首页 > 最新文献

2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

英文 中文
An Adaptive TXOP Sharing Algorithm for Multimedia Traffic in IEEE802.11ac Networks IEEE802.11ac网络中多媒体流量的自适应TXOP共享算法
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314840
Summera Nosheen, J. Khan
IEEE802.11 standard is continuously evolving to satisfy the increasing throughput and QoS (Quality of Service) requirements of diverse user applications. One of the advanced key features of the IEEE802.11 standard is the introduction of the DL-MU-MIMO (Downlink Multi-user Multiple Input and Multiple Output) techniques which enables a multi-antenna access point to serve multiple download users concurrently. The MAC layer of the 802.11ac protocol utilises the TXOP sharing technique to support the DL-MU-MIMO operating mode. In this paper, we propose a new TXOP sharing algorithm for the 802.11ac MAC protocol to offer high throughput and QoS for multimedia traffic. The proposed algorithm is referred to as FRA−TXOPE (Flow Rate Adaptive Transmission Opportunity Extension), enhancing our previously published FRA−TXOP algorithm. The FRA−TXOP E algorithm adaptively shares the TXOP resources with primary and secondary traffic sources by continuously monitoring different traffic source flow rates and QoS requirements. Simulation results show that the proposed algorithms significantly enhance the QoS performance of all traffic sources by improving the network throughput and channel utilisation in IEEE802.11ac WLANs.
IEEE802.11标准正在不断发展,以满足不同用户应用日益增长的吞吐量和QoS(服务质量)需求。IEEE802.11标准的高级关键特性之一是引入了DL-MU-MIMO(下行链路多用户多输入多输出)技术,该技术使多天线接入点能够同时为多个下载用户提供服务。802.11ac协议的MAC层利用TXOP共享技术来支持DL-MU-MIMO操作模式。本文针对802.11ac MAC协议提出一种新的TXOP共享算法,为多媒体通信提供高吞吐量和QoS。提出的算法被称为FRA - TXOPE(流量自适应传输机会扩展),增强了我们之前发表的FRA - TXOP算法。FRA−TXOP E算法通过持续监控不同的流量源速率和QoS要求,自适应地与主从源共享TXOP资源。仿真结果表明,该算法通过提高IEEE802.11ac无线局域网的网络吞吐量和信道利用率,显著提高了所有业务源的QoS性能。
{"title":"An Adaptive TXOP Sharing Algorithm for Multimedia Traffic in IEEE802.11ac Networks","authors":"Summera Nosheen, J. Khan","doi":"10.1109/LCN48667.2020.9314840","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314840","url":null,"abstract":"IEEE802.11 standard is continuously evolving to satisfy the increasing throughput and QoS (Quality of Service) requirements of diverse user applications. One of the advanced key features of the IEEE802.11 standard is the introduction of the DL-MU-MIMO (Downlink Multi-user Multiple Input and Multiple Output) techniques which enables a multi-antenna access point to serve multiple download users concurrently. The MAC layer of the 802.11ac protocol utilises the TXOP sharing technique to support the DL-MU-MIMO operating mode. In this paper, we propose a new TXOP sharing algorithm for the 802.11ac MAC protocol to offer high throughput and QoS for multimedia traffic. The proposed algorithm is referred to as FRA−TXOPE (Flow Rate Adaptive Transmission Opportunity Extension), enhancing our previously published FRA−TXOP algorithm. The FRA−TXOP E algorithm adaptively shares the TXOP resources with primary and secondary traffic sources by continuously monitoring different traffic source flow rates and QoS requirements. Simulation results show that the proposed algorithms significantly enhance the QoS performance of all traffic sources by improving the network throughput and channel utilisation in IEEE802.11ac WLANs.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"608 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Predicting Service-oriented Network Slices Performances in 5G: A Federated Learning Approach 5G中面向服务的网络切片性能预测:一种联邦学习方法
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314849
B. Brik, A. Ksentini
To achieve the vision of Zero Touch Management (ZSM) of network slices in 5G, it is important to monitor and predict the performances of the running network slices, or their Key Performance Indicator (KPI). KPIs are usually monitored, but also with the advance of Machine Learning (ML) techniques are predicted, aiming at proactively reacting to any service degradation of running network slices. While network- and computation-oriented KPIs can be easily monitored and predicted, service-oriented KPIs are difficult to obtain due to the privacy issue, as they disclose critical information on the performance of services. To tackle this issue, in this paper, we propose to use a new ML technique, known as Federated Learning (FL), which consists of keeping raw data where it is generated, while sending only users’ local trained models to the centralized entity for aggregation. Hence, making FL as an adequate candidate to be used for predicting slices’ service-oriented KPIs.
