首页 > 最新文献

2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

英文 中文
An Investigation of the Network Characteristics and Requirements of 3D Environmental Digital Twins for Inspection Robots 检测机器人三维环境数字孪生网络特征及要求研究
Hasan Kivrak, P. D. E. Baniqued, S. Watson, B. Lennox
Digital twins tend to be on the way of becoming the future of robots, artificial intelligence, and IoT devices, especially in industrial applications. Creating a digital twin solution will help to solve challenges faced in managing the tasks in their operating environment since it enables an integrated solution for the framework that seamlessly connects to their physical counterparts with the latest internet technologies. In this study, we aim to develop a synchronous, situational-aware, bi-directional/multi-directional digital twin platform that allows us to perceive real-time/simultaneous flow of sensory environmental data and remotely operate robots through digital twins for continuous inspection. To achieve this aim, we will investigate the interoperability issues in robot teleoperation with 3D mapping of a remote unknown environment case scenario.
数字孪生体往往会成为机器人、人工智能和物联网设备的未来,尤其是在工业应用中。创建数字孪生解决方案将有助于解决在操作环境中管理任务所面临的挑战,因为它可以为框架提供集成解决方案,通过最新的互联网技术无缝连接到物理对应物。在这项研究中,我们的目标是开发一个同步的、态势感知的、双向/多向的数字双胞胎平台,使我们能够感知实时/同步的感官环境数据流,并通过数字双胞胎远程操作机器人进行连续检查。为了实现这一目标,我们将研究机器人远程操作与远程未知环境案例场景的3D映射的互操作性问题。
{"title":"An Investigation of the Network Characteristics and Requirements of 3D Environmental Digital Twins for Inspection Robots","authors":"Hasan Kivrak, P. D. E. Baniqued, S. Watson, B. Lennox","doi":"10.1109/WoWMoM54355.2022.00093","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00093","url":null,"abstract":"Digital twins tend to be on the way of becoming the future of robots, artificial intelligence, and IoT devices, especially in industrial applications. Creating a digital twin solution will help to solve challenges faced in managing the tasks in their operating environment since it enables an integrated solution for the framework that seamlessly connects to their physical counterparts with the latest internet technologies. In this study, we aim to develop a synchronous, situational-aware, bi-directional/multi-directional digital twin platform that allows us to perceive real-time/simultaneous flow of sensory environmental data and remotely operate robots through digital twins for continuous inspection. To achieve this aim, we will investigate the interoperability issues in robot teleoperation with 3D mapping of a remote unknown environment case scenario.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130121054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Reliable Localization with a Single Unaided Receiver by AoA 用AoA实现单接收机的可靠定位
Hongya Wang, H. Luan
In recent years, most indoor localization systems coordinate the angle of arrival (AoA) of multiple access points (APs) for triangulation or sacrifice the availability of the system in order to obtain accurate time of flight (ToF), which is not conducive to the actual deployment of the system. The recent standardization by IEEE of Fine Timing Measurement (FTM), a native firmware implementation ToF based approach for ranging. In this way, we can pay more attention to AoA-based localization system. We present SAP-AoA, a WIFI based localization system, which only requires one AP and one channel to complete localization. To accomplish this, we use two incident angles and the distance between two antennas to determine the unique constraint of the target, and then search the localization field to get the target. At the same time, we simulate the FTM value and use it with SAP-AoA to obtain better positioning accuracy. We implemented SAP-AoA using Intel 5300 commodity WIFI cards and deployed it in four environments with different multipath propagation. Results indicate the best median localization error is 0.85m.
