Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00082
Wanying Guo, Shiraz Ali Wagan, D. Shin, Isma Farah Siddiqui, Jahwan Koo, Nawab Muhammad Faseeh Qureshi
In order to adapt to the change of mobile service needs, a base station sleep method combining long cycle and short cycle style is proposed to realize energy saving in heterogeneous dense networks. In the long-cycle mode, the neighboring base stations cooperate to optimize the activation and deactivation strategy. Meanwhile, a constrained graph game is formulated where each base station is abstracted as a game player with the constraint of traffic load. Then the base station states are solved distributively to reduce signaling overhead and base station power consumption. In the short-cycle mode, the transmission mode and non-transmission mode are introduced to enhance the adaptability to fast-changing services. The base stations are clustered and the mode matrix of the base station cluster is set to form the potential cooperation among base stations, thus energy saving is achieved by reducing inter-base station interference. Then, a distributed iterative algorithm for solving the generalized Nash equilibrium and the selection process of the mode matrix of the base station cluster is given. Simulation results show that the proposed method can respectively save energy by more than 12% and 15% during 24 hours, compared with the reference log-cycle and short-cycle modes.
{"title":"Periodic-Collaboration-Based Energy-Efficient Cell Dormancy in Heterogeneous Dense Networks","authors":"Wanying Guo, Shiraz Ali Wagan, D. Shin, Isma Farah Siddiqui, Jahwan Koo, Nawab Muhammad Faseeh Qureshi","doi":"10.1109/WoWMoM54355.2022.00082","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00082","url":null,"abstract":"In order to adapt to the change of mobile service needs, a base station sleep method combining long cycle and short cycle style is proposed to realize energy saving in heterogeneous dense networks. In the long-cycle mode, the neighboring base stations cooperate to optimize the activation and deactivation strategy. Meanwhile, a constrained graph game is formulated where each base station is abstracted as a game player with the constraint of traffic load. Then the base station states are solved distributively to reduce signaling overhead and base station power consumption. In the short-cycle mode, the transmission mode and non-transmission mode are introduced to enhance the adaptability to fast-changing services. The base stations are clustered and the mode matrix of the base station cluster is set to form the potential cooperation among base stations, thus energy saving is achieved by reducing inter-base station interference. Then, a distributed iterative algorithm for solving the generalized Nash equilibrium and the selection process of the mode matrix of the base station cluster is given. Simulation results show that the proposed method can respectively save energy by more than 12% and 15% during 24 hours, compared with the reference log-cycle and short-cycle modes.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132559041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00025
Preti Kumari, Hari Prabhat Gupta, Tanima Dutta, Sajal K. Das
Low Power Wide Area Networks (LPWAN) offer a promising wireless communications technology for Internet of Things (IoT) applications. Among various existing LPWAN technologies, Long-Range WAN (LoRaWAN) consumes minimal power and provides virtual channels for communication through spreading factors. However, LoRaWAN suffers from the interference problem among nodes connected to a gateway that uses the same spreading factor. Such interference increases data communication time, thus reducing data freshness and suitability of LoRaWAN for delay-sensitive applications. To minimize the interference problem, an optimal allocation of the spreading factor is requisite for determining the time duration of data transmission. This paper proposes a game-theoretic approach to estimate the time duration of using a spreading factor that ensures on-time data delivery with maximum network utilization. We incorporate the Age of Information (AoI) metric to capture the freshness of information as demanded by the applications. Our proposed approach is validated through simulation experiments, and its applicability is demonstrated for a crop protection system that ensures real-time monitoring and intrusion control of animals in an agricultural field. The simulation and prototype results demonstrate the impact of the number of nodes, AoI metric, and game-theoretic parameters on the performance of the IoT network.
