首页 > 最新文献

2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

英文 中文
QoS Aware Channel Selection and Power Allocation for Device-to-Device Communication 面向设备间通信的QoS感知信道选择和功率分配
Radhika Gour, Anshul Tyagi
Device-to-Device (D2D) communication has proven as a candidate solution for offloading the data traffic and improving spectrum efficiency of cellular communication systems. It allows the terminals to communicate directly without increasing the load on the base station (BS). Underlay D2D is adopted in our work because it is more spectrum efficient due to channel sharing among cellular user (CU) and D2D pair. This kind of sharing is beneficial only when appropriate resource management is done otherwise it causes harmful interferences too. This work introduces an efficient and simple method to find multiple CUs as reuse partners for each D2D pair. After the selection of channels, power control is applied by means of convex optimization for D2D pairs to control the interference at the BS. The objective of the work is to maximize the D2D sum-rate without affecting CU's performance. The proposed scheme is then compared with existing pairing algorithms named as Hungarian also known as Kuhn-Munkres (KM) and IPPO algorithms and performance gain is verified through simulation results.
设备对设备(Device-to-Device, D2D)通信已被证明是蜂窝通信系统中减轻数据流量和提高频谱效率的备选解决方案。它允许终端直接通信,而不会增加基站(BS)的负载。我们的工作采用底层D2D,因为它在蜂窝用户(CU)和D2D对之间共享信道,从而提高了频谱效率。这种共享只有在适当的资源管理下才有益,否则也会造成有害的干扰。本文介绍了一种高效、简单的方法来寻找多个cu作为每个D2D对的重用伙伴。在信道选择之后,采用D2D对的凸优化功率控制来控制BS处的干扰。这项工作的目标是在不影响CU性能的情况下最大化D2D求和速率。然后将该方案与现有的配对算法(Hungarian,也称为Kuhn-Munkres (KM))和IPPO算法进行了比较,并通过仿真结果验证了性能增益。
{"title":"QoS Aware Channel Selection and Power Allocation for Device-to-Device Communication","authors":"Radhika Gour, Anshul Tyagi","doi":"10.1109/ANTS.2018.8710110","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710110","url":null,"abstract":"Device-to-Device (D2D) communication has proven as a candidate solution for offloading the data traffic and improving spectrum efficiency of cellular communication systems. It allows the terminals to communicate directly without increasing the load on the base station (BS). Underlay D2D is adopted in our work because it is more spectrum efficient due to channel sharing among cellular user (CU) and D2D pair. This kind of sharing is beneficial only when appropriate resource management is done otherwise it causes harmful interferences too. This work introduces an efficient and simple method to find multiple CUs as reuse partners for each D2D pair. After the selection of channels, power control is applied by means of convex optimization for D2D pairs to control the interference at the BS. The objective of the work is to maximize the D2D sum-rate without affecting CU's performance. The proposed scheme is then compared with existing pairing algorithms named as Hungarian also known as Kuhn-Munkres (KM) and IPPO algorithms and performance gain is verified through simulation results.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power, Cost and Reach Based Evaluation of Next Generation Passive Optical Networks Architectures 基于功耗、成本和覆盖范围的下一代无源光网络架构评估
Sukriti Garg, M. Aggarwal, A. Dixit
Evolution in passive optical access networks concentrate on increasing their capacity that can be in terms of the number of users served or the data rates served per user. Various techniques have been under consideration to achieve the same. Their names are first generation passive optical networks (PON), next generation-1 PON (NG-PON1), and next generation 2 PON (NG-PON2). However, none of them has proven to be the most efficient solution for every scenario (such as power, cost and reach efficiency). This calls for the evaluation of the existing PON architectures and provide an optimum solution. In this work, we evaluate the performance of Gigabit-capable PON (GPON), XG-PON, XLG-PON, wavelength division multiplexing PON (WDM-PON), and time and wavelength division multiplex PON (TWDM-PON) architectures in terms of their reach, cost and power consumption. On analyzing these architectures in OptSim software, we found that WDM-PON is an optimum solution for long reach and high data rate PON system if we neglect the cost constraint. Furthermore, for the cost effective solution, TWDM-PON fits best in terms of high data rate and low power consumption but provides lower reach in comparison to WDM-PON.
