首页 > 最新文献

2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

英文 中文
Fast and accurate edge resource scaling for 5G/6G networks with distributed deep neural networks 基于分布式深度神经网络的5G/6G网络边缘资源快速准确扩展
Theodoros Giannakas, T. Spyropoulos, O. Smid
Network slicing has been proposed as a paradigm for 5G+ networks. The operators slice physical resources from the edge, all the way to datacenter, and are responsible to micromanage the allocation of these resources among tenants bound by predefined Service Level Agreements (SLAs). A key task, for which recent works have advocated the use of Deep Neural Networks (DNNs), is tracking the tenant demand and scaling its resources. Nevertheless, for edge resources (e.g. RAN), a question arises whether operators can: (a) scale edge resources fast enough (often in the order of ms) and (b) afford to transmit huge amounts of data towards a cloud where such a DNN-based algorithm might operate. We propose a Distributed-DNN architecture for a class of such problems: a small subset of the DNN layers at the edge attempt to act as fast, standalone resource allocator; this is coupled with a Bayesian mechanism to intelligently offload a subset of (harder) decisions to additional DNN layers running at a remote cloud. Using the publicly available Milano dataset, we investigate how such a DDNN should be jointly trained, as well as operated, to efficiently address (a) and (b), resolving up to 60% of allocation decisions locally with little or no penalty on the allocation cost.
网络切片已被提出作为5G+网络的范例。运营商将物理资源从边缘一直切割到数据中心,并负责微观管理这些资源在租户之间的分配,这些租户受预定义的服务水平协议(sla)的约束。最近的工作提倡使用深度神经网络(dnn),其中一个关键任务是跟踪租户需求并扩展其资源。然而,对于边缘资源(例如RAN),出现了一个问题,即运营商是否能够:(a)足够快地扩展边缘资源(通常以毫秒为数量级)和(b)负担得起向云传输大量数据的能力,而这种基于dnn的算法可能会在云上运行。针对这类问题,我们提出了一种分布式深度神经网络架构:边缘的一小部分深度神经网络层试图充当快速、独立的资源分配器;这与贝叶斯机制相结合,智能地将(更难的)决策子集卸载到运行在远程云上的其他DNN层。使用公开可用的Milano数据集,我们研究了如何联合训练这样的dddnn,以及如何操作,以有效地解决(a)和(b),在分配成本很少或没有惩罚的情况下,在本地解决高达60%的分配决策。
{"title":"Fast and accurate edge resource scaling for 5G/6G networks with distributed deep neural networks","authors":"Theodoros Giannakas, T. Spyropoulos, O. Smid","doi":"10.1109/WoWMoM54355.2022.00021","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00021","url":null,"abstract":"Network slicing has been proposed as a paradigm for 5G+ networks. The operators slice physical resources from the edge, all the way to datacenter, and are responsible to micromanage the allocation of these resources among tenants bound by predefined Service Level Agreements (SLAs). A key task, for which recent works have advocated the use of Deep Neural Networks (DNNs), is tracking the tenant demand and scaling its resources. Nevertheless, for edge resources (e.g. RAN), a question arises whether operators can: (a) scale edge resources fast enough (often in the order of ms) and (b) afford to transmit huge amounts of data towards a cloud where such a DNN-based algorithm might operate. We propose a Distributed-DNN architecture for a class of such problems: a small subset of the DNN layers at the edge attempt to act as fast, standalone resource allocator; this is coupled with a Bayesian mechanism to intelligently offload a subset of (harder) decisions to additional DNN layers running at a remote cloud. Using the publicly available Milano dataset, we investigate how such a DDNN should be jointly trained, as well as operated, to efficiently address (a) and (b), resolving up to 60% of allocation decisions locally with little or no penalty on the allocation cost.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Reliable Localization with a Single Unaided Receiver by AoA 用AoA实现单接收机的可靠定位
Hongya Wang, H. Luan
In recent years, most indoor localization systems coordinate the angle of arrival (AoA) of multiple access points (APs) for triangulation or sacrifice the availability of the system in order to obtain accurate time of flight (ToF), which is not conducive to the actual deployment of the system. The recent standardization by IEEE of Fine Timing Measurement (FTM), a native firmware implementation ToF based approach for ranging. In this way, we can pay more attention to AoA-based localization system. We present SAP-AoA, a WIFI based localization system, which only requires one AP and one channel to complete localization. To accomplish this, we use two incident angles and the distance between two antennas to determine the unique constraint of the target, and then search the localization field to get the target. At the same time, we simulate the FTM value and use it with SAP-AoA to obtain better positioning accuracy. We implemented SAP-AoA using Intel 5300 commodity WIFI cards and deployed it in four environments with different multipath propagation. Results indicate the best median localization error is 0.85m.
