首页 > 最新文献

2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

英文 中文
Robust Multicast Device-to-Device Communication 鲁棒组播设备到设备通信
Uyoata Uyoata, M. Dlodlo, Joyce B. Mwangama
Device-to-device (D2D) multicast communication can be employed in distributing popular content among similarly interested groups thereby reducing the load on the network. When the network multicasts a requested file to a cluster or group of users, some members of a cluster may not receive the sent data correctly and so may require re-transmission by other selected group members through D2D multicast communication. In analysing D2D communication, the availability of perfect channel information (CSI) is mostly assumed. Hence the need for a channel uncertainty aware D2D multicast communication analysis. In this paper a multicast D2D communication underlaying uplink cellular communication is formulated as a robust optimisation problem that caters for uncertainty in the interference channels between D2D multicast groups within a cell. K-means algorithm is employed to create D2D groups. Using simulations, the impact of factoring in channel uncertainty is demonstrated. The gains of group communication is also shown through simulation as increasing the number of groups provides a pronounced increase in D2D data rate specifically in moving from 2 to 3 groups there is an increase of 2 bps/Hz. Furthermore, the effect of D2D group dimension on the transmission data rate is also shown through the numerical results with a drop of upto 0.5 bps/Hz for a variation of 20 to 60 m.
设备到设备(D2D)多播通信可用于在相似的感兴趣的组之间分发流行内容,从而减少网络负载。当网络向集群或用户组广播请求的文件时,集群的某些成员可能无法正确接收发送的数据,因此可能需要其他选定的组成员通过D2D多播通信重新传输。在分析D2D通信时,通常假定存在完全信道信息(CSI)。因此,需要一种信道不确定性感知的D2D多播通信分析方法。在本文中,基于上行蜂窝通信的多播D2D通信被制定为一个鲁棒优化问题,该问题迎合了蜂窝内D2D多播组之间干扰信道的不确定性。采用K-means算法创建D2D分组。通过仿真,证明了信道不确定性因素的影响。组通信的增益也通过模拟显示,增加组的数量提供了D2D数据速率的显著增加,特别是从2组移动到3组时,增加了2 bps/Hz。此外,数值结果还显示了D2D群维对传输数据速率的影响,在20 ~ 60 m的变化范围内,D2D群维对传输数据速率的影响可达0.5 bps/Hz。
{"title":"Robust Multicast Device-to-Device Communication","authors":"Uyoata Uyoata, M. Dlodlo, Joyce B. Mwangama","doi":"10.1109/ANTS.2018.8710155","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710155","url":null,"abstract":"Device-to-device (D2D) multicast communication can be employed in distributing popular content among similarly interested groups thereby reducing the load on the network. When the network multicasts a requested file to a cluster or group of users, some members of a cluster may not receive the sent data correctly and so may require re-transmission by other selected group members through D2D multicast communication. In analysing D2D communication, the availability of perfect channel information (CSI) is mostly assumed. Hence the need for a channel uncertainty aware D2D multicast communication analysis. In this paper a multicast D2D communication underlaying uplink cellular communication is formulated as a robust optimisation problem that caters for uncertainty in the interference channels between D2D multicast groups within a cell. K-means algorithm is employed to create D2D groups. Using simulations, the impact of factoring in channel uncertainty is demonstrated. The gains of group communication is also shown through simulation as increasing the number of groups provides a pronounced increase in D2D data rate specifically in moving from 2 to 3 groups there is an increase of 2 bps/Hz. Furthermore, the effect of D2D group dimension on the transmission data rate is also shown through the numerical results with a drop of upto 0.5 bps/Hz for a variation of 20 to 60 m.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128830996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ANTS 2018 Other Reviewers ANTS 2018其他审稿人
{"title":"ANTS 2018 Other Reviewers","authors":"","doi":"10.1109/ants.2018.8710047","DOIUrl":"https://doi.org/10.1109/ants.2018.8710047","url":null,"abstract":"","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127949661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-time Precision Agriculture Monitoring System using Mobile Sink in WSNs 基于无线传感器网络的移动汇实时精准农业监测系统
Ashish Gupta, Hari Prabhat Gupta, Preti Kumari, Rahul Mishra, Surbhi Saraswat, Tanima Dutta
Recent advances in sensor technology has influenced various aspects of human-life. It has highly improved the monitoring and control applications. Precision agriculture is one such application that requires real-time monitoring of agricultural field to take smarter decisions. A deterministic deployment strategy in Wireless Sensor Networks (WSNs) is used to deploy sensor nodes in a predefine deployment pattern to cover the entire monitoring region. This paper presents a system that monitors the agricultural field in real-time by using a single mobile sink in WSNs. We use the square deployment pattern for placement of the sensors in the agriculture field. A prototype is also developed and tested on real-time agricultural field data. The prototype uses temperature, humidity, and soil moisture sensors attached with NodeMCU. The system uses Wi-Fi for transferring the data collected from sensors to the mobile sink.
