首页 > 最新文献

2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)最新文献

英文 中文
Energy Depletion Attack Against Routing Protocol in the Internet of Things 针对物联网路由协议的能量耗尽攻击
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651771
Cong Pu
Low power and lossy networks (LLNs) are undeniably vulnerable to various Denial-of-Service (DoS) attacks due to the shared wireless medium, the lack of physical protection, and instinctive resource constraints. In this paper, we propose a misbehavior-aware threshold detection scheme, called MAD, against energy depletion attack in RPL-based LLNs, where a malicious node intentionally generates and sends a large number of packets to legitimate nodes to excessively consume the energy resource of intermediate nodes located along the forwarding paths, and finally makes the resource-constrained network suffer from denial of service. In the MAD, each node maintains a count of the number of received packets from its child node within a specific time window, and then compares the count with a dynamically calculated threshold to detect potential malicious node. We conduct extensive simulation experiments for performance evaluation and comparison with the original RPL with and without adversary, respectively. The simulation results show that the proposed scheme is a viable approach against energy depletion attack in RPL-based LLNs.
由于共享无线介质、缺乏物理保护和本能的资源限制,低功耗和有损网络(lln)不可否认地容易受到各种拒绝服务(DoS)攻击。本文针对基于rpl的lln中的能量耗尽攻击,提出了一种错误行为感知阈值检测方案MAD,即恶意节点故意生成并向合法节点发送大量数据包,过度消耗转发路径中间节点的能量,最终使资源受限的网络遭受拒绝服务攻击。在MAD中,每个节点保持在特定时间窗口内其子节点接收数据包的数量,然后将该计数与动态计算的阈值进行比较,以检测潜在的恶意节点。我们进行了广泛的模拟实验,分别与有对手和没有对手的原始RPL进行性能评估和比较。仿真结果表明,该方案是抵御基于rpl的lln能量耗尽攻击的一种可行方法。
{"title":"Energy Depletion Attack Against Routing Protocol in the Internet of Things","authors":"Cong Pu","doi":"10.1109/CCNC.2019.8651771","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651771","url":null,"abstract":"Low power and lossy networks (LLNs) are undeniably vulnerable to various Denial-of-Service (DoS) attacks due to the shared wireless medium, the lack of physical protection, and instinctive resource constraints. In this paper, we propose a misbehavior-aware threshold detection scheme, called MAD, against energy depletion attack in RPL-based LLNs, where a malicious node intentionally generates and sends a large number of packets to legitimate nodes to excessively consume the energy resource of intermediate nodes located along the forwarding paths, and finally makes the resource-constrained network suffer from denial of service. In the MAD, each node maintains a count of the number of received packets from its child node within a specific time window, and then compares the count with a dynamically calculated threshold to detect potential malicious node. We conduct extensive simulation experiments for performance evaluation and comparison with the original RPL with and without adversary, respectively. The simulation results show that the proposed scheme is a viable approach against energy depletion attack in RPL-based LLNs.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115248494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection 基于神经网络的入侵检测的级联结构元专家方法
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651856
Maxime Labonne, Alexis Olivereau, Baptiste Polvé, D. Zeghlache
An ensemble learning approach for classification in intrusion detection is proposed. Its application to the KDD Cup 99 and NSL-KDD datasets consistently increases the classification accuracy compared to previous techniques. The cascade-structured meta-specialists architecture is based on a three-step optimization method: data augmentation, hyperparameters optimization and ensemble learning. Classifiers are first created with a strong specialization in each specific class. These specialists are then combined to form meta-specialists, more accurate than the best classifiers that compose them. Finally, meta-specialists are arranged in a cascading architecture where each classifier is successively given the opportunity to recognize its own class. This method is particularly useful for datasets where training and test sets differ greatly, as in this case. The cascade-structured meta-specialists approach achieved a very high classification accuracy (94.44% on KDD Cup 99 test set and 88.39% on NSL-KDD test set) with a low false positive rate (0.33% and 1.94% respectively).
