Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00024
Leiyang Cui, Yusi Long, D. Hoang, Shiming Gong
In this paper, we focus on a multi-user wireless network coordinated by a multi-antenna access point (AP). Each user can generate the sensing information randomly and report it to the AP. The freshness of information is measured by the age of information (AoI). We formulate the AoI minimization problem by jointly optimizing the users’ scheduling and transmission control strategies. Moreover, we employ the intelligent reflecting surface (IRS) to enhance the channel conditions and thus reduce the transmission delay by controlling the AP’s beamforming vector and the IRS’s phase shifting matrices. The resulting AoI minimization becomes a mixed-integer program and difficult to solve due to uncertain information of the sensing data arrivals at individual users. By exploiting the problem structure, we devised a hierarchical deep reinforcement learning (DRL) framework to search for optimal solution in two iterative steps. Specifically, the users’ scheduling strategy is firstly determined by the outer-loop DRL approach, and then the inner-loop optimization adapts either the uplink information transmission or downlink energy transfer to all users. Our numerical results verify that the proposed algorithm can outperform typical baselines in terms of the average AoI performance.
本文主要研究由多天线接入点(AP)协调的多用户无线网络。每个用户可以随机生成感知信息并向AP报告。信息的新鲜度通过信息年龄(age of information, AoI)来衡量。通过联合优化用户调度和传输控制策略,提出了AoI最小化问题。此外,我们采用智能反射面(IRS)来改善信道条件,从而通过控制AP的波束形成矢量和IRS的相移矩阵来降低传输延迟。由此产生的AoI最小化成为一个混合整数方案,并且由于到达单个用户的传感数据信息不确定而难以求解。通过利用问题结构,我们设计了一个分层深度强化学习(DRL)框架,通过两个迭代步骤搜索最优解。具体而言,用户的调度策略首先由外环DRL方法确定,然后内环优化将上行信息传输或下行能量传输适用于所有用户。我们的数值结果验证了所提出的算法在平均AoI性能方面优于典型基线。
{"title":"Hierarchical Learning Approach for Age-of-Information Minimization in Wireless Sensor Networks","authors":"Leiyang Cui, Yusi Long, D. Hoang, Shiming Gong","doi":"10.1109/WoWMoM54355.2022.00024","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00024","url":null,"abstract":"In this paper, we focus on a multi-user wireless network coordinated by a multi-antenna access point (AP). Each user can generate the sensing information randomly and report it to the AP. The freshness of information is measured by the age of information (AoI). We formulate the AoI minimization problem by jointly optimizing the users’ scheduling and transmission control strategies. Moreover, we employ the intelligent reflecting surface (IRS) to enhance the channel conditions and thus reduce the transmission delay by controlling the AP’s beamforming vector and the IRS’s phase shifting matrices. The resulting AoI minimization becomes a mixed-integer program and difficult to solve due to uncertain information of the sensing data arrivals at individual users. By exploiting the problem structure, we devised a hierarchical deep reinforcement learning (DRL) framework to search for optimal solution in two iterative steps. Specifically, the users’ scheduling strategy is firstly determined by the outer-loop DRL approach, and then the inner-loop optimization adapts either the uplink information transmission or downlink energy transfer to all users. Our numerical results verify that the proposed algorithm can outperform typical baselines in terms of the average AoI performance.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131317649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00069
F. Martelli, M. E. Renda
The problem of data privacy preservation is of central importance in ride-sharing applications, because in order to efficiently match passengers with vehicles, these services rely on exact location information. Yet, transportation and location data can reveal personal habits, preferences and behaviors, and users may prefer not to share their exact location. Masking location data in order to avoid the identification of users in case of data leakage, and/or misusage would help protect user privacy, but could also lead to poorer system performance, in terms of efficiency and quality of service as perceived by users.In this paper, we compare classic data masking techniques, namely obfuscation, k-anonymity, and l-diversity, applied to users’ location data, before sending it to a carpooling system. While the first two techniques use randomly generated points to mask the actual location, l-diversity uses actual points of interest, having the additional benefit of ensuring that the disclosed location is always an accessible and safe pickup or drop-off location. Given that users in a real ride-sharing system could choose to protect or not protect their location data when using the system, we also evaluate the effect of privacy preservation penetration rate, by varying the percentage of users choosing to have their location data protected. The results show that l-diversity performance is better than the others’ even when the privacy penetration rate is high, suggesting that this technique has the potential to meet both users’ and system’s needs, and thus being a better option to provide privacy within carpooling systems.
