首页 > 最新文献

2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)最新文献

英文 中文
Cost-Efficient Server Provisioning for Deadline-Constrained VNFs Chains: A Parallel VNF Processing Approach 期限约束VNF链的高效服务器配置:一种并行VNF处理方法
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651799
Somayeh Kianpisheh, R. Glitho
The fifth generation (5G) utilizes Network Functions Virtualization (NFV) and Software Defined Network (SDN) to provide applications. Among them, there are deadline constrained applications. When the traffic generated by applications traverses Virtual Network Functions (VNFs) chains, it may not be possible to meet the deadlines when the traffic is processed sequentially; even if very fast servers are provisioned to host the VNFs. We propose a parallel VNF processing approach for the traffic. This is done through pools of candidate servers that host VNFs which process the traffic. Considering the routing policy provided by the SDN routing application, the server selection problem with the aim of deadline satisfaction and cost minimization is modeled as a non-linear binary optimization problem. An iterative search algorithm is proposed to solve this problem. Simulations show enhancement in deadline satisfaction as well as cost reduction.
5G(第五代)技术通过NFV (Network Functions Virtualization)和SDN (Software Defined Network)提供应用。其中,有期限限制的申请。当应用程序产生的流量穿越虚拟网络功能链时,按顺序处理流量时可能无法满足截止日期;即使提供了非常快的服务器来托管VNFs。我们提出了一种并行的VNF处理方法。这是通过承载处理流量的VNFs的候选服务器池完成的。考虑到SDN路由应用程序提供的路由策略,将服务器选择问题建模为一个非线性的二元优化问题,以满足时间期限和成本最小为目标。为了解决这一问题,提出了一种迭代搜索算法。仿真结果表明,该方法提高了工期满意度,降低了成本。
{"title":"Cost-Efficient Server Provisioning for Deadline-Constrained VNFs Chains: A Parallel VNF Processing Approach","authors":"Somayeh Kianpisheh, R. Glitho","doi":"10.1109/CCNC.2019.8651799","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651799","url":null,"abstract":"The fifth generation (5G) utilizes Network Functions Virtualization (NFV) and Software Defined Network (SDN) to provide applications. Among them, there are deadline constrained applications. When the traffic generated by applications traverses Virtual Network Functions (VNFs) chains, it may not be possible to meet the deadlines when the traffic is processed sequentially; even if very fast servers are provisioned to host the VNFs. We propose a parallel VNF processing approach for the traffic. This is done through pools of candidate servers that host VNFs which process the traffic. Considering the routing policy provided by the SDN routing application, the server selection problem with the aim of deadline satisfaction and cost minimization is modeled as a non-linear binary optimization problem. An iterative search algorithm is proposed to solve this problem. Simulations show enhancement in deadline satisfaction as well as cost reduction.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115407703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Channel Access Control for Collisions Caused by Hidden Nodes and Phase Synchronization among Periodic Data Flows 周期数据流间隐藏节点碰撞与相位同步的信道访问控制
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651756
Anh Huy Nguyen, Y. Tanigawa, H. Tode
With the rapid increase in IoT (Internet of Things) applications, more sensor devices, generating periodic data flows whose packets are transmitted at regular intervals, are being incorporated into WSNs (Wireless Sensor Networks). However, packet collision caused by the hidden node problem becomes serious particularly in large-scale multi-hop WSNs. Moreover, focusing on periodic data flows, continuous packet collisions among periodic data flows are caused once periodic packet transmission phases are synchronized. In this paper, we tackle the compounded negative effect of the hidden node problem and the continuous collision problem among periodic data flows. To realize this objective, we propose a new MAC layer mechanism. The proposed method predicts risky durations during which collision can be caused by hidden nodes by taking into account periodic characteristics of data packet generation. In the risky duration, each sensor node stops the transmission of packets in order to avoid collisions. To the best of our knowledge, this is the first paper that considers the compounded effect of hidden nodes and continuous collisions among periodic data flows. Other advantages of the proposed method include that any new control packets are not required and it can be implemented in widelydiffused IEEE 802.11 and IEEE 802.15.4 devices.
