首页 > 最新文献

2010 Proceedings IEEE INFOCOM最新文献

英文 中文
P-Coding: Secure Network Coding against Eavesdropping Attacks p -编码:防止窃听攻击的安全网络编码
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462050
Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin Shen
Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdropping attacks, by which an adversary may compromise the confidentiality of message content. Existing studies mainly deal with eavesdroppers that can intercept a lim-ited number of packets. However, real scenarios often consist of more capable adversaries, e.g., global eavesdroppers, which can defeat these techniques. In this paper, we propose P-Coding, a novel security scheme against eavesdropping attacks in network coding. With the lightweight permutation encryption performed on each message and its coding vector, P-Coding can efficiently thwart global eavesdroppers in a transparent way. Moreover, P-Coding is also featured in scalability and robustness, which enable it to be integrated into practical network coded systems. Security analysis and simulation results demonstrate the efficacy and efficiency of the P-Coding scheme.
网络编码虽然提供了内在的保密性,但仍然容易受到窃听攻击,攻击者可以通过窃听攻击破坏消息内容的保密性。现有的研究主要针对的是能够截获有限数量数据包的窃听器。然而,真实的场景通常包含更有能力的对手,例如,全球窃听者,可以击败这些技术。本文提出了一种新的网络编码防窃听安全方案——p -编码。通过对每条消息及其编码向量进行轻量级排列加密,p -编码可以以透明的方式有效地阻止全局窃听者。此外,p编码还具有可扩展性和鲁棒性,使其能够集成到实际的网络编码系统中。安全性分析和仿真结果验证了p -编码方案的有效性和高效性。
{"title":"P-Coding: Secure Network Coding against Eavesdropping Attacks","authors":"Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin Shen","doi":"10.1109/INFCOM.2010.5462050","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462050","url":null,"abstract":"Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdropping attacks, by which an adversary may compromise the confidentiality of message content. Existing studies mainly deal with eavesdroppers that can intercept a lim-ited number of packets. However, real scenarios often consist of more capable adversaries, e.g., global eavesdroppers, which can defeat these techniques. In this paper, we propose P-Coding, a novel security scheme against eavesdropping attacks in network coding. With the lightweight permutation encryption performed on each message and its coding vector, P-Coding can efficiently thwart global eavesdroppers in a transparent way. Moreover, P-Coding is also featured in scalability and robustness, which enable it to be integrated into practical network coded systems. Security analysis and simulation results demonstrate the efficacy and efficiency of the P-Coding scheme.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123002020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Optimal SINR-based Random Access 基于最优sinr的随机存取
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462065
Hamed Mohsenian Rad, V. Wong, R. Schober
Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not accurate and particularly it cannot account for aggregate interference from multiple interference sources. In this paper, we use the more accurate physical model, which is based on the signal-to-interference-plus-noise-ratio (SINR), to study optimization-based design in wireless random access systems, where the optimization variables are the transmission probabilities of the users. We focus on throughput maximization, fair resource allocation, and network utility maximization, and show that they entail non-convex optimization problems if the physical model is adopted. We propose two schemes to solve these problems. The first design is centralized and leads to the global optimal solution using a sum-of-squares technique. However, due to its complexity, this approach is only applicable to small-scale networks. The second design is distributed and leads to a close-to-optimal solution using the coordinate ascent method. This approach is applicable to medium-size and large-scale networks. Based on various simulations, we show that it is highly preferable to use the physical model for optimization-based random access design. In this regard, even a sub-optimal design based on the physical model can achieve a significantly better performance than an optimal design based on the inaccurate protocol model.
