首页 > 最新文献

2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

英文 中文
ACOMTA: An Ant Colony Optimisation based Multi-Task Assignment Algorithm for Reverse Auction based Mobile Crowdsensing ACOMTA:基于蚁群优化的反向拍卖移动众测多任务分配算法
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314813
S. Saadatmand, S. Kanhere
Mobile Crowdsensing (MCS) systems take advantage of the ubiquity and sensing power of smartphones in data gathering. Reverse auction is a popular incentive mechanism framework for MCS wherein, the participants can determine their expected rewards for their contributions. In this paper, for the first time, we consider a multi-task location-dependent reverse auction based MCS setting wherein, each task requires a specific amount of contribution to be fulfilled, participants may need to move to the task locations in order to participate in them, and the goal is to assign each participant to at most one task in a way such that the cumulative contribution of the fulfilled tasks are maximised while not exceeding a limited budget. We show that this is an NP-hard optimization problem and propose Ant Colony Optimisation-based Multi-Task Assignment (ACOMTA) as an approximation algorithm for it. We uncover an issue with the basic instantiation of ACO and propose an approach called Valid Random Path Generator (VRPG) to avoid lack of or premature convergence of the algorithm. Through extensive experiments, we show that the proposed algorithm outperforms a greedy approach as well as a random-based solution.
移动群体感知(MCS)系统利用智能手机的无处不在和感知能力来收集数据。逆向拍卖是MCS中比较流行的一种激励机制框架,参与者可以根据自己的贡献来确定自己的预期回报。在本文中,我们首次考虑了基于多任务位置依赖的反向拍卖的MCS设置,其中每个任务需要完成特定数量的贡献,参与者可能需要移动到任务位置才能参与其中,目标是将每个参与者分配到最多一个任务,从而使完成任务的累积贡献最大化,同时不超过有限的预算。我们证明了这是一个NP-hard优化问题,并提出了基于蚁群优化的多任务分配(ACOMTA)作为其近似算法。我们发现了蚁群算法基本实例化的一个问题,并提出了一种称为有效随机路径生成器(VRPG)的方法来避免算法的缺乏或过早收敛。通过大量的实验,我们表明所提出的算法优于贪婪方法和基于随机的解决方案。
{"title":"ACOMTA: An Ant Colony Optimisation based Multi-Task Assignment Algorithm for Reverse Auction based Mobile Crowdsensing","authors":"S. Saadatmand, S. Kanhere","doi":"10.1109/LCN48667.2020.9314813","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314813","url":null,"abstract":"Mobile Crowdsensing (MCS) systems take advantage of the ubiquity and sensing power of smartphones in data gathering. Reverse auction is a popular incentive mechanism framework for MCS wherein, the participants can determine their expected rewards for their contributions. In this paper, for the first time, we consider a multi-task location-dependent reverse auction based MCS setting wherein, each task requires a specific amount of contribution to be fulfilled, participants may need to move to the task locations in order to participate in them, and the goal is to assign each participant to at most one task in a way such that the cumulative contribution of the fulfilled tasks are maximised while not exceeding a limited budget. We show that this is an NP-hard optimization problem and propose Ant Colony Optimisation-based Multi-Task Assignment (ACOMTA) as an approximation algorithm for it. We uncover an issue with the basic instantiation of ACO and propose an approach called Valid Random Path Generator (VRPG) to avoid lack of or premature convergence of the algorithm. Through extensive experiments, we show that the proposed algorithm outperforms a greedy approach as well as a random-based solution.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124889108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LoRaDRL: Deep Reinforcement Learning Based Adaptive PHY Layer Transmission Parameters Selection for LoRaWAN LoRaDRL:基于深度强化学习的LoRaWAN物理层自适应传输参数选择
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314772
Inaam Ilahi, M. Usama, M. Farooq, M. Janjua, Junaid Qadir
The performance of densely-deployed low-power wide-area networks (LPWANs) can significantly deteriorate due to packets collisions, and one of the main reasons for that is the rule-based PHY layer transmission parameters assignment algorithms. LoRaWAN is a leading LPWAN technology where LoRa serves as the physical layer. Here, we propose and evaluate a deep reinforcement learning (DRL)-based PHY layer transmission parameter assignment algorithm for LoRaWAN. Our algorithm ensures fewer collisions and better network performance compared to the existing state-of-the-art PHY layer transmission parameter assignment algorithms for LoRaWAN. Our algorithm outperforms the state of the art learning-based technique achieving up to 500% improvement of PDR in some cases.