为了实现5G网络切片的零接触管理(Zero Touch Management, ZSM)愿景,监控和预测正在运行的网络切片的性能或其关键性能指标(KPI)非常重要。kpi通常会被监控,但随着机器学习(ML)技术的进步,也会被预测,旨在主动响应运行网络切片的任何服务降级。虽然面向网络和计算的kpi可以很容易地监控和预测,但由于隐私问题,很难获得面向服务的kpi,因为它们会泄露有关服务性能的关键信息。为了解决这个问题,在本文中,我们建议使用一种新的ML技术,称为联邦学习(FL),它包括将原始数据保存在生成的地方,同时仅将用户的本地训练模型发送到集中实体进行聚合。因此,将FL作为预测切片的面向服务kpi的合适候选。
{"title":"On Predicting Service-oriented Network Slices Performances in 5G: A Federated Learning Approach","authors":"B. Brik, A. Ksentini","doi":"10.1109/LCN48667.2020.9314849","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314849","url":null,"abstract":"To achieve the vision of Zero Touch Management (ZSM) of network slices in 5G, it is important to monitor and predict the performances of the running network slices, or their Key Performance Indicator (KPI). KPIs are usually monitored, but also with the advance of Machine Learning (ML) techniques are predicted, aiming at proactively reacting to any service degradation of running network slices. While network- and computation-oriented KPIs can be easily monitored and predicted, service-oriented KPIs are difficult to obtain due to the privacy issue, as they disclose critical information on the performance of services. To tackle this issue, in this paper, we propose to use a new ML technique, known as Federated Learning (FL), which consists of keeping raw data where it is generated, while sending only users’ local trained models to the centralized entity for aggregation. Hence, making FL as an adequate candidate to be used for predicting slices’ service-oriented KPIs.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116067938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Multi-Domain Framework to Enable Privacy for Aggregated IoT Streams 为聚合物联网流启用隐私的多域框架
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314825
Renato Caminha Juaçaba-Neto, P. Mérindol, Fabrice Théoleyre
The Internet of Things (IoT) is expected to integrate a large number of sensors, and actuators to the Internet. Multiple concurrent applications may cohabit on top of the same IoT infrastructure, and may re-use the same data for various purpose. However, privacy represents a major concern for many IoT applications, such as in smart building and healthcare. We propose here a multi-domain IoT framework where each domain aggregates distinct data-streams to respect their privacy concerns. We argue that removing sensitive meta-data and aggregating values reported by each data-stream is sufficient to hide individual private measurements. Moreover, relying on the Named Data Networking (NDN) paradigm, we can exploit caching strategies and perform in-network processing to ensure both scalability and privacy. In this paper, we discuss the necessary mechanisms to design a scalable inter-domain, privacy aware NDN scheme.