随机访问协议(如Aloha)通常在无线自组织网络中使用协议模型进行建模。然而,众所周知,协议模型并不准确,特别是它不能考虑来自多个干扰源的聚合干扰。本文采用基于信噪比(SINR)的更精确的物理模型来研究无线随机接入系统的优化设计,其中优化变量为用户的传输概率。我们关注吞吐量最大化、公平资源分配和网络效用最大化,并表明如果采用物理模型,它们会导致非凸优化问题。我们提出两个方案来解决这些问题。第一种设计是集中式的,使用平方和技术得到全局最优解。但由于其复杂性,该方法仅适用于小规模网络。第二种设计是分布式的,采用坐标上升法得到接近最优解。该方法适用于大中型网络。基于各种仿真,我们证明了在基于优化的随机访问设计中使用物理模型是非常可取的。在这方面,即使是基于物理模型的次优设计也能比基于不准确的协议模型的最优设计获得更好的性能。
{"title":"Optimal SINR-based Random Access","authors":"Hamed Mohsenian Rad, V. Wong, R. Schober","doi":"10.1109/INFCOM.2010.5462065","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462065","url":null,"abstract":"Random access protocols, such as Aloha, are commonly modeled in wireless ad-hoc networks by using the protocol model. However, it is well-known that the protocol model is not accurate and particularly it cannot account for aggregate interference from multiple interference sources. In this paper, we use the more accurate physical model, which is based on the signal-to-interference-plus-noise-ratio (SINR), to study optimization-based design in wireless random access systems, where the optimization variables are the transmission probabilities of the users. We focus on throughput maximization, fair resource allocation, and network utility maximization, and show that they entail non-convex optimization problems if the physical model is adopted. We propose two schemes to solve these problems. The first design is centralized and leads to the global optimal solution using a sum-of-squares technique. However, due to its complexity, this approach is only applicable to small-scale networks. The second design is distributed and leads to a close-to-optimal solution using the coordinate ascent method. This approach is applicable to medium-size and large-scale networks. Based on various simulations, we show that it is highly preferable to use the physical model for optimization-based random access design. In this regard, even a sub-optimal design based on the physical model can achieve a significantly better performance than an optimal design based on the inaccurate protocol model.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121885686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Opportunistic Spectrum Access with Multiple Users: Learning under Competition 多用户的机会频谱接入:竞争下的学习
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462144
Anima Anandkumar, Nithin Michael, A. Tang
The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initially unknown to the secondary users and are learnt via sensing samples. Two distributed learning and allocation schemes which maximize the cognitive system throughput or equivalently minimize the total regret in distributed learning and allocation are proposed. The first scheme assumes minimal prior information in terms of pre-allocated ranks for secondary users while the second scheme is fully distributed and assumes no such prior information. The two schemes have sum regret which is provably logarithmic in the number of sensing time slots. A lower bound is derived for any learning scheme which is asymptotically logarithmic in the number of slots. Hence, our schemes achieve asymptotic order optimality in terms of regret in distributed learning and allocation.
考虑了以认知系统吞吐量最大化为目标的多辅助用户协同分配问题。信道可用性统计数据最初对次要用户是未知的,并通过传感样本学习。提出了两种分布式学习和分配方案,即在分布式学习和分配中使认知系统吞吐量最大化或总遗憾最小化。第一种方案假定次要用户的预分配秩方面的最小先验信息,而第二种方案是完全分布的,并且假定没有这种先验信息。这两种方案在感知时隙的数量上具有可证明的对数和遗憾。对于槽数渐近对数的任何学习方案,都导出了下界。因此,在分布式学习和分配中,我们的方案在遗憾度方面实现了渐近阶最优性。
{"title":"Opportunistic Spectrum Access with Multiple Users: Learning under Competition","authors":"Anima Anandkumar, Nithin Michael, A. Tang","doi":"10.1109/INFCOM.2010.5462144","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462144","url":null,"abstract":"The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initially unknown to the secondary users and are learnt via sensing samples. Two distributed learning and allocation schemes which maximize the cognitive system throughput or equivalently minimize the total regret in distributed learning and allocation are proposed. The first scheme assumes minimal prior information in terms of pre-allocated ranks for secondary users while the second scheme is fully distributed and assumes no such prior information. The two schemes have sum regret which is provably logarithmic in the number of sensing time slots. A lower bound is derived for any learning scheme which is asymptotically logarithmic in the number of slots. Hence, our schemes achieve asymptotic order optimality in terms of regret in distributed learning and allocation.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 184
Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks 机会频谱接入网中的真实最小价格路径路由
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461945