近年来,大多数室内定位系统为了获得准确的飞行时间(ToF),需要协调多个接入点(ap)的到达角(AoA)进行三角测量或牺牲系统的可用性,这不利于系统的实际部署。最近IEEE对精细定时测量(FTM)进行了标准化,这是一种基于ToF的本地固件实现测距方法。这样,我们就可以更加重视基于面向对象的定位系统。我们提出了一种基于WIFI的定位系统SAP-AoA,它只需要一个AP和一个信道就可以完成定位。为此,我们利用两个入射角和两根天线之间的距离来确定目标的唯一约束,然后搜索定位场来获得目标。同时,我们模拟了FTM值,并将其与SAP-AoA结合使用,以获得更好的定位精度。我们使用Intel 5300商用WIFI卡实现了SAP-AoA,并将其部署在四种不同的多径传播环境中。结果表明,最佳中值定位误差为0.85m。
{"title":"Toward Reliable Localization with a Single Unaided Receiver by AoA","authors":"Hongya Wang, H. Luan","doi":"10.1109/WoWMoM54355.2022.00066","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00066","url":null,"abstract":"In recent years, most indoor localization systems coordinate the angle of arrival (AoA) of multiple access points (APs) for triangulation or sacrifice the availability of the system in order to obtain accurate time of flight (ToF), which is not conducive to the actual deployment of the system. The recent standardization by IEEE of Fine Timing Measurement (FTM), a native firmware implementation ToF based approach for ranging. In this way, we can pay more attention to AoA-based localization system. We present SAP-AoA, a WIFI based localization system, which only requires one AP and one channel to complete localization. To accomplish this, we use two incident angles and the distance between two antennas to determine the unique constraint of the target, and then search the localization field to get the target. At the same time, we simulate the FTM value and use it with SAP-AoA to obtain better positioning accuracy. We implemented SAP-AoA using Intel 5300 commodity WIFI cards and deployed it in four environments with different multipath propagation. Results indicate the best median localization error is 0.85m.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Service Mixes in Access Links: Product Form and Oscillations 访问链接中的服务混合建模:产品形式和振荡
A. Marin, M. Meo, M. Sereno, M. Marsan
We consider an access link of a data network loaded with data flows generated by streaming and elastic services requested by fixed or mobile end users, and subjected to an admission control (AC) algorithm. For the performance analysis of such link we develop a new queuing model and we show that, with the considered AC, the queuing model admits a product form expression for the joint limiting probability distribution of the numbers of active services of the different types. Numerical results show unexpected oscillating behaviors for several performance metrics, and provide interesting insight into the link performance.
我们考虑一个数据网络的接入链路,该链路加载了由固定或移动终端用户请求的流和弹性服务生成的数据流,并受到接纳控制(AC)算法的约束。为了分析这类链路的性能,我们建立了一个新的排队模型,并证明在考虑AC的情况下,排队模型对于不同类型的活动业务量的联合极限概率分布具有乘积形式的表达式。数值结果显示了几个性能指标的意外振荡行为,并提供了对链路性能的有趣见解。
{"title":"Modeling Service Mixes in Access Links: Product Form and Oscillations","authors":"A. Marin, M. Meo, M. Sereno, M. Marsan","doi":"10.1109/WoWMoM54355.2022.00065","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00065","url":null,"abstract":"We consider an access link of a data network loaded with data flows generated by streaming and elastic services requested by fixed or mobile end users, and subjected to an admission control (AC) algorithm. For the performance analysis of such link we develop a new queuing model and we show that, with the considered AC, the queuing model admits a product form expression for the joint limiting probability distribution of the numbers of active services of the different types. Numerical results show unexpected oscillating behaviors for several performance metrics, and provide interesting insight into the link performance.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114413064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast Approximation Algorithms for Multiple Coverage with Unit Disks 单位磁盘多重覆盖的快速逼近算法
Xuening Gao, Longkun Guo, Kewen Liao
Effective monitoring of applications in wireless sensor networks can be underpinned by the multiple coverage problem with unit disks. In the problem, we are given a set of targets T = {t1, t2, …, tn} distributed in the plane, where ti needs to be covered f(ti) times for any positive integer f(ti). The aim is to place a minimum number of disks, such that all the targets can be covered as desired. In the paper, we first present a 5-approximation algorithm with runtime O(n + m) for m = maxi{f(ti)}. Then, we give a theoretically improved 4-approximation algorithm, albeit with an increased time complexity to O(n2). In addition, we consider the online setting where targets arrive in sequence and upon each arrival the corresponding coverage disk must be placed. For this setting, we devise an online algorithm with a competitive ratio of 6 and constant update time. To verify aforementioned theoretical findings, numerical experiments are conducted to demonstrate and compare the practical performance of the proposed algorithms.
