首页 > 最新文献

2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

英文 中文
Hierarchical Learning Approach for Age-of-Information Minimization in Wireless Sensor Networks 无线传感器网络中信息年龄最小化的分层学习方法
Leiyang Cui, Yusi Long, D. Hoang, Shiming Gong
In this paper, we focus on a multi-user wireless network coordinated by a multi-antenna access point (AP). Each user can generate the sensing information randomly and report it to the AP. The freshness of information is measured by the age of information (AoI). We formulate the AoI minimization problem by jointly optimizing the users’ scheduling and transmission control strategies. Moreover, we employ the intelligent reflecting surface (IRS) to enhance the channel conditions and thus reduce the transmission delay by controlling the AP’s beamforming vector and the IRS’s phase shifting matrices. The resulting AoI minimization becomes a mixed-integer program and difficult to solve due to uncertain information of the sensing data arrivals at individual users. By exploiting the problem structure, we devised a hierarchical deep reinforcement learning (DRL) framework to search for optimal solution in two iterative steps. Specifically, the users’ scheduling strategy is firstly determined by the outer-loop DRL approach, and then the inner-loop optimization adapts either the uplink information transmission or downlink energy transfer to all users. Our numerical results verify that the proposed algorithm can outperform typical baselines in terms of the average AoI performance.
本文主要研究由多天线接入点(AP)协调的多用户无线网络。每个用户可以随机生成感知信息并向AP报告。信息的新鲜度通过信息年龄(age of information, AoI)来衡量。通过联合优化用户调度和传输控制策略,提出了AoI最小化问题。此外,我们采用智能反射面(IRS)来改善信道条件,从而通过控制AP的波束形成矢量和IRS的相移矩阵来降低传输延迟。由此产生的AoI最小化成为一个混合整数方案,并且由于到达单个用户的传感数据信息不确定而难以求解。通过利用问题结构,我们设计了一个分层深度强化学习(DRL)框架,通过两个迭代步骤搜索最优解。具体而言,用户的调度策略首先由外环DRL方法确定,然后内环优化将上行信息传输或下行能量传输适用于所有用户。我们的数值结果验证了所提出的算法在平均AoI性能方面优于典型基线。
{"title":"Hierarchical Learning Approach for Age-of-Information Minimization in Wireless Sensor Networks","authors":"Leiyang Cui, Yusi Long, D. Hoang, Shiming Gong","doi":"10.1109/WoWMoM54355.2022.00024","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00024","url":null,"abstract":"In this paper, we focus on a multi-user wireless network coordinated by a multi-antenna access point (AP). Each user can generate the sensing information randomly and report it to the AP. The freshness of information is measured by the age of information (AoI). We formulate the AoI minimization problem by jointly optimizing the users’ scheduling and transmission control strategies. Moreover, we employ the intelligent reflecting surface (IRS) to enhance the channel conditions and thus reduce the transmission delay by controlling the AP’s beamforming vector and the IRS’s phase shifting matrices. The resulting AoI minimization becomes a mixed-integer program and difficult to solve due to uncertain information of the sensing data arrivals at individual users. By exploiting the problem structure, we devised a hierarchical deep reinforcement learning (DRL) framework to search for optimal solution in two iterative steps. Specifically, the users’ scheduling strategy is firstly determined by the outer-loop DRL approach, and then the inner-loop optimization adapts either the uplink information transmission or downlink energy transfer to all users. Our numerical results verify that the proposed algorithm can outperform typical baselines in terms of the average AoI performance.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131317649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Privacy in Ride-Sharing Applications Through POIs Selection 通过poi选择提高拼车应用的隐私
F. Martelli, M. E. Renda
The problem of data privacy preservation is of central importance in ride-sharing applications, because in order to efficiently match passengers with vehicles, these services rely on exact location information. Yet, transportation and location data can reveal personal habits, preferences and behaviors, and users may prefer not to share their exact location. Masking location data in order to avoid the identification of users in case of data leakage, and/or misusage would help protect user privacy, but could also lead to poorer system performance, in terms of efficiency and quality of service as perceived by users.In this paper, we compare classic data masking techniques, namely obfuscation, k-anonymity, and l-diversity, applied to users’ location data, before sending it to a carpooling system. While the first two techniques use randomly generated points to mask the actual location, l-diversity uses actual points of interest, having the additional benefit of ensuring that the disclosed location is always an accessible and safe pickup or drop-off location. Given that users in a real ride-sharing system could choose to protect or not protect their location data when using the system, we also evaluate the effect of privacy preservation penetration rate, by varying the percentage of users choosing to have their location data protected. The results show that l-diversity performance is better than the others’ even when the privacy penetration rate is high, suggesting that this technique has the potential to meet both users’ and system’s needs, and thus being a better option to provide privacy within carpooling systems.