{"title":"Enhancing Privacy in Ride-Sharing Applications Through POIs Selection","authors":"F. Martelli, M. E. Renda","doi":"10.1109/WoWMoM54355.2022.00069","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00069","url":null,"abstract":"The problem of data privacy preservation is of central importance in ride-sharing applications, because in order to efficiently match passengers with vehicles, these services rely on exact location information. Yet, transportation and location data can reveal personal habits, preferences and behaviors, and users may prefer not to share their exact location. Masking location data in order to avoid the identification of users in case of data leakage, and/or misusage would help protect user privacy, but could also lead to poorer system performance, in terms of efficiency and quality of service as perceived by users.In this paper, we compare classic data masking techniques, namely obfuscation, k-anonymity, and l-diversity, applied to users’ location data, before sending it to a carpooling system. While the first two techniques use randomly generated points to mask the actual location, l-diversity uses actual points of interest, having the additional benefit of ensuring that the disclosed location is always an accessible and safe pickup or drop-off location. Given that users in a real ride-sharing system could choose to protect or not protect their location data when using the system, we also evaluate the effect of privacy preservation penetration rate, by varying the percentage of users choosing to have their location data protected. The results show that l-diversity performance is better than the others’ even when the privacy penetration rate is high, suggesting that this technique has the potential to meet both users’ and system’s needs, and thus being a better option to provide privacy within carpooling systems.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00075
Haiyan Li, Bo Zhang, Sha Qin, Jinlin Peng
UAV swarms based on cooperative communication networks are widely used in many fields, which have the advantages of high mobility, high flexibility and low cost. However, UAVs face limited spectrum resources in a specific area and may interfere with primary users. Effective communication management between UAVs is a challenging problem. There-fore, this paper proposes a UAV clustering method based on the improved cluster head selection weight, which provides an effective management for the communication between UAVs and improves the efficiency of data collection. The proposed algorithm employs a new cluster head selection strategy based on the searched targets and available channel resources. Moreover, we analyze the weight factors of UAVs in flight and communication energy consumption. Considering the decreasing the member of the UAV clusters, we also design a maintenance strategy to improve the degree of data sharing in the cluster. The experimental results show that, compared with the traditional UAV clustering methods, the proposed method can effectively improve the network management for communication resources, reduce the collision and interference rate with the primary user by 25%, shorten the time required to fully acquire multi-target point data for the first time by 9%, and increase the amount of target point data collected by 26%.