传感器技术的最新进展影响了人类生活的各个方面。它极大地提高了监测和控制的应用。精准农业就是这样一种应用,它需要实时监控农业领域以做出更明智的决策。无线传感器网络采用确定性部署策略,以预定义的部署模式部署传感器节点,以覆盖整个监控区域。本文提出了一种利用无线传感器网络中的单个移动接收器对农田进行实时监测的系统。我们在农业领域使用方形部署模式来放置传感器。还开发了一个原型,并在实时农业现场数据上进行了测试。原型机使用了与NodeMCU连接的温度、湿度和土壤湿度传感器。该系统使用Wi-Fi将从传感器收集的数据传输到移动接收器。
{"title":"A Real-time Precision Agriculture Monitoring System using Mobile Sink in WSNs","authors":"Ashish Gupta, Hari Prabhat Gupta, Preti Kumari, Rahul Mishra, Surbhi Saraswat, Tanima Dutta","doi":"10.1109/ANTS.2018.8710048","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710048","url":null,"abstract":"Recent advances in sensor technology has influenced various aspects of human-life. It has highly improved the monitoring and control applications. Precision agriculture is one such application that requires real-time monitoring of agricultural field to take smarter decisions. A deterministic deployment strategy in Wireless Sensor Networks (WSNs) is used to deploy sensor nodes in a predefine deployment pattern to cover the entire monitoring region. This paper presents a system that monitors the agricultural field in real-time by using a single mobile sink in WSNs. We use the square deployment pattern for placement of the sensors in the agriculture field. A prototype is also developed and tested on real-time agricultural field data. The prototype uses temperature, humidity, and soil moisture sensors attached with NodeMCU. The system uses Wi-Fi for transferring the data collected from sensors to the mobile sink.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121441931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Pharmaceutical uses of Blockchain Technology 区块链技术的制药应用
Camden Thatcher, Subrata Acharya
This research identifies a conceptual e-Prescription system based on blockchain technology. The system utilizes cryptocurrency principles applied to the electronic prescription processes to achieve its goals. This e-Prescription system can be utilized as a combatant to the nationwide opioid crisis as a potential Prescription Drug Monitoring System (PDMP). While not a fully evaluated system, the proof of concept results presented have significant demonstrated potential. Moreover, the concepts can be used to create a system that can serve as an inspiration to use blockchain technology in healthcare applications.