近年来,大多数室内定位系统为了获得准确的飞行时间(ToF),需要协调多个接入点(ap)的到达角(AoA)进行三角测量或牺牲系统的可用性,这不利于系统的实际部署。最近IEEE对精细定时测量(FTM)进行了标准化,这是一种基于ToF的本地固件实现测距方法。这样,我们就可以更加重视基于面向对象的定位系统。我们提出了一种基于WIFI的定位系统SAP-AoA,它只需要一个AP和一个信道就可以完成定位。为此,我们利用两个入射角和两根天线之间的距离来确定目标的唯一约束,然后搜索定位场来获得目标。同时,我们模拟了FTM值,并将其与SAP-AoA结合使用,以获得更好的定位精度。我们使用Intel 5300商用WIFI卡实现了SAP-AoA,并将其部署在四种不同的多径传播环境中。结果表明,最佳中值定位误差为0.85m。
{"title":"Toward Reliable Localization with a Single Unaided Receiver by AoA","authors":"Hongya Wang, H. Luan","doi":"10.1109/WoWMoM54355.2022.00066","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00066","url":null,"abstract":"In recent years, most indoor localization systems coordinate the angle of arrival (AoA) of multiple access points (APs) for triangulation or sacrifice the availability of the system in order to obtain accurate time of flight (ToF), which is not conducive to the actual deployment of the system. The recent standardization by IEEE of Fine Timing Measurement (FTM), a native firmware implementation ToF based approach for ranging. In this way, we can pay more attention to AoA-based localization system. We present SAP-AoA, a WIFI based localization system, which only requires one AP and one channel to complete localization. To accomplish this, we use two incident angles and the distance between two antennas to determine the unique constraint of the target, and then search the localization field to get the target. At the same time, we simulate the FTM value and use it with SAP-AoA to obtain better positioning accuracy. We implemented SAP-AoA using Intel 5300 commodity WIFI cards and deployed it in four environments with different multipath propagation. Results indicate the best median localization error is 0.85m.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast and accurate edge resource scaling for 5G/6G networks with distributed deep neural networks 基于分布式深度神经网络的5G/6G网络边缘资源快速准确扩展
Theodoros Giannakas, T. Spyropoulos, O. Smid
Network slicing has been proposed as a paradigm for 5G+ networks. The operators slice physical resources from the edge, all the way to datacenter, and are responsible to micromanage the allocation of these resources among tenants bound by predefined Service Level Agreements (SLAs). A key task, for which recent works have advocated the use of Deep Neural Networks (DNNs), is tracking the tenant demand and scaling its resources. Nevertheless, for edge resources (e.g. RAN), a question arises whether operators can: (a) scale edge resources fast enough (often in the order of ms) and (b) afford to transmit huge amounts of data towards a cloud where such a DNN-based algorithm might operate. We propose a Distributed-DNN architecture for a class of such problems: a small subset of the DNN layers at the edge attempt to act as fast, standalone resource allocator; this is coupled with a Bayesian mechanism to intelligently offload a subset of (harder) decisions to additional DNN layers running at a remote cloud. Using the publicly available Milano dataset, we investigate how such a DDNN should be jointly trained, as well as operated, to efficiently address (a) and (b), resolving up to 60% of allocation decisions locally with little or no penalty on the allocation cost.
网络切片已被提出作为5G+网络的范例。运营商将物理资源从边缘一直切割到数据中心,并负责微观管理这些资源在租户之间的分配,这些租户受预定义的服务水平协议(sla)的约束。最近的工作提倡使用深度神经网络(dnn),其中一个关键任务是跟踪租户需求并扩展其资源。然而,对于边缘资源(例如RAN),出现了一个问题,即运营商是否能够:(a)足够快地扩展边缘资源(通常以毫秒为数量级)和(b)负担得起向云传输大量数据的能力,而这种基于dnn的算法可能会在云上运行。针对这类问题,我们提出了一种分布式深度神经网络架构:边缘的一小部分深度神经网络层试图充当快速、独立的资源分配器;这与贝叶斯机制相结合,智能地将(更难的)决策子集卸载到运行在远程云上的其他DNN层。使用公开可用的Milano数据集,我们研究了如何联合训练这样的dddnn,以及如何操作,以有效地解决(a)和(b),在分配成本很少或没有惩罚的情况下,在本地解决高达60%的分配决策。
{"title":"Fast and accurate edge resource scaling for 5G/6G networks with distributed deep neural networks","authors":"Theodoros Giannakas, T. Spyropoulos, O. Smid","doi":"10.1109/WoWMoM54355.2022.00021","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00021","url":null,"abstract":"Network slicing has been proposed as a paradigm for 5G+ networks. The operators slice physical resources from the edge, all the way to datacenter, and are responsible to micromanage the allocation of these resources among tenants bound by predefined Service Level Agreements (SLAs). A key task, for which recent works have advocated the use of Deep Neural Networks (DNNs), is tracking the tenant demand and scaling its resources. Nevertheless, for edge resources (e.g. RAN), a question arises whether operators can: (a) scale edge resources fast enough (often in the order of ms) and (b) afford to transmit huge amounts of data towards a cloud where such a DNN-based algorithm might operate. We propose a Distributed-DNN architecture for a class of such problems: a small subset of the DNN layers at the edge attempt to act as fast, standalone resource allocator; this is coupled with a Bayesian mechanism to intelligently offload a subset of (harder) decisions to additional DNN layers running at a remote cloud. Using the publicly available Milano dataset, we investigate how such a DDNN should be jointly trained, as well as operated, to efficiently address (a) and (b), resolving up to 60% of allocation decisions locally with little or no penalty on the allocation cost.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design, implementation, and testing of a microservices-based Digital Twins framework for network management and control 基于微服务的数字孪生网络管理和控制框架的设计、实现和测试