{"title":"UAV-Clustering: Cluster head selection and update for UAV swarms searching with unknown target location","authors":"Haiyan Li, Bo Zhang, Sha Qin, Jinlin Peng","doi":"10.1109/WoWMoM54355.2022.00075","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00075","url":null,"abstract":"UAV swarms based on cooperative communication networks are widely used in many fields, which have the advantages of high mobility, high flexibility and low cost. However, UAVs face limited spectrum resources in a specific area and may interfere with primary users. Effective communication management between UAVs is a challenging problem. There-fore, this paper proposes a UAV clustering method based on the improved cluster head selection weight, which provides an effective management for the communication between UAVs and improves the efficiency of data collection. The proposed algorithm employs a new cluster head selection strategy based on the searched targets and available channel resources. Moreover, we analyze the weight factors of UAVs in flight and communication energy consumption. Considering the decreasing the member of the UAV clusters, we also design a maintenance strategy to improve the degree of data sharing in the cluster. The experimental results show that, compared with the traditional UAV clustering methods, the proposed method can effectively improve the network management for communication resources, reduce the collision and interference rate with the primary user by 25%, shorten the time required to fully acquire multi-target point data for the first time by 9%, and increase the amount of target point data collected by 26%.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00056
Javier Jose Diaz Rivera, T. Khan, Waleed Akbar, Muhammad Afaq, A. Mehmood, Wang-Cheol Song
Network ecosystems have grown to encompass multiple application domains. SDN and NFV technologies have helped pave the road for the evolution of the core and edge networking systems, allowing for numerous services to be served by the same physical infrastructure. Guaranteeing the operability of the network has become an ever-increasing requirement in order to sustain the underlying services deployed on the network. For this, Intent-Based Networking (IBN) aims to abstract network management by introducing high-level rules/policies that are translated to network configurations per service requirements. By following this principle, we proposed an anomaly detection and mitigation mechanism that exploits the characteristics of IBN for collecting and analyzing flows, using Machine Learning for interpreting traffic patterns, and automatic deployment of high-level policies for corrective actions related to anomalous traffic occurrences. The complete system is deployed on the Korea Advanced Research Network (KOREN), where the abstraction provided by IBN for network anomaly detection and mitigation is a key factor in closing the gap to achieve complete network automation.
{"title":"Automation of network anomaly detection and mitigation with the use of IBN: A deployment case on KOREN","authors":"Javier Jose Diaz Rivera, T. Khan, Waleed Akbar, Muhammad Afaq, A. Mehmood, Wang-Cheol Song","doi":"10.1109/WoWMoM54355.2022.00056","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00056","url":null,"abstract":"Network ecosystems have grown to encompass multiple application domains. SDN and NFV technologies have helped pave the road for the evolution of the core and edge networking systems, allowing for numerous services to be served by the same physical infrastructure. Guaranteeing the operability of the network has become an ever-increasing requirement in order to sustain the underlying services deployed on the network. For this, Intent-Based Networking (IBN) aims to abstract network management by introducing high-level rules/policies that are translated to network configurations per service requirements. By following this principle, we proposed an anomaly detection and mitigation mechanism that exploits the characteristics of IBN for collecting and analyzing flows, using Machine Learning for interpreting traffic patterns, and automatic deployment of high-level policies for corrective actions related to anomalous traffic occurrences. The complete system is deployed on the Korea Advanced Research Network (KOREN), where the abstraction provided by IBN for network anomaly detection and mitigation is a key factor in closing the gap to achieve complete network automation.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00061
Lingyun Lu, Jun Xiao, Wei Ni, Haifeng Du, Dalin Zhang
Online video is the most popular Internet application. As the throughput would frequently change under different network conditions, it is important to adaptively select the proper bitrate and improve user’s quality of experience. In this paper, we propose a new DRL-based rate adaption algorithm for video streaming, which holistically captures user’s preference of video contents, network throughput and buffer occupancy, and select the proper bitrate for video to improve the QoE. Specifically, we use 3D Convolutional neural (C3D) network to learn the spatio-temporal features, and implement the semantic analysis of videos. We also apply the Term Frequency-Inverse Document Frequency (TF-IDF) method to analyze the user’s preference of different scene types, according to its viewing history. The dynamic adaptive streaming is formulated as a Markov Decision Process (MDP) problem, and use the Actor-Critic (A3C) algorithm to dynamically choose the optimal bitrate. As corroborated by simulations, our algorithm can accurately obtain the user’s preference, keep the bitrate allocation consistent with the user’s preference, and maintain video quality. Compared with the state-of-the-art Pensieve algorithm, our algorithm improves the average QoE by at least 12.5%. It also has a significant improvement over other baseline methods.