本研究确定了一个基于区块链技术的概念性电子处方系统。该系统利用应用于电子处方流程的加密货币原理来实现其目标。这个电子处方系统可以作为一个潜在的处方药监测系统(PDMP),作为全国性阿片类药物危机的战斗人员。虽然不是一个充分评估的系统,但所提出的概念验证结果具有显着的演示潜力。此外,这些概念可用于创建一个系统,该系统可作为在医疗保健应用程序中使用区块链技术的灵感。
{"title":"Pharmaceutical uses of Blockchain Technology","authors":"Camden Thatcher, Subrata Acharya","doi":"10.1109/ANTS.2018.8710154","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710154","url":null,"abstract":"This research identifies a conceptual e-Prescription system based on blockchain technology. The system utilizes cryptocurrency principles applied to the electronic prescription processes to achieve its goals. This e-Prescription system can be utilized as a combatant to the nationwide opioid crisis as a potential Prescription Drug Monitoring System (PDMP). While not a fully evaluated system, the proof of concept results presented have significant demonstrated potential. Moreover, the concepts can be used to create a system that can serve as an inspiration to use blockchain technology in healthcare applications.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Spectrum Sensing in Mobile Full-Duplex Cognitive Radio 移动全双工认知无线电中的频谱感知
Santoshkumar Sabat, P. Sharma, A. Gandhi
In this paper, a mobile secondary user (SU) having in-band full-duplex (FD) ability is considered. We investigate the effect of the SU mobility and residual self-interference (RSI) on sensing performance. The fading channel between primary and secondary users is considered to be time-selective frequency flat Rayleigh fading channel. The RSI channel is also assumed to be Rayleigh fading channel. We analytically derive the closed form expressions for false alarm and detection probabilities. Moreover we analyse the receiver operating characteristics (ROC) and total error rate (TER) performance using energy detector (ED). The results show that the sensing performance degrades with increase in secondary user’s speed and also due to RSI. The results are verified through Monte Carlo simulations.
本文考虑具有带内全双工(FD)能力的移动辅助用户(SU)。我们研究了SU迁移率和残余自干扰(RSI)对传感性能的影响。主从用户之间的衰落信道被认为是时间选择频率的平坦瑞利衰落信道。RSI信道也假定为瑞利衰落信道。我们解析地导出了虚警和检测概率的封闭表达式。此外,我们还利用能量检测器(ED)分析了接收机的工作特性(ROC)和总误差率(TER)性能。结果表明,感应性能随着二次用户速度的增加和RSI的影响而下降。通过蒙特卡洛仿真验证了结果。
{"title":"Spectrum Sensing in Mobile Full-Duplex Cognitive Radio","authors":"Santoshkumar Sabat, P. Sharma, A. Gandhi","doi":"10.1109/ANTS.2018.8710090","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710090","url":null,"abstract":"In this paper, a mobile secondary user (SU) having in-band full-duplex (FD) ability is considered. We investigate the effect of the SU mobility and residual self-interference (RSI) on sensing performance. The fading channel between primary and secondary users is considered to be time-selective frequency flat Rayleigh fading channel. The RSI channel is also assumed to be Rayleigh fading channel. We analytically derive the closed form expressions for false alarm and detection probabilities. Moreover we analyse the receiver operating characteristics (ROC) and total error rate (TER) performance using energy detector (ED). The results show that the sensing performance degrades with increase in secondary user’s speed and also due to RSI. The results are verified through Monte Carlo simulations.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115668984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mechanism of dynamic, impact-aware and context-aware orchestration of cognitive functions in 5G networks 5G网络中动态、影响感知和情境感知的认知功能编排机制
R. Ravichandran, M. Moorthy, S. Seetharaman
As networks grow in size, heterogeneity and complexity, automated management and end-to-end orchestration to maintain service-level agreements (SLAs) becomes essential. With the advent of 5G, network slicing adds another dimension to this challenge. Cognitive functions play a key role in autonomic orchestration, and as cognitive functions increase in number, variety and are increasingly distributed in order to play a more effective role. In such a scenario, effective end-to-end orchestration of the cognitive functions is vital to reap the full benefits of the available intelligence for automated operation. Existing work in orchestrating cognitive functions has limitations in scope and coverage, and addresses only certain aspects. We propose a dynamic, impact-aware and context-aware end-to-end orchestration of cognitive functions in the network, resulting in improved overall SLA adherence of all services and network slices, and improved operational efficiency by minimizing human intervention.
