首页 > 最新文献

2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

英文 中文
Joint Terahertz Communication and Atmospheric Sensing in Low Earth Orbit Satellite Networks: Physical Layer Design 低地球轨道卫星网络中联合太赫兹通信和大气传感:物理层设计
Sergio Aliaga, Ali J. Alqaraghuli, J. Jornet
As the interest in the Terahertz (0.1-1THz) band grows with the technological advancements that enable communication at higher data rates, the existing use for THz-based sensing systems motivate exploration of Joint Communication and Sensing systems (JCS). Such systems can be used for the next generation of satellite constellations for the purposes of internet-backhauling, while performing scientific functions such as studying atmospheric gases. The fact that the hardware employed for both applications is highly similar, if not identical, opens the possibility of designing a new waveform that can jointly communicate and sense at the same time. In this paper, we explore Differential Absorption Radars (DAR), traditionally used for weather sensing, as a potential candidate to be operated in combination with a Chirp Spread Spectrum (CSS) modulation. We present a scenario with a satellite at Low Earth Orbit (LEO) where the CSS modulation could outperform traditional PSK modulations while making it possible to retrieve water vapor density profiles of the atmosphere with DAR. Performance of both communication and remote sensing applications are studied through simulation.
随着技术的进步,人们对太赫兹(0.1-1THz)频段的兴趣不断增长,使通信能够以更高的数据速率进行,基于太赫兹的传感系统的现有使用激发了联合通信和传感系统(JCS)的探索。这种系统可以用于下一代卫星星座,用于互联网回传,同时执行研究大气气体等科学功能。事实上,这两种应用所采用的硬件即使不完全相同,也是高度相似的,这为设计一种可以同时进行通信和感知的新波形提供了可能性。在本文中,我们探讨了差分吸收雷达(DAR),传统上用于天气传感,作为与啁啾扩频(CSS)调制相结合的潜在候选者。我们提出了一个低地球轨道卫星的场景,其中CSS调制可以优于传统的PSK调制,同时可以通过DAR检索大气的水蒸气密度分布。通过仿真研究了通信和遥感应用的性能。
{"title":"Joint Terahertz Communication and Atmospheric Sensing in Low Earth Orbit Satellite Networks: Physical Layer Design","authors":"Sergio Aliaga, Ali J. Alqaraghuli, J. Jornet","doi":"10.1109/WoWMoM54355.2022.00071","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00071","url":null,"abstract":"As the interest in the Terahertz (0.1-1THz) band grows with the technological advancements that enable communication at higher data rates, the existing use for THz-based sensing systems motivate exploration of Joint Communication and Sensing systems (JCS). Such systems can be used for the next generation of satellite constellations for the purposes of internet-backhauling, while performing scientific functions such as studying atmospheric gases. The fact that the hardware employed for both applications is highly similar, if not identical, opens the possibility of designing a new waveform that can jointly communicate and sense at the same time. In this paper, we explore Differential Absorption Radars (DAR), traditionally used for weather sensing, as a potential candidate to be operated in combination with a Chirp Spread Spectrum (CSS) modulation. We present a scenario with a satellite at Low Earth Orbit (LEO) where the CSS modulation could outperform traditional PSK modulations while making it possible to retrieve water vapor density profiles of the atmosphere with DAR. Performance of both communication and remote sensing applications are studied through simulation.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125944479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Joint Orchestration of Content-Based Message Management and Traffic Flow Steering in Industrial Backbones 工业骨干网中基于内容的消息管理与流量导向的联合编排
Mattia Fogli, Carlo Giannelli, C. Stefanelli
The industrial internet of things has radically modified industrial environments, not only enabling novel services but also dramatically increasing the amount of generated traffic. Nowadays, a major concern within industrial plants is to support network-intensive services, such as real-time remote vibration monitoring of autonomous guided vehicles, while ensuring the prompt and reliable delivery of mission-critical safety-related messages among machines and the control room. To this purpose, we present a novel solution jointly orchestrating content-based message management and traffic flow steering: the former enables edge-powered in-network processing modules to process packet payloads as they traverse the industrial backbone, the latter supports dynamic (re)routing of traffic flows towards such processing modules. In particular, we exploit software-defined networking for flexible traffic flow (re)routing and Kubernetes for dynamic deployment on edge nodes of in-network processing modules for content-based message management. As demonstrated by performance results based on our working proof-of-concept prototype, our solution efficiently allows to manage industrial traffic flows in a coordinated fashion, by considering requirements of concurrently running industrial applications and the current state of the overall topology.
