首页 > 最新文献

2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)最新文献

英文 中文
Passive Device-Free Multi-Point CSI Localization and Its Obfuscation with Randomized Filtering 无源无设备多点CSI定位及其随机滤波混淆
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501240
Marco Cominelli, F. Gringoli, R. Cigno
The use of Channel State Information (CSI) as a means of sensing the environment through Wi-Fi communications, and in particular to locate the position of unaware people, is moving from feasibility studies to high precision applications. The work we present in this paper explores how the use of multiple localization receivers can enhance the precision and robustness of device-free CSI-based localization with a method based on a state-of-the-art Convolutional Neural Network. Next we discuss how a randomized pre-filtering at the transmitter can hide the information that the CSI carries on the location of one person indoor formalizing the manipulation technique. Results are presented discussing two different ways of exploiting the multi-receiver redundancy and how, in any case, properly randomized pre-distortion at the transmitter can prevent localization even if the attack is carried out with multiple localization devices (receivers controlled by the attacker).
使用信道状态信息(CSI)作为通过Wi-Fi通信感知环境的一种手段,特别是定位不知情人员的位置,正在从可行性研究转向高精度应用。我们在本文中介绍的工作探讨了如何使用多个定位接收器,通过基于最先进的卷积神经网络的方法,提高无设备的基于csi的定位的精度和鲁棒性。接下来,我们将讨论如何在发射机进行随机预滤波,以隐藏CSI对一个人的室内位置进行的信息,将操作技术形式化。结果讨论了利用多接收机冗余的两种不同方式,以及在任何情况下,如何在发射机上适当随机化预失真可以防止定位,即使攻击是用多个定位设备(由攻击者控制的接收机)进行的。
{"title":"Passive Device-Free Multi-Point CSI Localization and Its Obfuscation with Randomized Filtering","authors":"Marco Cominelli, F. Gringoli, R. Cigno","doi":"10.1109/MedComNet52149.2021.9501240","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501240","url":null,"abstract":"The use of Channel State Information (CSI) as a means of sensing the environment through Wi-Fi communications, and in particular to locate the position of unaware people, is moving from feasibility studies to high precision applications. The work we present in this paper explores how the use of multiple localization receivers can enhance the precision and robustness of device-free CSI-based localization with a method based on a state-of-the-art Convolutional Neural Network. Next we discuss how a randomized pre-filtering at the transmitter can hide the information that the CSI carries on the location of one person indoor formalizing the manipulation technique. Results are presented discussing two different ways of exploiting the multi-receiver redundancy and how, in any case, properly randomized pre-distortion at the transmitter can prevent localization even if the attack is carried out with multiple localization devices (receivers controlled by the attacker).","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121346042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Channel-Aware and QoS-Aware Downlink Resource Allocation for Multi-numerology Based 5G NR Systems 基于多命理的5G NR系统信道感知和qos感知下行资源分配
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501268
Luciano Miuccio, D. Panno, P. Pisacane, Salvatore Riolo
The versatility and flexibility needed to support heterogeneous 5G usage scenarios involves the introduction of multi-numerology based 5G New Radio (NR) systems, where multiple frame structures with different sub-carrier spacing coexists in the same radio spectrum. Although this approach is efficient to cater a wide variety of services, it introduces a new issue in the radio resource allocation among the different non-orthogonal numerologies. This work introduces a new Quality of Service (QoS) aware Radio Resource Management (RRM) framework which schedules User Equipments (UEs) requiring Guaranteed Bit Rate (GBR) services with different priorities, or non-GBR services. In order to maximize the spectral efficiency and, consequently, the system throughput, this framework consists of two channel-aware control levels. The first level provides a dynamic subdivision of the spectrum among the various numerologies, while the second one schedules the Physical Resource Blocks (PRBs) to the UEs belonging to the same numerology. In this paper, we propose a new 1st level allocation algorithm, called Channel-Aware Resource Allocation for Multi-numerology (CARAM), which aims to maximize the system throughput and the amount of satisfied users, taking into account the priority. As 2nd control level, we exploit well-known scheduling algorithms. We benchmark our approach against other existing 1st level allocation algorithms via several system-level simulations, under different traffic loads and channel conditions. The comparative analysis shows that our RRM framework outperforms the reference schemes in terms of system throughput, while guaranteeing a larger number of GBR services with high priority.