数据隐私保护问题在拼车应用中至关重要,因为为了有效地将乘客与车辆匹配,这些服务依赖于精确的位置信息。然而,交通和位置数据可以揭示个人习惯、偏好和行为,用户可能不愿意分享他们的确切位置。屏蔽位置数据以避免在数据泄露和/或滥用的情况下识别用户,这有助于保护用户隐私,但也可能导致系统性能下降,即用户所感受到的效率和服务质量。在本文中,我们比较了在将用户位置数据发送到拼车系统之前应用于用户位置数据的经典数据屏蔽技术,即混淆,k-匿名和l-多样性。前两种技术使用随机生成的点来掩盖实际位置,而l-diversity使用实际兴趣点,具有确保公开位置始终是可访问且安全的取货或下车位置的额外好处。考虑到真实拼车系统中的用户在使用系统时可以选择保护或不保护其位置数据,我们还通过改变选择保护其位置数据的用户百分比来评估隐私保护渗透率的影响。结果表明,即使在隐私渗透率较高的情况下,l-diversity的性能也优于其他技术,这表明该技术具有满足用户和系统需求的潜力,因此是在拼车系统中提供隐私的更好选择。
{"title":"Enhancing Privacy in Ride-Sharing Applications Through POIs Selection","authors":"F. Martelli, M. E. Renda","doi":"10.1109/WoWMoM54355.2022.00069","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00069","url":null,"abstract":"The problem of data privacy preservation is of central importance in ride-sharing applications, because in order to efficiently match passengers with vehicles, these services rely on exact location information. Yet, transportation and location data can reveal personal habits, preferences and behaviors, and users may prefer not to share their exact location. Masking location data in order to avoid the identification of users in case of data leakage, and/or misusage would help protect user privacy, but could also lead to poorer system performance, in terms of efficiency and quality of service as perceived by users.In this paper, we compare classic data masking techniques, namely obfuscation, k-anonymity, and l-diversity, applied to users’ location data, before sending it to a carpooling system. While the first two techniques use randomly generated points to mask the actual location, l-diversity uses actual points of interest, having the additional benefit of ensuring that the disclosed location is always an accessible and safe pickup or drop-off location. Given that users in a real ride-sharing system could choose to protect or not protect their location data when using the system, we also evaluate the effect of privacy preservation penetration rate, by varying the percentage of users choosing to have their location data protected. The results show that l-diversity performance is better than the others’ even when the privacy penetration rate is high, suggesting that this technique has the potential to meet both users’ and system’s needs, and thus being a better option to provide privacy within carpooling systems.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UAV-Clustering: Cluster head selection and update for UAV swarms searching with unknown target location 无人机聚类:未知目标位置下无人机群搜索的簇头选择与更新
Haiyan Li, Bo Zhang, Sha Qin, Jinlin Peng
UAV swarms based on cooperative communication networks are widely used in many fields, which have the advantages of high mobility, high flexibility and low cost. However, UAVs face limited spectrum resources in a specific area and may interfere with primary users. Effective communication management between UAVs is a challenging problem. There-fore, this paper proposes a UAV clustering method based on the improved cluster head selection weight, which provides an effective management for the communication between UAVs and improves the efficiency of data collection. The proposed algorithm employs a new cluster head selection strategy based on the searched targets and available channel resources. Moreover, we analyze the weight factors of UAVs in flight and communication energy consumption. Considering the decreasing the member of the UAV clusters, we also design a maintenance strategy to improve the degree of data sharing in the cluster. The experimental results show that, compared with the traditional UAV clustering methods, the proposed method can effectively improve the network management for communication resources, reduce the collision and interference rate with the primary user by 25%, shorten the time required to fully acquire multi-target point data for the first time by 9%, and increase the amount of target point data collected by 26%.