低功耗广域网(LPWAN)为物联网(IoT)应用提供了一种有前途的无线通信技术。在现有的各种低功耗广域网技术中,远程广域网(LoRaWAN)功耗最小,并通过扩频因子提供虚拟通信通道。然而,LoRaWAN存在与使用相同传播因子的网关连接的节点之间的干扰问题。这种干扰增加了数据通信时间,从而降低了数据的新鲜度和LoRaWAN对延迟敏感应用的适用性。为了最大限度地减少干扰问题,需要对扩频因子进行最优分配,以确定数据传输的时间长度。本文提出了一种博弈论方法来估计使用扩展因子的时间持续时间,以保证数据的准时传输和最大的网络利用率。我们结合了信息时代(Age of Information, AoI)度量来捕获应用程序所要求的信息的新鲜度。通过仿真实验验证了我们提出的方法,并证明了其在作物保护系统中的适用性,该系统可确保农田动物的实时监测和入侵控制。仿真和原型结果验证了节点数量、AoI度量和博弈论参数对物联网网络性能的影响。
{"title":"Improving Age of Information with Interference Problem in Long-Range Wide Area Networks","authors":"Preti Kumari, Hari Prabhat Gupta, Tanima Dutta, Sajal K. Das","doi":"10.1109/WoWMoM54355.2022.00025","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00025","url":null,"abstract":"Low Power Wide Area Networks (LPWAN) offer a promising wireless communications technology for Internet of Things (IoT) applications. Among various existing LPWAN technologies, Long-Range WAN (LoRaWAN) consumes minimal power and provides virtual channels for communication through spreading factors. However, LoRaWAN suffers from the interference problem among nodes connected to a gateway that uses the same spreading factor. Such interference increases data communication time, thus reducing data freshness and suitability of LoRaWAN for delay-sensitive applications. To minimize the interference problem, an optimal allocation of the spreading factor is requisite for determining the time duration of data transmission. This paper proposes a game-theoretic approach to estimate the time duration of using a spreading factor that ensures on-time data delivery with maximum network utilization. We incorporate the Age of Information (AoI) metric to capture the freshness of information as demanded by the applications. Our proposed approach is validated through simulation experiments, and its applicability is demonstrated for a crop protection system that ensures real-time monitoring and intrusion control of animals in an agricultural field. The simulation and prototype results demonstrate the impact of the number of nodes, AoI metric, and game-theoretic parameters on the performance of the IoT network.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133278138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00075
Haiyan Li, Bo Zhang, Sha Qin, Jinlin Peng
UAV swarms based on cooperative communication networks are widely used in many fields, which have the advantages of high mobility, high flexibility and low cost. However, UAVs face limited spectrum resources in a specific area and may interfere with primary users. Effective communication management between UAVs is a challenging problem. There-fore, this paper proposes a UAV clustering method based on the improved cluster head selection weight, which provides an effective management for the communication between UAVs and improves the efficiency of data collection. The proposed algorithm employs a new cluster head selection strategy based on the searched targets and available channel resources. Moreover, we analyze the weight factors of UAVs in flight and communication energy consumption. Considering the decreasing the member of the UAV clusters, we also design a maintenance strategy to improve the degree of data sharing in the cluster. The experimental results show that, compared with the traditional UAV clustering methods, the proposed method can effectively improve the network management for communication resources, reduce the collision and interference rate with the primary user by 25%, shorten the time required to fully acquire multi-target point data for the first time by 9%, and increase the amount of target point data collected by 26%.
