首页 > 最新文献

2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)最新文献

英文 中文
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks 移动物联网RPL中基于信任的轻量级安全架构
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651846
P. Thulasiraman, Yizhong Wang
Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the security of data transfer. In this paper, we successfully design and develop a lightweight, trust-based security architecture to support routing in a mobile IoT network. Specifically, we modify the RPL IoT routing algorithm using common security techniques, including a nonce identity value, timestamp, and network whitelist. Our approach allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal strength indicator (ARSSI) value across network members. We conducted simulations using the Cooja network simulator and Wireshark to validate the algorithm against stipulated threat models. We demonstrate that our algorithm can protect the network against Denial of Service (DoS) and Sybil based identity attacks. We also show that the control overhead required for our algorithm is less than 5% and that the packet delivery rate improves by nearly 10%.
军事社区已经开始严重依赖商用现货(COTS)标准和技术来进行物联网(IoT)操作。军用COTS物联网设备的主要障碍之一是数据传输的安全性。在本文中,我们成功地设计和开发了一个轻量级的、基于信任的安全架构,以支持移动物联网网络中的路由。具体来说,我们使用常见的安全技术修改RPL IoT路由算法,包括nonce身份值、时间戳和网络白名单。我们的方法允许RPL根据计算的节点信任值和网络成员之间的平均接收信号强度指标(ARSSI)值,在移动物联网无线网络上选择路由路径。我们使用Cooja网络模拟器和Wireshark进行了模拟,以验证算法对规定的威胁模型的有效性。我们证明了我们的算法可以保护网络免受拒绝服务(DoS)和基于Sybil的身份攻击。我们还表明,我们的算法所需的控制开销小于5%,数据包传输速率提高了近10%。
{"title":"A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks","authors":"P. Thulasiraman, Yizhong Wang","doi":"10.1109/CCNC.2019.8651846","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651846","url":null,"abstract":"Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the security of data transfer. In this paper, we successfully design and develop a lightweight, trust-based security architecture to support routing in a mobile IoT network. Specifically, we modify the RPL IoT routing algorithm using common security techniques, including a nonce identity value, timestamp, and network whitelist. Our approach allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal strength indicator (ARSSI) value across network members. We conducted simulations using the Cooja network simulator and Wireshark to validate the algorithm against stipulated threat models. We demonstrate that our algorithm can protect the network against Denial of Service (DoS) and Sybil based identity attacks. We also show that the control overhead required for our algorithm is less than 5% and that the packet delivery rate improves by nearly 10%.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Voice Based One Step Solution for Bulk IoT Device Onboarding 基于语音的批量物联网设备登录一步解决方案
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651724
Vinay Kumar, Sujay Mohan, Rakesh Kumar
Device Onboarding refers to the first time registration of a device into an Internet of Things (IoT) network. The process can be as simple as pairing of two devices or as complicated as connecting thousands of devices. This process varies significantly across different device vendors. Currently, onboarding process can onboard one device at a time and can take around 5-20 minutes for the lay user. As per International Data Corporation (IDC) [1], number of smart devices is growing faster and approximately 80 billion devices will be connected by 2025. The need for onboarding multiple devices quickly will therefore assume great importance. In this paper, we propose a software-based one-step solution that can securely onboard multiple microphone enabled devices with a single voice command (e.g., “Onboard all devices”). The efficacy of the proposed approach is demonstrated by onboarding multiple IoT devices successfully within the voice range with a single voice command.