工业物联网从根本上改变了工业环境,不仅实现了新颖的服务,而且大大增加了产生的流量。如今,工业工厂内的一个主要问题是支持网络密集型服务,例如自动引导车辆的实时远程振动监测,同时确保在机器和控制室之间及时可靠地传递关键任务安全相关信息。为此,我们提出了一种新颖的解决方案,联合编排基于内容的消息管理和流量控制:前者使边缘供电的网络内处理模块能够在数据包有效负载穿越工业骨干时处理它们,后者支持流量流向这些处理模块的动态(重新)路由。特别是,我们利用软件定义网络实现灵活的流量(重)路由,并利用Kubernetes在基于内容的消息管理的网络内处理模块的边缘节点上动态部署。正如基于我们的工作概念验证原型的性能结果所证明的那样,通过考虑并发运行的工业应用程序的需求和整体拓扑的当前状态,我们的解决方案有效地允许以协调的方式管理工业流量。
{"title":"Joint Orchestration of Content-Based Message Management and Traffic Flow Steering in Industrial Backbones","authors":"Mattia Fogli, Carlo Giannelli, C. Stefanelli","doi":"10.1109/WoWMoM54355.2022.00067","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00067","url":null,"abstract":"The industrial internet of things has radically modified industrial environments, not only enabling novel services but also dramatically increasing the amount of generated traffic. Nowadays, a major concern within industrial plants is to support network-intensive services, such as real-time remote vibration monitoring of autonomous guided vehicles, while ensuring the prompt and reliable delivery of mission-critical safety-related messages among machines and the control room. To this purpose, we present a novel solution jointly orchestrating content-based message management and traffic flow steering: the former enables edge-powered in-network processing modules to process packet payloads as they traverse the industrial backbone, the latter supports dynamic (re)routing of traffic flows towards such processing modules. In particular, we exploit software-defined networking for flexible traffic flow (re)routing and Kubernetes for dynamic deployment on edge nodes of in-network processing modules for content-based message management. As demonstrated by performance results based on our working proof-of-concept prototype, our solution efficiently allows to manage industrial traffic flows in a coordinated fashion, by considering requirements of concurrently running industrial applications and the current state of the overall topology.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Privacy in Ride-Sharing Applications Through POIs Selection 通过poi选择提高拼车应用的隐私
F. Martelli, M. E. Renda
The problem of data privacy preservation is of central importance in ride-sharing applications, because in order to efficiently match passengers with vehicles, these services rely on exact location information. Yet, transportation and location data can reveal personal habits, preferences and behaviors, and users may prefer not to share their exact location. Masking location data in order to avoid the identification of users in case of data leakage, and/or misusage would help protect user privacy, but could also lead to poorer system performance, in terms of efficiency and quality of service as perceived by users.In this paper, we compare classic data masking techniques, namely obfuscation, k-anonymity, and l-diversity, applied to users’ location data, before sending it to a carpooling system. While the first two techniques use randomly generated points to mask the actual location, l-diversity uses actual points of interest, having the additional benefit of ensuring that the disclosed location is always an accessible and safe pickup or drop-off location. Given that users in a real ride-sharing system could choose to protect or not protect their location data when using the system, we also evaluate the effect of privacy preservation penetration rate, by varying the percentage of users choosing to have their location data protected. The results show that l-diversity performance is better than the others’ even when the privacy penetration rate is high, suggesting that this technique has the potential to meet both users’ and system’s needs, and thus being a better option to provide privacy within carpooling systems.
