首页 > 最新文献

2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

英文 中文
CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures CAUDHT:使用DHT和盲签名的分散接触跟踪
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314850
Samuel Brack, Leonie Reichert, B. Scheuermann
Contact tracing is a promising approach to combat the COVID-19 pandemic. Various systems have been proposed to automatise the process. Many designs rely heavily on a centralised server or reveal significant amounts of private data to health authorities. We propose CAUDHT, a decentralized peer-to-peer system for contact tracing. The central health authority can focus on providing and operating tests for the disease while contact tracing is done by the system’s users themselves. We use a distributed hash table to build a decentral messaging system for infected patients and their contacts. With blind signatures, we ensure that messages about infections are authentic and unchanged. A strong privacy focus enables data integrity, confidentiality, and privacy.
接触者追踪是抗击COVID-19大流行的一种有希望的方法。已经提出了各种系统来实现这一过程的自动化。许多设计严重依赖于集中式服务器或向卫生当局泄露大量私人数据。我们提出CAUDHT,一个分散的点对点接触追踪系统。中央卫生当局可以专注于提供和操作疾病检测,而接触者追踪则由系统用户自己完成。我们使用分布式哈希表为感染患者和他们的联系人建立一个分散的消息传递系统。通过盲签名,我们确保有关感染的信息是真实的和不变的。强大的隐私焦点可实现数据完整性、机密性和隐私性。
{"title":"CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures","authors":"Samuel Brack, Leonie Reichert, B. Scheuermann","doi":"10.1109/LCN48667.2020.9314850","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314850","url":null,"abstract":"Contact tracing is a promising approach to combat the COVID-19 pandemic. Various systems have been proposed to automatise the process. Many designs rely heavily on a centralised server or reveal significant amounts of private data to health authorities. We propose CAUDHT, a decentralized peer-to-peer system for contact tracing. The central health authority can focus on providing and operating tests for the disease while contact tracing is done by the system’s users themselves. We use a distributed hash table to build a decentral messaging system for infected patients and their contacts. With blind signatures, we ensure that messages about infections are authentic and unchanged. A strong privacy focus enables data integrity, confidentiality, and privacy.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125932910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
KYoT: Self-sovereign IoT Identification with a Physically Unclonable Function KYoT:具有物理不可克隆功能的自主物联网识别
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314816
Sina Rafati Niya, Benjamin Jeffrey, B. Stiller
The integration of Internet-of-Things (IoT) and Blockchains (BC) for trusted and decentralized approaches enabled modern use cases, such as supply chain tracing, smart cities, and IoT data marketplaces. For these it is essential to identify reliably IoT devices, since the producer-consumer trust is not guaranteed by a Trusted Third Party (TTP). Therefore, this work proposes a Know Your IoT device platform (KYoT), which enables the self-sovereign identification of IoT devices on the Ethereum BC. KYoT permits manufacturers and device owners to register and verify IoT devices in a self-sovereign fashion, while data storage security is ensured. KYoT deploys an SRAM-based (Static Random Access Memory) Physically Unclonable Function (PUF), which takes advantage of the manufacturing variability of devices' SRAM chips to derive a unique identifying key for each IoT device. The self-sovereign identification mechanism introduced is based on the ERC 734 and ERC 735 Ethereum identity standards.