A. Lombardo, G. Morabito, Salvatore Quattropani, Carmelo Ricci
The introduction of the Software Defined Networking (SDN) paradigm is radically changing the way in which networks are thought, designed, and managed. The reasons of such huge success are manifold; one of the most relevant is that SDN enables an agile management of the network that can quickly adapt its behavior to the dynamics of the user needs and context conditions. In this sense, SDN represents a fundamental step towards the vision of an autonomous network. Nevertheless, network adaptation still requires the intervention of the network manager that installs and configures the network applications executed by the network operating system. In this context, the application of the Digital Twin (DT) technology can trigger a significant leap forward. In fact, the DT of the network can interact with the other relevant DTs and, applying artificial intelligence techniques, interact with the network operating system and take care of the network application installation and configuration. In this paper we motivate and introduce a platform, implemented exploiting microservices, for the realization of such a vision. The proposed platform is applied in a simple use case to demonstrate the proposed workflow and the resulting impact on network operations.
软件定义网络(SDN)范式的引入正在从根本上改变人们思考、设计和管理网络的方式。如此巨大成功的原因是多方面的;其中最相关的一点是,SDN支持对网络的敏捷管理,可以快速调整其行为以适应用户需求和上下文条件的动态变化。从这个意义上说,SDN代表了迈向自治网络愿景的基本一步。然而,网络适应仍然需要网络管理器的干预,网络管理器安装和配置由网络操作系统执行的网络应用程序。在这种情况下,数字孪生(DT)技术的应用可以引发重大飞跃。事实上,网络的DT可以与其他相关的DT进行交互,并应用人工智能技术与网络操作系统进行交互,并负责网络应用程序的安装和配置。在本文中,我们激励并介绍了一个利用微服务实现的平台,以实现这一愿景。所建议的平台应用于一个简单的用例中,以演示所建议的工作流及其对网络操作的影响。
{"title":"Design, implementation, and testing of a microservices-based Digital Twins framework for network management and control","authors":"A. Lombardo, G. Morabito, Salvatore Quattropani, Carmelo Ricci","doi":"10.1109/WoWMoM54355.2022.00092","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00092","url":null,"abstract":"The introduction of the Software Defined Networking (SDN) paradigm is radically changing the way in which networks are thought, designed, and managed. The reasons of such huge success are manifold; one of the most relevant is that SDN enables an agile management of the network that can quickly adapt its behavior to the dynamics of the user needs and context conditions. In this sense, SDN represents a fundamental step towards the vision of an autonomous network. Nevertheless, network adaptation still requires the intervention of the network manager that installs and configures the network applications executed by the network operating system. In this context, the application of the Digital Twin (DT) technology can trigger a significant leap forward. In fact, the DT of the network can interact with the other relevant DTs and, applying artificial intelligence techniques, interact with the network operating system and take care of the network application installation and configuration. In this paper we motivate and introduce a platform, implemented exploiting microservices, for the realization of such a vision. The proposed platform is applied in a simple use case to demonstrate the proposed workflow and the resulting impact on network operations.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT 偏振指纹:无线物联网中一种新的物理层认证方法
Jinlong Xu, Dong Wei, Weiqing Huang