数据隐私保护问题在拼车应用中至关重要,因为为了有效地将乘客与车辆匹配,这些服务依赖于精确的位置信息。然而,交通和位置数据可以揭示个人习惯、偏好和行为,用户可能不愿意分享他们的确切位置。屏蔽位置数据以避免在数据泄露和/或滥用的情况下识别用户,这有助于保护用户隐私,但也可能导致系统性能下降,即用户所感受到的效率和服务质量。在本文中,我们比较了在将用户位置数据发送到拼车系统之前应用于用户位置数据的经典数据屏蔽技术,即混淆,k-匿名和l-多样性。前两种技术使用随机生成的点来掩盖实际位置,而l-diversity使用实际兴趣点,具有确保公开位置始终是可访问且安全的取货或下车位置的额外好处。考虑到真实拼车系统中的用户在使用系统时可以选择保护或不保护其位置数据,我们还通过改变选择保护其位置数据的用户百分比来评估隐私保护渗透率的影响。结果表明,即使在隐私渗透率较高的情况下,l-diversity的性能也优于其他技术,这表明该技术具有满足用户和系统需求的潜力,因此是在拼车系统中提供隐私的更好选择。
{"title":"Enhancing Privacy in Ride-Sharing Applications Through POIs Selection","authors":"F. Martelli, M. E. Renda","doi":"10.1109/WoWMoM54355.2022.00069","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00069","url":null,"abstract":"The problem of data privacy preservation is of central importance in ride-sharing applications, because in order to efficiently match passengers with vehicles, these services rely on exact location information. Yet, transportation and location data can reveal personal habits, preferences and behaviors, and users may prefer not to share their exact location. Masking location data in order to avoid the identification of users in case of data leakage, and/or misusage would help protect user privacy, but could also lead to poorer system performance, in terms of efficiency and quality of service as perceived by users.In this paper, we compare classic data masking techniques, namely obfuscation, k-anonymity, and l-diversity, applied to users’ location data, before sending it to a carpooling system. While the first two techniques use randomly generated points to mask the actual location, l-diversity uses actual points of interest, having the additional benefit of ensuring that the disclosed location is always an accessible and safe pickup or drop-off location. Given that users in a real ride-sharing system could choose to protect or not protect their location data when using the system, we also evaluate the effect of privacy preservation penetration rate, by varying the percentage of users choosing to have their location data protected. The results show that l-diversity performance is better than the others’ even when the privacy penetration rate is high, suggesting that this technique has the potential to meet both users’ and system’s needs, and thus being a better option to provide privacy within carpooling systems.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Federated Leaning Perspective for Intelligent Data Communication Framework in IoT Ecosystem 物联网生态系统中智能数据通信框架的联合学习视角
R. Kumar, R. S. Bali, G. Aujla
Edge intelligence propelled federated learning as a promising technology for embedding distributed intelligence in the Internet of Things (IoT) ecosystem. The multidimensional data generated by IoT devices is enormous in volume and personalized in nature. Thus, integrating federated learning to train the learning model for performing analysis on source data can be helpful. Despite the above reasons, the current schemes are centralized and depend on the server for aggregation of local parameters. So, in this paper, we have proposed a model that enables the sensor to be part of a defined cluster (based on the type of data generated by the sensor) during the registration process. In this approach, the aggregation is performed at the edge server for sub-global aggregation, which further communicates the aggregated parameters for global aggregation. The sub-global model is trained by selecting an optimal value for local iterations, batch size, and appropriate model selection. The experimental setup based on the tensor flow federated framework is verified on MNSIT-10 datasets for the validity of the proposed methodology.