基于协作通信网络的无人机群具有高机动性、高灵活性和低成本等优点,广泛应用于许多领域。然而,无人机在特定区域面临有限的频谱资源,并可能干扰主要用户。无人机之间的有效通信管理是一个具有挑战性的问题。因此,本文提出了一种基于改进簇头选择权值的无人机聚类方法,为无人机之间的通信提供了有效的管理,提高了数据采集效率。该算法采用了一种基于搜索目标和可用信道资源的簇头选择策略。此外,还分析了无人机在飞行和通信能耗方面的权重因素。考虑到无人机集群成员的减少,设计了维护策略以提高集群内数据的共享程度。实验结果表明,与传统的无人机聚类方法相比,所提方法可有效提高对通信资源的网络管理,与主用户的碰撞和干扰率降低25%,首次充分获取多目标点数据所需时间缩短9%,目标点数据采集量增加26%。
{"title":"UAV-Clustering: Cluster head selection and update for UAV swarms searching with unknown target location","authors":"Haiyan Li, Bo Zhang, Sha Qin, Jinlin Peng","doi":"10.1109/WoWMoM54355.2022.00075","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00075","url":null,"abstract":"UAV swarms based on cooperative communication networks are widely used in many fields, which have the advantages of high mobility, high flexibility and low cost. However, UAVs face limited spectrum resources in a specific area and may interfere with primary users. Effective communication management between UAVs is a challenging problem. There-fore, this paper proposes a UAV clustering method based on the improved cluster head selection weight, which provides an effective management for the communication between UAVs and improves the efficiency of data collection. The proposed algorithm employs a new cluster head selection strategy based on the searched targets and available channel resources. Moreover, we analyze the weight factors of UAVs in flight and communication energy consumption. Considering the decreasing the member of the UAV clusters, we also design a maintenance strategy to improve the degree of data sharing in the cluster. The experimental results show that, compared with the traditional UAV clustering methods, the proposed method can effectively improve the network management for communication resources, reduce the collision and interference rate with the primary user by 25%, shorten the time required to fully acquire multi-target point data for the first time by 9%, and increase the amount of target point data collected by 26%.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automation of network anomaly detection and mitigation with the use of IBN: A deployment case on KOREN 使用IBN实现网络异常检测和缓解的自动化:KOREN上的一个部署案例
Javier Jose Diaz Rivera, T. Khan, Waleed Akbar, Muhammad Afaq, A. Mehmood, Wang-Cheol Song
Network ecosystems have grown to encompass multiple application domains. SDN and NFV technologies have helped pave the road for the evolution of the core and edge networking systems, allowing for numerous services to be served by the same physical infrastructure. Guaranteeing the operability of the network has become an ever-increasing requirement in order to sustain the underlying services deployed on the network. For this, Intent-Based Networking (IBN) aims to abstract network management by introducing high-level rules/policies that are translated to network configurations per service requirements. By following this principle, we proposed an anomaly detection and mitigation mechanism that exploits the characteristics of IBN for collecting and analyzing flows, using Machine Learning for interpreting traffic patterns, and automatic deployment of high-level policies for corrective actions related to anomalous traffic occurrences. The complete system is deployed on the Korea Advanced Research Network (KOREN), where the abstraction provided by IBN for network anomaly detection and mitigation is a key factor in closing the gap to achieve complete network automation.
网络生态系统已经发展到涵盖多个应用领域。SDN和NFV技术为核心和边缘网络系统的发展铺平了道路,允许在相同的物理基础设施中提供多种服务。为了维持部署在网络上的底层业务,保证网络的可操作性已成为日益增长的需求。为此,基于意图的网络(IBN)旨在通过引入高级规则/策略来抽象网络管理,这些规则/策略被转换为每个服务需求的网络配置。通过遵循这一原则,我们提出了一种异常检测和缓解机制,该机制利用IBN的特征来收集和分析流量,使用机器学习来解释流量模式,并自动部署与异常流量发生相关的纠正措施的高级策略。完整的系统部署在韩国高级研究网络(KOREN)上,其中IBN为网络异常检测和缓解提供的抽象是缩小差距以实现完全网络自动化的关键因素。
{"title":"Automation of network anomaly detection and mitigation with the use of IBN: A deployment case on KOREN","authors":"Javier Jose Diaz Rivera, T. Khan, Waleed Akbar, Muhammad Afaq, A. Mehmood, Wang-Cheol Song","doi":"10.1109/WoWMoM54355.2022.00056","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00056","url":null,"abstract":"Network ecosystems have grown to encompass multiple application domains. SDN and NFV technologies have helped pave the road for the evolution of the core and edge networking systems, allowing for numerous services to be served by the same physical infrastructure. Guaranteeing the operability of the network has become an ever-increasing requirement in order to sustain the underlying services deployed on the network. For this, Intent-Based Networking (IBN) aims to abstract network management by introducing high-level rules/policies that are translated to network configurations per service requirements. By following this principle, we proposed an anomaly detection and mitigation mechanism that exploits the characteristics of IBN for collecting and analyzing flows, using Machine Learning for interpreting traffic patterns, and automatic deployment of high-level policies for corrective actions related to anomalous traffic occurrences. The complete system is deployed on the Korea Advanced Research Network (KOREN), where the abstraction provided by IBN for network anomaly detection and mitigation is a key factor in closing the gap to achieve complete network automation.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep-Reinforcement-Learning-based User-Preference-Aware Rate Adaptation for Video Streaming 基于深度强化学习的视频流用户偏好感知速率自适应
Lingyun Lu, Jun Xiao, Wei Ni, Haifeng Du, Dalin Zhang
Online video is the most popular Internet application. As the throughput would frequently change under different network conditions, it is important to adaptively select the proper bitrate and improve user’s quality of experience. In this paper, we propose a new DRL-based rate adaption algorithm for video streaming, which holistically captures user’s preference of video contents, network throughput and buffer occupancy, and select the proper bitrate for video to improve the QoE. Specifically, we use 3D Convolutional neural (C3D) network to learn the spatio-temporal features, and implement the semantic analysis of videos. We also apply the Term Frequency-Inverse Document Frequency (TF-IDF) method to analyze the user’s preference of different scene types, according to its viewing history. The dynamic adaptive streaming is formulated as a Markov Decision Process (MDP) problem, and use the Actor-Critic (A3C) algorithm to dynamically choose the optimal bitrate. As corroborated by simulations, our algorithm can accurately obtain the user’s preference, keep the bitrate allocation consistent with the user’s preference, and maintain video quality. Compared with the state-of-the-art Pensieve algorithm, our algorithm improves the average QoE by at least 12.5%. It also has a significant improvement over other baseline methods.
