首页 > 最新文献

2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

英文 中文
Adaptive Resource Block Allocation for Green 5G Wireless Communication Networks 绿色5G无线通信网络的自适应资源块分配
Pimmy Gandotra, R. Jha
The most precious resource for the mobile network operators (MNOs) is the radio spectrum, cardinal for meeting the quality of service (QoS) requirements of the users. An integral technology of the budding fifth generation (5G) wireless communication networks (WCNs) is device-to-device (D2D) communication. To make use of the gains offered by D2D communication, optimal resource sharing with the cellular users in the network is necessitated. This paper proposes an adaptive resource block (RB) allocation scheme, using Hidden Markov Model (HMM), to assure adequate resource availability to each demanding D2D pair in the network. The adaptive allocation of resources improves the system throughput and energy efficiency (EE), meeting the QoS demands of the D2D pairs and fostering green communication. Since RB sharing is between pairs and cellular users, interference rises. The improvement in performance is achieved by sectoring the cellular coverage region, which diminishes the interference levels. The potency of the proposed adaptive scheme has been verified through simulations.
无线频谱是移动网络运营商最宝贵的资源,是满足用户服务质量要求的基础。新兴的第五代(5G)无线通信网络(WCNs)的一项重要技术是设备到设备(D2D)通信。为了充分利用D2D通信的优势,需要优化网络中蜂窝用户的资源共享。本文提出了一种基于隐马尔可夫模型(HMM)的自适应资源块(RB)分配方案,以保证网络中每个需求D2D对的资源可用性。资源的自适应分配提高了系统吞吐量和能效,满足了D2D对的QoS需求,促进了绿色通信。由于RB共享是在对和蜂窝用户之间进行的,因此干扰会增加。性能的提高是通过分割蜂窝覆盖区域来实现的,这降低了干扰水平。仿真结果验证了该自适应方案的有效性。
{"title":"Adaptive Resource Block Allocation for Green 5G Wireless Communication Networks","authors":"Pimmy Gandotra, R. Jha","doi":"10.1109/ANTS.2018.8710144","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710144","url":null,"abstract":"The most precious resource for the mobile network operators (MNOs) is the radio spectrum, cardinal for meeting the quality of service (QoS) requirements of the users. An integral technology of the budding fifth generation (5G) wireless communication networks (WCNs) is device-to-device (D2D) communication. To make use of the gains offered by D2D communication, optimal resource sharing with the cellular users in the network is necessitated. This paper proposes an adaptive resource block (RB) allocation scheme, using Hidden Markov Model (HMM), to assure adequate resource availability to each demanding D2D pair in the network. The adaptive allocation of resources improves the system throughput and energy efficiency (EE), meeting the QoS demands of the D2D pairs and fostering green communication. Since RB sharing is between pairs and cellular users, interference rises. The improvement in performance is achieved by sectoring the cellular coverage region, which diminishes the interference levels. The potency of the proposed adaptive scheme has been verified through simulations.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT 基于指数平滑的物联网黑洞攻击检测方法
R. Sahay, G. Geethakumari, Barsha Mitra, V. Thejas
Low power and lossy network (LLN) comprising of constrained devices like sensors and RFIDs, is a major component in the Internet of Things (IoT) environment as these devices provide global connectivity to physical devices or “Things”. LLNs are tied to the Internet or any High Performance Computing environment via an adaptation layer called 6LoWPAN (IPv6 over Low power Personal Area Network). The routing protocol used by 6LoWPAN is RPL (IPv6 Routing Protocol over LLN). Like many other routing protocols, RPL is susceptible to blackhole attacks which cause topological isolation for a subset of nodes in the LLN. A malicious node instigating the blackhole attack drops received packets from nodes in its subtree which it is supposed to forward. Thus, the malicious node successfully isolates nodes in its subtree from the rest of the network. In this paper, we propose an algorithm based on the concept of exponential smoothing to detect the topological isolation of nodes due to blackhole attack. Exponential smoothing is a technique for smoothing time series data using the exponential window function and is used for short, medium and long term forecasting. In our proposed algorithm, exponential smoothing is used to estimate the next arrival time of packets at the sink node from every other node in the LLN. Using this estimation, the algorithm is designed to identify the malicious nodes instigating blackhole attack in real time.