{"title":"Deep-Reinforcement-Learning-based User-Preference-Aware Rate Adaptation for Video Streaming","authors":"Lingyun Lu, Jun Xiao, Wei Ni, Haifeng Du, Dalin Zhang","doi":"10.1109/WoWMoM54355.2022.00061","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00061","url":null,"abstract":"Online video is the most popular Internet application. As the throughput would frequently change under different network conditions, it is important to adaptively select the proper bitrate and improve user’s quality of experience. In this paper, we propose a new DRL-based rate adaption algorithm for video streaming, which holistically captures user’s preference of video contents, network throughput and buffer occupancy, and select the proper bitrate for video to improve the QoE. Specifically, we use 3D Convolutional neural (C3D) network to learn the spatio-temporal features, and implement the semantic analysis of videos. We also apply the Term Frequency-Inverse Document Frequency (TF-IDF) method to analyze the user’s preference of different scene types, according to its viewing history. The dynamic adaptive streaming is formulated as a Markov Decision Process (MDP) problem, and use the Actor-Critic (A3C) algorithm to dynamically choose the optimal bitrate. As corroborated by simulations, our algorithm can accurately obtain the user’s preference, keep the bitrate allocation consistent with the user’s preference, and maintain video quality. Compared with the state-of-the-art Pensieve algorithm, our algorithm improves the average QoE by at least 12.5%. It also has a significant improvement over other baseline methods.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00044
Muhammad Zeeshan, A. Pouryazdan, Robert Cobden, Stephen Wang, R. Prance, D. Roggen
Wearable and home IoT applications require low-power connectivity to maximize battery life. Sensing a modulated electric field, referred to as capacitively coupled communication, is a promising alternative to communication via electromagnetic waves. However, achieving a reliable over-the-air communication through electric field remains a research challenge. We describe an efficient electric field based over-the-air communication system using frequency shift keying (FSK) which achieves arm’s length communication range with throughput suitable for real-time sensor streaming or even audio streaming. This is achieved through a highly sensitive electric potential receiver allowing communication when weakly coupled, such as between two devices far from any other object or human body. The digital FSK receiver uses an undersampling technique to reduce the complexity of the implementation. Another contribution of this work is the use of low-power ARM microcontroller to perform the modulation/demodulation, with a few additional off-the-shelf digital and analog components. We present a detailed performance analysis of the system when varying the transmit voltage and communication distance in five different scenarios/environments. The performance is analyzed and compared in terms of bit error rate (BER) and throughput. The system is capable of providing reliable communication link up to 1.2m with a user throughput of 75 kbps in the best case scenario, when placed over tarmac road. It is also shown that the system achieves a user throughput of at least 80 kbps for a distance of 70cm in the worst case scenario, when both the devices are hanged in air through strings.