无源光接入网的发展主要集中在增加其容量上,这可以是在服务的用户数量或每个用户服务的数据速率方面。为了达到同样的目的,已经考虑了各种技术。它们的名称分别是第一代无源光网络(PON)、下一代一代无源光网络(NG-PON1)和下一代无源光网络(NG-PON2)。然而,它们都没有被证明是适用于所有场景(例如功率、成本和到达效率)的最有效的解决方案。这需要对现有PON架构进行评估,并提供最佳解决方案。在这项工作中,我们从覆盖范围、成本和功耗方面评估了千兆PON (GPON)、XG-PON、XLG-PON、波分复用PON (WDM-PON)和时分波分复用PON (TWDM-PON)架构的性能。在OptSim软件中对这些架构进行了分析,发现在不考虑成本约束的情况下,WDM-PON是实现远距离、高数据速率PON系统的最佳方案。此外,对于具有成本效益的解决方案,TWDM-PON在高数据速率和低功耗方面最适合,但与WDM-PON相比,其覆盖范围较短。
{"title":"Power, Cost and Reach Based Evaluation of Next Generation Passive Optical Networks Architectures","authors":"Sukriti Garg, M. Aggarwal, A. Dixit","doi":"10.1109/ANTS.2018.8710127","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710127","url":null,"abstract":"Evolution in passive optical access networks concentrate on increasing their capacity that can be in terms of the number of users served or the data rates served per user. Various techniques have been under consideration to achieve the same. Their names are first generation passive optical networks (PON), next generation-1 PON (NG-PON1), and next generation 2 PON (NG-PON2). However, none of them has proven to be the most efficient solution for every scenario (such as power, cost and reach efficiency). This calls for the evaluation of the existing PON architectures and provide an optimum solution. In this work, we evaluate the performance of Gigabit-capable PON (GPON), XG-PON, XLG-PON, wavelength division multiplexing PON (WDM-PON), and time and wavelength division multiplex PON (TWDM-PON) architectures in terms of their reach, cost and power consumption. On analyzing these architectures in OptSim software, we found that WDM-PON is an optimum solution for long reach and high data rate PON system if we neglect the cost constraint. Furthermore, for the cost effective solution, TWDM-PON fits best in terms of high data rate and low power consumption but provides lower reach in comparison to WDM-PON.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115688046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Security of Remote Key Less Entry for Vehicles 车辆远程无钥匙进入安全性研究
Jinita Patel, M. Das, Sukumar Nandi
With the rapid growth in the automobile industry and the advancement in the embedded technology, the traditional mechanical key for operating vehicles is gradually replaced by Remote Keyless Entry (RKE) system. Enabling RKE system in vehicles not only improves the security of car access but also facilitates convenience to users. At the same time, RKE system introduces many threats such as eavesdropping, relay, replay attack, On-board Diagnostic (OBD) port scan attack, key fob cloning, jamming and so on. In this paper, we discuss on the keyless car entry system, observe some security weaknesses in a recent RKE system and present a new RKE system. The proposed RKE system uses the notion of unclonable security module to minimize the OBD port scan attack including other known threats. The proposed RKE system achieves authentication of car as well as key fob by preserving privacy of the communicating entities. The security analysis and experimental results show that the proposed RKE system is secure and practical with respect to efficiency and user convenience.
随着汽车工业的快速发展和嵌入式技术的进步,传统的机械钥匙操作车辆逐渐被远程无钥匙进入(RKE)系统所取代。在车辆上启用RKE系统,不仅提高了车辆进出的安全性,也为用户提供了方便。同时,RKE系统也引入了窃听、中继、重放攻击、车载诊断(OBD)端口扫描攻击、密钥克隆、干扰等威胁。本文对无钥匙汽车进入系统进行了讨论,观察了现有RKE系统的一些安全缺陷,并提出了一种新的RKE系统。提出的RKE系统使用不可克隆安全模块的概念,以最大限度地减少OBD端口扫描攻击,包括其他已知威胁。该RKE系统通过保护通信实体的隐私性,实现了对汽车和密钥的认证。安全性分析和实验结果表明,所提出的RKE系统在效率和用户便利性方面是安全实用的。
{"title":"On the Security of Remote Key Less Entry for Vehicles","authors":"Jinita Patel, M. Das, Sukumar Nandi","doi":"10.1109/ANTS.2018.8710105","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710105","url":null,"abstract":"With the rapid growth in the automobile industry and the advancement in the embedded technology, the traditional mechanical key for operating vehicles is gradually replaced by Remote Keyless Entry (RKE) system. Enabling RKE system in vehicles not only improves the security of car access but also facilitates convenience to users. At the same time, RKE system introduces many threats such as eavesdropping, relay, replay attack, On-board Diagnostic (OBD) port scan attack, key fob cloning, jamming and so on. In this paper, we discuss on the keyless car entry system, observe some security weaknesses in a recent RKE system and present a new RKE system. The proposed RKE system uses the notion of unclonable security module to minimize the OBD port scan attack including other known threats. The proposed RKE system achieves authentication of car as well as key fob by preserving privacy of the communicating entities. The security analysis and experimental results show that the proposed RKE system is secure and practical with respect to efficiency and user convenience.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115716997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Novel Insights into Probability of Success of Random Access Scheme in 5G Millimeter Wave Cellular Network 5G毫米波蜂窝网络中随机接入方案成功概率的新见解