在线视频是最流行的互联网应用。由于吞吐量在不同的网络条件下会发生频繁的变化,因此自适应地选择合适的比特率,提高用户的体验质量非常重要。在本文中,我们提出了一种新的基于drl的视频流速率自适应算法,该算法全面捕捉用户对视频内容的偏好、网络吞吐量和缓冲区占用,并为视频选择合适的比特率以提高QoE。具体来说,我们使用三维卷积神经网络(C3D)来学习视频的时空特征,并实现视频的语义分析。我们还应用术语频率-逆文档频率(TF-IDF)方法来分析用户根据其观看历史对不同场景类型的偏好。将动态自适应流描述为马尔可夫决策过程(MDP)问题,并使用行动者-评论家(A3C)算法动态选择最优比特率。仿真结果表明,该算法能够准确获取用户偏好,保证码率分配与用户偏好一致,保证视频质量。与最先进的冥想筛算法相比,我们的算法将平均QoE提高了至少12.5%。与其他基线方法相比,它也有显著的改进。
{"title":"Deep-Reinforcement-Learning-based User-Preference-Aware Rate Adaptation for Video Streaming","authors":"Lingyun Lu, Jun Xiao, Wei Ni, Haifeng Du, Dalin Zhang","doi":"10.1109/WoWMoM54355.2022.00061","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00061","url":null,"abstract":"Online video is the most popular Internet application. As the throughput would frequently change under different network conditions, it is important to adaptively select the proper bitrate and improve user’s quality of experience. In this paper, we propose a new DRL-based rate adaption algorithm for video streaming, which holistically captures user’s preference of video contents, network throughput and buffer occupancy, and select the proper bitrate for video to improve the QoE. Specifically, we use 3D Convolutional neural (C3D) network to learn the spatio-temporal features, and implement the semantic analysis of videos. We also apply the Term Frequency-Inverse Document Frequency (TF-IDF) method to analyze the user’s preference of different scene types, according to its viewing history. The dynamic adaptive streaming is formulated as a Markov Decision Process (MDP) problem, and use the Actor-Critic (A3C) algorithm to dynamically choose the optimal bitrate. As corroborated by simulations, our algorithm can accurately obtain the user’s preference, keep the bitrate allocation consistent with the user’s preference, and maintain video quality. Compared with the state-of-the-art Pensieve algorithm, our algorithm improves the average QoE by at least 12.5%. It also has a significant improvement over other baseline methods.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electric Field Short-range Over-the-air Communication for Wearable and IoT Applications with Off-the-shelf Microcontrollers 电场短距离空中通信可穿戴和物联网应用与现成的微控制器
Muhammad Zeeshan, A. Pouryazdan, Robert Cobden, Stephen Wang, R. Prance, D. Roggen
Wearable and home IoT applications require low-power connectivity to maximize battery life. Sensing a modulated electric field, referred to as capacitively coupled communication, is a promising alternative to communication via electromagnetic waves. However, achieving a reliable over-the-air communication through electric field remains a research challenge. We describe an efficient electric field based over-the-air communication system using frequency shift keying (FSK) which achieves arm’s length communication range with throughput suitable for real-time sensor streaming or even audio streaming. This is achieved through a highly sensitive electric potential receiver allowing communication when weakly coupled, such as between two devices far from any other object or human body. The digital FSK receiver uses an undersampling technique to reduce the complexity of the implementation. Another contribution of this work is the use of low-power ARM microcontroller to perform the modulation/demodulation, with a few additional off-the-shelf digital and analog components. We present a detailed performance analysis of the system when varying the transmit voltage and communication distance in five different scenarios/environments. The performance is analyzed and compared in terms of bit error rate (BER) and throughput. The system is capable of providing reliable communication link up to 1.2m with a user throughput of 75 kbps in the best case scenario, when placed over tarmac road. It is also shown that the system achieves a user throughput of at least 80 kbps for a distance of 70cm in the worst case scenario, when both the devices are hanged in air through strings.