随着物联网(IoT)应用的快速增长,越来越多的传感器设备被纳入无线传感器网络(WSNs),这些设备产生周期性的数据流,这些数据流的数据包以一定的间隔传输。然而,在大规模多跳无线网络中,隐藏节点问题导致的数据包冲突问题变得尤为严重。此外,针对周期数据流,一旦周期数据流的报文传输阶段同步,就会导致周期数据流之间的连续报文冲突。在本文中,我们解决了隐藏节点问题和周期数据流之间的连续碰撞问题的复合负面影响。为了实现这一目标,我们提出了一种新的MAC层机制。该方法通过考虑数据包生成的周期性特征,预测隐藏节点可能引起碰撞的风险持续时间。在风险持续时间内,为了避免碰撞,每个传感器节点都停止数据包的传输。据我们所知,这是第一篇考虑隐藏节点和周期数据流之间连续碰撞的复合效应的论文。该方法的其他优点包括不需要任何新的控制数据包,并且可以在广泛扩散的IEEE 802.11和IEEE 802.15.4设备中实现。
{"title":"Channel Access Control for Collisions Caused by Hidden Nodes and Phase Synchronization among Periodic Data Flows","authors":"Anh Huy Nguyen, Y. Tanigawa, H. Tode","doi":"10.1109/CCNC.2019.8651756","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651756","url":null,"abstract":"With the rapid increase in IoT (Internet of Things) applications, more sensor devices, generating periodic data flows whose packets are transmitted at regular intervals, are being incorporated into WSNs (Wireless Sensor Networks). However, packet collision caused by the hidden node problem becomes serious particularly in large-scale multi-hop WSNs. Moreover, focusing on periodic data flows, continuous packet collisions among periodic data flows are caused once periodic packet transmission phases are synchronized. In this paper, we tackle the compounded negative effect of the hidden node problem and the continuous collision problem among periodic data flows. To realize this objective, we propose a new MAC layer mechanism. The proposed method predicts risky durations during which collision can be caused by hidden nodes by taking into account periodic characteristics of data packet generation. In the risky duration, each sensor node stops the transmission of packets in order to avoid collisions. To the best of our knowledge, this is the first paper that considers the compounded effect of hidden nodes and continuous collisions among periodic data flows. Other advantages of the proposed method include that any new control packets are not required and it can be implemented in widelydiffused IEEE 802.11 and IEEE 802.15.4 devices.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"7 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115237144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G K-Simulator and TestBench Demonstration Proposal 5G k -模拟器和试验台演示方案
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651672
Youngnam Han
The fifth-generation (5G) communication systems are expected to be an important connecting infrastructure for information and knowledge exchanges among people, machines, sensors, devices, and even environments. The technical specifications for 5G communication systems are being made to satisfy performance requirements that are defined in ITU-R documents. In addition, the key performance indicators in 5G communication systems include peak and average data rate, mobility, energy efficiency, spectral efficiency, latency, connection density, and so on. These performance metrics need to be evaluated by simulators at different levels. Therefore, simulators play an important role in evaluating the performance of 5G communication systems as well as an individual technique. Most research institutes, universities, and industries have their own simulators, but with different levels of assumption and implementation depth according to technical needs of individual organization, which makes a fair comparison impossible.