物联网(IoT)和区块链(BC)的可信和分散方法的集成实现了现代用例,如供应链跟踪,智能城市和物联网数据市场。对于这些来说,识别可靠的物联网设备是至关重要的,因为生产者-消费者的信任不是由可信第三方(TTP)保证的。因此,这项工作提出了一个了解你的物联网设备平台(KYoT),它可以在以太坊BC上实现物联网设备的自主识别。KYoT允许制造商和设备所有者以自主的方式注册和验证物联网设备,同时确保数据存储安全。KYoT部署了一个基于SRAM(静态随机存取存储器)的物理不可克隆功能(PUF),它利用设备SRAM芯片的制造可变性来为每个物联网设备派生一个唯一的识别密钥。引入的自我主权识别机制基于ERC 734和ERC 735以太坊身份标准。
{"title":"KYoT: Self-sovereign IoT Identification with a Physically Unclonable Function","authors":"Sina Rafati Niya, Benjamin Jeffrey, B. Stiller","doi":"10.1109/LCN48667.2020.9314816","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314816","url":null,"abstract":"The integration of Internet-of-Things (IoT) and Blockchains (BC) for trusted and decentralized approaches enabled modern use cases, such as supply chain tracing, smart cities, and IoT data marketplaces. For these it is essential to identify reliably IoT devices, since the producer-consumer trust is not guaranteed by a Trusted Third Party (TTP). Therefore, this work proposes a Know Your IoT device platform (KYoT), which enables the self-sovereign identification of IoT devices on the Ethereum BC. KYoT permits manufacturers and device owners to register and verify IoT devices in a self-sovereign fashion, while data storage security is ensured. KYoT deploys an SRAM-based (Static Random Access Memory) Physically Unclonable Function (PUF), which takes advantage of the manufacturing variability of devices' SRAM chips to derive a unique identifying key for each IoT device. The self-sovereign identification mechanism introduced is based on the ERC 734 and ERC 735 Ethereum identity standards.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125959563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Congestion Control Using Diffusion Method in Named Data Networking 基于扩散方法的命名数据网络拥塞控制
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314852
Cheng-Hua Lee, H. Nakazato
Named Data Networking (NDN) is a new networking mechanism to amend problems in the current Internet. There are many features to improve the efficiency of network in NDN, and one of them is that routers can cache data conveyed by packets. This results in network node to client communication unlike the client to client principle in TCP/IP architecture. Therefore, end-to-end flow control cannot be applied to NDN unlike the Internet. Inspired from thermal diffusion, researchers proposed hop-by-hop flow control to solve this problem. However, the congestion control in hop-by-hop method is still under research. In this paper, a diffusion-based flow control method for NDN is proposed. We conducted simulations to verify its performance.
命名数据网络(NDN)是针对当前Internet存在的问题而提出的一种新的网络机制。在NDN中,提高网络效率的特性有很多,其中之一就是路由器可以缓存数据包所传输的数据。这导致了网络节点到客户端的通信,而不像TCP/IP架构中的客户端到客户端原则。因此,端到端流量控制不能像Internet那样应用于NDN。受热扩散的启发,研究人员提出了逐跳流控制来解决这个问题。然而,逐跳方法中的拥塞控制仍处于研究阶段。本文提出了一种基于扩散的NDN流量控制方法。我们进行了仿真来验证其性能。
{"title":"Congestion Control Using Diffusion Method in Named Data Networking","authors":"Cheng-Hua Lee, H. Nakazato","doi":"10.1109/LCN48667.2020.9314852","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314852","url":null,"abstract":"Named Data Networking (NDN) is a new networking mechanism to amend problems in the current Internet. There are many features to improve the efficiency of network in NDN, and one of them is that routers can cache data conveyed by packets. This results in network node to client communication unlike the client to client principle in TCP/IP architecture. Therefore, end-to-end flow control cannot be applied to NDN unlike the Internet. Inspired from thermal diffusion, researchers proposed hop-by-hop flow control to solve this problem. However, the congestion control in hop-by-hop method is still under research. In this paper, a diffusion-based flow control method for NDN is proposed. We conducted simulations to verify its performance.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121611727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Automated Trust Computation in IoT with Multiple Attributes and Subjective Logic 基于多属性和主观逻辑的物联网自动信任计算研究
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314808
Nuray Baltaci Akhuseyinoglu, Maryam Karimi, Mai Abdelhakim, P. Krishnamurthy
Developing automated trust mechanisms has become crucial for overcoming perceptions of uncertainty and risk by people using IoT services. Things are increasingly communicating with each other and trust in the data they deliver depends on several factors such as the links they use to communicate and the environment. This points to a need for a trust management method for "things" that considers the communication among them, environmental and security-related factors, and the net-work topology but without human intervention. To address these challenges, we propose a trust management framework that automatically computes the trust of "things". We use Multi-Attribute Decision Making (MADM) and Evidence-Based Subjective Logic (EBSL) in a trust network of "things" to take into account the uncertainty in trust values. We propose new normalization for non-monotonic attributes in MADM. We present an algorithm for automatic trust computation and evaluate its effectiveness using synthetic data and sampling from real datasets.