可穿戴和家庭物联网应用需要低功耗连接,以最大限度地延长电池寿命。感应调制电场,被称为电容耦合通信,是一种有前途的替代通信通过电磁波。然而,通过电场实现可靠的空中通信仍然是一个研究挑战。我们描述了一种高效的基于电场的无线通信系统,该系统使用频移键控(FSK)实现了一臂长的通信范围,吞吐量适合实时传感器流甚至音频流。这是通过一个高灵敏度的电位接收器实现的,允许在弱耦合时进行通信,例如在远离任何其他物体或人体的两个设备之间。数字FSK接收机采用欠采样技术来降低实现的复杂性。这项工作的另一个贡献是使用低功耗ARM微控制器来执行调制/解调,并使用一些额外的现成数字和模拟组件。在五种不同的场景/环境中,我们对系统在改变传输电压和通信距离时的性能进行了详细的分析。从误码率(BER)和吞吐量两方面对其性能进行了分析和比较。当放置在柏油路上时,该系统能够在最佳情况下提供高达1.2米的可靠通信链路,用户吞吐量为75 kbps。结果还表明,在最坏的情况下,当两个设备通过串挂在空中时,该系统在70厘米的距离上实现了至少80 kbps的用户吞吐量。
{"title":"Electric Field Short-range Over-the-air Communication for Wearable and IoT Applications with Off-the-shelf Microcontrollers","authors":"Muhammad Zeeshan, A. Pouryazdan, Robert Cobden, Stephen Wang, R. Prance, D. Roggen","doi":"10.1109/WoWMoM54355.2022.00044","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00044","url":null,"abstract":"Wearable and home IoT applications require low-power connectivity to maximize battery life. Sensing a modulated electric field, referred to as capacitively coupled communication, is a promising alternative to communication via electromagnetic waves. However, achieving a reliable over-the-air communication through electric field remains a research challenge. We describe an efficient electric field based over-the-air communication system using frequency shift keying (FSK) which achieves arm’s length communication range with throughput suitable for real-time sensor streaming or even audio streaming. This is achieved through a highly sensitive electric potential receiver allowing communication when weakly coupled, such as between two devices far from any other object or human body. The digital FSK receiver uses an undersampling technique to reduce the complexity of the implementation. Another contribution of this work is the use of low-power ARM microcontroller to perform the modulation/demodulation, with a few additional off-the-shelf digital and analog components. We present a detailed performance analysis of the system when varying the transmit voltage and communication distance in five different scenarios/environments. The performance is analyzed and compared in terms of bit error rate (BER) and throughput. The system is capable of providing reliable communication link up to 1.2m with a user throughput of 75 kbps in the best case scenario, when placed over tarmac road. It is also shown that the system achieves a user throughput of at least 80 kbps for a distance of 70cm in the worst case scenario, when both the devices are hanged in air through strings.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulating LoRa-Based Direct-to-Satellite IoT Networks with FLoRaSaT 用FLoRaSaT模拟基于lora的直对卫星物联网
J. Fraire, P. Madoery, Mehdi Ait Mesbah, Oana-Teodora Iova, F. Valois
Direct-to-Satellite-IoT (DtS-IoT) is a promising approach for data transfer to/from IoT devices in remote areas where deploying terrestrial infrastructure is not appealing or feasible. In this context, Low-Earth Orbit (LEO) satellites can serve as passing-by IoT gateways to which devices can offload buffered data to. However, transmission distance and orbital dynamics, combined with highly constrained devices on the ground makes DtS-IoT a very challenging problem. In fact, existing IoT medium access control protocols, negotiations schemes, etc. need to be revised and/or extended to scale up to these challenging conditions. The intricate time-dynamic aspects of DtS-IoT networks require of adequate simulation environments to assess the expected performance of enabling technologies. To make up for the lack of such tools, we present a novel event-driven open-source end-to-end simulation tool coined FLoRaSAT. The simulator leverages Omnet++ and includes a benchmarking DtS-IoT scenario comprising 16 cross-linked LEO satellites and 1500 IoT nodes on the surface. Satellites and devices are connected using the standard LoRaWAN Low-Power Wide Area (LPWAN) protocol (Class A and B). FLoRaSAT allows the easy implementation and study of DtS-IoT radio access and core network protocols, and we take advantage of this flexibility to investigate expected network metrics and non-intuitive phenomena emerging from the resulting multi-gateway setup.