低功耗和损耗网络(LLN)由传感器和rfid等受限设备组成,是物联网(IoT)环境中的主要组成部分,因为这些设备为物理设备或“事物”提供全球连接。lln通过一个称为6LoWPAN(低功耗个人局域网IPv6)的适配层绑定到互联网或任何高性能计算环境。6LoWPAN使用的路由协议是RPL (IPv6 routing protocol over LLN)。与许多其他路由协议一样,RPL容易受到黑洞攻击,从而导致LLN中一部分节点的拓扑隔离。发起黑洞攻击的恶意节点会丢弃从其子树节点接收到的数据包,而这些数据包本应转发。因此,恶意节点成功地将其子树中的节点与网络的其余部分隔离开来。在本文中,我们提出了一种基于指数平滑的算法来检测由于黑洞攻击而导致的节点拓扑隔离。指数平滑是一种利用指数窗口函数平滑时间序列数据的技术,用于短期、中期和长期预测。在我们提出的算法中,使用指数平滑来估计来自LLN中每个其他节点的数据包下一次到达汇聚节点的时间。利用这一估计,设计了实时识别引发黑洞攻击的恶意节点的算法。
{"title":"Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT","authors":"R. Sahay, G. Geethakumari, Barsha Mitra, V. Thejas","doi":"10.1109/ANTS.2018.8710073","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710073","url":null,"abstract":"Low power and lossy network (LLN) comprising of constrained devices like sensors and RFIDs, is a major component in the Internet of Things (IoT) environment as these devices provide global connectivity to physical devices or “Things”. LLNs are tied to the Internet or any High Performance Computing environment via an adaptation layer called 6LoWPAN (IPv6 over Low power Personal Area Network). The routing protocol used by 6LoWPAN is RPL (IPv6 Routing Protocol over LLN). Like many other routing protocols, RPL is susceptible to blackhole attacks which cause topological isolation for a subset of nodes in the LLN. A malicious node instigating the blackhole attack drops received packets from nodes in its subtree which it is supposed to forward. Thus, the malicious node successfully isolates nodes in its subtree from the rest of the network. In this paper, we propose an algorithm based on the concept of exponential smoothing to detect the topological isolation of nodes due to blackhole attack. Exponential smoothing is a technique for smoothing time series data using the exponential window function and is used for short, medium and long term forecasting. In our proposed algorithm, exponential smoothing is used to estimate the next arrival time of packets at the sink node from every other node in the LLN. Using this estimation, the algorithm is designed to identify the malicious nodes instigating blackhole attack in real time.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123526798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cognitive Hybrid Satellite-Terrestrial Relay Networks with Simultaneous Energy and Information Transmission 能量和信息同步传输的认知混合卫星-地面中继网络
Vibhum Singh, P. K. Upadhyay
In this paper, a cognitive hybrid satellite-terrestrial relay network with power splitting-based energy harvesting (EH) has been proposed. Herein, a primary satellite source coexists with a secondary transmitter-receiver pair on the ground and communicates with its terrestrial user by exploiting both direct and relay links. It is further assumed that secondary transmitter has the radio-frequency-based EH capability and harvests energy from the primary satellite’s signal. Hereby, it explores an opportunity for spectrum access through an amplify-and-forward based relay cooperation with the primary satellite network. We analyze the performance of the primary satellite network and secondary terrestrial network by adopting Shadowed-Rician fading for satellite links and Nakagami-m fading for terrestrial links by deriving their corresponding outage probability expressions. In addition, to get useful insights, expressions for throughput and energy efficiency of primary satellite network are provided assuming a delay-limited scenario. Moreover, our results elucidate the impact of power splitting factor and spectrum sharing factor on the system performance.