{"title":"UAV-Clustering: Cluster head selection and update for UAV swarms searching with unknown target location","authors":"Haiyan Li, Bo Zhang, Sha Qin, Jinlin Peng","doi":"10.1109/WoWMoM54355.2022.00075","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00075","url":null,"abstract":"UAV swarms based on cooperative communication networks are widely used in many fields, which have the advantages of high mobility, high flexibility and low cost. However, UAVs face limited spectrum resources in a specific area and may interfere with primary users. Effective communication management between UAVs is a challenging problem. There-fore, this paper proposes a UAV clustering method based on the improved cluster head selection weight, which provides an effective management for the communication between UAVs and improves the efficiency of data collection. The proposed algorithm employs a new cluster head selection strategy based on the searched targets and available channel resources. Moreover, we analyze the weight factors of UAVs in flight and communication energy consumption. Considering the decreasing the member of the UAV clusters, we also design a maintenance strategy to improve the degree of data sharing in the cluster. The experimental results show that, compared with the traditional UAV clustering methods, the proposed method can effectively improve the network management for communication resources, reduce the collision and interference rate with the primary user by 25%, shorten the time required to fully acquire multi-target point data for the first time by 9%, and increase the amount of target point data collected by 26%.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00056
Javier Jose Diaz Rivera, T. Khan, Waleed Akbar, Muhammad Afaq, A. Mehmood, Wang-Cheol Song
Network ecosystems have grown to encompass multiple application domains. SDN and NFV technologies have helped pave the road for the evolution of the core and edge networking systems, allowing for numerous services to be served by the same physical infrastructure. Guaranteeing the operability of the network has become an ever-increasing requirement in order to sustain the underlying services deployed on the network. For this, Intent-Based Networking (IBN) aims to abstract network management by introducing high-level rules/policies that are translated to network configurations per service requirements. By following this principle, we proposed an anomaly detection and mitigation mechanism that exploits the characteristics of IBN for collecting and analyzing flows, using Machine Learning for interpreting traffic patterns, and automatic deployment of high-level policies for corrective actions related to anomalous traffic occurrences. The complete system is deployed on the Korea Advanced Research Network (KOREN), where the abstraction provided by IBN for network anomaly detection and mitigation is a key factor in closing the gap to achieve complete network automation.
{"title":"Automation of network anomaly detection and mitigation with the use of IBN: A deployment case on KOREN","authors":"Javier Jose Diaz Rivera, T. Khan, Waleed Akbar, Muhammad Afaq, A. Mehmood, Wang-Cheol Song","doi":"10.1109/WoWMoM54355.2022.00056","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00056","url":null,"abstract":"Network ecosystems have grown to encompass multiple application domains. SDN and NFV technologies have helped pave the road for the evolution of the core and edge networking systems, allowing for numerous services to be served by the same physical infrastructure. Guaranteeing the operability of the network has become an ever-increasing requirement in order to sustain the underlying services deployed on the network. For this, Intent-Based Networking (IBN) aims to abstract network management by introducing high-level rules/policies that are translated to network configurations per service requirements. By following this principle, we proposed an anomaly detection and mitigation mechanism that exploits the characteristics of IBN for collecting and analyzing flows, using Machine Learning for interpreting traffic patterns, and automatic deployment of high-level policies for corrective actions related to anomalous traffic occurrences. The complete system is deployed on the Korea Advanced Research Network (KOREN), where the abstraction provided by IBN for network anomaly detection and mitigation is a key factor in closing the gap to achieve complete network automation.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00061
Lingyun Lu, Jun Xiao, Wei Ni, Haifeng Du, Dalin Zhang
Online video is the most popular Internet application. As the throughput would frequently change under different network conditions, it is important to adaptively select the proper bitrate and improve user’s quality of experience. In this paper, we propose a new DRL-based rate adaption algorithm for video streaming, which holistically captures user’s preference of video contents, network throughput and buffer occupancy, and select the proper bitrate for video to improve the QoE. Specifically, we use 3D Convolutional neural (C3D) network to learn the spatio-temporal features, and implement the semantic analysis of videos. We also apply the Term Frequency-Inverse Document Frequency (TF-IDF) method to analyze the user’s preference of different scene types, according to its viewing history. The dynamic adaptive streaming is formulated as a Markov Decision Process (MDP) problem, and use the Actor-Critic (A3C) algorithm to dynamically choose the optimal bitrate. As corroborated by simulations, our algorithm can accurately obtain the user’s preference, keep the bitrate allocation consistent with the user’s preference, and maintain video quality. Compared with the state-of-the-art Pensieve algorithm, our algorithm improves the average QoE by at least 12.5%. It also has a significant improvement over other baseline methods.