支持异构5G使用场景所需的多功能性和灵活性涉及引入基于多数字命数学的5G新无线电(NR)系统,其中具有不同子载波间距的多个帧结构共存于同一无线电频谱中。虽然这种方法能够有效地满足多种业务需求,但它在不同的非正交数字系统之间引入了无线电资源分配的新问题。这项工作引入了一个新的服务质量(QoS)感知无线电资源管理(RRM)框架,该框架调度需要不同优先级的保证比特率(GBR)服务或非GBR服务的用户设备(ue)。为了最大限度地提高频谱效率,从而提高系统吞吐量,该框架由两个通道感知控制级别组成。第一级在各种数字命理学之间提供频谱的动态细分,而第二级将物理资源块(PRBs)调度到属于同一数字命理学的ue。在本文中,我们提出了一种新的第一级分配算法,称为通道感知的多数字资源分配(CARAM),该算法旨在最大限度地提高系统吞吐量和满足用户的数量,同时考虑优先级。作为第二级控制,我们利用了著名的调度算法。我们通过几个系统级模拟,在不同的流量负载和信道条件下,将我们的方法与其他现有的一级分配算法进行基准测试。对比分析表明,我们的RRM框架在系统吞吐量方面优于参考方案,同时保证了大量高优先级的GBR服务。
{"title":"Channel-Aware and QoS-Aware Downlink Resource Allocation for Multi-numerology Based 5G NR Systems","authors":"Luciano Miuccio, D. Panno, P. Pisacane, Salvatore Riolo","doi":"10.1109/MedComNet52149.2021.9501268","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501268","url":null,"abstract":"The versatility and flexibility needed to support heterogeneous 5G usage scenarios involves the introduction of multi-numerology based 5G New Radio (NR) systems, where multiple frame structures with different sub-carrier spacing coexists in the same radio spectrum. Although this approach is efficient to cater a wide variety of services, it introduces a new issue in the radio resource allocation among the different non-orthogonal numerologies. This work introduces a new Quality of Service (QoS) aware Radio Resource Management (RRM) framework which schedules User Equipments (UEs) requiring Guaranteed Bit Rate (GBR) services with different priorities, or non-GBR services. In order to maximize the spectral efficiency and, consequently, the system throughput, this framework consists of two channel-aware control levels. The first level provides a dynamic subdivision of the spectrum among the various numerologies, while the second one schedules the Physical Resource Blocks (PRBs) to the UEs belonging to the same numerology. In this paper, we propose a new 1st level allocation algorithm, called Channel-Aware Resource Allocation for Multi-numerology (CARAM), which aims to maximize the system throughput and the amount of satisfied users, taking into account the priority. As 2nd control level, we exploit well-known scheduling algorithms. We benchmark our approach against other existing 1st level allocation algorithms via several system-level simulations, under different traffic loads and channel conditions. The comparative analysis shows that our RRM framework outperforms the reference schemes in terms of system throughput, while guaranteeing a larger number of GBR services with high priority.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128007257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modelling Solar Powered UAV-BS for 5G and Beyond 5G及以后的太阳能无人机- bs建模
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501239
Greta Vallero, M. Meo
Unmanned Aerial Vehicles equipped with Base Stations (UAV-BSs) are considered an effective solution to dynamically provide additional capacity in Radio Access Networks (RANs), in case of network congestion or emergency situations. To face the problem of the poor energy availability provided by on-board batteries, UAV-BSs can be equipped with Photovoltaic (PV) panels. To investigate and understand the complex interworking between traffic needs and energy availability, in this paper, we propose a model of a PV-panel-powered Long Term Evolution (LTE) Multi User Multiple Input-Multiple Output (MU-MIMO) UAV-BS, using a discretized representation of the energy in terms of Energy Packets (EPs). The model highlights the different operation regions under which the traffic demand can be satisfied for given energy production levels. Results for winter and summer seasons that take into account daily traffic and energy production variability are shown and can be used to properly dimension the UAV-BS power supply system.