无线传感器网络中应用的有效监控可以通过单元磁盘的多重覆盖问题得到支持。在问题中,给定平面上的一组目标T = {t1, t2,…,tn},其中对于任意正整数f(ti), ti需要覆盖f(ti)次。这样做的目的是放置最少数量的磁盘,以便可以根据需要覆盖所有目标。在本文中,我们首先提出了一个运行时间为O(n + m)的5-逼近算法,该算法的m = maxi{f(ti)}。然后,我们给出了一个理论上改进的4-近似算法,尽管时间复杂度增加到O(n2)。此外,我们考虑在线设置,其中目标按顺序到达,并且在每个到达时必须放置相应的覆盖磁盘。对于这种设置,我们设计了一个竞争比为6且更新时间恒定的在线算法。为了验证上述理论发现,进行了数值实验来验证和比较所提出算法的实际性能。
{"title":"Fast Approximation Algorithms for Multiple Coverage with Unit Disks","authors":"Xuening Gao, Longkun Guo, Kewen Liao","doi":"10.1109/WoWMoM54355.2022.00037","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00037","url":null,"abstract":"Effective monitoring of applications in wireless sensor networks can be underpinned by the multiple coverage problem with unit disks. In the problem, we are given a set of targets T = {t1, t2, …, tn} distributed in the plane, where ti needs to be covered f(ti) times for any positive integer f(ti). The aim is to place a minimum number of disks, such that all the targets can be covered as desired. In the paper, we first present a 5-approximation algorithm with runtime O(n + m) for m = maxi{f(ti)}. Then, we give a theoretically improved 4-approximation algorithm, albeit with an increased time complexity to O(n2). In addition, we consider the online setting where targets arrive in sequence and upon each arrival the corresponding coverage disk must be placed. For this setting, we devise an online algorithm with a competitive ratio of 6 and constant update time. To verify aforementioned theoretical findings, numerical experiments are conducted to demonstrate and compare the practical performance of the proposed algorithms.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130026290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Investigation of the Network Characteristics and Requirements of 3D Environmental Digital Twins for Inspection Robots 检测机器人三维环境数字孪生网络特征及要求研究
Hasan Kivrak, P. D. E. Baniqued, S. Watson, B. Lennox
Digital twins tend to be on the way of becoming the future of robots, artificial intelligence, and IoT devices, especially in industrial applications. Creating a digital twin solution will help to solve challenges faced in managing the tasks in their operating environment since it enables an integrated solution for the framework that seamlessly connects to their physical counterparts with the latest internet technologies. In this study, we aim to develop a synchronous, situational-aware, bi-directional/multi-directional digital twin platform that allows us to perceive real-time/simultaneous flow of sensory environmental data and remotely operate robots through digital twins for continuous inspection. To achieve this aim, we will investigate the interoperability issues in robot teleoperation with 3D mapping of a remote unknown environment case scenario.