提出了一种集成学习的入侵检测分类方法。与以前的技术相比,它在KDD Cup 99和NSL-KDD数据集上的应用不断提高了分类精度。级联结构的元专家体系结构基于三步优化方法:数据增强、超参数优化和集成学习。首先在每个特定类中使用强专门化创建分类器。然后将这些专家组合成元专家,比组成它们的最佳分类器更准确。最后,元专家被安排在级联体系结构中,其中每个分类器依次有机会识别自己的类。这种方法对于训练集和测试集差异很大的数据集特别有用,就像在这种情况下一样。级联结构元专家方法的分类准确率非常高(KDD Cup 99测试集为94.44%,NSL-KDD测试集为88.39%),假阳性率较低(分别为0.33%和1.94%)。
{"title":"A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection","authors":"Maxime Labonne, Alexis Olivereau, Baptiste Polvé, D. Zeghlache","doi":"10.1109/CCNC.2019.8651856","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651856","url":null,"abstract":"An ensemble learning approach for classification in intrusion detection is proposed. Its application to the KDD Cup 99 and NSL-KDD datasets consistently increases the classification accuracy compared to previous techniques. The cascade-structured meta-specialists architecture is based on a three-step optimization method: data augmentation, hyperparameters optimization and ensemble learning. Classifiers are first created with a strong specialization in each specific class. These specialists are then combined to form meta-specialists, more accurate than the best classifiers that compose them. Finally, meta-specialists are arranged in a cascading architecture where each classifier is successively given the opportunity to recognize its own class. This method is particularly useful for datasets where training and test sets differ greatly, as in this case. The cascade-structured meta-specialists approach achieved a very high classification accuracy (94.44% on KDD Cup 99 test set and 88.39% on NSL-KDD test set) with a low false positive rate (0.33% and 1.94% respectively).","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Robust Device-to-Device 5G Cellular Communication in the Post-Disaster Scenario 灾后场景下稳健的设备对设备5G蜂窝通信
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651832
C. DeepakG., Alexandros Ladas, C. Politis
The wireless communication is an integral part of the society, however, wireless network infrastructure may not fully function during post-disaster wireless network scenario in which we need wireless services even more than normal circumstances. In such post-disaster scenarios, the base stations (BS) could possibly be dysfunctional or overloaded by an excessive number of user calls or data, whereas user terminals are likely to be partially connected to or fully isolated from the BS radio signals. In this paper, we study the network behavior during the post-disaster when BSs undergo the thinning process due to the damage to the network infrastructure. During network recovery phase, we also study the network performance when new temporary BSs are distributed which will bring the network into BS superposition phase. Furthermore, Device-to-Device (D2D) assisted cellular communication helps to increase the link level network connectivity which is highly appreciated during post- disaster network scenario because the network coverage is more desirable than the network throughout in such cases. We also present the analytical study of D2D and cellular communication and show that it will effectively increase the network coverage which may ultimately save many lives during the golden hours of post-disaster phase.
无线通信是社会不可分割的一部分,但在灾后无线网络场景中,无线网络基础设施可能无法充分发挥作用,因此我们比平时更需要无线服务。在这种灾后情况下,基站(BS)可能因用户呼叫或数据数量过多而功能失调或过载,而用户终端可能部分连接到BS无线电信号或与BS无线电信号完全隔离。在本文中,我们研究了灾后由于网络基础设施的破坏,BSs发生稀疏过程时的网络行为。在网络恢复阶段,我们还研究了新的临时BSs的分布将使网络进入BSs叠加阶段时的网络性能。此外,设备到设备(D2D)辅助蜂窝通信有助于增加链路级网络连接,这在灾后网络场景中非常受欢迎,因为在这种情况下,网络覆盖比整个网络更可取。我们还介绍了D2D和蜂窝通信的分析研究,并表明它将有效地增加网络覆盖率,最终可能在灾后黄金时段挽救许多生命。
{"title":"Robust Device-to-Device 5G Cellular Communication in the Post-Disaster Scenario","authors":"C. DeepakG., Alexandros Ladas, C. Politis","doi":"10.1109/CCNC.2019.8651832","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651832","url":null,"abstract":"The wireless communication is an integral part of the society, however, wireless network infrastructure may not fully function during post-disaster wireless network scenario in which we need wireless services even more than normal circumstances. In such post-disaster scenarios, the base stations (BS) could possibly be dysfunctional or overloaded by an excessive number of user calls or data, whereas user terminals are likely to be partially connected to or fully isolated from the BS radio signals. In this paper, we study