Shilpi Varshney, Shreya Tyagi, B. Sainath
As we progress towards the fifth generation (5G) wireless systems to meet the data rate requirements, it becomes difficult for the conventional cellular networks to provide connectivity in the uplink to a huge number of connected devices. Hence, the adoption of the millimeter wave (mmWave) technology will ease the integration of IoT devices into the 5G cellular network. In this paper, we consider a stochastic geometry model to investigate baseline Random Access scheme’s success probability in the Internet of things (IoT) that uses millimeter wave (mmWave) cellular communication technology. Specifically, to obtain novel insights, we analyze probability of success of the random access scheme in the following three scenarios: i) Success probability as a function of the signal power-to-noise ratio (SNR), ii) Success probability as a function of the signal power-to-interference ratio (SIR), and iii) Success probability in terms of signal power-to-interference plus noise ratio (SINR). Furthermore, we approximate the probability of success in LOS region using a simplified ball model for a large number of IoT devices. Using Monte Carlo simulations, the approximation of LOS-ball comes out to be sufficiently accurate with the analytical results for typical IoT intensity.
随着我们向第五代(5G)无线系统发展以满足数据速率要求,传统的蜂窝网络很难在上行链路中提供大量连接设备的连接。因此,采用毫米波(mmWave)技术将简化物联网设备与5G蜂窝网络的集成。在本文中,我们考虑一个随机几何模型来研究基线随机接入方案在使用毫米波(mmWave)蜂窝通信技术的物联网(IoT)中的成功概率。具体来说,为了获得新的见解,我们在以下三种情况下分析了随机接入方案的成功概率:i)成功概率作为信号功率噪声比(SNR)的函数,ii)成功概率作为信号功率干扰比(SIR)的函数,iii)成功概率作为信号功率干扰加噪声比(SINR)的函数。此外,我们使用大量物联网设备的简化球模型来近似LOS区域的成功概率。通过蒙特卡罗模拟,LOS-ball的近似结果与典型物联网强度的分析结果足够准确。
{"title":"Novel Insights into Probability of Success of Random Access Scheme in 5G Millimeter Wave Cellular Network","authors":"Shilpi Varshney, Shreya Tyagi, B. Sainath","doi":"10.1109/ANTS.2018.8710051","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710051","url":null,"abstract":"As we progress towards the fifth generation (5G) wireless systems to meet the data rate requirements, it becomes difficult for the conventional cellular networks to provide connectivity in the uplink to a huge number of connected devices. Hence, the adoption of the millimeter wave (mmWave) technology will ease the integration of IoT devices into the 5G cellular network. In this paper, we consider a stochastic geometry model to investigate baseline Random Access scheme’s success probability in the Internet of things (IoT) that uses millimeter wave (mmWave) cellular communication technology. Specifically, to obtain novel insights, we analyze probability of success of the random access scheme in the following three scenarios: i) Success probability as a function of the signal power-to-noise ratio (SNR), ii) Success probability as a function of the signal power-to-interference ratio (SIR), and iii) Success probability in terms of signal power-to-interference plus noise ratio (SINR). Furthermore, we approximate the probability of success in LOS region using a simplified ball model for a large number of IoT devices. Using Monte Carlo simulations, the approximation of LOS-ball comes out to be sufficiently accurate with the analytical results for typical IoT intensity.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121077821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Optimal Packet Scheduling with Individual Packet Delay Constraints 具有单个包延迟约束的能量最优包调度
Dony J. Muttath, M. Santhoshkumar, K. Premkumar
We consider a problem of scheduling packets in a fading link where each packet is required to reach the destination before a delay deadline. Time is slotted, and at the beginning of each slot, a packet arrives according to an arrival process. A packet on arrival is stored in a buffer, and it is required to reach the destination before a total delay of $d+ 1$ slots (i.e., the maximum waiting time in the buffer can be d time-slots and one time-slot delay for transmission). At the beginning, the transmitter is provided with a finite energy $E_{0}$, and the problem that we consider is to obtain an optimum scheduler that decides which time-slots to be used for transmission such that it maximizes the number of packet transmissions with a total energy $E_{0}$, and within a delay deadline of $d+1$ time-slots for each packet. We model this problem as a Markov Decision process, and provide a dynamic programming (DP) based solution which is prohibitively complex, but can be numerically solved. The computational complexity of the DP solution motivates us to provide two sub-optimal heuristic solutions to the scheduling problem. We provide the throughput and average energy performance of the heuristic solutions.