Tao Shu, M. Krunz
We study the problem of finding the least-priced path (LPP) between a source and a destination in opportunistic spectrum access (OSA) networks. This problem is motivated by economic considerations, whereby spectrum opportunities are sold/leased to secondary radios (SRs). This incurs a communication cost, e.g., for traffic relaying. As the beneficiary of these services, the end user must compensate the service-providing SRs for their spectrum cost. To give an incentive (i.e., profit) for SRs to report their true cost, typically the payment to a SR should be higher than the actual cost. However, from an end user's perspective, unnecessary overpayment should be avoided. So we are interested in the optimal route selection and payment determination mechanism that minimizes the price tag of the selected route and at the same time guarantees truthful cost reports from SRs. This setup is in contrast to the conventional truthful least-cost path (LCP) problem, where the interest is to find the minimum-cost route. The LPP problem is investigated with and without capacity constraints at individual SRs. For both cases, our algorithmic solutions can be executed in polynomial time. The effectiveness of our algorithms in terms of price saving is verified through extensive simulations.
研究了机会频谱接入(OSA)网络中源端和目标端之间的最低价格路径(LPP)问题。这个问题是由经济考虑引起的,因此频谱机会被出售/租赁给二级无线电(SRs)。这就产生了通信成本,例如流量中继。作为这些业务的受益者,终端用户必须补偿提供业务的sr的频谱成本。为了激励SR报告其真实成本(即利润),通常支付给SR的费用应该高于实际成本。然而,从最终用户的角度来看,应该避免不必要的多付。因此,我们对最优路线选择和支付决定机制感兴趣,该机制可以使所选路线的价格标签最小化,同时保证sr的真实成本报告。这种设置与传统的真实最小代价路径(LCP)问题相反,LCP问题的目的是找到最小代价路径。研究了在单个srr上有和没有容量约束的LPP问题。对于这两种情况,我们的算法解决方案可以在多项式时间内执行。通过大量的仿真验证了我们的算法在节省价格方面的有效性。
{"title":"Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks","authors":"Tao Shu, M. Krunz","doi":"10.1109/INFCOM.2010.5461945","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461945","url":null,"abstract":"We study the problem of finding the least-priced path (LPP) between a source and a destination in opportunistic spectrum access (OSA) networks. This problem is motivated by economic considerations, whereby spectrum opportunities are sold/leased to secondary radios (SRs). This incurs a communication cost, e.g., for traffic relaying. As the beneficiary of these services, the end user must compensate the service-providing SRs for their spectrum cost. To give an incentive (i.e., profit) for SRs to report their true cost, typically the payment to a SR should be higher than the actual cost. However, from an end user's perspective, unnecessary overpayment should be avoided. So we are interested in the optimal route selection and payment determination mechanism that minimizes the price tag of the selected route and at the same time guarantees truthful cost reports from SRs. This setup is in contrast to the conventional truthful least-cost path (LCP) problem, where the interest is to find the minimum-cost route. The LPP problem is investigated with and without capacity constraints at individual SRs. For both cases, our algorithmic solutions can be executed in polynomial time. The effectiveness of our algorithms in terms of price saving is verified through extensive simulations.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":" 36","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks 各向异性传感器网络中虚拟标尺的构造距离估计
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461928
Yun Wang, Kai Li, Jie Wu
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in sensor networks. Compared with isotropic networks, anisotropic networks are more intractable in that their properties vary according to the directions of measurement. Anisotropic properties result from various factors, such as geographic shapes, irregular radio patterns, node densities, and impacts from obstacles. In this paper, we study the problem of measuring irregularity of sensor networks and evaluating its impact on distance estimation. In particular, we establish a new metric to measure irregularity along a path in sensor networks, and identify turning nodes where a considered path is inflected. Furthermore, we develop an approach to construct a virtual ruler for distance estimation between any pair of sensor nodes. The construction of a virtual ruler is carried out according to distance measurements among beacon nodes. However, it does not require beacon nodes to be deployed uniformly throughout sensor networks. Compared with existing methods, our approach neither assumes global knowledge of boundary recognition nor relies on uniform distribution of beacon nodes. Therefore, this approach is robust and applicable in practical environments. Simulation results show that our approach outperforms some previous methods, such as DVDistance and PDM.