直接到卫星物联网(DtS-IoT)是一种很有前途的方法,用于在部署地面基础设施不具有吸引力或不可行的偏远地区与物联网设备之间进行数据传输。在这种情况下,低地球轨道(LEO)卫星可以作为路过的物联网网关,设备可以将缓冲数据卸载到该网关。然而,传输距离和轨道动力学,加上地面上高度受限的设备,使DtS-IoT成为一个非常具有挑战性的问题。事实上,现有的物联网介质访问控制协议、协商方案等需要修改和/或扩展,以适应这些具有挑战性的条件。DtS-IoT网络复杂的时间动态方面需要足够的仿真环境来评估使能技术的预期性能。为了弥补此类工具的不足,我们提出了一种新的事件驱动的开源端到端模拟工具,称为FLoRaSAT。模拟器利用omnet++,包括一个基准DtS-IoT场景,包括16颗交联的LEO卫星和1500个地面物联网节点。卫星和设备使用标准的LoRaWAN低功耗广域网(LPWAN)协议(A类和B类)连接。FLoRaSAT允许轻松实施和研究DtS-IoT无线电接入和核心网络协议,我们利用这种灵活性来调查预期的网络指标和由此产生的多网关设置中出现的非直观现象。
{"title":"Simulating LoRa-Based Direct-to-Satellite IoT Networks with FLoRaSaT","authors":"J. Fraire, P. Madoery, Mehdi Ait Mesbah, Oana-Teodora Iova, F. Valois","doi":"10.1109/WoWMoM54355.2022.00072","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00072","url":null,"abstract":"Direct-to-Satellite-IoT (DtS-IoT) is a promising approach for data transfer to/from IoT devices in remote areas where deploying terrestrial infrastructure is not appealing or feasible. In this context, Low-Earth Orbit (LEO) satellites can serve as passing-by IoT gateways to which devices can offload buffered data to. However, transmission distance and orbital dynamics, combined with highly constrained devices on the ground makes DtS-IoT a very challenging problem. In fact, existing IoT medium access control protocols, negotiations schemes, etc. need to be revised and/or extended to scale up to these challenging conditions. The intricate time-dynamic aspects of DtS-IoT networks require of adequate simulation environments to assess the expected performance of enabling technologies. To make up for the lack of such tools, we present a novel event-driven open-source end-to-end simulation tool coined FLoRaSAT. The simulator leverages Omnet++ and includes a benchmarking DtS-IoT scenario comprising 16 cross-linked LEO satellites and 1500 IoT nodes on the surface. Satellites and devices are connected using the standard LoRaWAN Low-Power Wide Area (LPWAN) protocol (Class A and B). FLoRaSAT allows the easy implementation and study of DtS-IoT radio access and core network protocols, and we take advantage of this flexibility to investigate expected network metrics and non-intuitive phenomena emerging from the resulting multi-gateway setup.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DDAS: Distributed Delay Aware Scheduling for DSME based IoT Network Applications in Smart Cities DDAS:智慧城市中基于DSME的物联网应用的分布式延迟感知调度
Nikumani Choudhury, Moustafa M. Nasralla, Aman Shrivastav, Anakhi Hazarika
With a plethora of Internet of Things (IoT) applications for smart cities, encompassing and supporting several enabling technologies for real-time performance, an enormous amount of network packets faces the challenge of timely delivery. The IEEE 802.15.4 standard is one of the most popular and extensively adopted networking specifications for implementing different IoT applications and catering to several application-specific Quality of Service (QoS) requirements. Deterministic Synchronous Multi-channel Extension (DSME) is one of the Medium Access Control (MAC) protocols of IEEE 802.15.4 standard that facilitates stringent QoS through the allocation of DSME-Guaranteed Time Slots (GTSs) between a pair of devices. Interestingly, the standard does not define any mechanism for scheduling the DSME-GTSs, thereby opening several research opportunities. In this paper, we propose a Distributed Delay Aware Scheduling (DDAS) mechanism to increase the efficiency of the DSME MAC by using priority-based guaranteed time slots scheduling. DDAS assigns priority to the devices according to the criticality of time and number of associated devices, i.e., it identifies various flow deadlines and assigns GTS slots accordingly. The DDAS scheme aims to satisfy and adhere to various delay deadlines in the data flows of an IoT application. The proposed scheduling mechanism is shown to outperform other closely related schemes in terms of latency as well as energy consumption.