配备基站的无人机(UAV-BSs)被认为是在网络拥塞或紧急情况下动态提供无线接入网(ran)额外容量的有效解决方案。为了解决机载电池提供的能量不足的问题,无人机- bss可以配备光伏(PV)面板。为了研究和理解交通需求和能源可用性之间的复杂相互作用,在本文中,我们提出了一个光伏面板供电的长期演进(LTE)多用户多输入多输出(MU-MIMO)无人机- bs模型,使用能量包(EPs)的离散表示。该模型突出了在给定的能源生产水平下,交通需求可以得到满足的不同运行区域。考虑到日常交通和能源生产变化的冬季和夏季的结果显示,可以用来适当地衡量无人机- bs供电系统。
{"title":"Modelling Solar Powered UAV-BS for 5G and Beyond","authors":"Greta Vallero, M. Meo","doi":"10.1109/MedComNet52149.2021.9501239","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501239","url":null,"abstract":"Unmanned Aerial Vehicles equipped with Base Stations (UAV-BSs) are considered an effective solution to dynamically provide additional capacity in Radio Access Networks (RANs), in case of network congestion or emergency situations. To face the problem of the poor energy availability provided by on-board batteries, UAV-BSs can be equipped with Photovoltaic (PV) panels. To investigate and understand the complex interworking between traffic needs and energy availability, in this paper, we propose a model of a PV-panel-powered Long Term Evolution (LTE) Multi User Multiple Input-Multiple Output (MU-MIMO) UAV-BS, using a discretized representation of the energy in terms of Energy Packets (EPs). The model highlights the different operation regions under which the traffic demand can be satisfied for given energy production levels. Results for winter and summer seasons that take into account daily traffic and energy production variability are shown and can be used to properly dimension the UAV-BS power supply system.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT for Real Time Presence Sensing on the 5G EVE Infrastructure 物联网在5G EVE基础设施上的实时存在感
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501245
Riccardo Rusca, C. Casetti, P. Giaccone
One of the most widely advertised capabilities of 5G targets the massive Machine-Type Communication (mMTC) giving the development of Internet of Things (IoT) solutions center stage in the new generation of mobile networks. In this paper, we address the possibility of detecting people on city streets thanks to deployment of commercial sensors, connected to the 5G network, that capture WiFi probes transmitted by people's smart devices. We first outline the motivation of such a scenario. Then, we illustrate our implemented architecture and present the results detected in an area near the Politecnico di Torino within the 5G EVE H2020 project. We show that our architecture can monitor real-time data coming from the installed sensors and thus estimate the number of people present in an area by simply collecting anonymized MAC addresses and timestamps from smart devices of passers-by.
5G最广为人知的功能之一是针对大规模机器类型通信(mMTC),使物联网(IoT)解决方案的发展成为新一代移动网络的中心舞台。在本文中,我们通过部署连接到5G网络的商用传感器,捕捉人们智能设备传输的WiFi探测器,解决了在城市街道上探测人的可能性。我们首先概述这种情况的动机。然后,我们展示了我们实现的架构,并展示了在都灵理工大学附近的5G EVE H2020项目中检测到的结果。我们展示了我们的架构可以监控来自安装的传感器的实时数据,从而通过简单地从路人的智能设备收集匿名MAC地址和时间戳来估计一个区域内的人数。
{"title":"IoT for Real Time Presence Sensing on the 5G EVE Infrastructure","authors":"Riccardo Rusca, C. Casetti, P. Giaccone","doi":"10.1109/MedComNet52149.2021.9501245","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501245","url":null,"abstract":"One of the most widely advertised capabilities of 5G targets the massive Machine-Type Communication (mMTC) giving the development of Internet of Things (IoT) solutions center stage in the new generation of mobile networks. In this paper, we address the possibility of detecting people on city streets thanks to deployment of commercial sensors, connected to the 5G network, that capture WiFi probes transmitted by people's smart devices. We first outline the motivation of such a scenario. Then, we illustrate our implemented architecture and present the results detected in an area near the Politecnico di Torino within the 5G EVE H2020 project. We show that our architecture can monitor real-time data coming from the installed sensors and thus estimate the number of people present in an area by simply collecting anonymized MAC addresses and timestamps from smart devices of passers-by.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131106037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discovery privacy threats via device de-anonymization in LoRaWAN LoRaWAN中通过设备去匿名化发现隐私威胁
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501247
Pietro Spadaccino, D. Garlisi, F. Cuomo, Giorgio Pillon, Patrizio Pisani
LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in turn, redirect the data to application servers. While several security issues have been faced in the LoRaWAN v1.1 specification from the very beginning, there are still some aspects that may undermine the privacy and the security of the IoT devices. In this paper we tackle the privacy aspect in the LoRaWAN device identity. The proposed approach, by monitoring the traffic of a LoRaWAN Network, is able to derive, in a probabilistic way, the unique identifier of the device from the temporal address assigned from the network. In other words, the method identifies the relationship between the LoRaWAN DevAddress and the device manufacturer DevEUI. The proposed approach, named DEVIL (DEVice Identification and privacy Leakage), is based on temporal patterns arising in the packet transmissions by LoRaWAN devices, and it is evaluated on the dataset extracted from real applications scenario deployed in Italy by a network operator. The results of our analysis show how device identification, during the time, can expose users to privacy leakage.