提出了一种基于功率分裂能量收集的认知混合星地中继网络。在这种情况下,主要卫星源与地面上的次级发射机-接收机对共存,并通过利用直接和中继链路与其地面用户通信。进一步假设二次发射机具有基于射频的EH能力,并从主卫星的信号中获取能量。因此,它通过与主卫星网络进行基于放大和转发的中继合作来探索频谱接入的机会。通过推导出卫星链路和地面链路的中断概率表达式,分别对卫星链路和地面链路分别采用阴影-专家衰落和Nakagami-m衰落来分析卫星主网和地面副网的性能。此外,为了得到有用的见解,给出了假设延迟有限的情况下主卫星网络吞吐量和能量效率的表达式。此外,我们的研究结果阐明了功率分裂因子和频谱共享因子对系统性能的影响。
{"title":"Cognitive Hybrid Satellite-Terrestrial Relay Networks with Simultaneous Energy and Information Transmission","authors":"Vibhum Singh, P. K. Upadhyay","doi":"10.1109/ANTS.2018.8710070","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710070","url":null,"abstract":"In this paper, a cognitive hybrid satellite-terrestrial relay network with power splitting-based energy harvesting (EH) has been proposed. Herein, a primary satellite source coexists with a secondary transmitter-receiver pair on the ground and communicates with its terrestrial user by exploiting both direct and relay links. It is further assumed that secondary transmitter has the radio-frequency-based EH capability and harvests energy from the primary satellite’s signal. Hereby, it explores an opportunity for spectrum access through an amplify-and-forward based relay cooperation with the primary satellite network. We analyze the performance of the primary satellite network and secondary terrestrial network by adopting Shadowed-Rician fading for satellite links and Nakagami-m fading for terrestrial links by deriving their corresponding outage probability expressions. In addition, to get useful insights, expressions for throughput and energy efficiency of primary satellite network are provided assuming a delay-limited scenario. Moreover, our results elucidate the impact of power splitting factor and spectrum sharing factor on the system performance.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125218530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Edge Assisted DASH Video Caching Mechanism for Multi-access Edge Computing 多访问边缘计算的边缘辅助DASH视频缓存机制
Shashwat Kumar, D. Vineeth, A. Franklin
Proliferation in mobile devices and the increase in video data consumption on these devices has led to an unprecedented surge of data usage in mobile networks. It is both challenging and expensive for network operators to scale up the network capacity and tackle this ever increasing data demand. Cellular network operators require alternative solutions, like in-network-caching, to solve this problem. Popular streaming services like YouTube use Dynamic Adaptive Streaming over HTTP (DASH) for video streaming where videos are divided into several small segments, and multiple bit-rate versions of each segment are stored in the server. Using store and forward caching method, in the network, may not help as the video segments cached in one session might not be usable for other users. This problem of unusability emerges as different users request different bit-rates of the same video segment. Also, it is not efficient to cache all versions of the video segments at the edge of the network, due to limited storage at the edge. In this paper, we propose a Multi-access Edge Computing (MEC) based video caching mechanism, where only the highest available bit-rate video is cached and by using the processing power available at the MEC it is transcoded to the requested lower bit-rate version. We develop a test-bed to evaluate the performance of the proposed caching mechanism in real time. Through various experimental results, we demonstrate that the proposed method reduces the backhaul traffic load and video load time and increases the cache hit-rate as compared to traditional store and forward caching mechanism.