物联网(IoT)有望将大量传感器和执行器集成到互联网上。多个并发应用程序可能共存于同一物联网基础设施之上,并且可能出于不同目的重用相同的数据。然而,隐私是许多物联网应用的主要关注点,例如智能建筑和医疗保健。我们在这里提出了一个多域物联网框架,其中每个域聚合不同的数据流以尊重其隐私问题。我们认为,删除敏感元数据和聚合每个数据流报告的值足以隐藏个人私有测量。此外,依靠命名数据网络(NDN)范例,我们可以利用缓存策略并执行网络内处理,以确保可伸缩性和隐私性。在本文中,我们讨论了必要的机制,以设计一个可扩展的跨域,隐私意识的NDN方案。
{"title":"A Multi-Domain Framework to Enable Privacy for Aggregated IoT Streams","authors":"Renato Caminha Juaçaba-Neto, P. Mérindol, Fabrice Théoleyre","doi":"10.1109/LCN48667.2020.9314825","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314825","url":null,"abstract":"The Internet of Things (IoT) is expected to integrate a large number of sensors, and actuators to the Internet. Multiple concurrent applications may cohabit on top of the same IoT infrastructure, and may re-use the same data for various purpose. However, privacy represents a major concern for many IoT applications, such as in smart building and healthcare. We propose here a multi-domain IoT framework where each domain aggregates distinct data-streams to respect their privacy concerns. We argue that removing sensitive meta-data and aggregating values reported by each data-stream is sufficient to hide individual private measurements. Moreover, relying on the Named Data Networking (NDN) paradigm, we can exploit caching strategies and perform in-network processing to ensure both scalability and privacy. In this paper, we discuss the necessary mechanisms to design a scalable inter-domain, privacy aware NDN scheme.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133003974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Beyond the VPN: Practical Client Identity in an Internet with Widespread IP Address Sharing 超越VPN:具有广泛IP地址共享的Internet中的实用客户端身份
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314846
Yu Liu, Craig A. Shue
To support remote employees, organizations often use virtual private networks (VPNs) to provide confidential and authenticated tunnels between the organization’s networks and the employees’ systems. With widespread end-to-end application-layer encryption and authentication, the cryptographic features of VPNs are often redundant. However, many organizations still rely upon VPNs. We examine the motivations and limitations associated with VPNs and find that VPNs are often used to simplify access control and filtering for enterprise services.To avoid limitations associated with VPNs, we propose an approach that allows straightforward filtering. Our approach provides evidence a remote user belongs in a network, despite the address sharing present in tools like Carrier-Grade Network Address Translation. We preserve simple access control and eliminate the need for VPN servers, redundant cryptography, and VPN packet headers overheads. The approach is incrementally deployable and provides a second factor for authenticating users and systems while minimizing performance overheads.
为了支持远程员工,组织经常使用虚拟专用网络(vpn)在组织的网络和员工的系统之间提供机密和经过身份验证的隧道。随着端到端应用层加密和身份验证的广泛应用,vpn的加密特性往往是冗余的。然而,许多组织仍然依赖vpn。我们研究了与vpn相关的动机和限制,发现vpn通常用于简化企业服务的访问控制和过滤。为了避免与vpn相关的限制,我们提出了一种允许直接过滤的方法。我们的方法提供了远程用户属于网络的证据,尽管在诸如运营商级网络地址转换之类的工具中存在地址共享。我们保留了简单的访问控制,消除了对VPN服务器、冗余加密和VPN数据包头开销的需求。该方法是可增量部署的,并为在最小化性能开销的同时验证用户和系统提供了第二个因素。
{"title":"Beyond the VPN: Practical Client Identity in an Internet with Widespread IP Address Sharing","authors":"Yu Liu, Craig A. Shue","doi":"10.1109/LCN48667.2020.9314846","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314846","url":null,"abstract":"To support remote employees, organizations often use virtual private networks (VPNs) to provide confidential and authenticated tunnels between the organization’s networks and the employees’ systems. With widespread end-to-end application-layer encryption and authentication, the cryptographic features of VPNs are often redundant. However, many organizations still rely upon VPNs. We examine the motivations and limitations associated with VPNs and find that VPNs are often used to simplify access control and filtering for enterprise services.To avoid limitations associated with VPNs, we propose an approach that allows straightforward filtering. Our approach provides evidence a remote user belongs in a network, despite the address sharing present in tools like Carrier-Grade Network Address Translation. We preserve simple access control and eliminate the need for VPN servers, redundant cryptography, and VPN packet headers overheads. The approach is incrementally deployable and provides a second factor for authenticating users and systems while minimizing performance overheads.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133461743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Lack of Anonymity of Anonymized Smart Meter Data: An Empiric Study 匿名化智能电表数据缺乏匿名性的实证研究
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314798
Aljoscha Dietrich, Dominik Leibenger, Christoph Sorge
After over a decade of research into the privacy of smart meters, the sensitivity of an individual household’s fine-grained energy readings is undisputed. A plethora of research contributions aim at protecting the privacy of end users while at the same time providing the energy supplier (and others) with sufficient data for safe operation, billing, and also forecasting purposes. The transmission of fine-grained readings is generally considered acceptable as long as they cannot be linked to the households they originate from (i.e., anonymized readings).Martinez et al. just recently pointed out that the typical provision of aggregated readings at the end of a billing period could compromise this anonymity, as the individual readings must sum up to the respective aggregate. In this short paper, we complement their research by examining the privacy implications of published aggregates of previously anonymized energy readings:We simulate attacks on a real world data set (Smart*), particularly investigating the implications of different parameter combinations such as aggregation group sizes, considered time spans, and reading precision to gain insights into theoretic risks, e.g., from an incautious choice of parameters.