{"title":"Electric Field Short-range Over-the-air Communication for Wearable and IoT Applications with Off-the-shelf Microcontrollers","authors":"Muhammad Zeeshan, A. Pouryazdan, Robert Cobden, Stephen Wang, R. Prance, D. Roggen","doi":"10.1109/WoWMoM54355.2022.00044","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00044","url":null,"abstract":"Wearable and home IoT applications require low-power connectivity to maximize battery life. Sensing a modulated electric field, referred to as capacitively coupled communication, is a promising alternative to communication via electromagnetic waves. However, achieving a reliable over-the-air communication through electric field remains a research challenge. We describe an efficient electric field based over-the-air communication system using frequency shift keying (FSK) which achieves arm’s length communication range with throughput suitable for real-time sensor streaming or even audio streaming. This is achieved through a highly sensitive electric potential receiver allowing communication when weakly coupled, such as between two devices far from any other object or human body. The digital FSK receiver uses an undersampling technique to reduce the complexity of the implementation. Another contribution of this work is the use of low-power ARM microcontroller to perform the modulation/demodulation, with a few additional off-the-shelf digital and analog components. We present a detailed performance analysis of the system when varying the transmit voltage and communication distance in five different scenarios/environments. The performance is analyzed and compared in terms of bit error rate (BER) and throughput. The system is capable of providing reliable communication link up to 1.2m with a user throughput of 75 kbps in the best case scenario, when placed over tarmac road. It is also shown that the system achieves a user throughput of at least 80 kbps for a distance of 70cm in the worst case scenario, when both the devices are hanged in air through strings.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131454606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00072
J. Fraire, P. Madoery, Mehdi Ait Mesbah, Oana-Teodora Iova, F. Valois
Direct-to-Satellite-IoT (DtS-IoT) is a promising approach for data transfer to/from IoT devices in remote areas where deploying terrestrial infrastructure is not appealing or feasible. In this context, Low-Earth Orbit (LEO) satellites can serve as passing-by IoT gateways to which devices can offload buffered data to. However, transmission distance and orbital dynamics, combined with highly constrained devices on the ground makes DtS-IoT a very challenging problem. In fact, existing IoT medium access control protocols, negotiations schemes, etc. need to be revised and/or extended to scale up to these challenging conditions. The intricate time-dynamic aspects of DtS-IoT networks require of adequate simulation environments to assess the expected performance of enabling technologies. To make up for the lack of such tools, we present a novel event-driven open-source end-to-end simulation tool coined FLoRaSAT. The simulator leverages Omnet++ and includes a benchmarking DtS-IoT scenario comprising 16 cross-linked LEO satellites and 1500 IoT nodes on the surface. Satellites and devices are connected using the standard LoRaWAN Low-Power Wide Area (LPWAN) protocol (Class A and B). FLoRaSAT allows the easy implementation and study of DtS-IoT radio access and core network protocols, and we take advantage of this flexibility to investigate expected network metrics and non-intuitive phenomena emerging from the resulting multi-gateway setup.
{"title":"Simulating LoRa-Based Direct-to-Satellite IoT Networks with FLoRaSaT","authors":"J. Fraire, P. Madoery, Mehdi Ait Mesbah, Oana-Teodora Iova, F. Valois","doi":"10.1109/WoWMoM54355.2022.00072","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00072","url":null,"abstract":"Direct-to-Satellite-IoT (DtS-IoT) is a promising approach for data transfer to/from IoT devices in remote areas where deploying terrestrial infrastructure is not appealing or feasible. In this context, Low-Earth Orbit (LEO) satellites can serve as passing-by IoT gateways to which devices can offload buffered data to. However, transmission distance and orbital dynamics, combined with highly constrained devices on the ground makes DtS-IoT a very challenging problem. In fact, existing IoT medium access control protocols, negotiations schemes, etc. need to be revised and/or extended to scale up to these challenging conditions. The intricate time-dynamic aspects of DtS-IoT networks require of adequate simulation environments to assess the expected performance of enabling technologies. To make up for the lack of such tools, we present a novel event-driven open-source end-to-end simulation tool coined FLoRaSAT. The simulator leverages Omnet++ and includes a benchmarking DtS-IoT scenario comprising 16 cross-linked LEO satellites and 1500 IoT nodes on the surface. Satellites and devices are connected using the standard LoRaWAN Low-Power Wide Area (LPWAN) protocol (Class A and B). FLoRaSAT allows the easy implementation and study of DtS-IoT radio access and core network protocols, and we take advantage of this flexibility to investigate expected network metrics and non-intuitive phenomena emerging from the resulting multi-gateway setup.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00083
Nikumani Choudhury, Moustafa M. Nasralla, Aman Shrivastav, Anakhi Hazarika
With a plethora of Internet of Things (IoT) applications for smart cities, encompassing and supporting several enabling technologies for real-time performance, an enormous amount of network packets faces the challenge of timely delivery. The IEEE 802.15.4 standard is one of the most popular and extensively adopted networking specifications for implementing different IoT applications and catering to several application-specific Quality of Service (QoS) requirements. Deterministic Synchronous Multi-channel Extension (DSME) is one of the Medium Access Control (MAC) protocols of IEEE 802.15.4 standard that facilitates stringent QoS through the allocation of DSME-Guaranteed Time Slots (GTSs) between a pair of devices. Interestingly, the standard does not define any mechanism for scheduling the DSME-GTSs, thereby opening several research opportunities. In this paper, we propose a Distributed Delay Aware Scheduling (DDAS) mechanism to increase the efficiency of the DSME MAC by using priority-based guaranteed time slots scheduling. DDAS assigns priority to the devices according to the criticality of time and number of associated devices, i.e., it identifies various flow deadlines and assigns GTS slots accordingly. The DDAS scheme aims to satisfy and adhere to various delay deadlines in the data flows of an IoT application. The proposed scheduling mechanism is shown to outperform other closely related schemes in terms of latency as well as energy consumption.