随着移动设备的普及和视频数据消费量的增加,移动网络的数据使用量出现了前所未有的激增。对于网络运营商来说,扩大网络容量并满足不断增长的数据需求既具有挑战性又成本高昂。蜂窝网络运营商需要其他解决方案,比如网络内缓存来解决这个问题。流行的流媒体服务如YouTube使用动态自适应流媒体HTTP (DASH)视频流,视频被分成几个小片段,每个片段的多个比特率版本存储在服务器中。在网络中使用存储和转发缓存方法可能没有帮助,因为缓存在一个会话中的视频片段可能无法为其他用户使用。当不同的用户对同一视频片段要求不同的比特率时,这种不可用性问题就出现了。此外,由于网络边缘的存储空间有限,在网络边缘缓存所有版本的视频片段的效率也不高。在本文中,我们提出了一种基于多访问边缘计算(MEC)的视频缓存机制,其中仅缓存最高可用比特率的视频,并利用MEC可用的处理能力将其转编码为所请求的低比特率版本。我们开发了一个测试平台来实时评估所提出的缓存机制的性能。通过各种实验结果表明,与传统的存储和转发缓存机制相比,该方法减少了回程流量负载和视频加载时间,提高了缓存命中率。
{"title":"Edge Assisted DASH Video Caching Mechanism for Multi-access Edge Computing","authors":"Shashwat Kumar, D. Vineeth, A. Franklin","doi":"10.1109/ANTS.2018.8710106","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710106","url":null,"abstract":"Proliferation in mobile devices and the increase in video data consumption on these devices has led to an unprecedented surge of data usage in mobile networks. It is both challenging and expensive for network operators to scale up the network capacity and tackle this ever increasing data demand. Cellular network operators require alternative solutions, like in-network-caching, to solve this problem. Popular streaming services like YouTube use Dynamic Adaptive Streaming over HTTP (DASH) for video streaming where videos are divided into several small segments, and multiple bit-rate versions of each segment are stored in the server. Using store and forward caching method, in the network, may not help as the video segments cached in one session might not be usable for other users. This problem of unusability emerges as different users request different bit-rates of the same video segment. Also, it is not efficient to cache all versions of the video segments at the edge of the network, due to limited storage at the edge. In this paper, we propose a Multi-access Edge Computing (MEC) based video caching mechanism, where only the highest available bit-rate video is cached and by using the processing power available at the MEC it is transcoded to the requested lower bit-rate version. We develop a test-bed to evaluate the performance of the proposed caching mechanism in real time. Through various experimental results, we demonstrate that the proposed method reduces the backhaul traffic load and video load time and increases the cache hit-rate as compared to traditional store and forward caching mechanism.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An Analytical Study of Single and Two-slope Model in Wireless Sensor Networks 无线传感器网络中单斜率和双斜率模型的分析研究
M. M. J. Chowdhury, Sadman Hoque Sadi, S. R. Sabuj
Presently there is a globally growing demand across all industries for small and portable electronic devices which feature Internet connectivity. This is largely due to their ease of use provided by robust interoperability and feasibility in almost any scenario. An example of such devices are the sensors used in a wireless sensor network (WSN) where prolonged battery life is a major challenge. This paper presents energy efficiency optimization techniques to reduce transmission power and further validate our findings through the use of single and double-slope modeling in MATLAB. In the simulations multiple aspects have been studied such as the connection quality, energy efficiency and optimal power with respect to distance and transmission power. The results have shown that the proposed optimization technique provides improvement to existing WSN technology (e.g. a 38.9% reduction in optimal power usage at the same pathloss distance).
目前,全球各行各业对具有互联网连接功能的小型便携式电子设备的需求不断增长。这主要是由于它们在几乎任何场景中都具有健壮的互操作性和可行性,从而易于使用。这种设备的一个例子是无线传感器网络(WSN)中使用的传感器,其中延长电池寿命是一个主要挑战。本文提出了降低传输功率的能效优化技术,并通过在MATLAB中使用单斜率和双斜率建模进一步验证了我们的发现。在仿真中研究了连接质量、能量效率和最优功率与距离和传输功率的关系等多个方面。结果表明,所提出的优化技术对现有WSN技术提供了改进(例如,在相同的路径损耗距离下,最优功耗降低了38.9%)。
{"title":"An Analytical Study of Single and Two-slope Model in Wireless Sensor Networks","authors":"M. M. J. Chowdhury, Sadman Hoque Sadi, S. R. Sabuj","doi":"10.1109/ANTS.2018.8710109","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710109","url":null,"abstract":"Presently there is a globally growing demand across all industries for small and portable electronic devices which feature Internet connectivity. This is largely due to their ease of use provided by robust interoperability and feasibility in almost any scenario. An example of such devices are the sensors used in a wireless sensor network (WSN) where prolonged battery life is a major challenge. This paper presents energy efficiency optimization techniques to reduce transmission power and further validate our findings through the use of single and double-slope modeling in MATLAB. In the simulations multiple aspects have been studied such as the connection quality, energy efficiency and optimal power with respect to distance and transmission power. The results have shown that the proposed optimization technique provides improvement to existing WSN technology (e.g. a 38.9% reduction in optimal power usage at the same pathloss distance).","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Selection of truncated codes for implementation of Telemetry CDMA in Satellites 卫星遥测CDMA实现中截短码的选择
V. Rohit, Aashish Kumar, V. Ravichandran, S. Sudhakar, S. Udupa
The CCSDS standard for CDMA services between Data Relay (GEO) and LEO satellites can optionally be used by a member agency for direct-to-earth link. In the return services related to Non-coherent mode of this standard, the possible modulation for DG1 Mode 2 is SS-BPSK and length of each code is 2047 bits.In this paper, we explain a method which deals with derivation of a code set with truncated lengths from a code set of standard length (2047 bits), for suitability to hardware realization. The degradation in the cross correlation property of the codes caused due to truncation is mitigated by our method of optimizing on the cross correlation protection achieved through computer search for appropriate codes from this derived code set.