预计第五代(5G)通信系统将成为人、机器、传感器、设备甚至环境之间信息和知识交流的重要连接基础设施。正在制定5G通信系统的技术规范,以满足ITU-R文件中定义的性能要求。此外,5G通信系统的关键性能指标还包括峰值和平均数据速率、移动性、能效、频谱效率、时延、连接密度等。这些性能指标需要由不同级别的模拟器进行评估。因此,模拟器在评估5G通信系统以及单个技术的性能方面发挥着重要作用。大多数研究机构、大学和行业都有自己的模拟器,但根据各个组织的技术需求,其假设程度和实现深度不同,无法进行公平的比较。
{"title":"5G K-Simulator and TestBench Demonstration Proposal","authors":"Youngnam Han","doi":"10.1109/CCNC.2019.8651672","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651672","url":null,"abstract":"The fifth-generation (5G) communication systems are expected to be an important connecting infrastructure for information and knowledge exchanges among people, machines, sensors, devices, and even environments. The technical specifications for 5G communication systems are being made to satisfy performance requirements that are defined in ITU-R documents. In addition, the key performance indicators in 5G communication systems include peak and average data rate, mobility, energy efficiency, spectral efficiency, latency, connection density, and so on. These performance metrics need to be evaluated by simulators at different levels. Therefore, simulators play an important role in evaluating the performance of 5G communication systems as well as an individual technique. Most research institutes, universities, and industries have their own simulators, but with different levels of assumption and implementation depth according to technical needs of individual organization, which makes a fair comparison impossible.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint High Level QP and Low Level Power Control in NOMA/OMA Downlink Wireless Multimedia Communications NOMA/OMA下行无线多媒体通信中的高电平QP和低电平功率联合控制
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651865
Shuan He, Wei Wang, K. Sohraby
Improving Quality of Experience (QoE) of User Equipment (UE) in wireless multimedia services is a critical challenge. In this paper we study the joint design of high level dynamic video Quantization Parameter (QP) and the low level power control in QoE-driven downlink wireless multimedia services. Furthermore, we study QoE performance with new Non-Orthogonal Multiple Access (NOMA) schemes in the Base Station (BS) – UE multimedia downlink, and discuss the performance in comparison with conventional Orthogonal Multiple Access (OMA). We mathematically model UE’s QoE gain (also known as utility) by considering UE’s perceived data quality and the corresponding data cost. Then we show that there exists an optimal data consumption option for UE to achieve utility maximization based on different cost coefficients. In addition, the power allocation strategies and their associated constraints are investigated in both OMA and NOMA transmission schemes. Finally, through numerical simulations, we quantitatively analyze the impact of low level power allocation and high level QP control on UEs’ utility gain and the system throughput performance.
在无线多媒体业务中,提高用户设备的体验质量(QoE)是一个重要的挑战。本文研究了qos驱动下行无线多媒体业务中高层次动态视频量化参数(QP)和低电平功率控制的联合设计。在此基础上,研究了新型非正交多址(NOMA)方案在基站(BS) - UE多媒体下行链路上的QoE性能,并与传统正交多址(OMA)方案进行了比较。我们通过考虑UE的感知数据质量和相应的数据成本,对UE的QoE增益(也称为效用)进行数学建模。在此基础上,我们证明了在不同的成本系数下,存在一个最优的数据消耗选项来实现UE的效用最大化。此外,还研究了OMA和NOMA两种传输方式下的功率分配策略及其约束。最后,通过数值模拟,定量分析了低电平功率分配和高电平QP控制对ue效用增益和系统吞吐量性能的影响。
{"title":"Joint High Level QP and Low Level Power Control in NOMA/OMA Downlink Wireless Multimedia Communications","authors":"Shuan He, Wei Wang, K. Sohraby","doi":"10.1109/CCNC.2019.8651865","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651865","url":null,"abstract":"Improving Quality of Experience (QoE) of User Equipment (UE) in wireless multimedia services is a critical challenge. In this paper we study the joint design of high level dynamic video Quantization Parameter (QP) and the low level power control in QoE-driven downlink wireless multimedia services. Furthermore, we study QoE performance with new Non-Orthogonal Multiple Access (NOMA) schemes in the Base Station (BS) – UE multimedia downlink, and discuss the performance in comparison with conventional Orthogonal Multiple Access (OMA). We mathematically model UE’s QoE gain (also known as utility) by considering UE’s perceived data quality and the corresponding data cost. Then we show that there exists an optimal data consumption option for UE to achieve utility maximization based on different cost coefficients. In addition, the power allocation strategies and their associated constraints are investigated in both OMA and NOMA transmission schemes. Finally, through numerical simulations, we quantitatively analyze the impact of low level power allocation and high level QP control on UEs’ utility gain and the system throughput performance.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123544234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Demonstration of a 5G Multi-access Edge Cloud Enabled Smart Sorting Machine for Industry 4.0 面向工业4.0的5G多接入边缘云智能分拣机演示
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651732
Alexander Kropp, Robert-Steve Schmoll, Giang T. Nguyen, F. Fitzek
This demonstrator, which is completely realized in software and hardware, shows the influence of latency in a very descriptive and interactive way with the example of a Mobile Edge Cloud or legacy cloud operated ball sorting machine. The demonstrator has every essential element that would be found in a real production machine or control loop. It consists of a sensor, a controller and several actuators. Through the Control and Monitoring Interface, the audience of the demo has a simple and self-explanatory way to interact with the demonstrator. In addition the advantages of Multi-access Edge Computing compared to legacy cloud computing and embedded computing are explained in the context of industry 4.0.