数字孪生体往往会成为机器人、人工智能和物联网设备的未来,尤其是在工业应用中。创建数字孪生解决方案将有助于解决在操作环境中管理任务所面临的挑战,因为它可以为框架提供集成解决方案,通过最新的互联网技术无缝连接到物理对应物。在这项研究中,我们的目标是开发一个同步的、态势感知的、双向/多向的数字双胞胎平台,使我们能够感知实时/同步的感官环境数据流,并通过数字双胞胎远程操作机器人进行连续检查。为了实现这一目标,我们将研究机器人远程操作与远程未知环境案例场景的3D映射的互操作性问题。
{"title":"An Investigation of the Network Characteristics and Requirements of 3D Environmental Digital Twins for Inspection Robots","authors":"Hasan Kivrak, P. D. E. Baniqued, S. Watson, B. Lennox","doi":"10.1109/WoWMoM54355.2022.00093","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00093","url":null,"abstract":"Digital twins tend to be on the way of becoming the future of robots, artificial intelligence, and IoT devices, especially in industrial applications. Creating a digital twin solution will help to solve challenges faced in managing the tasks in their operating environment since it enables an integrated solution for the framework that seamlessly connects to their physical counterparts with the latest internet technologies. In this study, we aim to develop a synchronous, situational-aware, bi-directional/multi-directional digital twin platform that allows us to perceive real-time/simultaneous flow of sensory environmental data and remotely operate robots through digital twins for continuous inspection. To achieve this aim, we will investigate the interoperability issues in robot teleoperation with 3D mapping of a remote unknown environment case scenario.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130121054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical Study of 5G Downlink & Uplink Scheduling and its Effects on Latency 5G上下行调度及其对时延影响的实证研究
Justus Rischke, Christian L. Vielhaus, Peter Sossalla, Sebastian Itting, Giang T. Nguyen, F. Fitzek
5G campus networks, whose advantages include flexible deployment, can be a promising candidate for production plants to complement existing Wifi-based networks. Toward that goal, 5G has to satisfy strict requirements about real-time communication to facilitate novel use cases. However, the realtime-capability of 5G is not well understood yet. In this work, we deliver insights into the functioning of 5G NR RAN Release 15, which includes actual one-way delay and Round-Trip Time (RTT) measurements for Downlink and Uplink in a private 5G Standalone campus network. The extensive measurement results reveal that these delays are correlated, and the corresponding RTT, i.e. the sum of Downlink and Uplink delays, is discreetly clustered, ranging between 12ms and 40ms. The measurements also show that the distribution of RTTs is mainly dependent on the packet rates and their inter-arrival times. Our study helps expand the current understanding of 5G used for latency-critical applications. We make the code and the measurement data traces publicly available as the IEEE DataPort 5G Campus Networks: Measurement Traces dataset (DOI 10.21227/xe3c-e968).
5G园区网络的优势包括灵活部署,可以成为生产工厂补充现有wifi网络的有希望的候选者。为了实现这一目标,5G必须满足对实时通信的严格要求,以促进新的用例。然而,5G的实时能力还没有得到很好的理解。在这项工作中,我们深入了解了5G NR RAN Release 15的功能,其中包括在专用5G独立校园网中下行链路和上行链路的实际单向延迟和往返时间(RTT)测量。广泛的测量结果表明,这些延迟是相关的,相应的RTT,即下行链路和上行链路延迟的总和,被谨慎地聚类,范围在12ms到40ms之间。测量结果还表明,rtt的分布主要取决于分组速率和它们的间隔到达时间。我们的研究有助于扩展目前对用于延迟关键应用的5G的理解。我们将代码和测量数据跟踪作为IEEE DataPort 5G校园网:测量跟踪数据集(DOI 10.21227/xe3c-e968)公开提供。
{"title":"Empirical Study of 5G Downlink & Uplink Scheduling and its Effects on Latency","authors":"Justus Rischke, Christian L. Vielhaus, Peter Sossalla, Sebastian Itting, Giang T. Nguyen, F. Fitzek","doi":"10.1109/WoWMoM54355.2022.00017","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00017","url":null,"abstract":"5G campus networks, whose advantages include flexible deployment, can be a promising candidate for production plants to complement existing Wifi-based networks. Toward that goal, 5G has to satisfy strict requirements about real-time communication to facilitate novel use cases. However, the realtime-capability of 5G is not well understood yet. In this work, we deliver insights into the functioning of 5G NR RAN Release 15, which includes actual one-way delay and Round-Trip Time (RTT) measurements for Downlink and Uplink in a private 5G Standalone campus network. The extensive measurement results reveal that these delays are correlated, and the corresponding RTT, i.e. the sum of Downlink and Uplink delays, is discreetly clustered, ranging between 12ms and 40ms. The measurements also show that the distribution of RTTs is mainly dependent on the packet rates and their inter-arrival times. Our study helps expand the current understanding of 5G used for latency-critical applications. We make the code and the measurement data traces publicly available as the IEEE DataPort 5G Campus Networks: Measurement Traces dataset (DOI 10.21227/xe3c-e968).","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reviewers: SwarmNet 2022
{"title":"Reviewers: SwarmNet 2022","authors":"","doi":"10.1109/wowmom54355.2022.00009","DOIUrl":"https://doi.org/10.1109/wowmom54355.2022.00009","url":null,"abstract":"","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BSBA: Burst Series Based Approach for Identifying Fake Free-traffic 基于突发级数的假自由流量识别方法
Sijia Li, Chang Liu, Zhuguo Li, Qingya Yang, Anlin Xu, Gaopeng Gou