我们考虑了一个在衰落链路中的数据包调度问题,其中每个数据包都需要在延迟截止日期之前到达目的地。时间是有间隙的,在每个间隙的开始,一个数据包根据到达过程到达。数据包到达时存储在缓冲区中,需要在总延迟$d+ 1$个时隙之前到达目的地(即缓冲区中的最大等待时间可以是d个时隙,传输延迟1个时隙)。一开始,发射机有一个有限的能量$E_{0}$,我们考虑的问题是获得一个最优调度程序,该调度程序决定使用哪个时隙进行传输,使总能量$E_{0}$的数据包传输数量最大化,并且每个数据包的延迟期限为$d+1$时隙。我们将此问题建模为马尔可夫决策过程,并提供了一个基于动态规划(DP)的解决方案,该方案非常复杂,但可以数值解决。DP解的计算复杂性促使我们为调度问题提供两个次优启发式解。我们提供了启发式解决方案的吞吐量和平均能源性能。
{"title":"Energy Optimal Packet Scheduling with Individual Packet Delay Constraints","authors":"Dony J. Muttath, M. Santhoshkumar, K. Premkumar","doi":"10.1109/ANTS.2018.8710104","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710104","url":null,"abstract":"We consider a problem of scheduling packets in a fading link where each packet is required to reach the destination before a delay deadline. Time is slotted, and at the beginning of each slot, a packet arrives according to an arrival process. A packet on arrival is stored in a buffer, and it is required to reach the destination before a total delay of $d+ 1$ slots (i.e., the maximum waiting time in the buffer can be d time-slots and one time-slot delay for transmission). At the beginning, the transmitter is provided with a finite energy $E_{0}$, and the problem that we consider is to obtain an optimum scheduler that decides which time-slots to be used for transmission such that it maximizes the number of packet transmissions with a total energy $E_{0}$, and within a delay deadline of $d+1$ time-slots for each packet. We model this problem as a Markov Decision process, and provide a dynamic programming (DP) based solution which is prohibitively complex, but can be numerically solved. The computational complexity of the DP solution motivates us to provide two sub-optimal heuristic solutions to the scheduling problem. We provide the throughput and average energy performance of the heuristic solutions.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MEC and IoT Based Automatic Agent Reconfiguration in Industry 4.0 工业4.0中基于MEC和物联网的自动代理重构
S. K. Datta, C. Bonnet
The Internet of Things (IoT) and connected devices are impacting enterprises, public sector bodies, and citizens in many ways. In parallel, upcoming 5G and Multi-Access Edge Computing (MEC) are aiming to enable ultra low latency use cases for IoT. This paper proposes to utilize MEC and IoT based architecture for automatic agent reconfiguration in smart manufacturing floors. The EURECOM IoT Platform is extended to achieve this purpose.