{"title":"Deep-Reinforcement-Learning-based User-Preference-Aware Rate Adaptation for Video Streaming","authors":"Lingyun Lu, Jun Xiao, Wei Ni, Haifeng Du, Dalin Zhang","doi":"10.1109/WoWMoM54355.2022.00061","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00061","url":null,"abstract":"Online video is the most popular Internet application. As the throughput would frequently change under different network conditions, it is important to adaptively select the proper bitrate and improve user’s quality of experience. In this paper, we propose a new DRL-based rate adaption algorithm for video streaming, which holistically captures user’s preference of video contents, network throughput and buffer occupancy, and select the proper bitrate for video to improve the QoE. Specifically, we use 3D Convolutional neural (C3D) network to learn the spatio-temporal features, and implement the semantic analysis of videos. We also apply the Term Frequency-Inverse Document Frequency (TF-IDF) method to analyze the user’s preference of different scene types, according to its viewing history. The dynamic adaptive streaming is formulated as a Markov Decision Process (MDP) problem, and use the Actor-Critic (A3C) algorithm to dynamically choose the optimal bitrate. As corroborated by simulations, our algorithm can accurately obtain the user’s preference, keep the bitrate allocation consistent with the user’s preference, and maintain video quality. Compared with the state-of-the-art Pensieve algorithm, our algorithm improves the average QoE by at least 12.5%. It also has a significant improvement over other baseline methods.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00044
Muhammad Zeeshan, A. Pouryazdan, Robert Cobden, Stephen Wang, R. Prance, D. Roggen
Wearable and home IoT applications require low-power connectivity to maximize battery life. Sensing a modulated electric field, referred to as capacitively coupled communication, is a promising alternative to communication via electromagnetic waves. However, achieving a reliable over-the-air communication through electric field remains a research challenge. We describe an efficient electric field based over-the-air communication system using frequency shift keying (FSK) which achieves arm’s length communication range with throughput suitable for real-time sensor streaming or even audio streaming. This is achieved through a highly sensitive electric potential receiver allowing communication when weakly coupled, such as between two devices far from any other object or human body. The digital FSK receiver uses an undersampling technique to reduce the complexity of the implementation. Another contribution of this work is the use of low-power ARM microcontroller to perform the modulation/demodulation, with a few additional off-the-shelf digital and analog components. We present a detailed performance analysis of the system when varying the transmit voltage and communication distance in five different scenarios/environments. The performance is analyzed and compared in terms of bit error rate (BER) and throughput. The system is capable of providing reliable communication link up to 1.2m with a user throughput of 75 kbps in the best case scenario, when placed over tarmac road. It is also shown that the system achieves a user throughput of at least 80 kbps for a distance of 70cm in the worst case scenario, when both the devices are hanged in air through strings.