随着网络规模、异构性和复杂性的增长,维护服务水平协议(sla)的自动化管理和端到端编排变得至关重要。随着5G的到来,网络切片为这一挑战增加了另一个维度。认知功能在自主协调中起着关键作用,随着认知功能在数量、种类和分布上的不断增加,认知功能发挥的作用也越来越有效。在这样的场景中,有效的端到端认知功能编排对于获得自动化操作的可用智能的全部好处至关重要。现有的协调认知功能的工作在范围和覆盖范围上都有局限性,并且只涉及某些方面。我们提出了一种动态的、影响感知的和上下文感知的端到端网络认知功能编排,从而提高了所有服务和网络切片的整体SLA遵从性,并通过最小化人为干预提高了运营效率。
{"title":"Mechanism of dynamic, impact-aware and context-aware orchestration of cognitive functions in 5G networks","authors":"R. Ravichandran, M. Moorthy, S. Seetharaman","doi":"10.1109/ANTS.2018.8710053","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710053","url":null,"abstract":"As networks grow in size, heterogeneity and complexity, automated management and end-to-end orchestration to maintain service-level agreements (SLAs) becomes essential. With the advent of 5G, network slicing adds another dimension to this challenge. Cognitive functions play a key role in autonomic orchestration, and as cognitive functions increase in number, variety and are increasingly distributed in order to play a more effective role. In such a scenario, effective end-to-end orchestration of the cognitive functions is vital to reap the full benefits of the available intelligence for automated operation. Existing work in orchestrating cognitive functions has limitations in scope and coverage, and addresses only certain aspects. We propose a dynamic, impact-aware and context-aware end-to-end orchestration of cognitive functions in the network, resulting in improved overall SLA adherence of all services and network slices, and improved operational efficiency by minimizing human intervention.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130761600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Performance Evaluation of High-performance Data Transfer Tools 高性能数据传输工具的比较性能评估
Deepak Nadig, Eun-Sung Jung, R. Kettimuthu, Ian T Foster, N. Rao, B. Ramamurthy
Data transfer in wide-area networks has been long studied in different contexts, from data sharing among data centers to online access to scientific data. Many software tools and platforms have been developed to facilitate easy, reliable, fast, and secure data transfer over wide area networks, such as GridFTP, FDT, bbcp, mdtmFTP, and XDD. However, few studies have shown the full capabilities of existing data transfer tools from the perspective of whether such tools have fully adopted state-of-the-art techniques through meticulous comparative evaluations. In this paper, we evaluate the performance of the four highperformance data transfer tools (GridFTP, FDT, mdtmFTP, and XDD) in various environments. Our evaluation suggests that each tool has strengths and weaknesses. FDT and GridFTP perform consistently in diverse environments. XDD and mdtmFTP show improved performance in limited environments and datasets during our evaluation. Unlike other studies on data transfer tools, we also evaluate the predictability of the tools’ performance, an important factor for scheduling different stages of science workflows. Performance predictability also helps in (auto)tuning the configurable parameters of the data transfer tool. We apply statistical learning techniques such as linear/polynomial regression, and k-nearest neighbors (kNN), to assess the performance predictability of each tool using its control parameters. Our results show that we can achieve good prediction performance for GridFTP and mdtmFTP using linear regression and kNN, respectively.