LoRaWAN (Long Range WAN)是物联网(IoT)的新兴技术之一。许多物联网应用涉及简单的设备,这些设备将数据传输到网络网关或接入点,进而将数据重定向到应用服务器。虽然LoRaWAN v1.1规范从一开始就面临着一些安全问题,但仍有一些方面可能会破坏物联网设备的隐私和安全性。本文主要研究LoRaWAN设备身份认证中的隐私问题。该方法通过监测LoRaWAN网络的流量,能够以概率方式从网络分配的时间地址中导出设备的唯一标识符。也就是说,该方法识别了LoRaWAN DevAddress与设备制造商DevEUI之间的关系。提出的方法名为DEVIL(设备识别和隐私泄漏),它基于LoRaWAN设备在数据包传输中产生的时间模式,并在意大利网络运营商部署的真实应用场景中提取的数据集上进行了评估。我们的分析结果表明,在此期间,设备识别如何使用户暴露于隐私泄露。
{"title":"Discovery privacy threats via device de-anonymization in LoRaWAN","authors":"Pietro Spadaccino, D. Garlisi, F. Cuomo, Giorgio Pillon, Patrizio Pisani","doi":"10.1109/MedComNet52149.2021.9501247","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501247","url":null,"abstract":"LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in turn, redirect the data to application servers. While several security issues have been faced in the LoRaWAN v1.1 specification from the very beginning, there are still some aspects that may undermine the privacy and the security of the IoT devices. In this paper we tackle the privacy aspect in the LoRaWAN device identity. The proposed approach, by monitoring the traffic of a LoRaWAN Network, is able to derive, in a probabilistic way, the unique identifier of the device from the temporal address assigned from the network. In other words, the method identifies the relationship between the LoRaWAN DevAddress and the device manufacturer DevEUI. The proposed approach, named DEVIL (DEVice Identification and privacy Leakage), is based on temporal patterns arising in the packet transmissions by LoRaWAN devices, and it is evaluated on the dataset extracted from real applications scenario deployed in Italy by a network operator. The results of our analysis show how device identification, during the time, can expose users to privacy leakage.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Creating RF Scenarios for Large-scale, Real-time Wireless Channel Emulators 为大规模实时无线信道模拟器创建射频场景
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501275
Miead Tehrani Moayyed, Leonardo Bonati, Pedram Johari, T. Melodia, S. Basagni
Recent years have seen the introduction of large-scale platforms for experimental wireless research. These platforms, which include testbeds like those of the PAWR program and emulators like Colosseum, allow researchers to prototype and test their solutions in a sound yet realistic wireless environment before actual deployment. Emulators, in particular, enable wireless experiments that are not site-specific as those on real testbeds. Researchers can choose among different radio frequency (RF) scenarios for real-time emulation of a vast variety of different situations, with different number of users, RF bandwidth, antenna counts, hardware requirements, etc. Although very powerful, in that they can emulate virtually any real-world deployment, emulated scenarios are only as useful as how accurately they can reproduce the targeted wireless channel and environment. Achieving emulation accuracy is particularly challenging, especially for experiments at scale for which emulators require considerable amounts of computational resources. In this paper, we propose a framework to create RF scenarios for emulators like Colosseum starting from rich forms of input, like those obtained by measurements through radio equipment or via software (e.g., ray-tracers and electromagnetic field solvers). Our framework optimally scales down the large set of RF data in input to the fewer parameters allowed by the emulator by using efficient clustering techniques and channel impulse response re-sampling. We showcase our method by generating wireless scenarios for the Colosseum network emulator by using Remcom's Wireless InSite, a commercial-grade ray-tracer that produces key characteristics of the wireless channel. Examples are provided for line-of-sight and non-line-of-sight scenarios on portions of the Northeastern University main campus