the network behavior during the post-disaster when BSs undergo the thinning process due to the damage to the network infrastructure. During network recovery phase, we also study the network performance when new temporary BSs are distributed which will bring the network into BS superposition phase. Furthermore, Device-to-Device (D2D) assisted cellular communication helps to increase the link level network connectivity which is highly appreciated during post- disaster network scenario because the network coverage is more desirable than the network throughout in such cases. We also present the analytical study of D2D and cellular communication and show that it will effectively increase the network coverage which may ultimately save many lives during the golden hours of post-disaster phase.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128335089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Service-Sharing Approach Using a Mutual Exclusion Algorithm for Smart Cashier Systems 基于互斥算法的智能收银系统服务共享方法
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651826
H. Kurdi, Ghada A. K. Al-Hudhud, M. Al-Dawod, Wafa Al-Shaikh, Lina Altoaimy
Service sharing is an important problem in distributed systems, where it affects wait time and allows for the equal use of services by a group of nodes. Mutual exclusion provides an appropriate sharing technique of a critical section (CS) among nodes by the priority order. The primary condition of mutual exclusion is that one node can only use one CS at any given time. In real life, queues and cashier services have long wait times that do not consider the priority of each node. The work presented in this paper proposed a token-based approach, which is a type of mutual exclusion that is suitable for smart cashier systems. In addition, a Fairness algorithm for priority process (FAPP) is implemented for minimizing wait time, decreasing queue length, and promoting fair CS use. The system performance evaluation based on the experiments performed proves the superiority of the proposed algorithm over the first-in-first-out (FIFO) approach in terms of reducing the waiting time.
服务共享是分布式系统中的一个重要问题,它会影响等待时间,并允许一组节点平等地使用服务。互斥为节点间按优先级顺序共享关键段提供了一种合适的技术。互斥的主要条件是一个节点在任何给定时间只能使用一个CS。在现实生活中,排队和收银服务的等待时间很长,而且不考虑每个节点的优先级。本文提出了一种基于令牌的方法,这是一种适用于智能收银系统的互斥方法。此外,还实现了优先级进程公平性算法(FAPP),以减少等待时间,减少队列长度,并促进公平的CS使用。基于实验的系统性能评估证明了该算法在减少等待时间方面优于先进先出(FIFO)方法。
{"title":"Service-Sharing Approach Using a Mutual Exclusion Algorithm for Smart Cashier Systems","authors":"H. Kurdi, Ghada A. K. Al-Hudhud, M. Al-Dawod, Wafa Al-Shaikh, Lina Altoaimy","doi":"10.1109/CCNC.2019.8651826","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651826","url":null,"abstract":"Service sharing is an important problem in distributed systems, where it affects wait time and allows for the equal use of services by a group of nodes. Mutual exclusion provides an appropriate sharing technique of a critical section (CS) among nodes by the priority order. The primary condition of mutual exclusion is that one node can only use one CS at any given time. In real life, queues and cashier services have long wait times that do not consider the priority of each node. The work presented in this paper proposed a token-based approach, which is a type of mutual exclusion that is suitable for smart cashier systems. In addition, a Fairness algorithm for priority process (FAPP) is implemented for minimizing wait time, decreasing queue length, and promoting fair CS use. The system performance evaluation based on the experiments performed proves the superiority of the proposed algorithm over the first-in-first-out (FIFO) approach in terms of reducing the waiting time.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127622844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient relay selection over fading channels 衰落信道上的节能中继选择
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651688
R. Milocco, P. Mühlethaler, S. Boumerdassi
In this work, we use the energy consumed by one bit of information per meter toward the destination as a local metric to be minimized in channels affected by shadow fading. Given a fixed amount of energy available for transmitting information, the proposed strategy consists in maximizing the amount of information delivered within a given time interval by optimizing both the transmission rate and power.