该演示器完全在软件和硬件上实现,以移动边缘云或传统云操作的球分拣机为例,以非常描述性和交互式的方式展示了延迟的影响。演示器具有在实际生产机器或控制回路中可以找到的所有基本元素。它由一个传感器、一个控制器和几个执行器组成。通过控制和监控界面,演示的观众有一个简单和自解释的方式与演示交互。此外,在工业4.0的背景下解释了多访问边缘计算与传统云计算和嵌入式计算相比的优势。
{"title":"Demonstration of a 5G Multi-access Edge Cloud Enabled Smart Sorting Machine for Industry 4.0","authors":"Alexander Kropp, Robert-Steve Schmoll, Giang T. Nguyen, F. Fitzek","doi":"10.1109/CCNC.2019.8651732","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651732","url":null,"abstract":"This demonstrator, which is completely realized in software and hardware, shows the influence of latency in a very descriptive and interactive way with the example of a Mobile Edge Cloud or legacy cloud operated ball sorting machine. The demonstrator has every essential element that would be found in a real production machine or control loop. It consists of a sensor, a controller and several actuators. Through the Control and Monitoring Interface, the audience of the demo has a simple and self-explanatory way to interact with the demonstrator. In addition the advantages of Multi-access Edge Computing compared to legacy cloud computing and embedded computing are explained in the context of industry 4.0.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Voice Based One Step Solution for Bulk IoT Device Onboarding 基于语音的批量物联网设备登录一步解决方案
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651724
Vinay Kumar, Sujay Mohan, Rakesh Kumar
Device Onboarding refers to the first time registration of a device into an Internet of Things (IoT) network. The process can be as simple as pairing of two devices or as complicated as connecting thousands of devices. This process varies significantly across different device vendors. Currently, onboarding process can onboard one device at a time and can take around 5-20 minutes for the lay user. As per International Data Corporation (IDC) [1], number of smart devices is growing faster and approximately 80 billion devices will be connected by 2025. The need for onboarding multiple devices quickly will therefore assume great importance. In this paper, we propose a software-based one-step solution that can securely onboard multiple microphone enabled devices with a single voice command (e.g., “Onboard all devices”). The efficacy of the proposed approach is demonstrated by onboarding multiple IoT devices successfully within the voice range with a single voice command.
设备登录是指设备第一次注册到物联网(IoT)网络中。这个过程可以简单到配对两个设备,也可以复杂到连接数千个设备。这个过程在不同的设备供应商之间差别很大。目前,安装过程一次可以安装一个设备,对于外行用户来说可能需要5-20分钟。根据国际数据公司(IDC)的数据[1],智能设备的数量正在快速增长,到2025年将有大约800亿台设备连接。因此,快速接入多个设备的需求将变得非常重要。在本文中,我们提出了一个基于软件的一步解决方案,该解决方案可以通过单个语音命令(例如,“板载所有设备”)安全地板载多个启用麦克风的设备。通过使用单个语音命令成功地在语音范围内登录多个物联网设备,证明了所提出方法的有效性。
{"title":"A Voice Based One Step Solution for Bulk IoT Device Onboarding","authors":"Vinay Kumar, Sujay Mohan, Rakesh Kumar","doi":"10.1109/CCNC.2019.8651724","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651724","url":null,"abstract":"Device Onboarding refers to the first time registration of a device into an Internet of Things (IoT) network. The process can be as simple as pairing of two devices or as complicated as connecting thousands of devices. This process varies significantly across different device vendors. Currently, onboarding process can onboard one device at a time and can take around 5-20 minutes for the lay user. As per International Data Corporation (IDC) [1], number of smart devices is growing faster and approximately 80 billion devices will be connected by 2025. The need for onboarding multiple devices quickly will therefore assume great importance. In this paper, we propose a software-based one-step solution that can securely onboard multiple microphone enabled devices with a single voice command (e.g., “Onboard all devices”). The efficacy of the proposed approach is demonstrated by onboarding multiple IoT devices successfully within the voice range with a single voice command.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121484522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fast Spectral Assessment for Handover Decisions in 5G Networks 5G网络切换决策的快速频谱评估
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651673
Kostas Chounos, Stratos Keranidis, A. Apostolaras, T. Korakis
In this paper, we present a UE-driven light-weight mechanism for fast handover decision and efficient WLAN selection in the context of 5G networks. As the network deployments are expected to be denser and the mobile user will be offered a multitude of alternative short coverage range options to have her mobile traffic served, her roaming decision will be performance critical. While the current 3GPP standardization considers the use of network performance statistics of nearby WLANs for the UE-driven roaming selection to address the uncertainty of the shared wireless medium, their collection and processing inevitably affects the mobile user performance and inserts an accuracy-performance tradeoff. We introduce a spectrum assessment framework, that is based on commercial hardware and open-source software, to evaluate the conditions on the nearby WLANs and let the UE to infer their performance with minimum overhead relying on Duty Cycle evaluation and the RSSI metrics. Our ready-to-be deployed solution leverages the use of off-the-shelf equipment and commercial devices and enables fast decision procedures for the WLAN selection with low collection and processing overhead. We evaluate our mechanism by conducting testbed experiments. The results reveal performance gains in terms of UE’s achieved throughput when enabling the proposed framework to infer the spectral WLAN conditions and decide for the AP to roam.