边缘智能推动了联邦学习作为一种有前途的技术,用于在物联网(IoT)生态系统中嵌入分布式智能。物联网设备产生的多维数据量巨大,具有个性化的本质。因此,集成联邦学习来训练学习模型,以便对源数据执行分析是有帮助的。尽管存在上述原因,但目前的方案是集中式的,并且依赖于服务器来聚合本地参数。因此,在本文中,我们提出了一个模型,使传感器在注册过程中成为定义集群的一部分(基于传感器生成的数据类型)。在这种方法中,在边缘服务器上执行聚合以进行子全局聚合,子全局聚合进一步通信用于全局聚合的聚合参数。通过选择局部迭代、批处理大小和适当的模型选择的最优值来训练子全局模型。在MNSIT-10数据集上验证了基于张量流联邦框架的实验设置,验证了所提方法的有效性。
{"title":"A Federated Leaning Perspective for Intelligent Data Communication Framework in IoT Ecosystem","authors":"R. Kumar, R. S. Bali, G. Aujla","doi":"10.1109/WoWMoM54355.2022.00086","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00086","url":null,"abstract":"Edge intelligence propelled federated learning as a promising technology for embedding distributed intelligence in the Internet of Things (IoT) ecosystem. The multidimensional data generated by IoT devices is enormous in volume and personalized in nature. Thus, integrating federated learning to train the learning model for performing analysis on source data can be helpful. Despite the above reasons, the current schemes are centralized and depend on the server for aggregation of local parameters. So, in this paper, we have proposed a model that enables the sensor to be part of a defined cluster (based on the type of data generated by the sensor) during the registration process. In this approach, the aggregation is performed at the edge server for sub-global aggregation, which further communicates the aggregated parameters for global aggregation. The sub-global model is trained by selecting an optimal value for local iterations, batch size, and appropriate model selection. The experimental setup based on the tensor flow federated framework is verified on MNSIT-10 datasets for the validity of the proposed methodology.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121780911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grade to the Edge: How Many Unreliable Nodes Does It Take to Break a Content Delivery Network? 分级到边缘:需要多少不可靠节点才能破坏一个内容分发网络?
Sandra Zimmermann, Paul Schwenteck, Juan A. Cabrera, Giang T. Nguyen, F. Fitzek
Delivering content from a network via a client-server architecture is expensive not only for content owners but also for network operators. Moving content closer to the end user is already used in Content Delivery Networks (CDN). Multi-Access Edge Computing (MEC) enables us to shift the content even closer by using the storage of end users. But, due to the large media files, storage and transport costs for peers increase significantly. Network Coding can reduce these costs. However, peers in CDNs tend to be highly fluctuating and often need to be restored, making continuous availability of data at the network edge a problem. While for uncoded data, individual packets lost due to peer failures can be tracked to determine availability, the availability of coded data is currently distinguished only in two cases: either there are still enough linearly independent packets to decode the file, or there are not. However, we have found that the network’s combined coded cache loses quality over time due to recovery. This quality loss, which we refer to as grade, can be measured by very cost-effective monitoring. If the grade falls below a certain limit, we can intervene in the network by performing a cache refresh to prevent data becoming unavailable preemptively. In this paper, we present the cases in which such monitoring is useful, how the grade is calculated, and when a cache refresh is necessary. The results show that we can reduce network traffic by up to 34% with minimal storage costs through efficient monitoring.
通过客户机-服务器架构从网络交付内容不仅对内容所有者而且对网络运营商来说都是昂贵的。内容分发网络(CDN)已经在使用将内容移动到更接近最终用户的方式。多访问边缘计算(MEC)使我们能够通过使用最终用户的存储将内容移动得更近。但是,由于媒体文件很大,对等体的存储和传输成本显著增加。网络编码可以降低这些成本。然而,cdn中的对等点往往波动很大,经常需要恢复,这使得网络边缘的数据持续可用性成为一个问题。对于未编码的数据,可以跟踪由于对等失败而丢失的单个数据包以确定可用性,而编码数据的可用性目前仅在两种情况下进行区分:要么仍然有足够的线性独立数据包来解码文件,要么没有。然而,我们发现,由于恢复,网络的组合编码缓存随着时间的推移会失去质量。这种质量损失,我们称之为等级,可以通过非常具有成本效益的监控来衡量。如果等级低于某个限制,我们可以通过执行缓存刷新来干预网络,以防止数据变得不可用。在本文中,我们介绍了这样的监控是有用的情况,如何计算等级,以及何时需要缓存刷新。结果表明,通过有效的监控,我们可以以最小的存储成本减少高达34%的网络流量。