近年来,大规模实验无线研究平台的引入。这些平台,包括像PAWR项目的测试平台和像Colosseum这样的模拟器,允许研究人员在实际部署之前,在一个健全而现实的无线环境中原型化和测试他们的解决方案。特别是,模拟器使无线实验不像在真实的测试台上那样是特定于站点的。研究人员可以在不同的射频(RF)场景中进行选择,实时仿真各种不同的情况,具有不同的用户数量、RF带宽、天线数量、硬件要求等。虽然它们非常强大,因为它们几乎可以模拟任何现实世界的部署,但模拟场景的有用程度取决于它们能够多么准确地再现目标无线信道和环境。实现仿真精度尤其具有挑战性,特别是对于模拟器需要大量计算资源的大规模实验。在本文中,我们提出了一个框架,用于为像Colosseum这样的模拟器创建RF场景,从丰富的输入形式开始,例如通过无线电设备或软件(例如,射线追踪器和电磁场求解器)进行测量获得的输入。我们的框架通过使用有效的聚类技术和信道脉冲响应重采样,将输入中的大量射频数据优化到模拟器允许的更少参数。我们通过使用Remcom的wireless InSite为Colosseum网络模拟器生成无线场景来展示我们的方法,Remcom的wireless InSite是一种商业级光线追踪器,可以产生无线信道的关键特征。提供了东北大学主校区部分地区的视线和非视线场景的示例
{"title":"Creating RF Scenarios for Large-scale, Real-time Wireless Channel Emulators","authors":"Miead Tehrani Moayyed, Leonardo Bonati, Pedram Johari, T. Melodia, S. Basagni","doi":"10.1109/MedComNet52149.2021.9501275","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501275","url":null,"abstract":"Recent years have seen the introduction of large-scale platforms for experimental wireless research. These platforms, which include testbeds like those of the PAWR program and emulators like Colosseum, allow researchers to prototype and test their solutions in a sound yet realistic wireless environment before actual deployment. Emulators, in particular, enable wireless experiments that are not site-specific as those on real testbeds. Researchers can choose among different radio frequency (RF) scenarios for real-time emulation of a vast variety of different situations, with different number of users, RF bandwidth, antenna counts, hardware requirements, etc. Although very powerful, in that they can emulate virtually any real-world deployment, emulated scenarios are only as useful as how accurately they can reproduce the targeted wireless channel and environment. Achieving emulation accuracy is particularly challenging, especially for experiments at scale for which emulators require considerable amounts of computational resources. In this paper, we propose a framework to create RF scenarios for emulators like Colosseum starting from rich forms of input, like those obtained by measurements through radio equipment or via software (e.g., ray-tracers and electromagnetic field solvers). Our framework optimally scales down the large set of RF data in input to the fewer parameters allowed by the emulator by using efficient clustering techniques and channel impulse response re-sampling. We showcase our method by generating wireless scenarios for the Colosseum network emulator by using Remcom's Wireless InSite, a commercial-grade ray-tracer that produces key characteristics of the wireless channel. Examples are provided for line-of-sight and non-line-of-sight scenarios on portions of the Northeastern University main campus","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124536011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
From PLATO to Platoons 从柏拉图到排
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501242
C. Quadri, V. Mancuso, Valerio Cislaghi, M. Marsan, G. P. Rossi
Grouping vehicles into platoons promises to improve road capacity, driver safety, and fuel consumption. However, when platoons have to allow for cross traffic maneuvers, the ability to control single large platoons is not sufficient, and chaining smaller platoons becomes necessary. To this aim we define PLATO, an edge-assisted multi-platoon control architecture and, by delving into the dichotomy of unity and plurality of platooning, we analyze costs and benefits of multi-platooning. We investigate on the feasibility and formulate the utility of multi-platoons by analyzing the underlying edge computing and broadband cellular connectivity requirements. Using a detailed simulator, we show that, in realistic environments, multi-platoons can be effectively controlled with PLATO, as long as the latency between individual platoon managers and the multi-platoon manager is kept below a few tens of milliseconds. Surprisingly, the latency between vehicles and managers is one order of magnitude less critical.