物联网(IoT)和连接设备正在以多种方式影响企业、公共部门机构和公民。与此同时,即将到来的5G和多接入边缘计算(MEC)旨在为物联网实现超低延迟用例。本文提出利用MEC和基于物联网的架构实现智能制造车间的智能体自动重构。EURECOM物联网平台的扩展就是为了实现这一目的。
{"title":"MEC and IoT Based Automatic Agent Reconfiguration in Industry 4.0","authors":"S. K. Datta, C. Bonnet","doi":"10.1109/ANTS.2018.8710126","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710126","url":null,"abstract":"The Internet of Things (IoT) and connected devices are impacting enterprises, public sector bodies, and citizens in many ways. In parallel, upcoming 5G and Multi-Access Edge Computing (MEC) are aiming to enable ultra low latency use cases for IoT. This paper proposes to utilize MEC and IoT based architecture for automatic agent reconfiguration in smart manufacturing floors. The EURECOM IoT Platform is extended to achieve this purpose.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121888786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Apache Spark Based Analytics of Squid Proxy Logs 基于Apache Spark的Squid代理日志分析
D. Mishra, Salim Pathan, C. Murthy
Internet today is an integral part of an organization’s working. It is vital to monitor Internet traffic closely in order to detect threats and malicious activities which may not only impact the reputation of an organization but also lead to data loss. One way of achieving this goal is to monitor the logs of critical applications like proxy server which contains crucial information related to Internet activity. Log data is often huge and is ever growing. Also, forensic analysis of an event requires not only current data but also historical one. This poses a big problem of efficient and fast storage and retrieval of data. Traditional RDBMS technologies fail in such situations but with the advent of big data technologies like Apache Hadoop and Apache Spark this task has now become feasible. In this paper, we propose a Spark based system for analysis of Squid proxy logs. Using this system we generate statistics like top domains accessed, top users etc for studying traffic behavior within organization and detect malicious activity. We further study the variation in proposed system’s performance with increase in data volume and variation in spark parameters like number of executors, number of executor cores and executor memory. From our experimental study we conclude that log analysis with Spark is extremely fast with no significant performance variation observed with increase in data volume. The challenging task, however, is selecting spark parameters for getting optimal performance.
今天,互联网是一个组织工作的组成部分。密切监控互联网流量是至关重要的,以便发现威胁和恶意活动,这些威胁和恶意活动不仅会影响组织的声誉,还会导致数据丢失。实现这一目标的一种方法是监视关键应用程序(如代理服务器)的日志,其中包含与Internet活动相关的关键信息。日志数据通常是巨大的,并且还在不断增长。此外,事件的取证分析不仅需要当前数据,还需要历史数据。这就给数据的高效、快速存储和检索带来了很大的问题。传统的RDBMS技术在这种情况下失败了,但是随着像Apache Hadoop和Apache Spark这样的大数据技术的出现,这项任务现在变得可行了。本文提出了一个基于Spark的Squid代理日志分析系统。使用该系统,我们生成统计数据,如顶级域名访问,顶级用户等,以研究组织内的流量行为和检测恶意活动。我们进一步研究了系统性能随数据量的增加和火花参数(如执行器数量、执行器内核数量和执行器内存)的变化。从我们的实验研究中我们得出结论,使用Spark进行日志分析非常快,并且随着数据量的增加没有明显的性能变化。然而,具有挑战性的任务是选择火花参数以获得最佳性能。
{"title":"Apache Spark Based Analytics of Squid Proxy Logs","authors":"D. Mishra, Salim Pathan, C. Murthy","doi":"10.1109/ANTS.2018.8710044","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710044","url":null,"abstract":"Internet today is an integral part of an organization’s working. It is vital to monitor Internet traffic closely in order to detect threats and malicious activities which may not only impact the reputation of an organization but also lead to data loss. One way of achieving this goal is to monitor the logs of critical applications like proxy server which contains crucial information related to Internet activity. Log data is often huge and is ever growing. Also, forensic analysis of an event requires not only current data but also historical one. This poses a big problem of efficient and fast storage and retrieval of data. Traditional RDBMS technologies fail in such situations but with the advent of big data technologies like Apache Hadoop and Apache Spark this task has now become feasible. In this paper, we propose a Spark based system for analysis of Squid proxy logs. Using this system we generate statistics like top domains accessed, top users etc for studying traffic behavior within organization and detect malicious activity. We further study the variation in proposed system’s performance with increase in data volume and variation in spark parameters like number of executors, number of executor cores and executor memory. From our experimental study we conclude that log analysis with Spark is extremely fast with no significant performance variation observed with increase in data volume. The challenging task, however, is selecting spark parameters for getting optimal performance.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124676369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative Analysis of Low Cost Photodetectors for Visible Light Communication 低成本可见光通信光电探测器的比较分析
A. Bishnu, Suman Das, Megha Soni, V. Bhatia
Visible light communication (VLC) has emerged as a promising supplement to radio frequency technology for secure and green wireless communication. In this paper, comparative analysis of various low cost photodetectors such as solar panel and silicon photodiode (PD) is performed to check the viability of VLC for low cost easily available commodity hardware. To check the viability of VLC in different practical scenarios, experiments are performed in dark room and in the presence of noise from sunlight and artificial light sources such as fluorescent and incandescent lamps. Experimental results indicate that PD exhibits superior performance over solar panel in terms of sharp rise and fall time. However, the bit error rate performance of solar panel is better than that of PD for the given setup.