在本文中,我们提出了一种ue驱动的轻量级机制,用于5G网络环境下的快速切换决策和高效WLAN选择。由于网络部署预计将更加密集,移动用户将获得大量可选的短覆盖范围选项,以便为其移动流量提供服务,因此她的漫游决定将对性能至关重要。虽然目前的3GPP标准化考虑使用附近wlan的网络性能统计来进行ue驱动的漫游选择,以解决共享无线介质的不确定性,但它们的收集和处理不可避免地影响移动用户的性能,并插入精度和性能之间的权衡。我们引入了一个基于商用硬件和开源软件的频谱评估框架,以评估附近wlan的条件,并让UE根据占空比评估和RSSI指标以最小的开销推断其性能。我们的现成部署解决方案充分利用了现成设备和商用设备的使用,使WLAN选择的快速决策过程具有较低的收集和处理开销。我们通过进行试验台实验来评估我们的机制。结果显示,当所提出的框架能够推断频谱WLAN条件并决定AP漫游时,就UE实现的吞吐量而言,性能得到了提高。
{"title":"Fast Spectral Assessment for Handover Decisions in 5G Networks","authors":"Kostas Chounos, Stratos Keranidis, A. Apostolaras, T. Korakis","doi":"10.1109/CCNC.2019.8651673","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651673","url":null,"abstract":"In this paper, we present a UE-driven light-weight mechanism for fast handover decision and efficient WLAN selection in the context of 5G networks. As the network deployments are expected to be denser and the mobile user will be offered a multitude of alternative short coverage range options to have her mobile traffic served, her roaming decision will be performance critical. While the current 3GPP standardization considers the use of network performance statistics of nearby WLANs for the UE-driven roaming selection to address the uncertainty of the shared wireless medium, their collection and processing inevitably affects the mobile user performance and inserts an accuracy-performance tradeoff. We introduce a spectrum assessment framework, that is based on commercial hardware and open-source software, to evaluate the conditions on the nearby WLANs and let the UE to infer their performance with minimum overhead relying on Duty Cycle evaluation and the RSSI metrics. Our ready-to-be deployed solution leverages the use of off-the-shelf equipment and commercial devices and enables fast decision procedures for the WLAN selection with low collection and processing overhead. We evaluate our mechanism by conducting testbed experiments. The results reveal performance gains in terms of UE’s achieved throughput when enabling the proposed framework to infer the spectral WLAN conditions and decide for the AP to roam.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122275104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Geo-Fencing in Wireless LANs with Camera for Location-Based Access Control 基于位置访问控制的摄像机无线局域网地理围栏
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651877
Go Yamanaka, T. Nishio, M. Morikura, Koji Yamamoto, Yuichi Maki, Shin'ichiro Eitoku, Takuya Indo
This paper proposes a camera-based geo-fencing system for wireless local area networks (WLANs) which enables geo-location based wireless access control to intuitively manage the area where the WLANs are available. The proposed system leverages camera to localize WLAN users accurately and estimates the proximity of users to objects in the real world. Meanwhile, conventional geo-location based access control suffers from low accuracy of RSSI based localization. As an example of geo-location based access control, we execute a WLAN activation control which allows STAs to pre-activate WLAN and associates with access points (APs) so that the power consumption and time to obtain contents are reduced. Experimental results show the feasibility of camera-based geo-fencing.