将车辆排成一排有望提高道路容量、驾驶员安全性和燃油消耗。然而,当排必须考虑交叉交通机动时,控制单个大排的能力是不够的,而连接较小的排就变得必要了。为此,我们定义了一种边缘辅助的多排控制体系结构PLATO,并通过深入研究队列的单一性和多元性二分法,分析了多排控制的成本和收益。我们通过分析潜在的边缘计算和宽带蜂窝连接需求,研究了多排的可行性和实用性。通过详细的模拟器,我们表明,在现实环境中,只要单个排管理器和多排管理器之间的延迟保持在几十毫秒以下,PLATO就可以有效地控制多排。令人惊讶的是,车辆和管理人员之间的延迟没有那么重要。
{"title":"From PLATO to Platoons","authors":"C. Quadri, V. Mancuso, Valerio Cislaghi, M. Marsan, G. P. Rossi","doi":"10.1109/MedComNet52149.2021.9501242","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501242","url":null,"abstract":"Grouping vehicles into platoons promises to improve road capacity, driver safety, and fuel consumption. However, when platoons have to allow for cross traffic maneuvers, the ability to control single large platoons is not sufficient, and chaining smaller platoons becomes necessary. To this aim we define PLATO, an edge-assisted multi-platoon control architecture and, by delving into the dichotomy of unity and plurality of platooning, we analyze costs and benefits of multi-platooning. We investigate on the feasibility and formulate the utility of multi-platoons by analyzing the underlying edge computing and broadband cellular connectivity requirements. Using a detailed simulator, we show that, in realistic environments, multi-platoons can be effectively controlled with PLATO, as long as the latency between individual platoon managers and the multi-platoon manager is kept below a few tens of milliseconds. Surprisingly, the latency between vehicles and managers is one order of magnitude less critical.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bitrate Reduction for Omnidirectional Video Streaming: Comparing Variable Quantization Parameter and Variable Resolution Approaches 全向视频流的比特率降低:比较可变量化参数和可变分辨率方法
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501278
Giuseppe Ribezzo, L. D. Cicco, Vittorio Palmisano, S. Mascolo
Immersive and Extended Reality applications are getting increasingly popular due to the recent improvements and wide availability of Head Mounted Displays in the mass market. Among the many new immersive applications, Omnidirectional Video Streaming (OVS) - or 360°Video Streaming - is attracting the attention of both the industry and the research community. The increased immersivity of 360° videos comes at the cost of larger bandwidth requirements compared to classic 2D videos. To tackle the issue of reducing bandwidth requirements, tiling is a viable technique that allows to encode the portions of the 360° video most likely to fall outside of the users' viewport at lower quality using a higher quantization parameter. Tiling requires new encoders to be used which however do not have available hardware decoders in mobile devices yet. The variable resolution approach instead shrinks areas not falling in the region of interest to decrease the overall resolution and thus allowing bitrate reduction with any codec. This paper quantitatively compares the two approaches to find the trade-offs between achievable bitrate reduction and visual quality measured using the VMAF visual quality metric.