{"title":"Electric Field Short-range Over-the-air Communication for Wearable and IoT Applications with Off-the-shelf Microcontrollers","authors":"Muhammad Zeeshan, A. Pouryazdan, Robert Cobden, Stephen Wang, R. Prance, D. Roggen","doi":"10.1109/WoWMoM54355.2022.00044","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00044","url":null,"abstract":"Wearable and home IoT applications require low-power connectivity to maximize battery life. Sensing a modulated electric field, referred to as capacitively coupled communication, is a promising alternative to communication via electromagnetic waves. However, achieving a reliable over-the-air communication through electric field remains a research challenge. We describe an efficient electric field based over-the-air communication system using frequency shift keying (FSK) which achieves arm’s length communication range with throughput suitable for real-time sensor streaming or even audio streaming. This is achieved through a highly sensitive electric potential receiver allowing communication when weakly coupled, such as between two devices far from any other object or human body. The digital FSK receiver uses an undersampling technique to reduce the complexity of the implementation. Another contribution of this work is the use of low-power ARM microcontroller to perform the modulation/demodulation, with a few additional off-the-shelf digital and analog components. We present a detailed performance analysis of the system when varying the transmit voltage and communication distance in five different scenarios/environments. The performance is analyzed and compared in terms of bit error rate (BER) and throughput. The system is capable of providing reliable communication link up to 1.2m with a user throughput of 75 kbps in the best case scenario, when placed over tarmac road. It is also shown that the system achieves a user throughput of at least 80 kbps for a distance of 70cm in the worst case scenario, when both the devices are hanged in air through strings.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00072
J. Fraire, P. Madoery, Mehdi Ait Mesbah, Oana-Teodora Iova, F. Valois
Direct-to-Satellite-IoT (DtS-IoT) is a promising approach for data transfer to/from IoT devices in remote areas where deploying terrestrial infrastructure is not appealing or feasible. In this context, Low-Earth Orbit (LEO) satellites can serve as passing-by IoT gateways to which devices can offload buffered data to. However, transmission distance and orbital dynamics, combined with highly constrained devices on the ground makes DtS-IoT a very challenging problem. In fact, existing IoT medium access control protocols, negotiations schemes, etc. need to be revised and/or extended to scale up to these challenging conditions. The intricate time-dynamic aspects of DtS-IoT networks require of adequate simulation environments to assess the expected performance of enabling technologies. To make up for the lack of such tools, we present a novel event-driven open-source end-to-end simulation tool coined FLoRaSAT. The simulator leverages Omnet++ and includes a benchmarking DtS-IoT scenario comprising 16 cross-linked LEO satellites and 1500 IoT nodes on the surface. Satellites and devices are connected using the standard LoRaWAN Low-Power Wide Area (LPWAN) protocol (Class A and B). FLoRaSAT allows the easy implementation and study of DtS-IoT radio access and core network protocols, and we take advantage of this flexibility to investigate expected network metrics and non-intuitive phenomena emerging from the resulting multi-gateway setup.
{"title":"Simulating LoRa-Based Direct-to-Satellite IoT Networks with FLoRaSaT","authors":"J. Fraire, P. Madoery, Mehdi Ait Mesbah, Oana-Teodora Iova, F. Valois","doi":"10.1109/WoWMoM54355.2022.00072","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00072","url":null,"abstract":"Direct-to-Satellite-IoT (DtS-IoT) is a promising approach for data transfer to/from IoT devices in remote areas where deploying terrestrial infrastructure is not appealing or feasible. In this context, Low-Earth Orbit (LEO) satellites can serve as passing-by IoT gateways to which devices can offload buffered data to. However, transmission distance and orbital dynamics, combined with highly constrained devices on the ground makes DtS-IoT a very challenging problem. In fact, existing IoT medium access control protocols, negotiations schemes, etc. need to be revised and/or extended to scale up to these challenging conditions. The intricate time-dynamic aspects of DtS-IoT networks require of adequate simulation environments to assess the expected performance of enabling technologies. To make up for the lack of such tools, we present a novel event-driven open-source end-to-end simulation tool coined FLoRaSAT. The simulator leverages Omnet++ and includes a benchmarking DtS-IoT scenario comprising 16 cross-linked LEO satellites and 1500 IoT nodes on the surface. Satellites and devices are connected using the standard LoRaWAN Low-Power Wide Area (LPWAN) protocol (Class A and B). FLoRaSAT allows the easy implementation and study of DtS-IoT radio access and core network protocols, and we take advantage of this flexibility to investigate expected network metrics and non-intuitive phenomena emerging from the resulting multi-gateway setup.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00083
Nikumani Choudhury, Moustafa M. Nasralla, Aman Shrivastav, Anakhi Hazarika
With a plethora of Internet of Things (IoT) applications for smart cities, encompassing and supporting several enabling technologies for real-time performance, an enormous amount of network packets faces the challenge of timely delivery. The IEEE 802.15.4 standard is one of the most popular and extensively adopted networking specifications for implementing different IoT applications and catering to several application-specific Quality of Service (QoS) requirements. Deterministic Synchronous Multi-channel Extension (DSME) is one of the Medium Access Control (MAC) protocols of IEEE 802.15.4 standard that facilitates stringent QoS through the allocation of DSME-Guaranteed Time Slots (GTSs) between a pair of devices. Interestingly, the standard does not define any mechanism for scheduling the DSME-GTSs, thereby opening several research opportunities. In this paper, we propose a Distributed Delay Aware Scheduling (DDAS) mechanism to increase the efficiency of the DSME MAC by using priority-based guaranteed time slots scheduling. DDAS assigns priority to the devices according to the criticality of time and number of associated devices, i.e., it identifies various flow deadlines and assigns GTS slots accordingly. The DDAS scheme aims to satisfy and adhere to various delay deadlines in the data flows of an IoT application. The proposed scheduling mechanism is shown to outperform other closely related schemes in terms of latency as well as energy consumption.