密集部署的低功耗广域网(lpwan)的性能会因分组冲突而显著下降,其主要原因之一是基于规则的物理层传输参数分配算法。LoRaWAN是一种领先的LPWAN技术,其中LoRa充当物理层。在此,我们提出并评估了一种基于深度强化学习(DRL)的LoRaWAN物理层传输参数分配算法。与现有的LoRaWAN最先进的物理层传输参数分配算法相比,我们的算法确保了更少的冲突和更好的网络性能。我们的算法优于目前基于学习的技术,在某些情况下实现了500%的PDR改进。
{"title":"LoRaDRL: Deep Reinforcement Learning Based Adaptive PHY Layer Transmission Parameters Selection for LoRaWAN","authors":"Inaam Ilahi, M. Usama, M. Farooq, M. Janjua, Junaid Qadir","doi":"10.1109/LCN48667.2020.9314772","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314772","url":null,"abstract":"The performance of densely-deployed low-power wide-area networks (LPWANs) can significantly deteriorate due to packets collisions, and one of the main reasons for that is the rule-based PHY layer transmission parameters assignment algorithms. LoRaWAN is a leading LPWAN technology where LoRa serves as the physical layer. Here, we propose and evaluate a deep reinforcement learning (DRL)-based PHY layer transmission parameter assignment algorithm for LoRaWAN. Our algorithm ensures fewer collisions and better network performance compared to the existing state-of-the-art PHY layer transmission parameter assignment algorithms for LoRaWAN. Our algorithm outperforms the state of the art learning-based technique achieving up to 500% improvement of PDR in some cases.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125167907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Blockage Robustness in Access Point Association for mmWave Wireless LANs with Mobility 具有移动性的毫米波无线局域网接入点关联的阻塞鲁棒性
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314770
Yuchen Liu, D. Blough
Millimeter-wave wireless LANs are targeted for use with bandwidth-intensive applications such as virtual/augmented reality and real-time high-definition video. To maintain high throughput while addressing mmWave signal blockages, multiple access points (APs) within one room to improve line-of-sight conditions is considered a promising approach. In a scenario with fixed and mobile (human) obstacles, we mathematically analyze LoS blockages produced by mobility, and use the analysis to develop a multi-AP association scheme. Our scheme statically assigns primary and backup APs in order to maximize blockage robustness and perform load balancing among APs. Simulation results show that: 1) our static approach can provide blockage tolerance close to that of an expensive dynamic probing approach while achieving higher throughput, 2) the use of client mobility patterns, if known, can improve our static approach even further, and 3) our approach achieves significantly better fairness and load balancing than existing approaches.
毫米波无线局域网的目标是用于带宽密集型应用,如虚拟/增强现实和实时高清视频。为了在解决毫米波信号阻塞的同时保持高吞吐量,在一个房间内设置多个接入点(ap)以改善视线条件被认为是一种很有前途的方法。在具有固定和移动(人类)障碍物的场景中,我们从数学上分析了由移动性产生的LoS阻塞,并使用该分析开发了一个多ap关联方案。该方案静态地分配主备ap,以最大限度地提高阻塞鲁棒性,并在ap之间实现负载均衡。仿真结果表明:1)我们的静态方法可以提供接近昂贵的动态探测方法的阻塞容忍度,同时实现更高的吞吐量;2)使用客户端移动模式,如果已知,可以进一步改进我们的静态方法;3)我们的方法实现了比现有方法更好的公平性和负载平衡。
{"title":"Blockage Robustness in Access Point Association for mmWave Wireless LANs with Mobility","authors":"Yuchen Liu, D. Blough","doi":"10.1109/LCN48667.2020.9314770","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314770","url":null,"abstract":"Millimeter-wave wireless LANs are targeted for use with bandwidth-intensive applications such as virtual/augmented reality and real-time high-definition video. To maintain high throughput while addressing mmWave signal blockages, multiple access points (APs) within one room to improve line-of-sight conditions is considered a promising approach. In a scenario with fixed and mobile (human) obstacles, we mathematically analyze LoS blockages produced by mobility, and use the analysis to develop a multi-AP association scheme. Our scheme statically assigns primary and backup APs in order to maximize blockage robustness and perform load balancing among APs. Simulation results show that: 1) our static approach can provide blockage tolerance close to that of an expensive dynamic probing approach while achieving higher throughput, 2) the use of client mobility patterns, if known, can improve our static approach even further, and 3) our approach achieves significantly better fairness and load balancing than existing approaches.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122598306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IntentKeeper: Intent-oriented Data Usage Control for Federated Data Analytics IntentKeeper:联邦数据分析面向意图的数据使用控制