从数据中心之间的数据共享到科学数据的在线访问,广域网中的数据传输已经在不同的背景下进行了长期的研究。已经开发了许多软件工具和平台来促进在广域网上简单、可靠、快速和安全的数据传输,例如GridFTP、FDT、bbcp、mdtmFTP和XDD。然而,很少有研究从这些工具是否通过细致的比较评价充分采用最先进的技术的角度显示现有数据传输工具的全部能力。在本文中,我们评估了四种高性能数据传输工具(GridFTP, FDT, mdtmFTP和XDD)在各种环境中的性能。我们的评估表明每个工具都有优点和缺点。FDT和GridFTP在不同的环境中表现一致。在我们的评估过程中,XDD和mdtmFTP在有限的环境和数据集中显示出改进的性能。与其他关于数据传输工具的研究不同,我们还评估了工具性能的可预测性,这是调度科学工作流程不同阶段的重要因素。性能可预测性还有助于(自动)调优数据传输工具的可配置参数。我们应用统计学习技术,如线性/多项式回归和k近邻(kNN),来评估每个工具使用其控制参数的性能可预测性。我们的结果表明,我们可以分别使用线性回归和kNN对GridFTP和mdtmFTP获得良好的预测性能。
{"title":"Comparative Performance Evaluation of High-performance Data Transfer Tools","authors":"Deepak Nadig, Eun-Sung Jung, R. Kettimuthu, Ian T Foster, N. Rao, B. Ramamurthy","doi":"10.1109/ANTS.2018.8710071","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710071","url":null,"abstract":"Data transfer in wide-area networks has been long studied in different contexts, from data sharing among data centers to online access to scientific data. Many software tools and platforms have been developed to facilitate easy, reliable, fast, and secure data transfer over wide area networks, such as GridFTP, FDT, bbcp, mdtmFTP, and XDD. However, few studies have shown the full capabilities of existing data transfer tools from the perspective of whether such tools have fully adopted state-of-the-art techniques through meticulous comparative evaluations. In this paper, we evaluate the performance of the four highperformance data transfer tools (GridFTP, FDT, mdtmFTP, and XDD) in various environments. Our evaluation suggests that each tool has strengths and weaknesses. FDT and GridFTP perform consistently in diverse environments. XDD and mdtmFTP show improved performance in limited environments and datasets during our evaluation. Unlike other studies on data transfer tools, we also evaluate the predictability of the tools’ performance, an important factor for scheduling different stages of science workflows. Performance predictability also helps in (auto)tuning the configurable parameters of the data transfer tool. We apply statistical learning techniques such as linear/polynomial regression, and k-nearest neighbors (kNN), to assess the performance predictability of each tool using its control parameters. Our results show that we can achieve good prediction performance for GridFTP and mdtmFTP using linear regression and kNN, respectively.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115854466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AppHunter: Mobile Application Traffic Classification AppHunter:移动应用流量分类
Mayank Swarnkar, N. Hubballi, Nikhil Tripathi, M. Conti
Traffic classification finds its application in the implementation of various services like Quality of Service (QoS) and security monitoring. In today’s networks, a significant portion of traffic is generated from mobile applications. Thus, a robust and accurate mobile application traffic classification technique is needed. In this paper, we propose AppHunter, a mobile application classification technique to classify Android applications using Deep Packet Inspection (DPI). Unlike previously known mobile application classification techniques, AppHunter is an unsupervised approach and does not require training with flows explicitly collected for each application. AppHunter extracts required fields from HTTP/HTTPS header of a flow and compares them with application details extracted from Google Playstore. We test the classification performance of AppHunter with two publicly available datasets and one dataset generated by simulating more than thousand applications in our testbed setup and report the results. We also show an application of AppHunter by using its rules for network traffic filtering and shaping.