在对智能电表的隐私进行了十多年的研究之后,单个家庭精细的能源读数的敏感性是无可争议的。大量的研究贡献旨在保护最终用户的隐私,同时为能源供应商(和其他人)提供足够的数据,用于安全运行、计费和预测目的。细粒度读数的传输通常被认为是可以接受的,只要它们不能与它们的来源家庭联系起来(即匿名读数)。马丁内斯等人最近指出,在结算期结束时提供汇总读数的典型做法可能会损害这种匿名性,因为每个读数必须之和为各自的汇总。在这篇简短的论文中,我们通过检查先前匿名能量读数的已发布聚合的隐私含义来补充他们的研究:我们模拟对真实世界数据集(Smart*)的攻击,特别是调查不同参数组合的含义,如聚合组大小,考虑的时间跨度和阅读精度,以获得对理论风险的见解,例如,从不谨慎的参数选择。
{"title":"On the Lack of Anonymity of Anonymized Smart Meter Data: An Empiric Study","authors":"Aljoscha Dietrich, Dominik Leibenger, Christoph Sorge","doi":"10.1109/LCN48667.2020.9314798","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314798","url":null,"abstract":"After over a decade of research into the privacy of smart meters, the sensitivity of an individual household’s fine-grained energy readings is undisputed. A plethora of research contributions aim at protecting the privacy of end users while at the same time providing the energy supplier (and others) with sufficient data for safe operation, billing, and also forecasting purposes. The transmission of fine-grained readings is generally considered acceptable as long as they cannot be linked to the households they originate from (i.e., anonymized readings).Martinez et al. just recently pointed out that the typical provision of aggregated readings at the end of a billing period could compromise this anonymity, as the individual readings must sum up to the respective aggregate. In this short paper, we complement their research by examining the privacy implications of published aggregates of previously anonymized energy readings:We simulate attacks on a real world data set (Smart*), particularly investigating the implications of different parameter combinations such as aggregation group sizes, considered time spans, and reading precision to gain insights into theoretic risks, e.g., from an incautious choice of parameters.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Inference in Social Networks from Ultra-Sparse Distance Measurements via Pretrained Hadamard Autoencoders 基于预训练Hadamard自编码器的超稀疏距离测量在社交网络中的推断
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314769
G. Mahindre, Rasika Karkare, R. Paffenroth, A. Jayasumana
Analysis of large-scale networks is hampered by limited data as complete network measurements are expensive or impossible to collect. We present an autoencoder based technique paired with pretraining, to predict missing topology information in ultra-sparsely sampled social networks. Randomly generated variations of Barabási-Albert and power law cluster graphs are used to pretrain a Hadamard Autoencoder. Pretrained neural network is then used to infer distances in social networks where only a very small fraction of intra-node distances are available. Model is evaluated on variations of Barabási-Albert and Powerlaw cluster graphs as well as on a real-world Facebook network. Results are compared with a deterministic Low-rank Matrix Completion (LMC) method as well as an autoencoder trained on partially observed data from the test-network. Results show that pretrained autoencoder far outperforms LMC when the number of distance samples available is less than 1%, while being competitive for higher fraction of samples.