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314823
Flavio Cirillo, Bin Cheng, Raffaele Porcellana, Marco Russo, Gürkan Solmaz, Hisashi Sakamoto, S. Romano
Data usage control is of utmost importance for federated data analytics across multiple business domains. However, the existing data usage control approaches are limited due to their complexity and inefficiency. This paper proposes an intent-oriented data usage control system for federated data analytics, called IntentKeeper. The system allows users to specify intents for data usage policies and services easily. Thus, it reduces the data sharing complexity for data providers and consumers. Moreover, IntentKeeper enforces preventive and proactive data usage control for better security and efficiency through joint decisions based on policy enforcement and service orchestration. The use case validations for the automotive industry scenario show that IntentKeeper significantly reduces the complexity of policy specification (up to 75% for moderately complex scenarios) compared to the state-of-the-art flow-based approach. Lastly, the experimental results show that the IntentKeeper system provides sufficiently short response times (less than 40ms) with minimal overhead (less than 10ms).
数据使用控制对于跨多个业务域的联邦数据分析至关重要。然而,现有的数据使用控制方法由于其复杂性和低效率而受到限制。本文提出了一种面向意图的联邦数据分析数据使用控制系统IntentKeeper。该系统允许用户方便地指定数据使用策略和服务的意图。因此,它降低了数据提供者和消费者的数据共享复杂性。此外,IntentKeeper通过基于策略实施和服务编排的联合决策,实施预防性和前瞻性数据使用控制,以获得更好的安全性和效率。汽车行业场景的用例验证表明,与最先进的基于流的方法相比,IntentKeeper显著降低了策略规范的复杂性(对于中等复杂的场景,可降低75%)。最后,实验结果表明,IntentKeeper系统以最小的开销(小于10ms)提供了足够短的响应时间(小于40ms)。
{"title":"IntentKeeper: Intent-oriented Data Usage Control for Federated Data Analytics","authors":"Flavio Cirillo, Bin Cheng, Raffaele Porcellana, Marco Russo, Gürkan Solmaz, Hisashi Sakamoto, S. Romano","doi":"10.1109/LCN48667.2020.9314823","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314823","url":null,"abstract":"Data usage control is of utmost importance for federated data analytics across multiple business domains. However, the existing data usage control approaches are limited due to their complexity and inefficiency. This paper proposes an intent-oriented data usage control system for federated data analytics, called IntentKeeper. The system allows users to specify intents for data usage policies and services easily. Thus, it reduces the data sharing complexity for data providers and consumers. Moreover, IntentKeeper enforces preventive and proactive data usage control for better security and efficiency through joint decisions based on policy enforcement and service orchestration. The use case validations for the automotive industry scenario show that IntentKeeper significantly reduces the complexity of policy specification (up to 75% for moderately complex scenarios) compared to the state-of-the-art flow-based approach. Lastly, the experimental results show that the IntentKeeper system provides sufficiently short response times (less than 40ms) with minimal overhead (less than 10ms).","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115036993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
L3SFA: Load Shifting Strategy for Spreading Factor Allocation in LoRaWAN Systems LoRaWAN系统中扩频因子分配的负载转移策略
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314777
Mohamed Hamnache, Rahim Kacimi, A. Beylot
LoRaWAN Enabled networks are expected to have a dizzying growth. Thus, an efficient allocation of wireless resources so as to support a large number of nodes is a major concern. In this paper we propose an SF assignment approach paying attention on the traffic load both per Spreading Factor and over the channels. Indeed, our strategy consists in finding a better distribution of the nodes on the SF by orchestrating an effective load balancing. Moreover, the performance of our solution is evaluated under diverse network configurations taking into account the capture effect and the non-orthogonality of SFs. In addition, we validated some assumptions by full-scale experiments like for the 3GPP path loss model which is used for the first time in LoRa simulations. Our results suggest that Load Shifting leads to better performance in terms of DER (Date Extraction Rate) while guaranteeing good scalability on the network size and density.