距离估计是无线传感器网络许多功能的基础,近年来得到了广泛的研究。距离估计的一个关键挑战是处理传感器网络中的各向异性问题。与各向同性网络相比,各向异性网络由于其性质随测量方向的不同而变化,因此更加难以处理。各向异性是由多种因素造成的,如地理形状、不规则射电模式、节点密度和障碍物的影响。本文研究了传感器网络不规则性的测量问题,并评估了其对距离估计的影响。特别是,我们建立了一个新的度量来测量传感器网络中沿路径的不规则性,并识别考虑路径弯曲的转弯节点。此外,我们还提出了一种构造虚拟标尺的方法来估计任意对传感器节点之间的距离。根据信标节点间的距离测量来构造虚拟标尺。然而,它不要求信标节点在整个传感器网络中统一部署。与现有方法相比,我们的方法既不假设边界识别的全局知识,也不依赖于信标节点的均匀分布。因此,该方法健壮且适用于实际环境。仿真结果表明,该方法优于现有的DVDistance和PDM方法。
{"title":"Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks","authors":"Yun Wang, Kai Li, Jie Wu","doi":"10.1109/INFCOM.2010.5461928","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461928","url":null,"abstract":"Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in sensor networks. Compared with isotropic networks, anisotropic networks are more intractable in that their properties vary according to the directions of measurement. Anisotropic properties result from various factors, such as geographic shapes, irregular radio patterns, node densities, and impacts from obstacles. In this paper, we study the problem of measuring irregularity of sensor networks and evaluating its impact on distance estimation. In particular, we establish a new metric to measure irregularity along a path in sensor networks, and identify turning nodes where a considered path is inflected. Furthermore, we develop an approach to construct a virtual ruler for distance estimation between any pair of sensor nodes. The construction of a virtual ruler is carried out according to distance measurements among beacon nodes. However, it does not require beacon nodes to be deployed uniformly throughout sensor networks. Compared with existing methods, our approach neither assumes global knowledge of boundary recognition nor relies on uniform distribution of beacon nodes. Therefore, this approach is robust and applicable in practical environments. Simulation results show that our approach outperforms some previous methods, such as DVDistance and PDM.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Universal Rigidity: Towards Accurate and Efficient Localization of Wireless Networks 通用刚性:实现无线网络精确高效的定位
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462057
Zhisu Zhu, A. M. So, Y. Ye
A fundamental problem in wireless ad-hoc and sensor networks is that of determining the positions of nodes. Often, such a problem is complicated by the presence of nodes whose positions cannot be uniquely determined. Most existing work uses the notion of global rigidity from rigidity theory to address the non-uniqueness issue. However, such a notion is not entirely satisfactory, as it has been shown that even if a network localization instance is known to be globally rigid, the problem of determining the node positions is still intractable in general. In this paper, we propose to use the notion of universal rigidity to bridge such disconnect. Although the notion of universal rigidity is more restrictive than that of global rigidity, it captures a large class of networks and is much more relevant to the efficient solvability of the network localization problem. Specifically, we show that both the problem of deciding whether a given network localization instance is universally rigid and the problem of determining the node positions of a universally rigid instance can be solved efficiently using semidefinite programming (SDP). Then, we give various constructions of universally rigid instances. In particular, we show that trilateration graphs are generically universally rigid, thus demonstrating not only the richness of the class of universally rigid instances, but also the fact that trilateration graphs possess much stronger geometric properties than previously known. Finally, we apply our results to design a novel edge sparsification heuristic that can reduce the size of the input network while provably preserving its original localization properties. One of the applications of such heuristic is to speed up existing convex optimization-based localization algorithms. Simulation results show that our speedup approach compares very favorably with existing ones, both in terms of accuracy and computation time.