开发自动化信任机制对于克服使用物联网服务的人们对不确定性和风险的认知至关重要。事物之间的通信越来越多,它们传递的数据的信任取决于几个因素,比如它们用于通信的链接和环境。这表明需要一种“事物”的信任管理方法,该方法考虑到它们之间的通信、环境和安全相关因素以及网络拓扑结构,但不需要人为干预。为了解决这些挑战,我们提出了一个自动计算“事物”信任的信任管理框架。在“物”信任网络中,我们采用多属性决策(MADM)和基于证据的主观逻辑(EBSL)来考虑信任值的不确定性。提出了MADM中非单调属性的新归一化方法。提出了一种自动信任计算算法,并利用合成数据和真实数据集的采样对其有效性进行了评价。
{"title":"On Automated Trust Computation in IoT with Multiple Attributes and Subjective Logic","authors":"Nuray Baltaci Akhuseyinoglu, Maryam Karimi, Mai Abdelhakim, P. Krishnamurthy","doi":"10.1109/LCN48667.2020.9314808","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314808","url":null,"abstract":"Developing automated trust mechanisms has become crucial for overcoming perceptions of uncertainty and risk by people using IoT services. Things are increasingly communicating with each other and trust in the data they deliver depends on several factors such as the links they use to communicate and the environment. This points to a need for a trust management method for \"things\" that considers the communication among them, environmental and security-related factors, and the net-work topology but without human intervention. To address these challenges, we propose a trust management framework that automatically computes the trust of \"things\". We use Multi-Attribute Decision Making (MADM) and Evidence-Based Subjective Logic (EBSL) in a trust network of \"things\" to take into account the uncertainty in trust values. We propose new normalization for non-monotonic attributes in MADM. We present an algorithm for automatic trust computation and evaluate its effectiveness using synthetic data and sampling from real datasets.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rate Adaptation Techniques Using Contextual Bandit Approach for Mobile Wireless LAN Users 基于上下文强盗的移动无线局域网用户速率自适应技术
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314810
A. Sen, K. Sivalingam
Rate adaptation (RA) is used in IEEE 802.11 WLANs to determine the optimal datarate for a particular channel condition. It becomes especially difficult to determine the optimal datarate for the new High-Throughput WLANs since the number of available datarates in these standards are very high. Moreover, a mobile environment poses additional challenge in RA as the channel conditions will keep on changing from time to time. In this paper, we propose a Contextual Bandits based Rate Adaptation (ContRA) algorithm for mobile users in IEEE 802.11ac standard. Based on the Received Signal Strength Indicator (RSSI) range that the receiver is currently in, the RA algorithm tries to determine the optimal rate from the rate set suitable for packet transmission in that RSSI range. Performance studies show that the proposed RA algorithm is able to adapt to changing channel conditions and quickly choose a suitable datarate for those channel conditions.