对大规模网络的分析受到有限数据的阻碍,因为完整的网络测量是昂贵的或不可能收集的。我们提出了一种基于自编码器的技术与预训练相结合,以预测超稀疏抽样社会网络中缺失的拓扑信息。随机生成的Barabási-Albert和幂律聚类图的变化用于预训练Hadamard自编码器。然后使用预训练的神经网络来推断只有很小一部分节点内距离可用的社交网络中的距离。模型在Barabási-Albert和Powerlaw聚类图的变化以及真实的Facebook网络上进行了评估。结果与确定性低秩矩阵补全(LMC)方法以及基于测试网络部分观测数据训练的自编码器进行了比较。结果表明,当可用距离样本数小于1%时,预训练自编码器的性能远远优于LMC,而对于更高比例的样本,预训练自编码器具有竞争力。
{"title":"Inference in Social Networks from Ultra-Sparse Distance Measurements via Pretrained Hadamard Autoencoders","authors":"G. Mahindre, Rasika Karkare, R. Paffenroth, A. Jayasumana","doi":"10.1109/LCN48667.2020.9314769","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314769","url":null,"abstract":"Analysis of large-scale networks is hampered by limited data as complete network measurements are expensive or impossible to collect. We present an autoencoder based technique paired with pretraining, to predict missing topology information in ultra-sparsely sampled social networks. Randomly generated variations of Barabási-Albert and power law cluster graphs are used to pretrain a Hadamard Autoencoder. Pretrained neural network is then used to infer distances in social networks where only a very small fraction of intra-node distances are available. Model is evaluated on variations of Barabási-Albert and Powerlaw cluster graphs as well as on a real-world Facebook network. Results are compared with a deterministic Low-rank Matrix Completion (LMC) method as well as an autoencoder trained on partially observed data from the test-network. Results show that pretrained autoencoder far outperforms LMC when the number of distance samples available is less than 1%, while being competitive for higher fraction of samples.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125444429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Traffic Shifting based Resource Optimization in Aggregated IoT Communication 基于流量转移的聚合物联网通信资源优化
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314781
Amirahmad Chapnevis, Ismail Güvenç, E. Bulut
Aggregated Internet of Things (IoT) communication aims to use core network resources efficiently by providing cellular access to a group of IoT devices over the same subscriber identity. Leveraging the low data rates and long data sending intervals of IoT devices, several of the IoT devices in the same serving area of the core network are grouped together and take turns to send their data to their servers without causing overlaps in their communication. In this paper, we take this approach further and benefiting from the flexibility in data sending schedules, we aim to increase savings in cellular resources by shifting (delaying or performing earlier) the regular traffic patterns of IoT devices slightly. To this end, we consider two different traffic shifting models, namely, consistent and inconsistent shifting. We first solve the optimal aggregation of IoT devices under each model by using Integer Linear Programming (ILP). In order to avoid the high complexity of ILP solution, we then develop a heuristic based solution that runs in polynomial time. Through simulations, we show that heuristic based solution provides close to optimal results in various scenarios and shifting based aggregated communication offers more resource optimization (i.e., smaller number of bearers needed to connect all IoT devices) than the aggregated communication with no shifting.
聚合物联网(IoT)通信旨在通过相同用户身份向一组物联网设备提供蜂窝访问,从而有效地利用核心网络资源。利用物联网设备的低数据速率和长数据发送间隔,核心网同一服务区域的多个物联网设备分组在一起,轮流将数据发送到服务器,而不会导致通信重叠。在本文中,我们进一步采用这种方法,并受益于数据发送计划的灵活性,我们的目标是通过稍微改变(延迟或提前执行)物联网设备的常规流量模式来增加蜂窝资源的节省。为此,我们考虑了两种不同的交通转移模型,即一致转移和不一致转移。首先利用整数线性规划(ILP)求解各模型下物联网设备的最优聚合。为了避免ILP解决方案的高复杂性,我们随后开发了一个基于启发式的解决方案,该解决方案在多项式时间内运行。通过模拟,我们发现基于启发式的解决方案在各种场景下提供了接近最优的结果,基于移位的聚合通信提供了更多的资源优化(即,连接所有物联网设备所需的承载数量更少),而不是没有移位的聚合通信。
{"title":"Traffic Shifting based Resource Optimization in Aggregated IoT Communication","authors":"Amirahmad Chapnevis, Ismail Güvenç, E. Bulut","doi":"10.1109/LCN48667.2020.9314781","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314781","url":null,"abstract":"Aggregated Internet of Things (IoT) communication aims to use core network resources efficiently by providing cellular access to a group of IoT devices over the same subscriber identity. Leveraging the low data rates and long data sending intervals of IoT devices, several of the IoT devices in the same serving area of the core network are grouped together and take turns to send their data to their servers without causing overlaps in their communication. In this paper, we take this approach further and benefiting from the flexibility in data sending schedules, we aim to increase savings in cellular resources by shifting (delaying or performing earlier) the regular traffic patterns of IoT devices slightly. To this end, we consider two different traffic shifting models, namely, consistent and inconsistent shifting. We first solve the optimal aggregation of IoT devices under each model by using Integer Linear Programming (ILP). In order to avoid the high complexity of ILP solution, we then develop a heuristic based solution that runs in polynomial time. Through simulations, we show that heuristic based solution provides close to optimal results in various scenarios and shifting based aggregated communication offers more resource optimization (i.e., smaller number of bearers needed to connect all IoT devices) than the aggregated communication with no shifting.