无线自组网和传感器网络中的一个基本问题是确定节点的位置。通常,由于存在不能唯一确定位置的节点,这样的问题会变得复杂。大多数现有的工作使用刚性理论的全局刚性的概念来解决非唯一性问题。然而,这样的概念并不完全令人满意,因为已经证明,即使已知网络定位实例是全局刚性的,确定节点位置的问题通常仍然难以解决。在本文中,我们建议使用普遍刚性的概念来弥合这种脱节。尽管普遍刚性的概念比全局刚性的概念更具限制性,但它捕获了一大类网络,并且与网络定位问题的有效可解性更相关。具体来说,我们证明了用半确定规划(SDP)可以有效地解决确定给定网络定位实例是否为普遍刚性的问题和确定普遍刚性实例的节点位置的问题。然后,我们给出了普遍刚性实例的各种构造。特别是,我们证明了三边图是一般普遍刚性的,从而不仅证明了一类普遍刚性实例的丰富性,而且证明了三边图具有比以前已知的更强的几何性质。最后,我们应用我们的结果设计了一种新的边缘稀疏化启发式算法,可以减少输入网络的大小,同时可以证明保留其原始的定位属性。这种启发式算法的一个应用是提高现有的基于凸优化的定位算法的速度。仿真结果表明,我们的加速方法在精度和计算时间上都优于现有的加速方法。
{"title":"Universal Rigidity: Towards Accurate and Efficient Localization of Wireless Networks","authors":"Zhisu Zhu, A. M. So, Y. Ye","doi":"10.1109/INFCOM.2010.5462057","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462057","url":null,"abstract":"A fundamental problem in wireless ad-hoc and sensor networks is that of determining the positions of nodes. Often, such a problem is complicated by the presence of nodes whose positions cannot be uniquely determined. Most existing work uses the notion of global rigidity from rigidity theory to address the non-uniqueness issue. However, such a notion is not entirely satisfactory, as it has been shown that even if a network localization instance is known to be globally rigid, the problem of determining the node positions is still intractable in general. In this paper, we propose to use the notion of universal rigidity to bridge such disconnect. Although the notion of universal rigidity is more restrictive than that of global rigidity, it captures a large class of networks and is much more relevant to the efficient solvability of the network localization problem. Specifically, we show that both the problem of deciding whether a given network localization instance is universally rigid and the problem of determining the node positions of a universally rigid instance can be solved efficiently using semidefinite programming (SDP). Then, we give various constructions of universally rigid instances. In particular, we show that trilateration graphs are generically universally rigid, thus demonstrating not only the richness of the class of universally rigid instances, but also the fact that trilateration graphs possess much stronger geometric properties than previously known. Finally, we apply our results to design a novel edge sparsification heuristic that can reduce the size of the input network while provably preserving its original localization properties. One of the applications of such heuristic is to speed up existing convex optimization-based localization algorithms. Simulation results show that our speedup approach compares very favorably with existing ones, both in terms of accuracy and computation time.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130109558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Resource Allocation in Multi-cell OFDMA-based Relay Networks 基于ofdma的多小区中继网络中的资源分配
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462037
Yao Hua, Qian Zhang, Z. Niu
Cooperative relay networks combined with Orthogonal Frequency Division Multiplexing Access (OFDMA) technology has been widely recognized as a promising candidate for future cellular infrastructure due to the performance enhancement by flexible resource allocation schemes. The majority of the existing schemes aim to optimize single cell performance gain. However, the higher frequency reuse factor and smaller cell size requirement lead to severe inter-cell interference problem. Therefore, the multi-cell resource allocation of subcarrier, time scheduling and power should be jointly considered to alleviate the severe inter-cell interference problem. In this paper, the joint resource allocation problem is formulated. Considering the high complexity of the optimal solution, a two-stage resource allocation scheme is proposed. In the first stage, all of the users in each cell are selected sequentially and the joint subcarrier allocation and scheduling is conducted for the selected users without considering the interference. In the second stage, the optimal power control is performed by geometric programming method. Simulation results show that the proposed the interference-aware resource allocation scheme improves the system capacity compared with existing schemes. Especially, the edge users achieve more benefit.
