一个庞大的YouTube视频目录。然后,我们提出并演示了一个基于主动学习的控制实验框架,为目标机器学习模型构建训练数据。使用这个模型,我们然后设计了YouScore,一个在给定网络条件下可能顺利播放的YouTube视频百分比的估计。最后,为了展示YouScore的基准测试功能,我们将其应用于真实用户移动网络测量的开放数据集,以比较移动运营商对视频流的性能。
{"title":"A Methodology for Performance Benchmarking of Mobile Networks for Internet Video Streaming","authors":"Muhammad Jawad Khokhar, Thierry Spetebroot, C. Barakat","doi":"10.1145/3242102.3242128","DOIUrl":"https://doi.org/10.1145/3242102.3242128","url":null,"abstract":"Video streaming is a dominant contributor to the global Internet traffic. Consequently, gauging network performance w.r.t. the video Quality of Experience (QoE) is of paramount importance to both telecom operators and regulators. Modern video streaming systems, e.g. YouTube, have huge catalogs of billions of different videos that vary significantly in content type. Owing to this difference, the QoE of different videos as perceived by end users can vary for the same network Quality of Service (QoS). In this paper, we present a methodology for benchmarking performance of mobile operators w.r.t Internet video that considers this variation in QoE. We take a data-driven approach to build a predictive model using supervised machine learning (ML) that takes into account a wide range of videos and network conditions. To that end, we first build and analyze a large catalog of YouTube videos. We then propose and demonstrate a framework of controlled experimentation based on active learning to build the training data for the targeted ML model. Using this model, we then devise YouScore, an estimate of the percentage of YouTube videos that may play out smoothly under a given network condition. Finally, to demonstrate the benchmarking utility of YouScore, we apply it on an open dataset of real user mobile network measurements to compare performance of mobile operators for video streaming.","PeriodicalId":241359,"journal":{"name":"Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125008714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1