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116100310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Bounding Path Exposure in Energy Harvesting Wireless Sensor Networks Using Pathsets and Cutsets 基于路径集和割集的能量采集无线传感器网络边界路径暴露
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314847
Abdulsalam Basabaa, E. Elmallah
In this work, we consider a fundamental wireless sensor network (WSN) problem where the network is deployed to guard against unauthorized traversal along a given path. Nodes are assumed to utilize energy harvesting from the ambient environment, and fluctuations in a node’s energy are assumed to affect its transmission range. In this context, we investigate a problem called the path exposure with range uncertainty (EXPO-RU) problem that asks for the likelihood that the EH-WSN can provide joint detection and reporting of the traversal. The problem models the EH-WSN using a probabilistic graph where each node is associated with multiple possible states. We present algorithms for deriving lower and upper bounds from operating and failed network configurations, respectively. We discuss properties of the presented methods, present numerical results that illustrate their usefulness, and draw remarks on the obtained numerical results.
在这项工作中,我们考虑了一个基本的无线传感器网络(WSN)问题,其中网络的部署是为了防止沿着给定路径的未经授权的穿越。假设节点利用从周围环境中收集的能量,假设节点能量的波动会影响其传输范围。在这种情况下,我们研究了一个名为路径暴露与距离不确定性(EXPO-RU)问题,该问题要求EH-WSN能够提供联合检测和报告遍历的可能性。该问题使用概率图对EH-WSN进行建模,其中每个节点与多个可能的状态相关联。我们分别给出了从运行和失败的网络配置中推导下界和上界的算法。我们讨论了所提出的方法的性质,给出了数值结果来说明它们的有效性,并对所得到的数值结果作了评论。
{"title":"Bounding Path Exposure in Energy Harvesting Wireless Sensor Networks Using Pathsets and Cutsets","authors":"Abdulsalam Basabaa, E. Elmallah","doi":"10.1109/LCN48667.2020.9314847","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314847","url":null,"abstract":"In this work, we consider a fundamental wireless sensor network (WSN) problem where the network is deployed to guard against unauthorized traversal along a given path. Nodes are assumed to utilize energy harvesting from the ambient environment, and fluctuations in a node’s energy are assumed to affect its transmission range. In this context, we investigate a problem called the path exposure with range uncertainty (EXPO-RU) problem that asks for the likelihood that the EH-WSN can provide joint detection and reporting of the traversal. The problem models the EH-WSN using a probabilistic graph where each node is associated with multiple possible states. We present algorithms for deriving lower and upper bounds from operating and failed network configurations, respectively. We discuss properties of the presented methods, present numerical results that illustrate their usefulness, and draw remarks on the obtained numerical results.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126031607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Bottleneck Use of PIE or FQ-CoDel Active Queue Management During DASH-like Content Streaming 在类dash内容流中使用PIE或FQ-CoDel主动队列管理检测瓶颈
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314804
Jonathan Kua, P. Branch, G. Armitage
Dynamic Adaptive Streaming over HTTP (DASH) is a widely adopted standard for delivering high Quality of Experience (QoE) for consumer video streaming applications. The progressive deployment of Active Queue Management (AQM) schemes – such as PIE and FQ-CoDel – at ISP bottlenecks or home gateways means that consumers’ video streams are increasingly impacted by such AQM schemes. However, many existing approaches do not consider adjusting streaming strategies based on the bottleneck queue types. We have previously demonstrated the benefits of AQM schemes for DASH video streams, and proposed adaptive chunklets for an improved streaming performance. In this paper, we demonstrate the problems of queue-agnostic streaming and propose a queue-detection technique during DASH-like streaming. This entirely client-side and application-level technique is capable of detecting likely FIFO, PIE and FQ-CoDel AQM schemes at network bottlenecks.