In recent years, mobile traffic has gradually become a major part of network traffic. To attract customers, mobile network operators provide free-traffic, which is a preferential policy that is free of charge for specific application traffic. Since the emergence of free-traffic, fake free-traffic also appeared soon. Fake free-traffic is a malicious behavior, which helps attackers illegally use network resources and evade network resource charging. The appearance of fake free-traffic maliciously harms the interests of operators and disrupts the rules of network resource charging. Because of the uniqueness of free-traffic, it encapsulates a layer of the HTTP protocol in addition to the actual application communication protocol, existing studies on encrypted traffic analysis are not applicable to identify fake free-traffic. In this paper, we propose Burst Series Based Approach (BSBA), a novel method for identifying fake free-traffic. The key idea behind BSBA is to construct effective features by capturing the differences of burst series among fake free-traffic, free-traffic and non-free traffic, and combine the constructed features with machine learning algorithms to identify fake free-traffic. We collect a real-world traffic dataset and conduct evaluations to verify the effectiveness of the BSBA. Experiment results demonstrate that the BSBA achieves excellent performances (96.82% Accuracy, 96.46% Precision, 96.57% Recall and 96.51% F1-score) and is superior to the state-of-the-art methods.
近年来,移动流量逐渐成为网络流量的重要组成部分。为了吸引客户,移动网络运营商提供免费流量,即针对特定应用流量免费的优惠政策。自免费流量出现以来,假免费流量也很快出现。虚假免费流量是一种恶意行为,可以帮助攻击者非法使用网络资源,逃避网络资源收费。虚假免费流量的出现恶意损害了运营商的利益,扰乱了网络资源收费规则。由于自由流量的唯一性,它除了封装了实际应用通信协议外,还封装了一层HTTP协议,现有的加密流量分析研究并不适用于识别虚假自由流量。本文提出了一种基于突发序列的伪自由流量识别方法(BSBA)。BSBA的核心思想是通过捕捉假自由流量、自由流量和非自由流量之间突发序列的差异,构建有效的特征,并将构建的特征与机器学习算法相结合,识别假自由流量。我们收集了真实世界的交通数据集,并进行了评估,以验证BSBA的有效性。实验结果表明,该方法取得了96.82%的正确率、96.46%的精密度、96.57%的召回率和96.51%的f1分数,优于现有的方法。
{"title":"BSBA: Burst Series Based Approach for Identifying Fake Free-traffic","authors":"Sijia Li, Chang Liu, Zhuguo Li, Qingya Yang, Anlin Xu, Gaopeng Gou","doi":"10.1109/WoWMoM54355.2022.00019","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00019","url":null,"abstract":"In recent years, mobile traffic has gradually become a major part of network traffic. To attract customers, mobile network operators provide free-traffic, which is a preferential policy that is free of charge for specific application traffic. Since the emergence of free-traffic, fake free-traffic also appeared soon. Fake free-traffic is a malicious behavior, which helps attackers illegally use network resources and evade network resource charging. The appearance of fake free-traffic maliciously harms the interests of operators and disrupts the rules of network resource charging. Because of the uniqueness of free-traffic, it encapsulates a layer of the HTTP protocol in addition to the actual application communication protocol, existing studies on encrypted traffic analysis are not applicable to identify fake free-traffic. In this paper, we propose Burst Series Based Approach (BSBA), a novel method for identifying fake free-traffic. The key idea behind BSBA is to construct effective features by capturing the differences of burst series among fake free-traffic, free-traffic and non-free traffic, and combine the constructed features with machine learning algorithms to identify fake free-traffic. We collect a real-world traffic dataset and conduct evaluations to verify the effectiveness of the BSBA. Experiment results demonstrate that the BSBA achieves excellent performances (96.82% Accuracy, 96.46% Precision, 96.57% Recall and 96.51% F1-score) and is superior to the state-of-the-art methods.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128149062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint 段检测算法:基于位约束的CAN总线入侵检测
Kaixuan Zheng, S. Zou, Guosheng Xu, Zixiang Bi
With the rapid development of Internet of Vehicles and autonomous driving technologies, car manufacturers provide more comfortable and safe driving experience while gradually exposing their vehicles to the background of cyber-attacks. As the car’s interior communicates through the CAN bus, the intrusion detection for CAN bus becomes crucial. Some studies use bus data characteristics, machine learning algorithms, or information theory algorithms to perform intrusion detection on the CAN bus, but they have problems such as low detection accuracy, high performance requirements, and insufficient detection granularity. This paper innovatively proposes a lightweight detection algorithm—Segment Detection Algorithm (SDA), which calculates the bit flip rate by segment, discovers the variation relationship between bits within each segment, and utilizes multiple inter-message features to achieve the detection of abnormal traffic. Experiments show that compared with existing research, the algorithm has effectively improved the detection accuracy, especially the detection of replay attacks. In addition, the algorithm has extremely low time complexity, can adapt to the limited resources in the vehicle environment, and achieve high-precision real-time detection of abnormal traffic.