{"title":"DDAS: Distributed Delay Aware Scheduling for DSME based IoT Network Applications in Smart Cities","authors":"Nikumani Choudhury, Moustafa M. Nasralla, Aman Shrivastav, Anakhi Hazarika","doi":"10.1109/WoWMoM54355.2022.00083","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00083","url":null,"abstract":"With a plethora of Internet of Things (IoT) applications for smart cities, encompassing and supporting several enabling technologies for real-time performance, an enormous amount of network packets faces the challenge of timely delivery. The IEEE 802.15.4 standard is one of the most popular and extensively adopted networking specifications for implementing different IoT applications and catering to several application-specific Quality of Service (QoS) requirements. Deterministic Synchronous Multi-channel Extension (DSME) is one of the Medium Access Control (MAC) protocols of IEEE 802.15.4 standard that facilitates stringent QoS through the allocation of DSME-Guaranteed Time Slots (GTSs) between a pair of devices. Interestingly, the standard does not define any mechanism for scheduling the DSME-GTSs, thereby opening several research opportunities. In this paper, we propose a Distributed Delay Aware Scheduling (DDAS) mechanism to increase the efficiency of the DSME MAC by using priority-based guaranteed time slots scheduling. DDAS assigns priority to the devices according to the criticality of time and number of associated devices, i.e., it identifies various flow deadlines and assigns GTS slots accordingly. The DDAS scheme aims to satisfy and adhere to various delay deadlines in the data flows of an IoT application. The proposed scheduling mechanism is shown to outperform other closely related schemes in terms of latency as well as energy consumption.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00088
Filippo Rebecchi, A. Pastor, A. Mozo, C. Lombardo, R. Bruschi, Ilias Aliferis, R. D. Corin, P. Gouvas, Antonio Álvarez Romero, Anna Angelogianni, Ilias Politis, C. Xenakis
Service providers, 5G network operators and, more generally, vertical industries face today a dangerous shortage of highly skilled cybersecurity experts. Along with the escalation and growing sophistication of cyber-attacks, 5G networks require the training of skilled and highly competent cyber forces. To meet these requirements, the SPIDER cyber range focuses specifically on 5G, and is based on three pillars, (i) cyber security assessment, (ii) training cyber security teams to defend against complex cyber-attack scenarios, and (iii) evaluation of cyber risk. The SPIDER cyber range replicates a customized 5G network, enabling the execution of cyber-exercises that take advantage of hands-on interaction in real time, the sharing of information between participants, and the gathering of feedback from network equipment, as well as the development and adaptation of advanced operational procedures. This aims to help 5G security professionals improve their ability to collaboratively manage and predict security incidents, complex attacks, and propagated vulnerabilities. The SPIDER cyber range is validated in two relevant use case scenarios aimed at demonstrating, in a realistic, measurable, and replicable way the transformations SPIDER will bring to the cybersecurity industry.