Radio frequency (RF) fingerprinting is a low-cost, high-efficiency, and high-security authentication technique for wireless IoT devices with limited resources, but RF fingerprinting faces problems such as small fingerprint differences, low finger-print stability, and high implementation difficulty. In order to solve these problems, we propose a novel concept of polarization fingerprinting. Polarization fingerprint (PF) is manifested as the correlation between polarization state and frequency. The properties of PF include group feature, individual feature and directionality. Group feature characterizes the antenna structure, and individual feature characterizes the antenna hardware imperfections. The directionality comes from the vector property of polarization and contains the relative position information of the communicating devices. The directionality solves the problem of similar fingerprints that may occur when the number of devices increases, which cannot be solved by RF fingerprinting. Compared to RF fingerprint, PF can exist stably and continuously, which not only solves the problem of low fingerprint stability, but also makes polarization fingerprinting based authentication easier to be implemented. The stability and continuity of PF allow more samples to be obtained during authentication. We also proved that increasing the sample amount can reduce the false alarm rate of authentication. Finally, we conducted experiments based on wireless IoT devices. Experiment results show that polarization fingerprinting based authentication has better performance than RF fingerprinting based under the same conditions.
射频指纹识别技术是一种低成本、高效率、高安全性的认证技术,适用于资源有限的无线物联网设备,但存在指纹差异小、指纹稳定性低、实现难度高等问题。为了解决这些问题,我们提出了一种新的极化指纹识别概念。偏振指纹(PF)表现为偏振态与频率的相关关系。PF的性质包括群特征、个体特征和方向性。群特征表征天线结构,个体特征表征天线硬件缺陷。方向性来源于偏振的矢量特性,包含通信设备的相对位置信息。方向性解决了设备数量增加时可能出现的指纹相似问题,这是射频指纹识别无法解决的问题。与射频指纹相比,PF可以稳定持续存在,不仅解决了指纹稳定性低的问题,而且使基于极化指纹的认证更容易实现。PF的稳定性和连续性使得在认证过程中可以获得更多的样本。我们还证明了增加样本量可以降低认证的虚警率。最后,我们进行了基于无线物联网设备的实验。实验结果表明,在相同条件下,基于极化指纹的认证性能优于基于射频指纹的认证性能。
{"title":"Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT","authors":"Jinlong Xu, Dong Wei, Weiqing Huang","doi":"10.1109/WoWMoM54355.2022.00063","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00063","url":null,"abstract":"Radio frequency (RF) fingerprinting is a low-cost, high-efficiency, and high-security authentication technique for wireless IoT devices with limited resources, but RF fingerprinting faces problems such as small fingerprint differences, low finger-print stability, and high implementation difficulty. In order to solve these problems, we propose a novel concept of polarization fingerprinting. Polarization fingerprint (PF) is manifested as the correlation between polarization state and frequency. The properties of PF include group feature, individual feature and directionality. Group feature characterizes the antenna structure, and individual feature characterizes the antenna hardware imperfections. The directionality comes from the vector property of polarization and contains the relative position information of the communicating devices. The directionality solves the problem of similar fingerprints that may occur when the number of devices increases, which cannot be solved by RF fingerprinting. Compared to RF fingerprint, PF can exist stably and continuously, which not only solves the problem of low fingerprint stability, but also makes polarization fingerprinting based authentication easier to be implemented. The stability and continuity of PF allow more samples to be obtained during authentication. We also proved that increasing the sample amount can reduce the false alarm rate of authentication. Finally, we conducted experiments based on wireless IoT devices. Experiment results show that polarization fingerprinting based authentication has better performance than RF fingerprinting based under the same conditions.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical Study of 5G Downlink & Uplink Scheduling and its Effects on Latency 5G上下行调度及其对时延影响的实证研究
Justus Rischke, Christian L. Vielhaus, Peter Sossalla, Sebastian Itting, Giang T. Nguyen, F. Fitzek
5G campus networks, whose advantages include flexible deployment, can be a promising candidate for production plants to complement existing Wifi-based networks. Toward that goal, 5G has to satisfy strict requirements about real-time communication to facilitate novel use cases. However, the realtime-capability of 5G is not well understood yet. In this work, we deliver insights into the functioning of 5G NR RAN Release 15, which includes actual one-way delay and Round-Trip Time (RTT) measurements for Downlink and Uplink in a private 5G Standalone campus network. The extensive measurement results reveal that these delays are correlated, and the corresponding RTT, i.e. the sum of Downlink and Uplink delays, is discreetly clustered, ranging between 12ms and 40ms. The measurements also show that the distribution of RTTs is mainly dependent on the packet rates and their inter-arrival times. Our study helps expand the current understanding of 5G used for latency-critical applications. We make the code and the measurement data traces publicly available as the IEEE DataPort 5G Campus Networks: Measurement Traces dataset (DOI 10.21227/xe3c-e968).