LoRaWAN支持的网络预计会有令人眼花缭乱的增长。因此,如何有效地分配无线资源以支持大量节点是一个重要的问题。在本文中,我们提出了一种同时关注每个扩频因子和信道上的业务负载的顺位分配方法。实际上,我们的策略包括通过编排有效的负载平衡,在SF上找到更好的节点分布。此外,考虑到捕获效应和SFs的非正交性,我们的解决方案在不同网络配置下的性能进行了评估。此外,我们还通过全尺寸实验验证了一些假设,例如在LoRa模拟中首次使用的3GPP路径损耗模型。我们的研究结果表明,负载转移在保证网络大小和密度的良好可扩展性的同时,在DER(数据提取率)方面带来了更好的性能。
{"title":"L3SFA: Load Shifting Strategy for Spreading Factor Allocation in LoRaWAN Systems","authors":"Mohamed Hamnache, Rahim Kacimi, A. Beylot","doi":"10.1109/LCN48667.2020.9314777","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314777","url":null,"abstract":"LoRaWAN Enabled networks are expected to have a dizzying growth. Thus, an efficient allocation of wireless resources so as to support a large number of nodes is a major concern. In this paper we propose an SF assignment approach paying attention on the traffic load both per Spreading Factor and over the channels. Indeed, our strategy consists in finding a better distribution of the nodes on the SF by orchestrating an effective load balancing. Moreover, the performance of our solution is evaluated under diverse network configurations taking into account the capture effect and the non-orthogonality of SFs. In addition, we validated some assumptions by full-scale experiments like for the 3GPP path loss model which is used for the first time in LoRa simulations. Our results suggest that Load Shifting leads to better performance in terms of DER (Date Extraction Rate) while guaranteeing good scalability on the network size and density.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114684804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PLEDGE: An IoT-oriented Proof-of-Honesty based Blockchain Consensus Protocol PLEDGE:一个面向物联网的基于诚信证明的区块链共识协议
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314794
Imran Makhdoom, F. Tofigh, Ian Zhou, M. Abolhasan, J. Lipman
The existing lottery-based consensus algorithms, such as Proof-of-Work, and Proof-of-Stake, are mostly used for blockchain-based financial technology applications. Similarly, the Byzantine Fault Tolerance algorithms do provide consensus finality, yet they are either communications intensive, vulnerable to Denial-of-Service attacks, poorly scalable, or have a low faulty node tolerance level. Moreover, these algorithms are not designed for the Internet of Things systems that require near-real-time transaction confirmation, maximum fault tolerance, and appropriate transaction validation rules. Hence, we propose "Pledge," a unique Proof-of-Honesty based consensus protocol to reduce the possibility of malicious behavior during blockchain consensus. Pledge also introduces the Internet of Things centric transaction validation rules. Initial experimentation shows that Pledge is economical and secure with low communications complexity and low latency in transaction confirmation.
现有的基于彩票的共识算法,如工作量证明和权益证明,主要用于基于区块链的金融技术应用。类似地,拜占庭容错算法确实提供了共识终结性,但它们要么是通信密集型的,容易受到拒绝服务攻击,可扩展性差,要么具有较低的故障节点容错级别。此外,这些算法不是为需要近实时交易确认、最大容错性和适当交易验证规则的物联网系统设计的。因此,我们提出了“承诺”,这是一种独特的基于诚实证明的共识协议,以减少区块链共识过程中恶意行为的可能性。质押还引入了以物联网为中心的交易验证规则。初步实验表明,Pledge具有经济、安全、通信复杂度低、交易确认延迟低等优点。
{"title":"PLEDGE: An IoT-oriented Proof-of-Honesty based Blockchain Consensus Protocol","authors":"Imran Makhdoom, F. Tofigh, Ian Zhou, M. Abolhasan, J. Lipman","doi":"10.1109/LCN48667.2020.9314794","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314794","url":null,"abstract":"The existing lottery-based consensus algorithms, such as Proof-of-Work, and Proof-of-Stake, are mostly used for blockchain-based financial technology applications. Similarly, the Byzantine Fault Tolerance algorithms do provide consensus finality, yet they are either communications intensive, vulnerable to Denial-of-Service attacks, poorly scalable, or have a low faulty node tolerance level. Moreover, these algorithms are not designed for the Internet of Things systems that require near-real-time transaction confirmation, maximum fault tolerance, and appropriate transaction validation rules. Hence, we propose \"Pledge,\" a unique Proof-of-Honesty based consensus protocol to reduce the possibility of malicious behavior during blockchain consensus. Pledge also introduces the Internet of Things centric transaction validation rules. Initial experimentation shows that Pledge is economical and secure with low communications complexity and low latency in transaction confirmation.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Root Redundancy in Meshed Tree Bridged Networks 网状树桥接网络中的根冗余