流分类在服务质量(QoS)和安全监控等各种服务的实现中得到了应用。在今天的网络中,很大一部分流量是由移动应用程序产生的。因此,需要一种鲁棒、准确的移动应用流量分类技术。本文提出了一种基于深度包检测(Deep Packet Inspection, DPI)的移动应用分类技术AppHunter。与以前已知的移动应用程序分类技术不同,AppHunter是一种无监督的方法,不需要使用为每个应用程序明确收集的流进行训练。AppHunter从流的HTTP/HTTPS头中提取所需字段,并将它们与从Google Playstore中提取的应用程序详细信息进行比较。我们使用两个公开可用的数据集和一个通过在我们的测试平台设置中模拟数千个应用程序生成的数据集来测试AppHunter的分类性能,并报告结果。我们还展示了AppHunter的一个应用,使用它的规则进行网络流量过滤和整形。
{"title":"AppHunter: Mobile Application Traffic Classification","authors":"Mayank Swarnkar, N. Hubballi, Nikhil Tripathi, M. Conti","doi":"10.1109/ANTS.2018.8710170","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710170","url":null,"abstract":"Traffic classification finds its application in the implementation of various services like Quality of Service (QoS) and security monitoring. In today’s networks, a significant portion of traffic is generated from mobile applications. Thus, a robust and accurate mobile application traffic classification technique is needed. In this paper, we propose AppHunter, a mobile application classification technique to classify Android applications using Deep Packet Inspection (DPI). Unlike previously known mobile application classification techniques, AppHunter is an unsupervised approach and does not require training with flows explicitly collected for each application. AppHunter extracts required fields from HTTP/HTTPS header of a flow and compares them with application details extracted from Google Playstore. We test the classification performance of AppHunter with two publicly available datasets and one dataset generated by simulating more than thousand applications in our testbed setup and report the results. We also show an application of AppHunter by using its rules for network traffic filtering and shaping.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128862015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Generic Construction for Efficient and Secure AKA Protocol in 5G Network 5G网络中高效安全AKA协议的通用构建
The 3GPP has designed the authentication and key agreement (AKA) protocol for the 5G network to overcome the security deficiencies found in (Evolved Packet Service) EPS-AKA protocol of Long Term Evolution-Advanced (LTE-A) network. However, the existing 5G-AKA protocol is vulnerable to several attacks such as impersonation, man-in-the-middle, and denial of service attack. The identified protocol vulnerabilities would enable an adversary to impersonate the legitimate mobile user and the serving network. In addition, the communication entities incur high computational overhead. In this paper, we propose the generic construction for efficient and secure AKA protocol in the 5G network. For the correctness of the protocol, the formal verification is carried out using the AVISPA tool. In addition, the security analysis illustrates that the protocol fulfills all the security requirements and is secure against the known attacks. Moreover, the performance evaluation of the protocol shows less communication and computation overhead during the AKA process of 5G network.
3GPP为克服LTE-A网络(演进分组业务)aes -AKA协议存在的安全缺陷,设计了5G网络的认证和密钥协议(AKA)协议。但是,现有的5G-AKA协议容易受到冒充、中间人攻击和拒绝服务攻击等几种攻击。识别的协议漏洞将使攻击者能够冒充合法的移动用户和服务网络。此外,通信实体会产生很高的计算开销。本文提出了5G网络中高效、安全的AKA协议的通用架构。为了保证协议的正确性,使用AVISPA工具进行了形式化验证。此外,安全性分析表明,该协议满足所有安全需求,并且对已知的攻击是安全的。此外,该协议的性能评估表明,在5G网络AKA过程中,通信和计算开销较小。
{"title":"A Generic Construction for Efficient and Secure AKA Protocol in 5G Network","authors":"","doi":"10.1109/ants.2018.8710157","DOIUrl":"https://doi.org/10.1109/ants.2018.8710157","url":null,"abstract":"The 3GPP has designed the authentication and key agreement (AKA) protocol for the 5G network to overcome the security deficiencies found in (Evolved Packet Service) EPS-AKA protocol of Long Term Evolution-Advanced (LTE-A) network. However, the existing 5G-AKA protocol is vulnerable to several attacks such as impersonation, man-in-the-middle, and denial of service attack. The identified protocol vulnerabilities would enable an adversary to impersonate the legitimate mobile user and the serving network. In addition, the communication entities incur high computational overhead. In this paper, we propose the generic construction for efficient and secure AKA protocol in the 5G network. For the correctness of the protocol, the formal verification is carried out using the AVISPA tool. In addition, the security analysis illustrates that the protocol fulfills all the security requirements and is secure against the known attacks. Moreover, the performance evaluation of the protocol shows less communication and computation overhead during the AKA process of 5G network.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Joint Distributed Sensing and Channel Access in Cognitive Radio Networks 认知无线网络中的联合分布式感知和信道接入
M. Santhoshkumar, Dony J. Muttath, K. Premkumar
We consider a Cognitive Radio Network having one Primary User (PU) and N Secondary Users (SUs). In this paper, we study the problem of joint channel–sensing and channel– access for SUs. When the channel is in use by the PU, the signal that the PU sends and the channel fading gains are unknown to SUs. The channel sensing problem that we consider is detecting whether or not there is an unknown signal (with random fading) in noise. For this channel–sensing problem, we propose a sequential detection procedure based on the energy of samples that each SU observes. As soon as an SU detects the idle/busy state of the channel, it broadcasts it’s local decision to all other SUs. We propose a global decision rule that makes a decision that the channel is idle, only if at least $Gamma$ out of N SUs have broadcast idle local decisions; otherwise, the global decision rule makes a decision that the channel is busy. Also, the channel access is provided to the SU that is the first one to broadcast an idle decision. We study the detection and false-alarm performance of our proposed procedure, and compare the performance with that of Sequential Probability Ratio Test (SPRT) based sensing procedure. From the Receiver Operating Characteristic (ROC), and the average sample number (ASN) metrics, we observe that our energy based sequential sensing procedure yields a better probability of detection than the SPRT based procedure for a given probability of false-alarm. Also, as the threshold on the number of idle local decisions $Gamma$ increases, probability of detection also increases, but at the cost of detection delay.