5G园区网络的优势包括灵活部署,可以成为生产工厂补充现有wifi网络的有希望的候选者。为了实现这一目标,5G必须满足对实时通信的严格要求,以促进新的用例。然而,5G的实时能力还没有得到很好的理解。在这项工作中,我们深入了解了5G NR RAN Release 15的功能,其中包括在专用5G独立校园网中下行链路和上行链路的实际单向延迟和往返时间(RTT)测量。广泛的测量结果表明,这些延迟是相关的,相应的RTT,即下行链路和上行链路延迟的总和,被谨慎地聚类,范围在12ms到40ms之间。测量结果还表明,rtt的分布主要取决于分组速率和它们的间隔到达时间。我们的研究有助于扩展目前对用于延迟关键应用的5G的理解。我们将代码和测量数据跟踪作为IEEE DataPort 5G校园网:测量跟踪数据集(DOI 10.21227/xe3c-e968)公开提供。
{"title":"Empirical Study of 5G Downlink & Uplink Scheduling and its Effects on Latency","authors":"Justus Rischke, Christian L. Vielhaus, Peter Sossalla, Sebastian Itting, Giang T. Nguyen, F. Fitzek","doi":"10.1109/WoWMoM54355.2022.00017","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00017","url":null,"abstract":"5G campus networks, whose advantages include flexible deployment, can be a promising candidate for production plants to complement existing Wifi-based networks. Toward that goal, 5G has to satisfy strict requirements about real-time communication to facilitate novel use cases. However, the realtime-capability of 5G is not well understood yet. In this work, we deliver insights into the functioning of 5G NR RAN Release 15, which includes actual one-way delay and Round-Trip Time (RTT) measurements for Downlink and Uplink in a private 5G Standalone campus network. The extensive measurement results reveal that these delays are correlated, and the corresponding RTT, i.e. the sum of Downlink and Uplink delays, is discreetly clustered, ranging between 12ms and 40ms. The measurements also show that the distribution of RTTs is mainly dependent on the packet rates and their inter-arrival times. Our study helps expand the current understanding of 5G used for latency-critical applications. We make the code and the measurement data traces publicly available as the IEEE DataPort 5G Campus Networks: Measurement Traces dataset (DOI 10.21227/xe3c-e968).","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reviewers: SwarmNet 2022
{"title":"Reviewers: SwarmNet 2022","authors":"","doi":"10.1109/wowmom54355.2022.00009","DOIUrl":"https://doi.org/10.1109/wowmom54355.2022.00009","url":null,"abstract":"","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BSBA: Burst Series Based Approach for Identifying Fake Free-traffic 基于突发级数的假自由流量识别方法
Sijia Li, Chang Liu, Zhuguo Li, Qingya Yang, Anlin Xu, Gaopeng Gou
In recent years, mobile traffic has gradually become a major part of network traffic. To attract customers, mobile network operators provide free-traffic, which is a preferential policy that is free of charge for specific application traffic. Since the emergence of free-traffic, fake free-traffic also appeared soon. Fake free-traffic is a malicious behavior, which helps attackers illegally use network resources and evade network resource charging. The appearance of fake free-traffic maliciously harms the interests of operators and disrupts the rules of network resource charging. Because of the uniqueness of free-traffic, it encapsulates a layer of the HTTP protocol in addition to the actual application communication protocol, existing studies on encrypted traffic analysis are not applicable to identify fake free-traffic. In this paper, we propose Burst Series Based Approach (BSBA), a novel method for identifying fake free-traffic. The key idea behind BSBA is to construct effective features by capturing the differences of burst series among fake free-traffic, free-traffic and non-free traffic, and combine the constructed features with machine learning algorithms to identify fake free-traffic. We collect a real-world traffic dataset and conduct evaluations to verify the effectiveness of the BSBA. Experiment results demonstrate that the BSBA achieves excellent performances (96.82% Accuracy, 96.46% Precision, 96.57% Recall and 96.51% F1-score) and is superior to the state-of-the-art methods.