本文提出了一种基于摄像机的无线局域网地理围栏系统,使基于地理位置的无线访问控制能够直观地管理无线局域网可用的区域。该系统利用摄像头对WLAN用户进行精确定位,并估计用户与现实世界中物体的接近程度。同时,传统的基于地理位置的访问控制存在RSSI定位精度低的问题。作为基于地理位置的访问控制的一个示例,我们执行一个WLAN激活控制,该控制允许sta预激活WLAN并与接入点(ap)相关联,从而减少功耗和获取内容的时间。实验结果表明,基于摄像机的地理围栏是可行的。
{"title":"Geo-Fencing in Wireless LANs with Camera for Location-Based Access Control","authors":"Go Yamanaka, T. Nishio, M. Morikura, Koji Yamamoto, Yuichi Maki, Shin'ichiro Eitoku, Takuya Indo","doi":"10.1109/CCNC.2019.8651877","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651877","url":null,"abstract":"This paper proposes a camera-based geo-fencing system for wireless local area networks (WLANs) which enables geo-location based wireless access control to intuitively manage the area where the WLANs are available. The proposed system leverages camera to localize WLAN users accurately and estimates the proximity of users to objects in the real world. Meanwhile, conventional geo-location based access control suffers from low accuracy of RSSI based localization. As an example of geo-location based access control, we execute a WLAN activation control which allows STAs to pre-activate WLAN and associates with access points (APs) so that the power consumption and time to obtain contents are reduced. Experimental results show the feasibility of camera-based geo-fencing.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks 物联网网络异常活动检测的两级混合模型
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651782
I. Ullah, Q. Mahmoud
In this paper we propose a two-level hybrid anomalous activity detection model for intrusion detection in IoT networks. The level-1 model uses flow-based anomaly detection, which is capable of classifying the network traffic as normal or anomalous. The flow-based features are extracted from the CICIDS2017 and UNSW-15 datasets. If an anomaly activity is detected then the flow is forwarded to the level-2 model to find the category of the anomaly by deeply examining the contents of the packet. The level-2 model uses Recursive Feature Elimination (RFE) to select significant features and Synthetic Minority Over-Sampling Technique (SMOTE) for oversampling and Edited Nearest Neighbors (ENN) for cleaning the CICIDS2017 and UNSW-15 datasets. Our proposed model precision, recall and F score for level-1 were measured 100% for the CICIDS2017 dataset and 99% for the UNSW-15 dataset, while the level-2 model precision, recall, and F score were measured at 100 % for the CICIDS2017 dataset and 97 % for the UNSW-15 dataset. The predictor we introduce in this paper provides a solid framework for the development of malicious activity detection in IoT networks.
本文提出了一种用于物联网网络入侵检测的两级混合异常活动检测模型。level-1模型采用基于流的异常检测,能够对网络流量进行正常和异常的分类。基于流量的特征提取自CICIDS2017和UNSW-15数据集。如果检测到异常活动,则将流转发到第2级模型,通过深入检查数据包的内容来查找异常的类别。二级模型使用递归特征消除(RFE)来选择显著特征,使用合成少数过采样技术(SMOTE)进行过采样,使用编辑近邻(ENN)来清洗CICIDS2017和unws -15数据集。CICIDS2017数据集的一级模型精度、召回率和F分数为100%,UNSW-15数据集为99%,而CICIDS2017数据集的二级模型精度、召回率和F分数为100%,UNSW-15数据集的二级模型精度、召回率和F分数为97%。我们在本文中介绍的预测器为物联网网络中恶意活动检测的开发提供了坚实的框架。
{"title":"A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks","authors":"I. Ullah, Q. Mahmoud","doi":"10.1109/CCNC.2019.8651782","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651782","url":null,"abstract":"In this paper we propose a two-level hybrid anomalous activity detection model for intrusion detection in IoT networks. The level-1 model uses flow-based anomaly detection, which is capable of classifying the network traffic as normal or anomalous. The flow-based features are extracted from the CICIDS2017 and UNSW-15 datasets. If an anomaly activity is detected then the flow is forwarded to the level-2 model to find the category of the anomaly by deeply examining the contents of the packet. The level-2 model uses Recursive Feature Elimination (RFE) to select significant features and Synthetic Minority Over-Sampling Technique (SMOTE) for oversampling and Edited Nearest Neighbors (ENN) for cleaning the CICIDS2017 and UNSW-15 datasets. Our proposed model precision, recall and F score for level-1 were measured 100% for the CICIDS2017 dataset and 99% for the UNSW-15 dataset, while the level-2 model precision, recall, and F score were measured at 100 % for the CICIDS2017 dataset and 97 % for the UNSW-15 dataset. The predictor we introduce in this paper provides a solid framework for the development of malicious activity detection in IoT networks.