随着智能城市中大量的物联网(IoT)应用,包括并支持多种实时性能启用技术,大量的网络数据包面临着及时交付的挑战。IEEE 802.15.4标准是最流行和广泛采用的网络规范之一,用于实现不同的物联网应用程序,并满足几种特定于应用程序的服务质量(QoS)要求。确定同步多通道扩展(Deterministic Synchronous Multi-channel Extension, DSME)是IEEE 802.15.4标准中的一种介质访问控制(Medium Access Control, MAC)协议,它通过在一对设备之间分配DSME保证时隙(DSME - guaranteed Time slot, gts)来实现严格的QoS。有趣的是,该标准没有定义任何安排dsme - gts的机制,因此提供了一些研究机会。本文提出了一种分布式延迟感知调度(DDAS)机制,通过基于优先级的保证时隙调度来提高DSME MAC的效率。DDAS根据时间的临界性和关联设备的数量为设备分配优先级,即识别各种流量截止时间,并据此分配GTS时隙。DDAS方案旨在满足并遵守物联网应用数据流中的各种延迟截止日期。所提出的调度机制在延迟和能耗方面优于其他密切相关的方案。
{"title":"DDAS: Distributed Delay Aware Scheduling for DSME based IoT Network Applications in Smart Cities","authors":"Nikumani Choudhury, Moustafa M. Nasralla, Aman Shrivastav, Anakhi Hazarika","doi":"10.1109/WoWMoM54355.2022.00083","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00083","url":null,"abstract":"With a plethora of Internet of Things (IoT) applications for smart cities, encompassing and supporting several enabling technologies for real-time performance, an enormous amount of network packets faces the challenge of timely delivery. The IEEE 802.15.4 standard is one of the most popular and extensively adopted networking specifications for implementing different IoT applications and catering to several application-specific Quality of Service (QoS) requirements. Deterministic Synchronous Multi-channel Extension (DSME) is one of the Medium Access Control (MAC) protocols of IEEE 802.15.4 standard that facilitates stringent QoS through the allocation of DSME-Guaranteed Time Slots (GTSs) between a pair of devices. Interestingly, the standard does not define any mechanism for scheduling the DSME-GTSs, thereby opening several research opportunities. In this paper, we propose a Distributed Delay Aware Scheduling (DDAS) mechanism to increase the efficiency of the DSME MAC by using priority-based guaranteed time slots scheduling. DDAS assigns priority to the devices according to the criticality of time and number of associated devices, i.e., it identifies various flow deadlines and assigns GTS slots accordingly. The DDAS scheme aims to satisfy and adhere to various delay deadlines in the data flows of an IoT application. The proposed scheduling mechanism is shown to outperform other closely related schemes in terms of latency as well as energy consumption.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Digital Twin for the 5G Era: the SPIDER Cyber Range 5G时代的数字孪生:SPIDER网络靶场
Filippo Rebecchi, A. Pastor, A. Mozo, C. Lombardo, R. Bruschi, Ilias Aliferis, R. D. Corin, P. Gouvas, Antonio Álvarez Romero, Anna Angelogianni, Ilias Politis, C. Xenakis
Service providers, 5G network operators and, more generally, vertical industries face today a dangerous shortage of highly skilled cybersecurity experts. Along with the escalation and growing sophistication of cyber-attacks, 5G networks require the training of skilled and highly competent cyber forces. To meet these requirements, the SPIDER cyber range focuses specifically on 5G, and is based on three pillars, (i) cyber security assessment, (ii) training cyber security teams to defend against complex cyber-attack scenarios, and (iii) evaluation of cyber risk. The SPIDER cyber range replicates a customized 5G network, enabling the execution of cyber-exercises that take advantage of hands-on interaction in real time, the sharing of information between participants, and the gathering of feedback from network equipment, as well as the development and adaptation of advanced operational procedures. This aims to help 5G security professionals improve their ability to collaboratively manage and predict security incidents, complex attacks, and propagated vulnerabilities. The SPIDER cyber range is validated in two relevant use case scenarios aimed at demonstrating, in a realistic, measurable, and replicable way the transformations SPIDER will bring to the cybersecurity industry.