随着车联网和自动驾驶技术的快速发展,汽车制造商在提供更加舒适和安全的驾驶体验的同时,也逐渐将汽车暴露在网络攻击的背景下。由于汽车内部通过CAN总线进行通信,因此CAN总线的入侵检测变得至关重要。一些研究利用总线数据特征、机器学习算法或信息论算法在CAN总线上进行入侵检测,但存在检测精度低、性能要求高、检测粒度不够等问题。本文创新性地提出了一种轻量级检测算法——段检测算法(SDA),该算法按段计算比特翻转率,发现每个段内比特之间的变化关系,并利用多个报文间特征实现异常流量的检测。实验表明,与现有研究相比,该算法有效地提高了检测精度,特别是对重放攻击的检测。此外,该算法具有极低的时间复杂度,能够适应车辆环境中有限的资源,实现对异常交通的高精度实时检测。
{"title":"Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint","authors":"Kaixuan Zheng, S. Zou, Guosheng Xu, Zixiang Bi","doi":"10.1109/WoWMoM54355.2022.00070","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00070","url":null,"abstract":"With the rapid development of Internet of Vehicles and autonomous driving technologies, car manufacturers provide more comfortable and safe driving experience while gradually exposing their vehicles to the background of cyber-attacks. As the car’s interior communicates through the CAN bus, the intrusion detection for CAN bus becomes crucial. Some studies use bus data characteristics, machine learning algorithms, or information theory algorithms to perform intrusion detection on the CAN bus, but they have problems such as low detection accuracy, high performance requirements, and insufficient detection granularity. This paper innovatively proposes a lightweight detection algorithm—Segment Detection Algorithm (SDA), which calculates the bit flip rate by segment, discovers the variation relationship between bits within each segment, and utilizes multiple inter-message features to achieve the detection of abnormal traffic. Experiments show that compared with existing research, the algorithm has effectively improved the detection accuracy, especially the detection of replay attacks. In addition, the algorithm has extremely low time complexity, can adapt to the limited resources in the vehicle environment, and achieve high-precision real-time detection of abnormal traffic.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling WIP:基于射线发射传播损耗建模的移动映射导出的真实世界三维模型
T. Wahl, D. Borrmann, M. Bleier, A. Nüchter, T. Wiemann, T. Hänel, N. Aschenbruck
This work in progress paper presents an automated approach for network coverage prediction in real-world environments by combining mobile mapping, 3D mesh generation, and a ray launching based network simulator. We identify the challenges and demonstrate the functionality of such a pipeline. We preview an empirical evaluation in a realistic real-world environment.
这篇正在进行的论文通过结合移动地图、3D网格生成和基于射线发射的网络模拟器,提出了一种在现实环境中进行网络覆盖预测的自动化方法。我们确定了挑战并演示了这种管道的功能。我们在现实世界的环境中预览经验评估。
{"title":"WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling","authors":"T. Wahl, D. Borrmann, M. Bleier, A. Nüchter, T. Wiemann, T. Hänel, N. Aschenbruck","doi":"10.1109/WoWMoM54355.2022.00048","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00048","url":null,"abstract":"This work in progress paper presents an automated approach for network coverage prediction in real-world environments by combining mobile mapping, 3D mesh generation, and a ray launching based network simulator. We identify the challenges and demonstrate the functionality of such a pipeline. We preview an empirical evaluation in a realistic real-world environment.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1