我们考虑一个具有1个主用户(PU)和N个辅助用户(su)的认知无线网络。本文研究了SUs的联合信道感知和信道接入问题。当该信道被PU使用时,PU发送的信号和信道的衰落增益是su不知道的。我们考虑的信道感知问题是检测噪声中是否存在未知信号(随机衰落)。对于这个通道感知问题,我们提出了一个基于每个SU观察到的样本能量的顺序检测过程。一旦某个SU检测到通道的空闲/繁忙状态,它就会向所有其他SU广播它的本地决策。我们提出了一个全局决策规则,只有当N个单元中至少有$Gamma$广播了空闲的本地决策时,才会做出信道空闲的决策;否则,全局决策规则将做出通道忙的决定。另外,将通道访问提供给第一个广播空闲决策的SU。研究了该方法的检测和虚警性能,并与基于序列概率比测试(SPRT)的感知方法进行了性能比较。从接收者工作特征(ROC)和平均样本数(ASN)度量中,我们观察到,对于给定的假警报概率,我们基于能量的顺序感知过程比基于SPRT的过程产生更好的检测概率。此外,随着空闲本地决策数量的阈值$Gamma$的增加,检测的概率也会增加,但代价是检测延迟。
{"title":"Joint Distributed Sensing and Channel Access in Cognitive Radio Networks","authors":"M. Santhoshkumar, Dony J. Muttath, K. Premkumar","doi":"10.1109/ANTS.2018.8710134","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710134","url":null,"abstract":"We consider a Cognitive Radio Network having one Primary User (PU) and N Secondary Users (SUs). In this paper, we study the problem of joint channel–sensing and channel– access for SUs. When the channel is in use by the PU, the signal that the PU sends and the channel fading gains are unknown to SUs. The channel sensing problem that we consider is detecting whether or not there is an unknown signal (with random fading) in noise. For this channel–sensing problem, we propose a sequential detection procedure based on the energy of samples that each SU observes. As soon as an SU detects the idle/busy state of the channel, it broadcasts it’s local decision to all other SUs. We propose a global decision rule that makes a decision that the channel is idle, only if at least $Gamma$ out of N SUs have broadcast idle local decisions; otherwise, the global decision rule makes a decision that the channel is busy. Also, the channel access is provided to the SU that is the first one to broadcast an idle decision. We study the detection and false-alarm performance of our proposed procedure, and compare the performance with that of Sequential Probability Ratio Test (SPRT) based sensing procedure. From the Receiver Operating Characteristic (ROC), and the average sample number (ASN) metrics, we observe that our energy based sequential sensing procedure yields a better probability of detection than the SPRT based procedure for a given probability of false-alarm. Also, as the threshold on the number of idle local decisions $Gamma$ increases, probability of detection also increases, but at the cost of detection delay.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1