{"title":"Grade to the Edge: How Many Unreliable Nodes Does It Take to Break a Content Delivery Network?","authors":"Sandra Zimmermann, Paul Schwenteck, Juan A. Cabrera, Giang T. Nguyen, F. Fitzek","doi":"10.1109/WoWMoM54355.2022.00068","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00068","url":null,"abstract":"Delivering content from a network via a client-server architecture is expensive not only for content owners but also for network operators. Moving content closer to the end user is already used in Content Delivery Networks (CDN). Multi-Access Edge Computing (MEC) enables us to shift the content even closer by using the storage of end users. But, due to the large media files, storage and transport costs for peers increase significantly. Network Coding can reduce these costs. However, peers in CDNs tend to be highly fluctuating and often need to be restored, making continuous availability of data at the network edge a problem. While for uncoded data, individual packets lost due to peer failures can be tracked to determine availability, the availability of coded data is currently distinguished only in two cases: either there are still enough linearly independent packets to decode the file, or there are not. However, we have found that the network’s combined coded cache loses quality over time due to recovery. This quality loss, which we refer to as grade, can be measured by very cost-effective monitoring. If the grade falls below a certain limit, we can intervene in the network by performing a cache refresh to prevent data becoming unavailable preemptively. In this paper, we present the cases in which such monitoring is useful, how the grade is calculated, and when a cache refresh is necessary. The results show that we can reduce network traffic by up to 34% with minimal storage costs through efficient monitoring.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stateful Versus Stateless Selection of Edge or Cloud Servers Under Latency Constraints 延迟约束下边缘或云服务器的有状态与无状态选择
V. Mancuso, P. Castagno, M. Sereno, M. Marsan
We consider a radio access network slice serving mobile users whose requests imply computing requirements. Service is virtualized over either a powerful but distant cloud infrastructure or an edge computing host. The latter provides less computing and storage capacity with respect to the cloud, but can be reached with much lower delay. A tradeoff thus naturally arises between computing capacity and data transfer latency. We investigate the performance of this service model, discussing how service requests should be routed to edge or cloud servers. We look at the performance of various classes of online algorithms based on different levels of information about the system state. Our investigation is based on analytical models, simulations in OMNeT++, and a prototype implementation over operational cellular networks. First of all, we observe that distributing the load of service requests over edge and cloud is in general beneficial for performance, and simple to implement with a stateless online server selection policy that can be easily configured with near-optimal performance. Second, we shed light on the limited improvements that stateful polices can offer, notwithstanding they base their decisions on the knowledge of server congestion levels or round-trip latency conditions. Third, we unveil that stateful policies are dangerously prone to errors, which may make stateless policies preferable.
我们考虑一个无线接入网切片服务于移动用户,这些用户的请求包含计算需求。服务可以通过强大但遥远的云基础设施或边缘计算主机进行虚拟化。与云相比,后者提供的计算和存储容量更少,但可以以更低的延迟到达。因此,在计算能力和数据传输延迟之间自然会产生权衡。我们将研究此服务模型的性能,讨论如何将服务请求路由到边缘服务器或云服务器。我们根据不同级别的系统状态信息来研究各种在线算法的性能。我们的研究是基于分析模型,在omnet++中的模拟,以及在可操作的蜂窝网络上的原型实现。首先,我们观察到,在边缘和云上分配服务请求负载通常有利于性能,并且使用无状态在线服务器选择策略很容易实现,可以轻松配置为接近最佳性能。其次,我们阐明了有状态策略所能提供的有限改进,尽管它们的决策是基于服务器拥塞水平或往返延迟条件的知识。第三,我们揭示了有状态策略容易出错的危险,这可能使无状态策略更可取。