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314833
P. Willis, N. Shenoy, Yin Pan, John F. Hamilton
Switched networks require loop-avoidance protocols to avoid looping of broadcast and multicast Loop-avoidance protocols use a tree algorithm to construct a logical tree from one root such as rapid spanning tree protocol (RSTP). RSTP results in high convergence latency and heavily impaired network performance on root switch failures. Some protocols construct a logical tree from every switch resulting in high operational overhead. We propose the Meshed Tree Protocol (MTP) to designate the number of roots based on desired network uptime and computational overhead, where a meshed tree conceptually maintains multiple tree branches from a root. MTP based on multi meshed tree algorithm (MMTA), constructs and maintains multiple meshed trees from multiple designated roots. We compare a prototype of MTP based on MMTA against RSTP using switched networks in the Global Environment for Network Innovation (GENI) testbed. MTP's root failure recovery response is several magnitudes superior to RSTP.
交换网络需要避免环路的协议来避免广播和组播的环路。避免环路协议使用树算法从一个根开始构造一个逻辑树,如快速生成树协议RSTP (rapid spanning tree protocol)。当根交换机发生故障时,RSTP会导致较高的收敛延迟,严重影响网络性能。一些协议从每个交换机构建逻辑树,导致高操作开销。我们提出了网状树协议(MTP),根据期望的网络正常运行时间和计算开销来指定根的数量,其中网状树在概念上从根维护多个分支。MTP基于多网格树算法(MMTA),从多个指定根构建和维护多个网格树。我们在全球网络创新环境(GENI)测试平台上比较了基于MMTA的MTP原型和使用交换网络的RSTP。MTP的根故障恢复响应比RSTP好几个数量级。
{"title":"Root Redundancy in Meshed Tree Bridged Networks","authors":"P. Willis, N. Shenoy, Yin Pan, John F. Hamilton","doi":"10.1109/LCN48667.2020.9314833","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314833","url":null,"abstract":"Switched networks require loop-avoidance protocols to avoid looping of broadcast and multicast Loop-avoidance protocols use a tree algorithm to construct a logical tree from one root such as rapid spanning tree protocol (RSTP). RSTP results in high convergence latency and heavily impaired network performance on root switch failures. Some protocols construct a logical tree from every switch resulting in high operational overhead. We propose the Meshed Tree Protocol (MTP) to designate the number of roots based on desired network uptime and computational overhead, where a meshed tree conceptually maintains multiple tree branches from a root. MTP based on multi meshed tree algorithm (MMTA), constructs and maintains multiple meshed trees from multiple designated roots. We compare a prototype of MTP based on MMTA against RSTP using switched networks in the Global Environment for Network Innovation (GENI) testbed. MTP's root failure recovery response is several magnitudes superior to RSTP.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129339065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LCN 2020 Cover Page LCN 2020封面
Pub Date : 2020-11-16 DOI: 10.1109/lcn48667.2020.9314827
{"title":"LCN 2020 Cover Page","authors":"","doi":"10.1109/lcn48667.2020.9314827","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314827","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network Time Security Based Automatic Key Management for PTPv2.1 基于网络时间安全的PTPv2.1自动密钥管理
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314809
Martin Langer, Kai Heine, D. Sibold, R. Bermbach
The PTPv2.1 standard provides new protection mechanisms to ensure the authenticity and integrity of PTP messages. However, the distribution of the necessary security parameters is not part of the specification. This paper proposes a simple and practical approach for the automated distribution of these parameters by using a key management system that enables the Immediate Security Processing in PTP. It is based on the Network Time Security protocol and offers functions for group management, parameter updating and monitoring mechanisms. A Proof-of-Concept implementation provides initial results of the resources required for the key management system and its use.