近年来,移动流量逐渐成为网络流量的重要组成部分。为了吸引客户,移动网络运营商提供免费流量,即针对特定应用流量免费的优惠政策。自免费流量出现以来,假免费流量也很快出现。虚假免费流量是一种恶意行为,可以帮助攻击者非法使用网络资源,逃避网络资源收费。虚假免费流量的出现恶意损害了运营商的利益,扰乱了网络资源收费规则。由于自由流量的唯一性,它除了封装了实际应用通信协议外,还封装了一层HTTP协议,现有的加密流量分析研究并不适用于识别虚假自由流量。本文提出了一种基于突发序列的伪自由流量识别方法(BSBA)。BSBA的核心思想是通过捕捉假自由流量、自由流量和非自由流量之间突发序列的差异,构建有效的特征,并将构建的特征与机器学习算法相结合,识别假自由流量。我们收集了真实世界的交通数据集,并进行了评估,以验证BSBA的有效性。实验结果表明,该方法取得了96.82%的正确率、96.46%的精密度、96.57%的召回率和96.51%的f1分数,优于现有的方法。
{"title":"BSBA: Burst Series Based Approach for Identifying Fake Free-traffic","authors":"Sijia Li, Chang Liu, Zhuguo Li, Qingya Yang, Anlin Xu, Gaopeng Gou","doi":"10.1109/WoWMoM54355.2022.00019","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00019","url":null,"abstract":"In recent years, mobile traffic has gradually become a major part of network traffic. To attract customers, mobile network operators provide free-traffic, which is a preferential policy that is free of charge for specific application traffic. Since the emergence of free-traffic, fake free-traffic also appeared soon. Fake free-traffic is a malicious behavior, which helps attackers illegally use network resources and evade network resource charging. The appearance of fake free-traffic maliciously harms the interests of operators and disrupts the rules of network resource charging. Because of the uniqueness of free-traffic, it encapsulates a layer of the HTTP protocol in addition to the actual application communication protocol, existing studies on encrypted traffic analysis are not applicable to identify fake free-traffic. In this paper, we propose Burst Series Based Approach (BSBA), a novel method for identifying fake free-traffic. The key idea behind BSBA is to construct effective features by capturing the differences of burst series among fake free-traffic, free-traffic and non-free traffic, and combine the constructed features with machine learning algorithms to identify fake free-traffic. We collect a real-world traffic dataset and conduct evaluations to verify the effectiveness of the BSBA. Experiment results demonstrate that the BSBA achieves excellent performances (96.82% Accuracy, 96.46% Precision, 96.57% Recall and 96.51% F1-score) and is superior to the state-of-the-art methods.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128149062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint 段检测算法:基于位约束的CAN总线入侵检测
Kaixuan Zheng, S. Zou, Guosheng Xu, Zixiang Bi
With the rapid development of Internet of Vehicles and autonomous driving technologies, car manufacturers provide more comfortable and safe driving experience while gradually exposing their vehicles to the background of cyber-attacks. As the car’s interior communicates through the CAN bus, the intrusion detection for CAN bus becomes crucial. Some studies use bus data characteristics, machine learning algorithms, or information theory algorithms to perform intrusion detection on the CAN bus, but they have problems such as low detection accuracy, high performance requirements, and insufficient detection granularity. This paper innovatively proposes a lightweight detection algorithm—Segment Detection Algorithm (SDA), which calculates the bit flip rate by segment, discovers the variation relationship between bits within each segment, and utilizes multiple inter-message features to achieve the detection of abnormal traffic. Experiments show that compared with existing research, the algorithm has effectively improved the detection accuracy, especially the detection of replay attacks. In addition, the algorithm has extremely low time complexity, can adapt to the limited resources in the vehicle environment, and achieve high-precision real-time detection of abnormal traffic.