{"title":"Stateful Versus Stateless Selection of Edge or Cloud Servers Under Latency Constraints","authors":"V. Mancuso, P. Castagno, M. Sereno, M. Marsan","doi":"10.1109/WoWMoM54355.2022.00022","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00022","url":null,"abstract":"We consider a radio access network slice serving mobile users whose requests imply computing requirements. Service is virtualized over either a powerful but distant cloud infrastructure or an edge computing host. The latter provides less computing and storage capacity with respect to the cloud, but can be reached with much lower delay. A tradeoff thus naturally arises between computing capacity and data transfer latency. We investigate the performance of this service model, discussing how service requests should be routed to edge or cloud servers. We look at the performance of various classes of online algorithms based on different levels of information about the system state. Our investigation is based on analytical models, simulations in OMNeT++, and a prototype implementation over operational cellular networks. First of all, we observe that distributing the load of service requests over edge and cloud is in general beneficial for performance, and simple to implement with a stateless online server selection policy that can be easily configured with near-optimal performance. Second, we shed light on the limited improvements that stateful polices can offer, notwithstanding they base their decisions on the knowledge of server congestion levels or round-trip latency conditions. Third, we unveil that stateful policies are dangerously prone to errors, which may make stateless policies preferable.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Message from the Workshop Chairs: TwinNets 2022 研讨会主席的信息:TwinNets 2022
{"title":"Message from the Workshop Chairs: TwinNets 2022","authors":"","doi":"10.1109/wowmom54355.2022.00100","DOIUrl":"https://doi.org/10.1109/wowmom54355.2022.00100","url":null,"abstract":"","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125900954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of JavaScript Injection Eavesdropping on WebRTC communications WebRTC通信中JavaScript注入窃听检测
Ahmed A. A. Osman, Raouf Abozariba, A. Taufiq Asyhari, Adel Aneiba, M. Ben Farah
WebRTC is a Google-developed project that allows users to communicate directly. It is an open-source tool supported by all major browsers. Since it does not require additional installation steps and provides ultra-low latency streaming, smart city and social network applications such as WhatsApp, Facebook Messenger, and Snapchat use it as the underlying technology on the client-side both on desktop browsers and mobile apps. While the open-source tool is deemed to be secure and despite years of research and security testing, there are still vulnerabilities in the real-time communication application programming interface (API). We show in this paper how eavesdropping can be enabled by exploiting weaknesses and loopholes found in official WebRTC specifications. We demonstrate through real-world implementation how an eavesdropper can intercept WebRTC video calls by installing a malicious code onto the WebRTC webserver. Furthermore, we identify and discuss several, easy to perform, ways to detect wiretapping. Our evaluation shows that several indicators within webrtc-internals API traces can be used to detect anomalous activities, without the need for network monitoring tools.
WebRTC是谷歌开发的一个项目,允许用户直接交流。它是一个所有主流浏览器都支持的开源工具。由于它不需要额外的安装步骤,并提供超低延迟的流媒体,智能城市和社交网络应用,如WhatsApp、Facebook Messenger和Snapchat,都将其作为桌面浏览器和移动应用的客户端底层技术。虽然开源工具被认为是安全的,尽管经过多年的研究和安全测试,但实时通信应用程序编程接口(API)中仍然存在漏洞。我们在本文中展示了如何通过利用官方WebRTC规范中发现的弱点和漏洞来实现窃听。我们通过现实世界的实现演示了窃听者如何通过在WebRTC网络服务器上安装恶意代码来拦截WebRTC视频通话。此外,我们确定并讨论了几种易于执行的检测窃听的方法。我们的评估表明,web内部API跟踪中的几个指标可以用来检测异常活动,而不需要网络监控工具。
{"title":"Detection of JavaScript Injection Eavesdropping on WebRTC communications","authors":"Ahmed A. A. Osman, Raouf Abozariba, A. Taufiq Asyhari, Adel Aneiba, M. Ben Farah","doi":"10.1109/WoWMoM54355.2022.00084","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00084","url":null,"abstract":"WebRTC is a Google-developed project that allows users to communicate directly. It is an open-source tool supported by all major browsers. Since it does not require additional installation steps and provides ultra-low latency streaming, smart city and social network applications such as WhatsApp, Facebook Messenger, and Snapchat use it as the underlying technology on the client-side both on desktop browsers and mobile apps. While the open-source tool is deemed to be secure and despite years of research and security testing, there are still vulnerabilities in the real-time communication application programming interface (API). We show in this paper how eavesdropping can be enabled by exploiting weaknesses and loopholes found in official WebRTC specifications. We demonstrate through real-world implementation how an eavesdropper can intercept WebRTC video calls by installing a malicious code onto the WebRTC webserver. Furthermore, we identify and discuss several, easy to perform, ways to detect wiretapping. Our evaluation shows that several indicators within webrtc-internals API traces can be used to detect anomalous activities, without the need for network monitoring tools.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewers: ISMS 2022 审核人:ISMS 2022