在这项工作中,我们使用每米一比特信息消耗的能量作为局部度量,在受阴影衰落影响的信道中最小化。在给定信息传输能量的情况下,通过优化传输速率和功率,在给定的时间间隔内实现信息传输量的最大化。
{"title":"Energy-efficient relay selection over fading channels","authors":"R. Milocco, P. Mühlethaler, S. Boumerdassi","doi":"10.1109/CCNC.2019.8651688","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651688","url":null,"abstract":"In this work, we use the energy consumed by one bit of information per meter toward the destination as a local metric to be minimized in channels affected by shadow fading. Given a fixed amount of energy available for transmitting information, the proposed strategy consists in maximizing the amount of information delivered within a given time interval by optimizing both the transmission rate and power.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122009222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Joint Offloading and Resource Allocation Scheme for Mobile Edge Computing 一种新的移动边缘计算联合卸载和资源分配方案
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651879
Boutheina Dab, N. Aitsaadi, R. Langar
Recently Mobile Edge Computing (MEC) promises a great latency reduction by pushing mobile computing and storage to the network edge. MEC solutions allows the intensive applications to be computed in nearby servers at the edge. In this work, we envision a multi-user WiFi-based MEC architecture. We tackle the problem of joint task assignment and resource allocation. The main objective of our scheme is to minimize the energy consumption on the mobile terminal side under the application latency constraint. Based on extensive simulations conducted in NS3 while considering real input traces, we show that our approach outperforms the related prominent strategies in terms of: i) energy consumption and ii) completion delay.
最近,移动边缘计算(MEC)通过将移动计算和存储推向网络边缘,承诺大大减少延迟。MEC解决方案允许在边缘附近的服务器上计算密集的应用程序。在这项工作中,我们设想了一个基于多用户wifi的MEC架构。我们解决了联合任务分配和资源分配问题。我们方案的主要目标是在应用程序延迟约束下最小化移动端能耗。基于在NS3中进行的大量模拟,同时考虑了真实的输入轨迹,我们表明我们的方法在以下方面优于相关的突出策略:i)能耗和ii)完成延迟。
{"title":"A Novel Joint Offloading and Resource Allocation Scheme for Mobile Edge Computing","authors":"Boutheina Dab, N. Aitsaadi, R. Langar","doi":"10.1109/CCNC.2019.8651879","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651879","url":null,"abstract":"Recently Mobile Edge Computing (MEC) promises a great latency reduction by pushing mobile computing and storage to the network edge. MEC solutions allows the intensive applications to be computed in nearby servers at the edge. In this work, we envision a multi-user WiFi-based MEC architecture. We tackle the problem of joint task assignment and resource allocation. The main objective of our scheme is to minimize the energy consumption on the mobile terminal side under the application latency constraint. Based on extensive simulations conducted in NS3 while considering real input traces, we show that our approach outperforms the related prominent strategies in terms of: i) energy consumption and ii) completion delay.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Evaluation of Multi-hop Network Configuration for Wi-SUN FAN Systems Wi-SUN风扇系统多跳网络配置性能评估
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651777
Thidarut Junjalearnvong, Ryota Okumura, K. Mizutani, H. Harada
Wireless Smart Utility Network Field Area Network (Wi-SUN FAN) is one of the Wi-SUN profiles that is expected to be adopted by many smart devices in advanced smart city infrastructures to provide Machine-to-Machine (M2M) communication in Low power and Lossy Networks (LLNs). The physical and data link layer of Wi-SUN FAN systems is complied with IEEE 802.15.4-2015 to perform multi-hop data transmission. Currently, the implementation of Wi-SUN FAN devices has been initiated. However, the Wi-SUN FAN devices face a serious problem of very slow network configuration. In this paper, the multi-hop network configuration time of the current Wi-SUN FAN devices is measured by the experiment to analyze the factors that cause the slow configuration. The optimization scheme to accelerate the configuration process is discussed and the instant response configuration scheme that further reduces the configuration time is proposed. In addition, the computer simulation is performed to study the trade-off relationship between the configuration time and the percentage of time used in the configuration process. Finally, the appropriate values of the configuration parameters that can complete the configuration process in each hop within 1 minute while minimally deteriorate the transmission performance in both conventional and proposed configuration schemes are determined.