基于HTTP的动态自适应流(DASH)是一种广泛采用的标准,用于为消费者视频流应用程序提供高质量的体验(QoE)。主动队列管理(AQM)方案(如PIE和FQ-CoDel)在ISP瓶颈或家庭网关的逐步部署意味着消费者的视频流越来越多地受到此类AQM方案的影响。然而,许多现有的方法没有考虑根据瓶颈队列类型调整流策略。我们之前已经展示了AQM方案对DASH视频流的好处,并提出了自适应小块来提高流性能。在本文中,我们演示了队列不可知流的问题,并提出了一种在类dash流过程中的队列检测技术。这种完全的客户端和应用级技术能够在网络瓶颈处检测可能的FIFO, PIE和FQ-CoDel AQM方案。
{"title":"Detecting Bottleneck Use of PIE or FQ-CoDel Active Queue Management During DASH-like Content Streaming","authors":"Jonathan Kua, P. Branch, G. Armitage","doi":"10.1109/LCN48667.2020.9314804","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314804","url":null,"abstract":"Dynamic Adaptive Streaming over HTTP (DASH) is a widely adopted standard for delivering high Quality of Experience (QoE) for consumer video streaming applications. The progressive deployment of Active Queue Management (AQM) schemes – such as PIE and FQ-CoDel – at ISP bottlenecks or home gateways means that consumers’ video streams are increasingly impacted by such AQM schemes. However, many existing approaches do not consider adjusting streaming strategies based on the bottleneck queue types. We have previously demonstrated the benefits of AQM schemes for DASH video streams, and proposed adaptive chunklets for an improved streaming performance. In this paper, we demonstrate the problems of queue-agnostic streaming and propose a queue-detection technique during DASH-like streaming. This entirely client-side and application-level technique is capable of detecting likely FIFO, PIE and FQ-CoDel AQM schemes at network bottlenecks.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128172295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Celosia: An Immune-Inspired Anomaly Detection Framework for IoT Devices Celosia:用于物联网设备的免疫启发异常检测框架
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314839
Kashif Naveed, Hui Wu
IoT devices are becoming ubiquitous because of the advent of smart cities and vulnerable to a large number of powerful and sophisticated attacks that can potentially paralyze whole cities. There is a need to develop anomaly detection systems that can work on the same principles as the immune system to continuously learn to detect attacks that are not yet discovered. We present a dynamic framework, Celosia, that is inspired by the immune system offering good accuracy and high performance with minimal human intervention. Celosia employs a continuous learning process to detect abnormal behaviors that are yet to be discovered. It also provides a mechanism to manually define normal and anomalous entities to minimize errors. Celosia provides a layered defence and employs several agents performing their dedicated tasks. Experimental results demonstrate the power and capabilities of this framework, making it an ideal candidate for IoT devices.
由于智慧城市的出现,物联网设备变得无处不在,容易受到大量强大而复杂的攻击,这些攻击可能会使整个城市瘫痪。有必要开发异常检测系统,它可以按照与免疫系统相同的原理工作,不断学习检测尚未发现的攻击。我们提出了一种动态框架,Celosia,它的灵感来自免疫系统,提供了良好的准确性和高性能,最小的人为干预。Celosia采用持续的学习过程来检测尚未发现的异常行为。它还提供了一种手动定义正常和异常实体的机制,以尽量减少错误。Celosia提供了分层防御,并雇用了几名特工执行他们的专门任务。实验结果证明了该框架的强大功能,使其成为物联网设备的理想候选者。
{"title":"Celosia: An Immune-Inspired Anomaly Detection Framework for IoT Devices","authors":"Kashif Naveed, Hui Wu","doi":"10.1109/LCN48667.2020.9314839","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314839","url":null,"abstract":"IoT devices are becoming ubiquitous because of the advent of smart cities and vulnerable to a large number of powerful and sophisticated attacks that can potentially paralyze whole cities. There is a need to develop anomaly detection systems that can work on the same principles as the immune system to continuously learn to detect attacks that are not yet discovered. We present a dynamic framework, Celosia, that is inspired by the immune system offering good accuracy and high performance with minimal human intervention. Celosia employs a continuous learning process to detect abnormal behaviors that are yet to be discovered. It also provides a mechanism to manually define normal and anomalous entities to minimize errors. Celosia provides a layered defence and employs several agents performing their dedicated tasks. Experimental results demonstrate the power and capabilities of this framework, making it an ideal candidate for IoT devices.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130308069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 IEEE 45th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1