随着车联网和自动驾驶技术的快速发展,汽车制造商在提供更加舒适和安全的驾驶体验的同时,也逐渐将汽车暴露在网络攻击的背景下。由于汽车内部通过CAN总线进行通信,因此CAN总线的入侵检测变得至关重要。一些研究利用总线数据特征、机器学习算法或信息论算法在CAN总线上进行入侵检测,但存在检测精度低、性能要求高、检测粒度不够等问题。本文创新性地提出了一种轻量级检测算法——段检测算法(SDA),该算法按段计算比特翻转率,发现每个段内比特之间的变化关系,并利用多个报文间特征实现异常流量的检测。实验表明,与现有研究相比,该算法有效地提高了检测精度,特别是对重放攻击的检测。此外,该算法具有极低的时间复杂度,能够适应车辆环境中有限的资源,实现对异常交通的高精度实时检测。
{"title":"Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint","authors":"Kaixuan Zheng, S. Zou, Guosheng Xu, Zixiang Bi","doi":"10.1109/WoWMoM54355.2022.00070","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00070","url":null,"abstract":"With the rapid development of Internet of Vehicles and autonomous driving technologies, car manufacturers provide more comfortable and safe driving experience while gradually exposing their vehicles to the background of cyber-attacks. As the car’s interior communicates through the CAN bus, the intrusion detection for CAN bus becomes crucial. Some studies use bus data characteristics, machine learning algorithms, or information theory algorithms to perform intrusion detection on the CAN bus, but they have problems such as low detection accuracy, high performance requirements, and insufficient detection granularity. This paper innovatively proposes a lightweight detection algorithm—Segment Detection Algorithm (SDA), which calculates the bit flip rate by segment, discovers the variation relationship between bits within each segment, and utilizes multiple inter-message features to achieve the detection of abnormal traffic. Experiments show that compared with existing research, the algorithm has effectively improved the detection accuracy, especially the detection of replay attacks. In addition, the algorithm has extremely low time complexity, can adapt to the limited resources in the vehicle environment, and achieve high-precision real-time detection of abnormal traffic.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling WIP:基于射线发射传播损耗建模的移动映射导出的真实世界三维模型
T. Wahl, D. Borrmann, M. Bleier, A. Nüchter, T. Wiemann, T. Hänel, N. Aschenbruck
This work in progress paper presents an automated approach for network coverage prediction in real-world environments by combining mobile mapping, 3D mesh generation, and a ray launching based network simulator. We identify the challenges and demonstrate the functionality of such a pipeline. We preview an empirical evaluation in a realistic real-world environment.
这篇正在进行的论文通过结合移动地图、3D网格生成和基于射线发射的网络模拟器,提出了一种在现实环境中进行网络覆盖预测的自动化方法。我们确定了挑战并演示了这种管道的功能。我们在现实世界的环境中预览经验评估。
{"title":"WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling","authors":"T. Wahl, D. Borrmann, M. Bleier, A. Nüchter, T. Wiemann, T. Hänel, N. Aschenbruck","doi":"10.1109/WoWMoM54355.2022.00048","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00048","url":null,"abstract":"This work in progress paper presents an automated approach for network coverage prediction in real-world environments by combining mobile mapping, 3D mesh generation, and a ray launching based network simulator. We identify the challenges and demonstrate the functionality of such a pipeline. We preview an empirical evaluation in a realistic real-world environment.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1