{"title":"DDAS: Distributed Delay Aware Scheduling for DSME based IoT Network Applications in Smart Cities","authors":"Nikumani Choudhury, Moustafa M. Nasralla, Aman Shrivastav, Anakhi Hazarika","doi":"10.1109/WoWMoM54355.2022.00083","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00083","url":null,"abstract":"With a plethora of Internet of Things (IoT) applications for smart cities, encompassing and supporting several enabling technologies for real-time performance, an enormous amount of network packets faces the challenge of timely delivery. The IEEE 802.15.4 standard is one of the most popular and extensively adopted networking specifications for implementing different IoT applications and catering to several application-specific Quality of Service (QoS) requirements. Deterministic Synchronous Multi-channel Extension (DSME) is one of the Medium Access Control (MAC) protocols of IEEE 802.15.4 standard that facilitates stringent QoS through the allocation of DSME-Guaranteed Time Slots (GTSs) between a pair of devices. Interestingly, the standard does not define any mechanism for scheduling the DSME-GTSs, thereby opening several research opportunities. In this paper, we propose a Distributed Delay Aware Scheduling (DDAS) mechanism to increase the efficiency of the DSME MAC by using priority-based guaranteed time slots scheduling. DDAS assigns priority to the devices according to the criticality of time and number of associated devices, i.e., it identifies various flow deadlines and assigns GTS slots accordingly. The DDAS scheme aims to satisfy and adhere to various delay deadlines in the data flows of an IoT application. The proposed scheduling mechanism is shown to outperform other closely related schemes in terms of latency as well as energy consumption.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00088
Filippo Rebecchi, A. Pastor, A. Mozo, C. Lombardo, R. Bruschi, Ilias Aliferis, R. D. Corin, P. Gouvas, Antonio Álvarez Romero, Anna Angelogianni, Ilias Politis, C. Xenakis
Service providers, 5G network operators and, more generally, vertical industries face today a dangerous shortage of highly skilled cybersecurity experts. Along with the escalation and growing sophistication of cyber-attacks, 5G networks require the training of skilled and highly competent cyber forces. To meet these requirements, the SPIDER cyber range focuses specifically on 5G, and is based on three pillars, (i) cyber security assessment, (ii) training cyber security teams to defend against complex cyber-attack scenarios, and (iii) evaluation of cyber risk. The SPIDER cyber range replicates a customized 5G network, enabling the execution of cyber-exercises that take advantage of hands-on interaction in real time, the sharing of information between participants, and the gathering of feedback from network equipment, as well as the development and adaptation of advanced operational procedures. This aims to help 5G security professionals improve their ability to collaboratively manage and predict security incidents, complex attacks, and propagated vulnerabilities. The SPIDER cyber range is validated in two relevant use case scenarios aimed at demonstrating, in a realistic, measurable, and replicable way the transformations SPIDER will bring to the cybersecurity industry.