{"title":"A Digital Twin for the 5G Era: the SPIDER Cyber Range","authors":"Filippo Rebecchi, A. Pastor, A. Mozo, C. Lombardo, R. Bruschi, Ilias Aliferis, R. D. Corin, P. Gouvas, Antonio Álvarez Romero, Anna Angelogianni, Ilias Politis, C. Xenakis","doi":"10.1109/WoWMoM54355.2022.00088","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00088","url":null,"abstract":"Service providers, 5G network operators and, more generally, vertical industries face today a dangerous shortage of highly skilled cybersecurity experts. Along with the escalation and growing sophistication of cyber-attacks, 5G networks require the training of skilled and highly competent cyber forces. To meet these requirements, the SPIDER cyber range focuses specifically on 5G, and is based on three pillars, (i) cyber security assessment, (ii) training cyber security teams to defend against complex cyber-attack scenarios, and (iii) evaluation of cyber risk. The SPIDER cyber range replicates a customized 5G network, enabling the execution of cyber-exercises that take advantage of hands-on interaction in real time, the sharing of information between participants, and the gathering of feedback from network equipment, as well as the development and adaptation of advanced operational procedures. This aims to help 5G security professionals improve their ability to collaboratively manage and predict security incidents, complex attacks, and propagated vulnerabilities. The SPIDER cyber range is validated in two relevant use case scenarios aimed at demonstrating, in a realistic, measurable, and replicable way the transformations SPIDER will bring to the cybersecurity industry.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/WoWMoM54355.2022.00054
Seunggyu Ji, Seunghwan Lee, Gi Seok Park, Hwangjun Song
This paper presents an effective adaptive 360° video VR streaming system based on the Spatial Representation Description (SRD) feature of MPEG-DASH. The goal of the proposed system is to provide a seamless 360° video VR streaming service with high spatial quality over the time-varying wireless network. To achieve this goal, the proposed system adopts tile-based viewport-adaptive streaming that is a promising way to efficiently deliver 360° video. In accordance with the SRD information and user’s head movement, the proposed system is designed to enhance the quality of the user experience by intensively allocating a limited bit budget to specific segments of interest without noticeable blanks. Additionally, we propose a fast recovery algorithm to minimize the effect of blanks caused by unpredictable head movement. Moreover, the proposed system considers the binocular disparity of the human eye to improve the subjective quality of stereo video. The proposed system is fully implemented by using well-known open sources (e.g., OpenHMD, Kvazaar and GPAC), C/C++, Python and head-mounted display (HMD) equipment. Finally, the experimental results are provided to verify the performance of the proposed system in real wireless network environments.
{"title":"Head Movement-aware MPEG-DASH SRD-based 360° Video VR Streaming System over Wireless Network","authors":"Seunggyu Ji, Seunghwan Lee, Gi Seok Park, Hwangjun Song","doi":"10.1109/WoWMoM54355.2022.00054","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00054","url":null,"abstract":"This paper presents an effective adaptive 360° video VR streaming system based on the Spatial Representation Description (SRD) feature of MPEG-DASH. The goal of the proposed system is to provide a seamless 360° video VR streaming service with high spatial quality over the time-varying wireless network. To achieve this goal, the proposed system adopts tile-based viewport-adaptive streaming that is a promising way to efficiently deliver 360° video. In accordance with the SRD information and user’s head movement, the proposed system is designed to enhance the quality of the user experience by intensively allocating a limited bit budget to specific segments of interest without noticeable blanks. Additionally, we propose a fast recovery algorithm to minimize the effect of blanks caused by unpredictable head movement. Moreover, the proposed system considers the binocular disparity of the human eye to improve the subjective quality of stereo video. The proposed system is fully implemented by using well-known open sources (e.g., OpenHMD, Kvazaar and GPAC), C/C++, Python and head-mounted display (HMD) equipment. Finally, the experimental results are provided to verify the performance of the proposed system in real wireless network environments.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127707411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}