设备登录是指设备第一次注册到物联网(IoT)网络中。这个过程可以简单到配对两个设备,也可以复杂到连接数千个设备。这个过程在不同的设备供应商之间差别很大。目前,安装过程一次可以安装一个设备,对于外行用户来说可能需要5-20分钟。根据国际数据公司(IDC)的数据[1],智能设备的数量正在快速增长,到2025年将有大约800亿台设备连接。因此,快速接入多个设备的需求将变得非常重要。在本文中,我们提出了一个基于软件的一步解决方案,该解决方案可以通过单个语音命令(例如,“板载所有设备”)安全地板载多个启用麦克风的设备。通过使用单个语音命令成功地在语音范围内登录多个物联网设备,证明了所提出方法的有效性。
{"title":"A Voice Based One Step Solution for Bulk IoT Device Onboarding","authors":"Vinay Kumar, Sujay Mohan, Rakesh Kumar","doi":"10.1109/CCNC.2019.8651724","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651724","url":null,"abstract":"Device Onboarding refers to the first time registration of a device into an Internet of Things (IoT) network. The process can be as simple as pairing of two devices or as complicated as connecting thousands of devices. This process varies significantly across different device vendors. Currently, onboarding process can onboard one device at a time and can take around 5-20 minutes for the lay user. As per International Data Corporation (IDC) [1], number of smart devices is growing faster and approximately 80 billion devices will be connected by 2025. The need for onboarding multiple devices quickly will therefore assume great importance. In this paper, we propose a software-based one-step solution that can securely onboard multiple microphone enabled devices with a single voice command (e.g., “Onboard all devices”). The efficacy of the proposed approach is demonstrated by onboarding multiple IoT devices successfully within the voice range with a single voice command.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121484522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Subcarrier-Index Modulation for Reed Solomon Encoded OFDM-Based Visible Light Communication 基于Reed Solomon编码ofdm的可见光通信子载波索引调制
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651864
N. Taherkhani, K. Kiasaleh
In this paper, we propose the subcarrier-index modulation with Reed Solomon encoded Optical Orthogonal Frequency Division Multiplexing with index modulation (IM-RS-OFDM) scheme for visible light communication (VLC). In this technique, the data is encoded using an RS codeword and then part of the redundancy introduced by the frame which exceeds the clipping range are punctured and their corresponding subcarriers are set as inactive, where the indices of these inactive subcarriers are used to transmit extra information bits. The puncturing of the redundancy aids in mitigating clipping noise generated due to the dynamic range constraints of the optical transmitter by shortening the number of active subcarriers, while the locations of the punctured subcarriers are exploited to convey more bits in order to compensate for the reduction in spectral efficiency caused by coding redundancy. In the proposed scheme, the bipolar transmitting signal is clipped and biased according to DC bias optical OFDM (DCO-OFDM) system, and a Log-Likelihood ratio (LLR) calculation based detector is used to find the indices of punctured symbols in the codeword. Our simulation results show that the new scheme offers a better bit error rate performance compared to the conventional coded OFDM-based visible light communication.
本文提出了一种基于里德-所罗门编码的光正交频分复用索引调制(IM-RS-OFDM)的可见光通信子载波索引调制方案。在这种技术中,使用RS码字对数据进行编码,然后戳破帧引入的超过裁剪范围的冗余部分,并将其相应的子载波设置为非活动,其中这些非活动子载波的索引用于传输额外的信息位。通过减少有源子载波的数量,对冗余的穿刺有助于减轻由于光发射机动态范围限制而产生的裁剪噪声,同时利用被穿刺的子载波的位置来传输更多的比特,以补偿编码冗余引起的频谱效率的降低。该方案根据直流偏置光OFDM (DCO-OFDM)系统对双极发射信号进行裁剪和偏置,并采用基于对数似然比(LLR)计算的检测器来查找码字中被刺穿符号的指标。仿真结果表明,与传统的编码ofdm可见光通信相比,该方案具有更好的误码率性能。
{"title":"Subcarrier-Index Modulation for Reed Solomon Encoded OFDM-Based Visible Light Communication","authors":"N. Taherkhani, K. Kiasaleh","doi":"10.1109/CCNC.2019.8651864","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651864","url":null,"abstract":"In this paper, we propose the subcarrier-index modulation with Reed Solomon encoded Optical Orthogonal Frequency Division Multiplexing with index modulation (IM-RS-OFDM) scheme for visible light communication (VLC). In this technique, the data is encoded using an RS codeword and then part of the redundancy introduced by the frame which exceeds the clipping range are punctured and their corresponding subcarriers are set as inactive, where the indices of these inactive subcarriers are used to transmit extra information bits. The puncturing of the redundancy aids in mitigating clipping noise generated due to the dynamic range constraints of the optical transmitter by shortening the number of active subcarriers, while the locations of the punctured subcarriers are exploited to convey more bits in order to compensate for the reduction in spectral efficiency caused by coding redundancy. In the proposed scheme, the bipolar transmitting signal is clipped and biased according to DC bias optical OFDM (DCO-OFDM) system, and a Log-Likelihood ratio (LLR) calculation based detector is used to find the indices of punctured symbols in the codeword. Our simulation results show that the new scheme offers a better bit error rate performance compared to the conventional coded OFDM-based visible light communication.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127809688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Characterizing Full-Duplex V2V Broadcast Performance through Stochastic Geometry 基于随机几何的全双工V2V广播性能表征
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651886
Alexandre Mouradian, C. Campolo, A. Molinaro, A. Berthet, V. Vèque
Broadcast traffic in IEEE 802.11 vehicular networks is known to suffer from poor performance due to the lack of recovery mechanisms from packet losses, based on the rules of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. This may have a detrimental impact on cooperative vehicular safety applications that build on the reliable regular broadcasting of status messages by vehicles in a local neighborhood. Full-Duplex (FD) techniques can improve the broadcast CSMA/CA performance by letting a sending vehicle sense the channel while transmitting, thus enabling “collision detection”. The vehicle, consequently, can abort the packet prone to collision and reattempt a later transmission. In this paper, we define a stochastic geometry model that captures the collision detection capability of FD-enabled vehicles, while accurately characterizing the interference power generated by other vehicles on a road segment, and the dynamics of the backoff mechanism used for broadcast packet retransmissions. The model provides helpful insights into the FD broadcast CSMA/CA behaviour, highlighting a clear relationship between the settings for the carrier sense threshold and the collision detection threshold and the number of covered receivers on the road.