{"title":"A Digital Twin for the 5G Era: the SPIDER Cyber Range","authors":"Filippo Rebecchi, A. Pastor, A. Mozo, C. Lombardo, R. Bruschi, Ilias Aliferis, R. D. Corin, P. Gouvas, Antonio Álvarez Romero, Anna Angelogianni, Ilias Politis, C. Xenakis","doi":"10.1109/WoWMoM54355.2022.00088","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00088","url":null,"abstract":"Service providers, 5G network operators and, more generally, vertical industries face today a dangerous shortage of highly skilled cybersecurity experts. Along with the escalation and growing sophistication of cyber-attacks, 5G networks require the training of skilled and highly competent cyber forces. To meet these requirements, the SPIDER cyber range focuses specifically on 5G, and is based on three pillars, (i) cyber security assessment, (ii) training cyber security teams to defend against complex cyber-attack scenarios, and (iii) evaluation of cyber risk. The SPIDER cyber range replicates a customized 5G network, enabling the execution of cyber-exercises that take advantage of hands-on interaction in real time, the sharing of information between participants, and the gathering of feedback from network equipment, as well as the development and adaptation of advanced operational procedures. This aims to help 5G security professionals improve their ability to collaboratively manage and predict security incidents, complex attacks, and propagated vulnerabilities. The SPIDER cyber range is validated in two relevant use case scenarios aimed at demonstrating, in a realistic, measurable, and replicable way the transformations SPIDER will bring to the cybersecurity industry.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00054
Seunggyu Ji, Seunghwan Lee, Gi Seok Park, Hwangjun Song
This paper presents an effective adaptive 360° video VR streaming system based on the Spatial Representation Description (SRD) feature of MPEG-DASH. The goal of the proposed system is to provide a seamless 360° video VR streaming service with high spatial quality over the time-varying wireless network. To achieve this goal, the proposed system adopts tile-based viewport-adaptive streaming that is a promising way to efficiently deliver 360° video. In accordance with the SRD information and user’s head movement, the proposed system is designed to enhance the quality of the user experience by intensively allocating a limited bit budget to specific segments of interest without noticeable blanks. Additionally, we propose a fast recovery algorithm to minimize the effect of blanks caused by unpredictable head movement. Moreover, the proposed system considers the binocular disparity of the human eye to improve the subjective quality of stereo video. The proposed system is fully implemented by using well-known open sources (e.g., OpenHMD, Kvazaar and GPAC), C/C++, Python and head-mounted display (HMD) equipment. Finally, the experimental results are provided to verify the performance of the proposed system in real wireless network environments.
{"title":"Head Movement-aware MPEG-DASH SRD-based 360° Video VR Streaming System over Wireless Network","authors":"Seunggyu Ji, Seunghwan Lee, Gi Seok Park, Hwangjun Song","doi":"10.1109/WoWMoM54355.2022.00054","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00054","url":null,"abstract":"This paper presents an effective adaptive 360° video VR streaming system based on the Spatial Representation Description (SRD) feature of MPEG-DASH. The goal of the proposed system is to provide a seamless 360° video VR streaming service with high spatial quality over the time-varying wireless network. To achieve this goal, the proposed system adopts tile-based viewport-adaptive streaming that is a promising way to efficiently deliver 360° video. In accordance with the SRD information and user’s head movement, the proposed system is designed to enhance the quality of the user experience by intensively allocating a limited bit budget to specific segments of interest without noticeable blanks. Additionally, we propose a fast recovery algorithm to minimize the effect of blanks caused by unpredictable head movement. Moreover, the proposed system considers the binocular disparity of the human eye to improve the subjective quality of stereo video. The proposed system is fully implemented by using well-known open sources (e.g., OpenHMD, Kvazaar and GPAC), C/C++, Python and head-mounted display (HMD) equipment. Finally, the experimental results are provided to verify the performance of the proposed system in real wireless network environments.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127707411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}