结合正交频分复用接入(OFDMA)技术的协同中继网络由于其灵活的资源分配方案提高了性能,已被广泛认为是未来蜂窝基础设施的一个有前途的候选网络。现有的大多数方案旨在优化单个单元的性能增益。然而,较高的频率复用系数和较小的小区尺寸要求导致了严重的小区间干扰问题。因此,应综合考虑子载波的多小区资源分配、时间调度和功率等问题,以缓解严重的小区间干扰问题。本文提出了联合资源分配问题。考虑到最优解的复杂性,提出了一种两阶段资源分配方案。第一阶段,在不考虑干扰的情况下,依次选择每个小区中的所有用户,对所选用户进行联合子载波分配和调度;第二阶段采用几何规划方法进行最优功率控制。仿真结果表明,与现有方案相比,提出的干扰感知资源分配方案提高了系统容量。特别是边缘用户获得了更多的利益。
{"title":"Resource Allocation in Multi-cell OFDMA-based Relay Networks","authors":"Yao Hua, Qian Zhang, Z. Niu","doi":"10.1109/INFCOM.2010.5462037","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462037","url":null,"abstract":"Cooperative relay networks combined with Orthogonal Frequency Division Multiplexing Access (OFDMA) technology has been widely recognized as a promising candidate for future cellular infrastructure due to the performance enhancement by flexible resource allocation schemes. The majority of the existing schemes aim to optimize single cell performance gain. However, the higher frequency reuse factor and smaller cell size requirement lead to severe inter-cell interference problem. Therefore, the multi-cell resource allocation of subcarrier, time scheduling and power should be jointly considered to alleviate the severe inter-cell interference problem. In this paper, the joint resource allocation problem is formulated. Considering the high complexity of the optimal solution, a two-stage resource allocation scheme is proposed. In the first stage, all of the users in each cell are selected sequentially and the joint subcarrier allocation and scheduling is conducted for the selected users without considering the interference. In the second stage, the optimal power control is performed by geometric programming method. Simulation results show that the proposed the interference-aware resource allocation scheme improves the system capacity compared with existing schemes. Especially, the edge users achieve more benefit.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129306433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Non-asymptotic Delay Bounds for Networks with Heavy-Tailed Traffic 重尾流量网络的非渐近延迟界
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461913
J. Liebeherr, A. Burchard, F. Ciucu
Traffic with self-similar and heavy-tailed characteristics has been widely reported in networks, yet, only few analytical results are available for predicting the delay performance of such networks. We address a particularly difficult type of heavy-tailed traffic where only the first moment can be computed, and present the first non-asymptotic end-to-end delay bounds for such traffic. The derived performance bounds are non-asymptotic in that they do not assume a steady state, large buffer, or many sources regime. Our analysis considers a multi-hop path of fixed-capacity links with heavy-tailed self-similar cross traffic at each node. A key contribution of the analysis is a probabilistic sample-path bound for heavy-tailed arrival and service processes, which is based on a scale-free sampling method. We explore how delays scale as a function of the length of the path, and compare them with lower bounds. A comparison with simulations illustrates pitfalls when simulating self-similar heavy-tailed traffic, providing further evidence for the need of analytical bounds.