由于缺乏基于避免碰撞的载波感知多址(CSMA/CA)协议规则的数据包丢失恢复机制,IEEE 802.11车载网络中的广播流量表现不佳。这可能会对合作车辆安全应用程序产生不利影响,这些应用程序建立在当地社区车辆可靠的定期广播状态信息的基础上。全双工(FD)技术可以通过让发送车辆在发送时感知信道来提高广播CSMA/CA性能,从而实现“碰撞检测”。因此,车辆可以中止容易发生碰撞的数据包,并重新尝试稍后的传输。在本文中,我们定义了一个随机几何模型,该模型捕获了启用fd的车辆的碰撞检测能力,同时准确地表征了路段上其他车辆产生的干扰功率,以及用于广播数据包重传的退退机制的动力学。该模型为FD广播CSMA/CA行为提供了有用的见解,突出了载波感知阈值和碰撞检测阈值的设置与道路上覆盖的接收器数量之间的明确关系。
{"title":"Characterizing Full-Duplex V2V Broadcast Performance through Stochastic Geometry","authors":"Alexandre Mouradian, C. Campolo, A. Molinaro, A. Berthet, V. Vèque","doi":"10.1109/CCNC.2019.8651886","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651886","url":null,"abstract":"Broadcast traffic in IEEE 802.11 vehicular networks is known to suffer from poor performance due to the lack of recovery mechanisms from packet losses, based on the rules of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. This may have a detrimental impact on cooperative vehicular safety applications that build on the reliable regular broadcasting of status messages by vehicles in a local neighborhood. Full-Duplex (FD) techniques can improve the broadcast CSMA/CA performance by letting a sending vehicle sense the channel while transmitting, thus enabling “collision detection”. The vehicle, consequently, can abort the packet prone to collision and reattempt a later transmission. In this paper, we define a stochastic geometry model that captures the collision detection capability of FD-enabled vehicles, while accurately characterizing the interference power generated by other vehicles on a road segment, and the dynamics of the backoff mechanism used for broadcast packet retransmissions. The model provides helpful insights into the FD broadcast CSMA/CA behaviour, highlighting a clear relationship between the settings for the carrier sense threshold and the collision detection threshold and the number of covered receivers on the road.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CCNC 2019 Committees
Pub Date : 2019-01-01 DOI: 10.1109/ccnc.2019.8651685
{"title":"CCNC 2019 Committees","authors":"","doi":"10.1109/ccnc.2019.8651685","DOIUrl":"https://doi.org/10.1109/ccnc.2019.8651685","url":null,"abstract":"","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstration of Mobile Edge Cloud for 5G Connected Cars 5G车联网移动边缘云演示
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651783
Oleksandr Zhdanenko, Jianhui Liu, Roberto Torre Arranz, S. Mudriievskyi, H. Salah, Giang T. Nguyen, F. Fitzek
This demonstration shows both the utility of Mobile Edge Cloud (MEC) for 5G connected cars, as well as the impact of MEC server selection (i.e. migration) strategy on latency. The demonstration simulates cars moving according to a realistic model inside the city of Munich, and implements different MEC server selection strategies. A player can steer an ambulance using a controller, and can also choose one among four server selection strategies while driving. With each strategy, the player will experience a different latency.