由于最近头戴式显示器在大众市场上的改进和广泛可用性,沉浸式和扩展现实应用越来越受欢迎。在众多新的沉浸式应用中,全方位视频流(OVS)——或360°视频流——正吸引着业界和研究界的关注。与传统的2D视频相比,360°视频的沉浸感增加是以更大的带宽需求为代价的。为了解决减少带宽需求的问题,平片是一种可行的技术,它允许对360°视频中最有可能以较低质量落在用户视口之外的部分进行编码,并使用较高的量化参数。平铺需要使用新的编码器,但是在移动设备上还没有可用的硬件解码器。相反,可变分辨率方法缩小了不落在感兴趣区域的区域,从而降低了整体分辨率,从而允许使用任何编解码器降低比特率。本文定量地比较了这两种方法,以找到可实现的比特率降低和使用VMAF视觉质量度量测量的视觉质量之间的权衡。
{"title":"Bitrate Reduction for Omnidirectional Video Streaming: Comparing Variable Quantization Parameter and Variable Resolution Approaches","authors":"Giuseppe Ribezzo, L. D. Cicco, Vittorio Palmisano, S. Mascolo","doi":"10.1109/MedComNet52149.2021.9501278","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501278","url":null,"abstract":"Immersive and Extended Reality applications are getting increasingly popular due to the recent improvements and wide availability of Head Mounted Displays in the mass market. Among the many new immersive applications, Omnidirectional Video Streaming (OVS) - or 360°Video Streaming - is attracting the attention of both the industry and the research community. The increased immersivity of 360° videos comes at the cost of larger bandwidth requirements compared to classic 2D videos. To tackle the issue of reducing bandwidth requirements, tiling is a viable technique that allows to encode the portions of the 360° video most likely to fall outside of the users' viewport at lower quality using a higher quantization parameter. Tiling requires new encoders to be used which however do not have available hardware decoders in mobile devices yet. The variable resolution approach instead shrinks areas not falling in the region of interest to decrease the overall resolution and thus allowing bitrate reduction with any codec. This paper quantitatively compares the two approaches to find the trade-offs between achievable bitrate reduction and visual quality measured using the VMAF visual quality metric.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129935503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Local Intrusion Detection in the Internet of Things 评估物联网中的本地入侵检测
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501269
Christiana Ioannou, V. Vassiliou
Security in the Internet of Things (IoT) is designed to ensure timely, reliable and fully operational network. The presence of a malicious device within the network can decrease the IoT applications' effective functionality by failing to transmit the data to the intended user. Intrusion detection systems (IDS) with anomaly detection classify IoT network activity based on what is defined as normal. In this paper we present the evaluation of local Binary Logistic Regression (BLR) detection models, found in mIDS, which monitor local IoT node activity to detect routing layer attacks, such as Selective Forward and Blackhole. The BLR detection models were evaluated in both a simulator and an IoT testbed platform. Overall, our results, both in the simulator and at the testbed, have shown that for each environment to be deployed, a customised BLR model should be created and more than one performance measure should be used. In the paper we propose the use of four performance metrics to fully capture the efficacy of classification methods. Besides Precision, Recall, and Accuracy, we have chosen to include the Matthews Correlation Coefficient in our evaluation set, since it provides a more normalized view and the quality of the BLR detection models.
物联网安全旨在确保网络的及时、可靠和全面运行。网络中存在恶意设备可能会因无法将数据传输给预期用户而降低物联网应用程序的有效功能。具有异常检测功能的入侵检测系统(IDS)根据正常定义对物联网网络活动进行分类。在本文中,我们提出了对mIDS中发现的本地二元逻辑回归(BLR)检测模型的评估,该模型监测本地物联网节点活动以检测路由层攻击,如选择性转发和黑洞。在模拟器和物联网测试平台上对BLR检测模型进行了评估。总的来说,我们在模拟器和测试台上的结果都表明,对于要部署的每个环境,应该创建一个定制的BLR模型,并且应该使用多个性能度量。在本文中,我们提出使用四个性能指标来充分捕捉分类方法的有效性。除了Precision, Recall和Accuracy之外,我们还选择将Matthews相关系数包括在我们的评估集中,因为它提供了更规范化的视图和BLR检测模型的质量。
{"title":"Evaluating Local Intrusion Detection in the Internet of Things","authors":"Christiana Ioannou, V. Vassiliou","doi":"10.1109/MedComNet52149.2021.9501269","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501269","url":null,"abstract":"Security in the Internet of Things (IoT) is designed to ensure timely, reliable and fully operational network. The presence of a malicious device within the network can decrease the IoT applications' effective functionality by failing to transmit the data to the intended user. Intrusion detection systems (IDS) with anomaly detection classify IoT network activity based on what is defined as normal. In this paper we present the evaluation of local Binary Logistic Regression (BLR) detection models, found in mIDS, which monitor local IoT node activity to detect routing layer attacks, such as Selective Forward and Blackhole. The BLR detection models were evaluated in both a simulator and an IoT testbed platform. Overall, our results, both in the simulator and at the testbed, have shown that for each environment to be deployed, a customised BLR model should be created and more than one performance measure should be used. In the paper we propose the use of four performance metrics to fully capture the efficacy of classification methods. Besides Precision, Recall, and Accuracy, we have chosen to include the Matthews Correlation Coefficient in our evaluation set, since it provides a more normalized view and the quality of the BLR detection models.