网络中具有自相似和重尾特征的流量已被广泛报道,但用于预测此类网络延迟性能的分析结果却很少。我们解决了一种特别困难的重尾交通类型,其中只有第一矩可以计算,并给出了此类交通的第一个非渐近端到端延迟界。导出的性能边界是非渐近的,因为它们不假设稳定状态、大缓冲区或多源状态。我们的分析考虑了固定容量链路的多跳路径,每个节点具有重尾自相似交叉流量。该分析的一个关键贡献是基于无标度采样方法的重尾到达和服务过程的概率采样路径约束。我们探讨了延迟如何作为路径长度的函数,并将它们与下界进行比较。与仿真的比较说明了在模拟自相似重尾交通时存在的缺陷,进一步证明了分析边界的必要性。
{"title":"Non-asymptotic Delay Bounds for Networks with Heavy-Tailed Traffic","authors":"J. Liebeherr, A. Burchard, F. Ciucu","doi":"10.1109/INFCOM.2010.5461913","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461913","url":null,"abstract":"Traffic with self-similar and heavy-tailed characteristics has been widely reported in networks, yet, only few analytical results are available for predicting the delay performance of such networks. We address a particularly difficult type of heavy-tailed traffic where only the first moment can be computed, and present the first non-asymptotic end-to-end delay bounds for such traffic. The derived performance bounds are non-asymptotic in that they do not assume a steady state, large buffer, or many sources regime. Our analysis considers a multi-hop path of fixed-capacity links with heavy-tailed self-similar cross traffic at each node. A key contribution of the analysis is a probabilistic sample-path bound for heavy-tailed arrival and service processes, which is based on a scale-free sampling method. We explore how delays scale as a function of the length of the path, and compare them with lower bounds. A comparison with simulations illustrates pitfalls when simulating self-similar heavy-tailed traffic, providing further evidence for the need of analytical bounds.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122527290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Layered Internet Video Engineering (LIVE): Network-Assisted Bandwidth Sharing and Transient Loss Protection for Scalable Video Streaming 分层互联网视频工程(LIVE):可扩展视频流的网络辅助带宽共享和瞬态损失保护
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5462240
Xiaoqing Zhu, Rong Pan, Nandita Dukkipati, V. Subramanian, F. Bonomi
This paper presents a novel scheme, Layered Internet Video Engineering (LIVE), in which network nodes feed back virtual congestion levels to video senders to assist both media-aware bandwidth sharing and transient loss protection. The video senders respond to such feedback by adapting the rates of encoded H.264/SVC streams based on their respective video rate-distortion (R-D) characteristics. The same feedback is employed to calculate the amount of forward error correction (FEC) protection for combating transient losses. Simulation studies show that LIVE can minimize the total distortion of all participating video streams and hence maximize their overall quality. At steady state, video streams experience no queuing delays or packet losses. In face of transient congestion, the network-assisted adaptive FEC effectively protect video packets from losses while keeping a minimum overhead. Our theoretical analysis further guarantees system stability for arbitrary number of streams with arbitrary round trip delays below a prescribed limit. Finally, we show that LIVE streams can coexist with TCP flows within the existing explicit congestion notification (ECN) framework.