无线智能公用事业网络现场局域网(Wi-SUN FAN)是Wi-SUN配置文件之一,预计将被先进智慧城市基础设施中的许多智能设备采用,以在低功耗和有损网络(lln)中提供机器对机器(M2M)通信。Wi-SUN FAN系统的物理层和数据链路层符合IEEE 802.15.4-2015标准,实现多跳数据传输。目前,Wi-SUN FAN设备的实施已经启动。然而,Wi-SUN FAN设备面临着网络配置非常慢的严重问题。本文通过实验测量了当前Wi-SUN FAN设备的多跳网络配置时间,分析了造成配置缓慢的因素。讨论了加速配置过程的优化方案,提出了进一步缩短配置时间的即时响应配置方案。此外,还进行了计算机仿真,研究了配置时间与配置过程中使用的时间百分比之间的权衡关系。最后,确定了在常规配置方案和所提配置方案中,能够在1分钟内完成每跳配置过程,同时最小程度地降低传输性能的配置参数的合适值。
{"title":"Performance Evaluation of Multi-hop Network Configuration for Wi-SUN FAN Systems","authors":"Thidarut Junjalearnvong, Ryota Okumura, K. Mizutani, H. Harada","doi":"10.1109/CCNC.2019.8651777","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651777","url":null,"abstract":"Wireless Smart Utility Network Field Area Network (Wi-SUN FAN) is one of the Wi-SUN profiles that is expected to be adopted by many smart devices in advanced smart city infrastructures to provide Machine-to-Machine (M2M) communication in Low power and Lossy Networks (LLNs). The physical and data link layer of Wi-SUN FAN systems is complied with IEEE 802.15.4-2015 to perform multi-hop data transmission. Currently, the implementation of Wi-SUN FAN devices has been initiated. However, the Wi-SUN FAN devices face a serious problem of very slow network configuration. In this paper, the multi-hop network configuration time of the current Wi-SUN FAN devices is measured by the experiment to analyze the factors that cause the slow configuration. The optimization scheme to accelerate the configuration process is discussed and the instant response configuration scheme that further reduces the configuration time is proposed. In addition, the computer simulation is performed to study the trade-off relationship between the configuration time and the percentage of time used in the configuration process. Finally, the appropriate values of the configuration parameters that can complete the configuration process in each hop within 1 minute while minimally deteriorate the transmission performance in both conventional and proposed configuration schemes are determined.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130467716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Demo: Fog Based Framework for IoT Service Orchestration 演示:基于雾的物联网服务编排框架
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651852
Bruno Donassolo, Ilhem Fajjari, Arnaud Legrand, P. Mertikopoulos
In recent years, Fog computing paradigm has received the attention of academic and industrial communities. By offering nearby computational, storage and network resources, this new architecture deals with the explosion of IoT (Internet of Things) traffic while responding to the stringent requirements of new applications. Unfortunately, as of today, there is a lack of practical solutions to enable the exploitation of this novel paradigm. To deal with this shortcoming, this demo gives an insight into FITOR, our proposed orchestration system for IoT applications in Fog. Our solution makes use of both Grid5000 [1] and FIT/IoT-LAB [2] to build a realistic fog environment. FITOR is responsible for the orchestration of micro-service based IoT applications while making use of a holistic monitoring of the fog infrastructure.
近年来,雾计算范式受到了学术界和工业界的广泛关注。通过提供附近的计算、存储和网络资源,这种新架构可以应对物联网(IoT)流量的爆炸式增长,同时满足新应用的严格要求。不幸的是,到目前为止,还缺乏实际的解决方案来利用这种新范式。为了解决这个缺点,本演示将深入了解我们提出的用于雾中的物联网应用的编排系统FITOR。我们的解决方案利用Grid5000[1]和FIT/IoT-LAB[2]来构建一个真实的雾环境。FITOR负责基于微服务的物联网应用程序的编排,同时利用雾基础设施的整体监控。
{"title":"Demo: Fog Based Framework for IoT Service Orchestration","authors":"Bruno Donassolo, Ilhem Fajjari, Arnaud Legrand, P. Mertikopoulos","doi":"10.1109/CCNC.2019.8651852","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651852","url":null,"abstract":"In recent years, Fog computing paradigm has received the attention of academic and industrial communities. By offering nearby computational, storage and network resources, this new architecture deals with the explosion of IoT (Internet of Things) traffic while responding to the stringent requirements of new applications. Unfortunately, as of today, there is a lack of practical solutions to enable the exploitation of this novel paradigm. To deal with this shortcoming, this demo gives an insight into FITOR, our proposed orchestration system for IoT applications in Fog. Our solution makes use of both Grid5000 [1] and FIT/IoT-LAB [2] to build a realistic fog environment. FITOR is responsible for the orchestration of micro-service based IoT applications while making use of a holistic monitoring of the fog infrastructure.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Advanced Coordination Protocol for Safer and more Efficient Lane Change for Connected and Autonomous Vehicles 网联自动驾驶汽车更安全、更高效变道的高级协调协议
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651668
John A. Hodgkiss, S. Djahel, Y. H. Aoul
In this paper we will explore novel ways of utilizing inter-vehicle and vehicle to infrastructure communication technology to achieve a safe and efficient lane change manoeuvre for Connected and Autonomous Vehicles (CAVs). The need for such new protocols is due to the risk that every lane change manoeuvre brings to drivers and passengers lives in addition to its negative impact on congestion level and resulting air pollution, if not performed at the right time and using the appropriate speed. To avoid this risk, we design two new protocols, one is built upon and extends an existing protocol, and it aims to ensure safe and efficient lane change manoeuvre, while the second is an original lane change permission management solution inspired from mutual exclusion concept used in operating systems. This latter complements the former by exclusively granting lane change permissions in a way that avoids any risk of collision. Both protocols are being implemented using computer simulation and the results will be reported in a future work.