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124322271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Blockchain Definition to Clarify its Role for the Internet of Things 区块链定义澄清其在物联网中的作用
Pub Date : 2021-06-15 DOI: 10.1109/MedComNet52149.2021.9501280
Lorenzo Ghiro, Francesco Restuccia, Salvatore D’oro, S. Basagni, T. Melodia, L. Maccari, R. Cigno
The term blockchain is used for disparate projects, ranging from cryptocurrencies to applications for the Internet of Things (IoT). The concept of blockchain appears therefore blurred, as the same technology cannot empower applications with extremely different requirements, levels of security and performance. This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain allowing us to clarify its possible role in the IoT. The definition binds together three elements that, as a whole, delineate those unique features that distinguish the blockchain from other distributed ledger technologies: immutability, transparency and anonymity. We note that immutability-which is imperative for securing blockchains-imposes remarkable resource consumption. Moreover, while transparency demands no confidentiality, anonymity enhances privacy but prevents user identification. As such, we raise the concern that these blockchain features clash with the requirements of most IoT applications where devices are power-constrained, data needs to be kept confidential, and users to be clearly identifiable. We consequently downplay the role of the blockchain for the IoT: this can act as a ledger external to the IoT architecture, invoked as seldom as possible and only to record the aggregate results of myriads of local (IoT) transactions that are most of the time performed off-chain to meet performance and scalability requirements.
区块链这个术语用于不同的项目,从加密货币到物联网(IoT)的应用程序。因此,区块链的概念似乎是模糊的,因为相同的技术不能使应用程序具有完全不同的需求、安全性和性能级别。本文详细阐述了分布式系统的理论,提出了区块链的明确定义,使我们能够阐明其在物联网中的可能作用。该定义将三个要素结合在一起,作为一个整体,描绘了区分区块链与其他分布式账本技术的独特特征:不变性、透明度和匿名性。我们注意到,不可变性——这对于保护区块链至关重要——会带来巨大的资源消耗。此外,虽然透明不要求保密性,但匿名增强了隐私性,但阻止了用户的身份识别。因此,我们担心这些区块链功能与大多数物联网应用的要求相冲突,这些应用的设备功率有限,数据需要保密,用户需要清楚地识别。因此,我们低估了区块链在物联网中的作用:它可以作为物联网架构外部的分类账,尽可能少地调用,只记录大量本地(物联网)事务的汇总结果,这些事务大多数时候是在链下执行的,以满足性能和可扩展性要求。
{"title":"A Blockchain Definition to Clarify its Role for the Internet of Things","authors":"Lorenzo Ghiro, Francesco Restuccia, Salvatore D’oro, S. Basagni, T. Melodia, L. Maccari, R. Cigno","doi":"10.1109/MedComNet52149.2021.9501280","DOIUrl":"https://doi.org/10.1109/MedComNet52149.2021.9501280","url":null,"abstract":"The term blockchain is used for disparate projects, ranging from cryptocurrencies to applications for the Internet of Things (IoT). The concept of blockchain appears therefore blurred, as the same technology cannot empower applications with extremely different requirements, levels of security and performance. This position paper elaborates on the theory of distributed systems to advance a clear definition of blockchain allowing us to clarify its possible role in the IoT. The definition binds together three elements that, as a whole, delineate those unique features that distinguish the blockchain from other distributed ledger technologies: immutability, transparency and anonymity. We note that immutability-which is imperative for securing blockchains-imposes remarkable resource consumption. Moreover, while transparency demands no confidentiality, anonymity enhances privacy but prevents user identification. As such, we raise the concern that these blockchain features clash with the requirements of most IoT applications where devices are power-constrained, data needs to be kept confidential, and users to be clearly identifiable. We consequently downplay the role of the blockchain for the IoT: this can act as a ledger external to the IoT architecture, invoked as seldom as possible and only to record the aggregate results of myriads of local (IoT) transactions that are most of the time performed off-chain to meet performance and scalability requirements.","PeriodicalId":272937,"journal":{"name":"2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1