用于数据中继(GEO)和低轨道卫星之间CDMA服务的CCSDS标准可以由成员机构选择性地用于直接到地球的链路。在本标准中与非相干模式相关的返回业务中,DG1模式2的可能调制为SS-BPSK,每个码的长度为2047位。在本文中,我们解释了一种从标准长度(2047位)的代码集中推导出具有截断长度的代码集的方法,以适合硬件实现。我们的方法通过计算机从该派生代码集中搜索合适的代码来优化相互关联保护,从而减轻了由于截断引起的代码相互关联性能的下降。
{"title":"Selection of truncated codes for implementation of Telemetry CDMA in Satellites","authors":"V. Rohit, Aashish Kumar, V. Ravichandran, S. Sudhakar, S. Udupa","doi":"10.1109/ANTS.2018.8710054","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710054","url":null,"abstract":"The CCSDS standard for CDMA services between Data Relay (GEO) and LEO satellites can optionally be used by a member agency for direct-to-earth link. In the return services related to Non-coherent mode of this standard, the possible modulation for DG1 Mode 2 is SS-BPSK and length of each code is 2047 bits.In this paper, we explain a method which deals with derivation of a code set with truncated lengths from a code set of standard length (2047 bits), for suitability to hardware realization. The degradation in the cross correlation property of the codes caused due to truncation is mitigated by our method of optimizing on the cross correlation protection achieved through computer search for appropriate codes from this derived code set.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132725829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Out-Degree Based Clock Synchronization In Wireless Networks Using Precision Time Protocol 基于精确时间协议的无线网络外度时钟同步
Monika Bansal, Apurva Gupta
In this paper, an extension of Precision Time Protocol (PTP) to enable energy-efficient clock synchronization between the nodes within Wireless Sensor Network (WSN) is proposed. PTP is nanosecond accuracy clock synchronization protocol in which nodes are organized in master-slave hierarchy on the basis of clock accuracy by means of Best Master Clock (BMC) algorithm. The algorithm considers clock accuracy to select best clock in the system. A novel modification of IEEE 1588 BMC algorithm for energy-constraint multi-hop WSN has been proposed to reduce clock convergence time and energy needed by considering out-degree of clocks without sacrificing synchronization accuracy. The new algorithm results in energy efficient clock synchronization that makes it most appropriate for low-power multi-hop wireless sensor networks. We present NS-3 simulation data that confirms the effectiveness of work.