可见光通信(VLC)已成为射频技术的一个有前途的补充,以实现安全和绿色的无线通信。在本文中,比较分析了各种低成本的光电探测器,如太阳能电池板和硅光电二极管(PD),以检查VLC在低成本容易获得的商品硬件上的可行性。为了验证VLC在不同实际场景下的可行性,实验在暗室中进行,并在日光和人工光源(如荧光灯和白炽灯)存在噪声的情况下进行。实验结果表明,在急剧上升和急剧下降时间方面,PD具有优于太阳能电池板的性能。然而,在给定的设置下,太阳能电池板的误码率性能优于PD。
{"title":"Comparative Analysis of Low Cost Photodetectors for Visible Light Communication","authors":"A. Bishnu, Suman Das, Megha Soni, V. Bhatia","doi":"10.1109/ANTS.2018.8710125","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710125","url":null,"abstract":"Visible light communication (VLC) has emerged as a promising supplement to radio frequency technology for secure and green wireless communication. In this paper, comparative analysis of various low cost photodetectors such as solar panel and silicon photodiode (PD) is performed to check the viability of VLC for low cost easily available commodity hardware. To check the viability of VLC in different practical scenarios, experiments are performed in dark room and in the presence of noise from sunlight and artificial light sources such as fluorescent and incandescent lamps. Experimental results indicate that PD exhibits superior performance over solar panel in terms of sharp rise and fall time. However, the bit error rate performance of solar panel is better than that of PD for the given setup.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123613035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of AF Relayed NLOS UV Communication Over Turbulent Channel 湍流信道上AF中继NLOS紫外通信性能分析
Kamal K. Garg, P. Singya, V. Bhatia
Ultraviolet (UV) communication experiences strong aerosol and molecular scattering which leads to non-line-of-sight (NLOS) connectivity. As the UV signal propagates through the atmosphere, the change in the refractive index of the atmosphere causes random fluctuations in the transmitted signal, this phenomenon is referred to as turbulence. The effect of atmospheric turbulence in NLOS UV communication link is usually ignored under the assumption of short distance communication. In this paper, we consider a NLOS UV communication system experiencing fading due to atmospheric turbulence and use relay-assisted transmission for improved connectivity. We present performance analysis of dual-hop amplify-and-forward (AF) relayed outdoor NLOS UV communication and derive closed-form expressions for the outage probability, average symbol error rate, ergodic capacity and relative diversity order. Analytical expressions using two different approximations are compared and validated with simulations.
紫外线(UV)通信经历强烈的气溶胶和分子散射,导致非视距(NLOS)连接。当紫外信号在大气中传播时,大气折射率的变化会引起传输信号的随机波动,这种现象被称为湍流。在短距离通信的假设下,大气湍流对NLOS紫外通信链路的影响通常被忽略。在本文中,我们考虑了由于大气湍流而经历衰落的NLOS UV通信系统,并使用中继辅助传输来改善连通性。本文对双跳放大转发(AF)中继室外NLOS UV通信进行了性能分析,并推导出中断概率、平均码误差率、遍历容量和相对分集顺序的封闭表达式。对两种不同近似的解析表达式进行了比较,并通过仿真进行了验证。
{"title":"Performance Analysis of AF Relayed NLOS UV Communication Over Turbulent Channel","authors":"Kamal K. Garg, P. Singya, V. Bhatia","doi":"10.1109/ANTS.2018.8710065","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710065","url":null,"abstract":"Ultraviolet (UV) communication experiences strong aerosol and molecular scattering which leads to non-line-of-sight (NLOS) connectivity. As the UV signal propagates through the atmosphere, the change in the refractive index of the atmosphere causes random fluctuations in the transmitted signal, this phenomenon is referred to as turbulence. The effect of atmospheric turbulence in NLOS UV communication link is usually ignored under the assumption of short distance communication. In this paper, we consider a NLOS UV communication system experiencing fading due to atmospheric turbulence and use relay-assisted transmission for improved connectivity. We present performance analysis of dual-hop amplify-and-forward (AF) relayed outdoor NLOS UV communication and derive closed-form expressions for the outage probability, average symbol error rate, ergodic capacity and relative diversity order. Analytical expressions using two different approximations are compared and validated with simulations.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ANTS 2018 Copyright Page 蚂蚁2018版权专页
{"title":"ANTS 2018 Copyright Page","authors":"","doi":"10.1109/ants.2018.8710166","DOIUrl":"https://doi.org/10.1109/ants.2018.8710166","url":null,"abstract":"","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1