速率自适应(RA)在IEEE 802.11 wlan中用于确定特定信道条件下的最佳数据速率。由于这些标准中可用数据的数量非常高,因此确定新的高吞吐量wlan的最佳数据变得特别困难。此外,由于信道条件不断变化,移动环境对RA提出了额外的挑战。在本文中,我们提出了一种基于上下文强盗速率自适应(ContRA)的IEEE 802.11ac标准移动用户算法。RA算法根据接收方当前所处的RSSI (Received Signal Strength Indicator)范围,尝试从该RSSI范围内适合数据包传输的速率集中确定最优速率。性能研究表明,所提出的RA算法能够适应不断变化的信道条件,并快速选择适合这些信道条件的数据。
{"title":"Rate Adaptation Techniques Using Contextual Bandit Approach for Mobile Wireless LAN Users","authors":"A. Sen, K. Sivalingam","doi":"10.1109/LCN48667.2020.9314810","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314810","url":null,"abstract":"Rate adaptation (RA) is used in IEEE 802.11 WLANs to determine the optimal datarate for a particular channel condition. It becomes especially difficult to determine the optimal datarate for the new High-Throughput WLANs since the number of available datarates in these standards are very high. Moreover, a mobile environment poses additional challenge in RA as the channel conditions will keep on changing from time to time. In this paper, we propose a Contextual Bandits based Rate Adaptation (ContRA) algorithm for mobile users in IEEE 802.11ac standard. Based on the Received Signal Strength Indicator (RSSI) range that the receiver is currently in, the RA algorithm tries to determine the optimal rate from the rate set suitable for packet transmission in that RSSI range. Performance studies show that the proposed RA algorithm is able to adapt to changing channel conditions and quickly choose a suitable datarate for those channel conditions.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
StopEG: Detecting when to stop exponential growth in TCP slow-start StopEG:检测何时停止TCP慢启动的指数增长
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314853
M. Arghavani, Haibo Zhang, D. Eyers, Abbas Arghavani
TCP slow-start grows the congestion window exponentially, aims to quickly probe the throughput of the network path. Stopping this growth at the wrong time can affect the overall network performance. In this paper, we introduce StopEG, an efficient mechanism to accurately and quickly detect when to stop this exponential growth. StopEG reacts to the changes on congestion window size rather than traditional congestion signals such as packet loss. We show that theoretically the number of inflight packets in the forward path is no more than 56.8% of all the inflight packets when the bottleneck link is unsaturated, and use this value as the threshold to stop the exponential growth. StopEG is evaluated through simulations in ns-3 by incorporating it into Google’s BBR congestion control algorithm. Simulation results demonstrate its effectiveness in BBR, with a reduction of ≈68% in the length of the bottleneck queue when new connections are initiated.
TCP慢启动使拥塞窗口呈指数增长,目的是快速探测网络路径的吞吐量。在错误的时间停止这种增长可能会影响整体网络性能。在本文中,我们引入了StopEG,这是一种有效的机制,可以准确快速地检测何时停止这种指数增长。StopEG对拥塞窗口大小的变化作出反应,而不是像丢包这样的传统拥塞信号。研究表明,当瓶颈链路不饱和时,正向路径上的飞行数据包数量在理论上不超过所有飞行数据包的56.8%,并将此值作为阻止指数增长的阈值。StopEG通过ns-3中的模拟进行评估,并将其纳入谷歌的BBR拥塞控制算法。仿真结果证明了该算法在BBR中的有效性,当发起新连接时,瓶颈队列的长度减少了约68%。
{"title":"StopEG: Detecting when to stop exponential growth in TCP slow-start","authors":"M. Arghavani, Haibo Zhang, D. Eyers, Abbas Arghavani","doi":"10.1109/LCN48667.2020.9314853","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314853","url":null,"abstract":"TCP slow-start grows the congestion window exponentially, aims to quickly probe the throughput of the network path. Stopping this growth at the wrong time can affect the overall network performance. In this paper, we introduce StopEG, an efficient mechanism to accurately and quickly detect when to stop this exponential growth. StopEG reacts to the changes on congestion window size rather than traditional congestion signals such as packet loss. We show that theoretically the number of inflight packets in the forward path is no more than 56.8% of all the inflight packets when the bottleneck link is unsaturated, and use this value as the threshold to stop the exponential growth. StopEG is evaluated through simulations in ns-3 by incorporating it into Google’s BBR congestion control algorithm. Simulation results demonstrate its effectiveness in BBR, with a reduction of ≈68% in the length of the bottleneck queue when new connections are initiated.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extending MUD to Smartphones 将MUD扩展至智能手机
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314782
I. Fink, Martin Serror, Klaus Wehrle
The tremendous success of the IoT is overshadowed by severe security risks introduced by IoT devices and smartphone apps to control them. Therefore, academia and industry increasingly acknowledge the use of in-network security approaches, such as IETF Manufacturer Usage Description (MUD), to restrict undesired communication. However, actual communication patterns of smart homes are not sufficiently covered by such policy-based approaches. In this paper, we propose to enforce MUD on authenticated smartphones to efficiently filter malicious traffic close to its origin and hinder further spreading. Such enforcement allows us to successfully mitigate the threat of malicious apps and IoT devices in smart home networks.