在本文中,我们将探索利用车辆间和车辆与基础设施通信技术的新方法,以实现联网和自动驾驶汽车(cav)安全有效的变道机动。之所以需要这样的新协议,是因为如果没有在适当的时间和以适当的速度进行,每次变道操作都会给司机和乘客的生命带来风险,此外还会对拥堵程度和由此产生的空气污染产生负面影响。为了避免这种风险,我们设计了两个新协议,一个是建立和扩展现有协议,旨在确保安全有效的变道操作,而第二个是一个原始的变道权限管理解决方案,灵感来自于操作系统中使用的互斥概念。后者通过以避免任何碰撞风险的方式独家授予变道许可来补充前者。这两种协议都是通过计算机模拟来实现的,结果将在未来的工作中报告。
{"title":"An Advanced Coordination Protocol for Safer and more Efficient Lane Change for Connected and Autonomous Vehicles","authors":"John A. Hodgkiss, S. Djahel, Y. H. Aoul","doi":"10.1109/CCNC.2019.8651668","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651668","url":null,"abstract":"In this paper we will explore novel ways of utilizing inter-vehicle and vehicle to infrastructure communication technology to achieve a safe and efficient lane change manoeuvre for Connected and Autonomous Vehicles (CAVs). The need for such new protocols is due to the risk that every lane change manoeuvre brings to drivers and passengers lives in addition to its negative impact on congestion level and resulting air pollution, if not performed at the right time and using the appropriate speed. To avoid this risk, we design two new protocols, one is built upon and extends an existing protocol, and it aims to ensure safe and efficient lane change manoeuvre, while the second is an original lane change permission management solution inspired from mutual exclusion concept used in operating systems. This latter complements the former by exclusively granting lane change permissions in a way that avoids any risk of collision. Both protocols are being implemented using computer simulation and the results will be reported in a future work.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Upper Limit of Flow Accommodation under Allowable Delay Constraint in HANETs HANETs中允许延迟约束下的流量调节上限
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651741
Taichi Miya, Kohta Ohshima, Yoshiaki Kitaguchi, K. Yamaoka
For HANETs, it is important to integrate independent MANETs and operate them as one system. Moreover, communications with a time restriction have recently been increasing, so it is necessary to discuss about delay reduction in the field of HANETs. In this paper, we discuss the upper limit of flow accommodation under an allowable delay constraint. We suggest using the result as a performance evaluation index for routing algorithms for HANETs.
对于HANETs来说,重要的是将独立的MANETs整合成一个系统来运行。此外,最近有时间限制的通信越来越多,因此有必要讨论HANETs领域的延迟减少问题。本文讨论了在允许延迟约束下的流量调节上限问题。我们建议将结果作为HANETs路由算法的性能评价指标。
{"title":"The Upper Limit of Flow Accommodation under Allowable Delay Constraint in HANETs","authors":"Taichi Miya, Kohta Ohshima, Yoshiaki Kitaguchi, K. Yamaoka","doi":"10.1109/CCNC.2019.8651741","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651741","url":null,"abstract":"For HANETs, it is important to integrate independent MANETs and operate them as one system. Moreover, communications with a time restriction have recently been increasing, so it is necessary to discuss about delay reduction in the field of HANETs. In this paper, we discuss the upper limit of flow accommodation under an allowable delay constraint. We suggest using the result as a performance evaluation index for routing algorithms for HANETs.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1