PTPv2.1标准提供了新的保护机制来确保PTP消息的真实性和完整性。然而,必要的安全参数的分布并不是规范的一部分。本文提出了一种简单实用的方法,通过使用密钥管理系统实现PTP中的即时安全处理,实现这些参数的自动分发。它基于网络时间安全协议,提供组管理、参数更新和监控机制等功能。概念验证实现提供了密钥管理系统及其使用所需资源的初步结果。
{"title":"A Network Time Security Based Automatic Key Management for PTPv2.1","authors":"Martin Langer, Kai Heine, D. Sibold, R. Bermbach","doi":"10.1109/LCN48667.2020.9314809","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314809","url":null,"abstract":"The PTPv2.1 standard provides new protection mechanisms to ensure the authenticity and integrity of PTP messages. However, the distribution of the necessary security parameters is not part of the specification. This paper proposes a simple and practical approach for the automated distribution of these parameters by using a key management system that enables the Immediate Security Processing in PTP. It is based on the Network Time Security protocol and offers functions for group management, parameter updating and monitoring mechanisms. A Proof-of-Concept implementation provides initial results of the resources required for the key management system and its use.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125825035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online Detection of Wi-Fi Fingerprint Alteration Strength via Deep Learning 基于深度学习的Wi-Fi指纹篡改强度在线检测
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314835
Minglu Yan, Jiankun Wang, Z. Zhao
In Wi-Fi fingerprinting indoor localization, since signals of Wi-Fi APs vary over time, to retain high localization accuracy, the fingerprint database has to be updated periodically, which is labor-intensive and time-consuming. In this paper, we consider how to detect Wi-Fi fingerprint alteration accurately on line so as to update fingerprint database efficiently. To this end, we propose a deep learning model, AReAE (Alteration Reducing AutoEncoder), to reconstruct fingerprints from altered ones by learning alteration distribution. Based on AReAE, we further develop a FADet (Fingerprint Alteration Detection) system, which constructs a fingerprint ASmap (Alteration Strength map) with crowd-sourced Wi-Fi RSS (Received Signal Strength) measurements. The ASmap indicates how strong fingerprints change anywhere in the area of interest. FADet is verified through extensive experiments in real-world indoor scenarios. Results show that FADet yields accurate ASmaps for all scenarios tested, which can facilitate fingerprint database updating in time.
在Wi-Fi指纹室内定位中,由于Wi-Fi接入点的信号随时间变化,为了保持较高的定位精度,需要定期更新指纹数据库,这是一项费时费力的工作。本文研究了如何在线准确检测Wi-Fi指纹变化,从而有效地更新指纹数据库。为此,我们提出了一种深度学习模型AReAE (change reduction AutoEncoder),通过学习改变分布从改变的指纹中重建指纹。在此基础上,我们进一步开发了FADet(指纹改变检测)系统,该系统利用众包Wi-Fi接收信号强度(RSS)测量数据构建指纹改变强度图(ASmap)。ASmap表示指纹在感兴趣的区域内的变化强度。FADet通过在真实世界室内场景中的大量实验得到验证。结果表明,FADet方法能够准确地生成所有测试场景下的指纹图谱,有利于指纹库的及时更新。
{"title":"Online Detection of Wi-Fi Fingerprint Alteration Strength via Deep Learning","authors":"Minglu Yan, Jiankun Wang, Z. Zhao","doi":"10.1109/LCN48667.2020.9314835","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314835","url":null,"abstract":"In Wi-Fi fingerprinting indoor localization, since signals of Wi-Fi APs vary over time, to retain high localization accuracy, the fingerprint database has to be updated periodically, which is labor-intensive and time-consuming. In this paper, we consider how to detect Wi-Fi fingerprint alteration accurately on line so as to update fingerprint database efficiently. To this end, we propose a deep learning model, AReAE (Alteration Reducing AutoEncoder), to reconstruct fingerprints from altered ones by learning alteration distribution. Based on AReAE, we further develop a FADet (Fingerprint Alteration Detection) system, which constructs a fingerprint ASmap (Alteration Strength map) with crowd-sourced Wi-Fi RSS (Received Signal Strength) measurements. The ASmap indicates how strong fingerprints change anywhere in the area of interest. FADet is verified through extensive experiments in real-world indoor scenarios. Results show that FADet yields accurate ASmaps for all scenarios tested, which can facilitate fingerprint database updating in time.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128959978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE 45th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1