物联网的巨大成功被物联网设备和智能手机应用程序带来的严重安全风险所掩盖。因此,学术界和工业界越来越多地承认使用网络内安全方法,例如IETF制造商使用描述(MUD)来限制不希望的通信。然而,这种基于策略的方法并没有充分涵盖智能家居的实际通信模式。在本文中,我们建议在经过身份验证的智能手机上实施MUD,以有效地过滤靠近其来源的恶意流量并阻止其进一步传播。这样的执行使我们能够成功地减轻智能家居网络中恶意应用程序和物联网设备的威胁。
{"title":"Extending MUD to Smartphones","authors":"I. Fink, Martin Serror, Klaus Wehrle","doi":"10.1109/LCN48667.2020.9314782","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314782","url":null,"abstract":"The tremendous success of the IoT is overshadowed by severe security risks introduced by IoT devices and smartphone apps to control them. Therefore, academia and industry increasingly acknowledge the use of in-network security approaches, such as IETF Manufacturer Usage Description (MUD), to restrict undesired communication. However, actual communication patterns of smart homes are not sufficiently covered by such policy-based approaches. In this paper, we propose to enforce MUD on authenticated smartphones to efficiently filter malicious traffic close to its origin and hinder further spreading. Such enforcement allows us to successfully mitigate the threat of malicious apps and IoT devices in smart home networks.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131998983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pinning Control of Dynamical Networks with Optimal Cost 最优代价动态网络的钉住控制
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314818
S. Jafarizadeh
Complex networks of coupled dynamical systems, are effective models of numerous distributed systems. The desire to control such systems has led to the pinning control techniques where a subset of nodes in the network is controlled. A problem of interest is to optimize the pinning node selection and control gain design, while minimizing the associated total control cost. Here this optimal control optimization problem has been reformulated as a standard semidefinite programming problem. Solving the resultant problem, the analytical solution for the optimal feedback gain and pinning nodes are derived. An algorithm for determining the optimal feedback gain for a set of pinned nodes is developed. For a number of topologies, closed-forms of the optimal results are provided. Interestingly, increasing the number of pinned nodes in the network reduces the total pinning cost, i.e., the performance index. For a network of Lorenz systems, optimal results for all possible pinning node selections are provided.