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128731692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Improving of Fairness by Dynamic Sensitivity Control and Transmission Power Control with Access Point Cooperation in Dense WLAN 基于接入点协作的动态灵敏度控制和传输功率控制提高密集无线局域网公平性
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651714
Koki Iwai, Takanobu Ohnuma, H. Shigeno, Yusuke Tanaka
Wireless Local Area Networks (WLANs) have been deployed more densely according to high wireless demands. In a dense environment where a lot of stations (STAs) located closely, co-channel interference decreases system performance seriously. IEEE 802.11ax Task Group focuses on spatial reuse that utilizes finite frequency resources to address this problem. Although existing studies about spatial reuse have been discussed so far, interference from other basic service sets (BSSs) and cooperation with each access point (AP) have not been considered fully. To enhance communication fairness, we propose fair Dynamic Sensitivity and Transmission Power Control (fairDSTPC) that adjusts CCAT and transmission power based on AP cooperation. We improve communication environment of BSS which results in the worst throughput by exchanging information, such as throughput and number of sent data frames, between APs. Simulation results showed that our method achieved effectiveness compared with existing method and legacy system. In an open space scenario, our method reached approximately two times higher 5% ile downlink throughput than an existing method while maintaining 5% ile uplink throughput and aggregate throughput.
无线局域网(Wireless Local Area network, wlan)的部署越来越密集。在多站密集分布的环境中,同信道干扰严重影响系统性能。IEEE 802.11ax任务组专注于空间重用,利用有限的频率资源来解决这个问题。虽然现有的空间重用研究已经有了一定的进展,但对其他基本服务集(bss)的干扰以及与每个接入点(AP)的合作等方面的考虑还不够充分。为了提高通信公平性,我们提出了公平动态灵敏度和传输功率控制(fairDSTPC),该控制基于AP合作来调整CCAT和传输功率。通过在ap之间交换吞吐量和发送数据帧数等信息,改善了导致BSS吞吐量最差的通信环境。仿真结果表明,与现有方法和遗留系统相比,该方法取得了较好的效果。在开放空间场景中,我们的方法达到了比现有方法高两倍的5%文件下行吞吐量,同时保持了5%的文件上行吞吐量和总吞吐量。
{"title":"Improving of Fairness by Dynamic Sensitivity Control and Transmission Power Control with Access Point Cooperation in Dense WLAN","authors":"Koki Iwai, Takanobu Ohnuma, H. Shigeno, Yusuke Tanaka","doi":"10.1109/CCNC.2019.8651714","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651714","url":null,"abstract":"Wireless Local Area Networks (WLANs) have been deployed more densely according to high wireless demands. In a dense environment where a lot of stations (STAs) located closely, co-channel interference decreases system performance seriously. IEEE 802.11ax Task Group focuses on spatial reuse that utilizes finite frequency resources to address this problem. Although existing studies about spatial reuse have been discussed so far, interference from other basic service sets (BSSs) and cooperation with each access point (AP) have not been considered fully. To enhance communication fairness, we propose fair Dynamic Sensitivity and Transmission Power Control (fairDSTPC) that adjusts CCAT and transmission power based on AP cooperation. We improve communication environment of BSS which results in the worst throughput by exchanging information, such as throughput and number of sent data frames, between APs. Simulation results showed that our method achieved effectiveness compared with existing method and legacy system. In an open space scenario, our method reached approximately two times higher 5% ile downlink throughput than an existing method while maintaining 5% ile uplink throughput and aggregate throughput.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128100089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1