如今,服务提供商、5G网络运营商以及更普遍的垂直行业都面临着高技能网络安全专家短缺的危险。随着网络攻击的升级和日益复杂,5G网络需要训练熟练和高能力的网络部队。为了满足这些需求,SPIDER网络范围特别关注5G,并基于三个支柱:(i)网络安全评估,(ii)培训网络安全团队抵御复杂的网络攻击场景,以及(iii)网络风险评估。SPIDER网络范围复制了定制的5G网络,能够执行网络演习,利用实时动手交互,参与者之间的信息共享,从网络设备收集反馈,以及开发和适应先进的操作程序。这旨在帮助5G安全专业人员提高协同管理和预测安全事件、复杂攻击和传播漏洞的能力。SPIDER网络范围在两个相关的用例场景中得到验证,旨在以现实、可测量和可复制的方式展示SPIDER将给网络安全行业带来的转变。
{"title":"A Digital Twin for the 5G Era: the SPIDER Cyber Range","authors":"Filippo Rebecchi, A. Pastor, A. Mozo, C. Lombardo, R. Bruschi, Ilias Aliferis, R. D. Corin, P. Gouvas, Antonio Álvarez Romero, Anna Angelogianni, Ilias Politis, C. Xenakis","doi":"10.1109/WoWMoM54355.2022.00088","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00088","url":null,"abstract":"Service providers, 5G network operators and, more generally, vertical industries face today a dangerous shortage of highly skilled cybersecurity experts. Along with the escalation and growing sophistication of cyber-attacks, 5G networks require the training of skilled and highly competent cyber forces. To meet these requirements, the SPIDER cyber range focuses specifically on 5G, and is based on three pillars, (i) cyber security assessment, (ii) training cyber security teams to defend against complex cyber-attack scenarios, and (iii) evaluation of cyber risk. The SPIDER cyber range replicates a customized 5G network, enabling the execution of cyber-exercises that take advantage of hands-on interaction in real time, the sharing of information between participants, and the gathering of feedback from network equipment, as well as the development and adaptation of advanced operational procedures. This aims to help 5G security professionals improve their ability to collaboratively manage and predict security incidents, complex attacks, and propagated vulnerabilities. The SPIDER cyber range is validated in two relevant use case scenarios aimed at demonstrating, in a realistic, measurable, and replicable way the transformations SPIDER will bring to the cybersecurity industry.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Head Movement-aware MPEG-DASH SRD-based 360° Video VR Streaming System over Wireless Network 基于无线网络的基于MPEG-DASH srd的360°视频VR流媒体系统
Seunggyu Ji, Seunghwan Lee, Gi Seok Park, Hwangjun Song
This paper presents an effective adaptive 360° video VR streaming system based on the Spatial Representation Description (SRD) feature of MPEG-DASH. The goal of the proposed system is to provide a seamless 360° video VR streaming service with high spatial quality over the time-varying wireless network. To achieve this goal, the proposed system adopts tile-based viewport-adaptive streaming that is a promising way to efficiently deliver 360° video. In accordance with the SRD information and user’s head movement, the proposed system is designed to enhance the quality of the user experience by intensively allocating a limited bit budget to specific segments of interest without noticeable blanks. Additionally, we propose a fast recovery algorithm to minimize the effect of blanks caused by unpredictable head movement. Moreover, the proposed system considers the binocular disparity of the human eye to improve the subjective quality of stereo video. The proposed system is fully implemented by using well-known open sources (e.g., OpenHMD, Kvazaar and GPAC), C/C++, Python and head-mounted display (HMD) equipment. Finally, the experimental results are provided to verify the performance of the proposed system in real wireless network environments.
基于MPEG-DASH的空间表示描述(SRD)特性,提出了一种有效的自适应360°视频VR流媒体系统。该系统的目标是在时变无线网络上提供具有高空间质量的无缝360°视频VR流媒体服务。为了实现这一目标,所提出的系统采用基于tile的视口自适应流,这是一种有效传输360°视频的有前途的方法。根据SRD信息和用户头部运动,提出的系统旨在通过集中分配有限的比特预算到特定的感兴趣的部分来提高用户体验的质量,而不会出现明显的空白。此外,我们提出了一种快速恢复算法,以尽量减少不可预测的头部运动造成的空白的影响。此外,该系统考虑了人眼的双眼视差,提高了立体视频的主观质量。该系统采用知名的开源软件(如OpenHMD、Kvazaar和GPAC)、C/ c++、Python和头戴式显示器(HMD)设备全面实现。最后给出了实验结果,验证了该系统在实际无线网络环境中的性能。
{"title":"Head Movement-aware MPEG-DASH SRD-based 360° Video VR Streaming System over Wireless Network","authors":"Seunggyu Ji, Seunghwan Lee, Gi Seok Park, Hwangjun Song","doi":"10.1109/WoWMoM54355.2022.00054","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00054","url":null,"abstract":"This paper presents an effective adaptive 360° video VR streaming system based on the Spatial Representation Description (SRD) feature of MPEG-DASH. The goal of the proposed system is to provide a seamless 360° video VR streaming service with high spatial quality over the time-varying wireless network. To achieve this goal, the proposed system adopts tile-based viewport-adaptive streaming that is a promising way to efficiently deliver 360° video. In accordance with the SRD information and user’s head movement, the proposed system is designed to enhance the quality of the user experience by intensively allocating a limited bit budget to specific segments of interest without noticeable blanks. Additionally, we propose a fast recovery algorithm to minimize the effect of blanks caused by unpredictable head movement. Moreover, the proposed system considers the binocular disparity of the human eye to improve the subjective quality of stereo video. The proposed system is fully implemented by using well-known open sources (e.g., OpenHMD, Kvazaar and GPAC), C/C++, Python and head-mounted display (HMD) equipment. Finally, the experimental results are provided to verify the performance of the proposed system in real wireless network environments.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127707411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1