{"title":"Reviewers: ISMS 2022","authors":"","doi":"10.1109/wowmom54355.2022.00010","DOIUrl":"https://doi.org/10.1109/wowmom54355.2022.00010","url":null,"abstract":"","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121544001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Learning Approach for Age-of-Information Minimization in Wireless Sensor Networks 无线传感器网络中信息年龄最小化的分层学习方法
Leiyang Cui, Yusi Long, D. Hoang, Shiming Gong
In this paper, we focus on a multi-user wireless network coordinated by a multi-antenna access point (AP). Each user can generate the sensing information randomly and report it to the AP. The freshness of information is measured by the age of information (AoI). We formulate the AoI minimization problem by jointly optimizing the users’ scheduling and transmission control strategies. Moreover, we employ the intelligent reflecting surface (IRS) to enhance the channel conditions and thus reduce the transmission delay by controlling the AP’s beamforming vector and the IRS’s phase shifting matrices. The resulting AoI minimization becomes a mixed-integer program and difficult to solve due to uncertain information of the sensing data arrivals at individual users. By exploiting the problem structure, we devised a hierarchical deep reinforcement learning (DRL) framework to search for optimal solution in two iterative steps. Specifically, the users’ scheduling strategy is firstly determined by the outer-loop DRL approach, and then the inner-loop optimization adapts either the uplink information transmission or downlink energy transfer to all users. Our numerical results verify that the proposed algorithm can outperform typical baselines in terms of the average AoI performance.
本文主要研究由多天线接入点(AP)协调的多用户无线网络。每个用户可以随机生成感知信息并向AP报告。信息的新鲜度通过信息年龄(age of information, AoI)来衡量。通过联合优化用户调度和传输控制策略,提出了AoI最小化问题。此外,我们采用智能反射面(IRS)来改善信道条件,从而通过控制AP的波束形成矢量和IRS的相移矩阵来降低传输延迟。由此产生的AoI最小化成为一个混合整数方案,并且由于到达单个用户的传感数据信息不确定而难以求解。通过利用问题结构,我们设计了一个分层深度强化学习(DRL)框架,通过两个迭代步骤搜索最优解。具体而言,用户的调度策略首先由外环DRL方法确定,然后内环优化将上行信息传输或下行能量传输适用于所有用户。我们的数值结果验证了所提出的算法在平均AoI性能方面优于典型基线。
{"title":"Hierarchical Learning Approach for Age-of-Information Minimization in Wireless Sensor Networks","authors":"Leiyang Cui, Yusi Long, D. Hoang, Shiming Gong","doi":"10.1109/WoWMoM54355.2022.00024","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00024","url":null,"abstract":"In this paper, we focus on a multi-user wireless network coordinated by a multi-antenna access point (AP). Each user can generate the sensing information randomly and report it to the AP. The freshness of information is measured by the age of information (AoI). We formulate the AoI minimization problem by jointly optimizing the users’ scheduling and transmission control strategies. Moreover, we employ the intelligent reflecting surface (IRS) to enhance the channel conditions and thus reduce the transmission delay by controlling the AP’s beamforming vector and the IRS’s phase shifting matrices. The resulting AoI minimization becomes a mixed-integer program and difficult to solve due to uncertain information of the sensing data arrivals at individual users. By exploiting the problem structure, we devised a hierarchical deep reinforcement learning (DRL) framework to search for optimal solution in two iterative steps. Specifically, the users’ scheduling strategy is firstly determined by the outer-loop DRL approach, and then the inner-loop optimization adapts either the uplink information transmission or downlink energy transfer to all users. Our numerical results verify that the proposed algorithm can outperform typical baselines in terms of the average AoI performance.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131317649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1