本文提出了一种新的方案——分层互联网视频工程(LIVE),在该方案中,网络节点向视频发送方反馈虚拟拥塞水平,以辅助媒体感知带宽共享和瞬态丢失保护。视频发送方根据各自的视频速率失真(R-D)特性调整H.264/SVC编码流的速率来响应这些反馈。采用相同的反馈来计算前向纠错(FEC)保护的数量,以对抗瞬态损耗。仿真研究表明,LIVE可以最小化所有参与视频流的总失真,从而最大化其整体质量。在稳定状态下,视频流没有排队延迟或数据包丢失。面对瞬态拥塞,网络辅助自适应FEC在保持最小开销的同时,有效地保护了视频数据包的不丢失。我们的理论分析进一步保证了系统的稳定性,对于任意数量的流,任意往返延迟低于规定的限制。最后,我们展示了LIVE流可以与现有显式拥塞通知(ECN)框架内的TCP流共存。
{"title":"Layered Internet Video Engineering (LIVE): Network-Assisted Bandwidth Sharing and Transient Loss Protection for Scalable Video Streaming","authors":"Xiaoqing Zhu, Rong Pan, Nandita Dukkipati, V. Subramanian, F. Bonomi","doi":"10.1109/INFCOM.2010.5462240","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5462240","url":null,"abstract":"This paper presents a novel scheme, Layered Internet Video Engineering (LIVE), in which network nodes feed back virtual congestion levels to video senders to assist both media-aware bandwidth sharing and transient loss protection. The video senders respond to such feedback by adapting the rates of encoded H.264/SVC streams based on their respective video rate-distortion (R-D) characteristics. The same feedback is employed to calculate the amount of forward error correction (FEC) protection for combating transient losses. Simulation studies show that LIVE can minimize the total distortion of all participating video streams and hence maximize their overall quality. At steady state, video streams experience no queuing delays or packet losses. In face of transient congestion, the network-assisted adaptive FEC effectively protect video packets from losses while keeping a minimum overhead. Our theoretical analysis further guarantees system stability for arbitrary number of streams with arbitrary round trip delays below a prescribed limit. Finally, we show that LIVE streams can coexist with TCP flows within the existing explicit congestion notification (ECN) framework.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122274089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Distributed Algorithms for Approximating Wireless Network Capacity 近似无线网络容量的分布式算法
Pub Date : 2010-03-14 DOI: 10.1109/INFCOM.2010.5461905
M. Dinitz
In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol and physical models. We give the first distributed algorithms with provable guarantees in the physical model, and show how they can be generalized to more complicated metrics and settings in which the physical assumptions are slightly violated. We also give the first algorithms in the protocol model that do not assume transmitters can coordinate with their neighbors in the interference graph, so every transmitter chooses whether to broadcast based purely on local events. Our techniques draw heavily from algorithmic game theory and machine learning theory, even though our goal is a distributed algorithm. Indeed, our main results allow every transmitter to run any algorithm it wants, so long as its algorithm has a learning-theoretic property known as no-regret in a game-theoretic setting.
本文从协议模型和物理模型两方面考虑了无线网络容量最大化问题(即单次调度)。我们给出了第一个在物理模型中具有可证明保证的分布式算法,并展示了它们如何被推广到更复杂的度量和设置中,其中物理假设略有违反。我们还给出了协议模型中的第一种算法,该算法不假设发射机可以在干扰图中与其邻居协调,因此每个发射机都选择是否纯粹基于本地事件进行广播。我们的技术很大程度上借鉴了算法博弈论和机器学习理论,尽管我们的目标是分布式算法。事实上,我们的主要结果允许每个发射器运行它想要的任何算法,只要它的算法具有学习理论性质,在博弈论设置中称为无遗憾。
{"title":"Distributed Algorithms for Approximating Wireless Network Capacity","authors":"M. Dinitz","doi":"10.1109/INFCOM.2010.5461905","DOIUrl":"https://doi.org/10.1109/INFCOM.2010.5461905","url":null,"abstract":"In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol and physical models. We give the first distributed algorithms with provable guarantees in the physical model, and show how they can be generalized to more complicated metrics and settings in which the physical assumptions are slightly violated. We also give the first algorithms in the protocol model that do not assume transmitters can coordinate with their neighbors in the interference graph, so every transmitter chooses whether to broadcast based purely on local events. Our techniques draw heavily from algorithmic game theory and machine learning theory, even though our goal is a distributed algorithm. Indeed, our main results allow every transmitter to run any algorithm it wants, so long as its algorithm has a learning-theoretic property known as no-regret in a game-theoretic setting.","PeriodicalId":259639,"journal":{"name":"2010 Proceedings IEEE INFOCOM","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
期刊
2010 Proceedings IEEE INFOCOM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1