耦合动力系统的复杂网络是众多分布式系统的有效模型。控制这种系统的愿望导致了固定控制技术,其中控制网络中的节点子集。一个有趣的问题是优化固定节点的选择和控制增益设计,同时最小化相关的总控制成本。在这里,最优控制优化问题被重新表述为标准的半定规划问题。通过求解所得问题,导出了最优反馈增益和最优钉住节点的解析解。提出了一种确定一组固定节点的最优反馈增益的算法。对于许多拓扑,提供了最优结果的封闭形式。有趣的是,增加网络中固定节点的数量会降低总固定成本,即性能指标。对于洛伦兹系统网络,提供了所有可能的固定节点选择的最优结果。
{"title":"Pinning Control of Dynamical Networks with Optimal Cost","authors":"S. Jafarizadeh","doi":"10.1109/LCN48667.2020.9314818","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314818","url":null,"abstract":"Complex networks of coupled dynamical systems, are effective models of numerous distributed systems. The desire to control such systems has led to the pinning control techniques where a subset of nodes in the network is controlled. A problem of interest is to optimize the pinning node selection and control gain design, while minimizing the associated total control cost. Here this optimal control optimization problem has been reformulated as a standard semidefinite programming problem. Solving the resultant problem, the analytical solution for the optimal feedback gain and pinning nodes are derived. An algorithm for determining the optimal feedback gain for a set of pinned nodes is developed. For a number of topologies, closed-forms of the optimal results are provided. Interestingly, increasing the number of pinned nodes in the network reduces the total pinning cost, i.e., the performance index. For a network of Lorenz systems, optimal results for all possible pinning node selections are provided.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126157679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technical Program of LCN 2020 LCN 2020技术方案
Pub Date : 2020-11-16 DOI: 10.1109/lcn48667.2020.9314792
{"title":"Technical Program of LCN 2020","authors":"","doi":"10.1109/lcn48667.2020.9314792","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314792","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115715156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning based User Slice Allocation in 5G Radio Access Networks 基于深度学习的5G无线接入网用户片分配
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314857
Salma Matoussi, Ilhem Fajjari, N. Aitsaadi, R. Langar
Network slicing is proposed as a new paradigm to serve the plethora of 5G services on a shared infrastructure. Within this context, a Radio Access Network (RAN) slice is considered as the proportion of physical spectrum resources to be served to third parties. Interestingly, 3GPP standardized options of RAN processing dis-aggregation into network functions while enabling their placement whether in distributed or centralized locations. The adoption of an end-to-end RAN slicing raises new challenges related to the allocation efficiency of joint radio, link and computational resources. To deal with the stringent latency requirements of 5G services, we propose, in this paper, a Deep Learning based approach for User-centric end-to-end RAN Slice Allocation scheme. It can decide in real-time, to jointly allocate the amount of radio resources and functional split for each end- user. Our proposal satisfies end-user's requirements in terms of throughput and latency, while minimizing the infrastructure deployment cost.
网络切片是在共享基础设施上为大量5G服务提供服务的一种新范式。在这种情况下,无线接入网(RAN)切片被认为是提供给第三方的物理频谱资源的比例。有趣的是,3GPP标准化了RAN处理分解为网络功能的选项,同时允许它们放置在分布式或集中式位置。端到端无线局域网切片的采用对联合无线电、链路和计算资源的分配效率提出了新的挑战。为了应对5G服务严格的延迟要求,本文提出了一种基于深度学习的以用户为中心的端到端RAN分片分配方案。它可以实时决定,为每个终端用户共同分配无线资源的数量和功能分割。我们的建议在吞吐量和延迟方面满足了最终用户的需求,同时最小化了基础设施部署成本。
{"title":"Deep Learning based User Slice Allocation in 5G Radio Access Networks","authors":"Salma Matoussi, Ilhem Fajjari, N. Aitsaadi, R. Langar","doi":"10.1109/LCN48667.2020.9314857","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314857","url":null,"abstract":"Network slicing is proposed as a new paradigm to serve the plethora of 5G services on a shared infrastructure. Within this context, a Radio Access Network (RAN) slice is considered as the proportion of physical spectrum resources to be served to third parties. Interestingly, 3GPP standardized options of RAN processing dis-aggregation into network functions while enabling their placement whether in distributed or centralized locations. The adoption of an end-to-end RAN slicing raises new challenges related to the allocation efficiency of joint radio, link and computational resources. To deal with the stringent latency requirements of 5G services, we propose, in this paper, a Deep Learning based approach for User-centric end-to-end RAN Slice Allocation scheme. It can decide in real-time, to jointly allocate the amount of radio resources and functional split for each end- user. Our proposal satisfies end-user's requirements in terms of throughput and latency, while minimizing the infrastructure deployment cost.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122751339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2020 IEEE 45th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1