本文提出了一种精确时间协议(PTP)的扩展,以实现无线传感器网络(WSN)节点之间的高效时钟同步。PTP是一种纳秒级精度的时钟同步协议,该协议采用BMC (Best Master clock)算法,根据时钟精度将节点组织成主从结构。该算法考虑时钟精度,在系统中选择最佳时钟。针对能量约束型多跳无线传感器网络,提出了一种改进的IEEE 1588 BMC算法,在不牺牲同步精度的前提下,通过考虑时钟外度来减少时钟收敛时间和所需能量。新算法实现了高能效的时钟同步,使其最适合于低功耗多跳无线传感器网络。我们给出了NS-3模拟数据,证实了工作的有效性。
{"title":"Out-Degree Based Clock Synchronization In Wireless Networks Using Precision Time Protocol","authors":"Monika Bansal, Apurva Gupta","doi":"10.1109/ANTS.2018.8710042","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710042","url":null,"abstract":"In this paper, an extension of Precision Time Protocol (PTP) to enable energy-efficient clock synchronization between the nodes within Wireless Sensor Network (WSN) is proposed. PTP is nanosecond accuracy clock synchronization protocol in which nodes are organized in master-slave hierarchy on the basis of clock accuracy by means of Best Master Clock (BMC) algorithm. The algorithm considers clock accuracy to select best clock in the system. A novel modification of IEEE 1588 BMC algorithm for energy-constraint multi-hop WSN has been proposed to reduce clock convergence time and energy needed by considering out-degree of clocks without sacrificing synchronization accuracy. The new algorithm results in energy efficient clock synchronization that makes it most appropriate for low-power multi-hop wireless sensor networks. We present NS-3 simulation data that confirms the effectiveness of work.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133606523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ANTS 2018 Program 蚂蚁2018计划
{"title":"ANTS 2018 Program","authors":"","doi":"10.1109/ants.2018.8710167","DOIUrl":"https://doi.org/10.1109/ants.2018.8710167","url":null,"abstract":"","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122046096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANTS 2018 Message from General Co-Chairs 2018蚂蚁蚂蚁大会联合主席致辞
{"title":"ANTS 2018 Message from General Co-Chairs","authors":"","doi":"10.1109/ants.2018.8710077","DOIUrl":"https://doi.org/10.1109/ants.2018.8710077","url":null,"abstract":"","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Provisioning Framework for IoT Applications in Fog Computing Environment 雾计算环境下物联网应用资源配置框架
G. Rakshith, M. Rahul, G. S. Sanjay, V. NateshaB., R. R. Guddeti
The increasing utility of ubiquitous computing and dramatic shifts in the domain of Internet of Things (IoT) have generated the need to devise methods to enable the efficient storage and retrieval of data. Fog computing is the de facto paradigm most suitable to make efficient use of the edge devices and thus shifting the impetus from a centralized cloud environment to a decentralized computing paradigm. By utilizing fog resources near to the edge of the network, we can reduce the latency and the overheads involved in the processing of the data by deploying the required services on them. In this paper, we present resource provisioning framework which provisions the resources and also manages the registered services in a dynamic topology of the fog architecture. The results demonstrate that using fog computing for deploying services reduces the total service time.
无处不在计算的日益普及和物联网(IoT)领域的巨大变化产生了设计方法以实现有效存储和检索数据的需求。雾计算是最适合有效利用边缘设备的事实上的范式,从而将动力从集中式云环境转移到分散的计算范式。通过利用网络边缘附近的雾资源,我们可以通过在其上部署所需的服务来减少延迟和涉及数据处理的开销。在本文中,我们提出了一个资源配置框架,该框架在雾架构的动态拓扑中提供资源并管理注册的服务。结果表明,使用雾计算部署服务可以减少总服务时间。
{"title":"Resource Provisioning Framework for IoT Applications in Fog Computing Environment","authors":"G. Rakshith, M. Rahul, G. S. Sanjay, V. NateshaB., R. R. Guddeti","doi":"10.1109/ANTS.2018.8710172","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710172","url":null,"abstract":"The increasing utility of ubiquitous computing and dramatic shifts in the domain of Internet of Things (IoT) have generated the need to devise methods to enable the efficient storage and retrieval of data. Fog computing is the de facto paradigm most suitable to make efficient use of the edge devices and thus shifting the impetus from a centralized cloud environment to a decentralized computing paradigm. By utilizing fog resources near to the edge of the network, we can reduce the latency and the overheads involved in the processing of the data by deploying the required services on them. In this paper, we present resource provisioning framework which provisions the resources and also manages the registered services in a dynamic topology of the fog architecture. The results demonstrate that using fog computing for deploying services reduces the total service time.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1