该演示展示了移动边缘云(MEC)对5G联网汽车的效用,以及MEC服务器选择(即迁移)策略对延迟的影响。该演示根据现实模型模拟了在慕尼黑市内行驶的汽车,并实现了不同的MEC服务器选择策略。玩家可以使用控制器驾驶救护车,也可以在驾驶时选择四种服务器选择策略中的一种。对于每种策略,玩家将体验到不同的延迟。
{"title":"Demonstration of Mobile Edge Cloud for 5G Connected Cars","authors":"Oleksandr Zhdanenko, Jianhui Liu, Roberto Torre Arranz, S. Mudriievskyi, H. Salah, Giang T. Nguyen, F. Fitzek","doi":"10.1109/CCNC.2019.8651783","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651783","url":null,"abstract":"This demonstration shows both the utility of Mobile Edge Cloud (MEC) for 5G connected cars, as well as the impact of MEC server selection (i.e. migration) strategy on latency. The demonstration simulates cars moving according to a realistic model inside the city of Munich, and implements different MEC server selection strategies. A player can steer an ambulance using a controller, and can also choose one among four server selection strategies while driving. With each strategy, the player will experience a different latency.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122214419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Detections of pulse and blood pressure employing 5G millimeter wave signal 利用5G毫米波信号检测脉搏和血压
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651697
Yukino Yamaoka, Jiang Liu, S. Shimamoto
Currently, non-invasive blood pressure monitoring with using a cuff is commonly used. However, this monitoring method is not suitable for some people who cannot wear the cuff and who might feel uncomfortable and troublesome. Non-contact measurement method provides a safer and more comfortable way to measure blood pressure. This paper describes the research on a non-contact pulse and blood pressure monitoring system. The frequencies of millimeter waves used in this experiment are 28GHz and 32GHz, which are the same as 5G millimeter wave signal. In this experiment, the millimeter waves are transmitted and reflected to the body and measure the reception intensity. As the results, we can detect pulse by utilizing millimeter waves, however, the relationship between blood pressure and millimeter waves needs further investigation.
目前,常用的是使用袖带进行无创血压监测。但是,这种监测方法并不适合一些不能佩戴袖口的人,他们可能会感到不舒服和麻烦。非接触式测量方法提供了一种更安全、更舒适的血压测量方法。本文介绍了一种非接触式脉搏和血压监测系统的研究。本次实验使用的毫米波频率为28GHz和32GHz,与5G毫米波信号相同。在本实验中,毫米波被传输并反射到人体,并测量接收强度。因此,利用毫米波可以检测脉搏,但血压和毫米波之间的关系还需要进一步研究。
{"title":"Detections of pulse and blood pressure employing 5G millimeter wave signal","authors":"Yukino Yamaoka, Jiang Liu, S. Shimamoto","doi":"10.1109/CCNC.2019.8651697","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651697","url":null,"abstract":"Currently, non-invasive blood pressure monitoring with using a cuff is commonly used. However, this monitoring method is not suitable for some people who cannot wear the cuff and who might feel uncomfortable and troublesome. Non-contact measurement method provides a safer and more comfortable way to measure blood pressure. This paper describes the research on a non-contact pulse and blood pressure monitoring system. The frequencies of millimeter waves used in this experiment are 28GHz and 32GHz, which are the same as 5G millimeter wave signal. In this experiment, the millimeter waves are transmitted and reflected to the body and measure the reception intensity. As the results, we can detect pulse by utilizing millimeter waves, however, the relationship between blood pressure and millimeter waves needs further investigation.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131511861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incremental Spatial Clustering for Spatial Big Crowd Data in Evolving Disaster Scenario 演化灾害场景下空间大人群数据的增量空间聚类
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651840
Yilang Wu, Amitangshu Pal, Junbo Wang, K. Kant
Spatial clustering of the events scattered over a geographical region has many important applications, including the assessment of needs of the people affected by a disaster. In this paper we consider spatial clustering of social media data (e.g., tweets) generated by smart phones in the disaster region. Our goal in this context is to find high density areas within the affected area with abundance of messages concerning specific needs that we call simply as “situations”. Unfortunately, a direct spatial clustering is not only unstable or unreliable in the presence of mobility or changing conditions but also fails to recognize the fact that the “situation” expressed by a tweet remains valid for some time beyond the time of its emission. We address this by associating a decay function with each information content and define an incremental spatial clustering algorithm (ISCA) based on the decay model. We study the performance of incremental clustering as a function of decay rate to provide insights into how it can be chosen appropriately for different situations.
分散在一个地理区域的事件的空间聚类有许多重要的应用,包括评估受灾害影响的人民的需求。本文考虑了灾区智能手机产生的社交媒体数据(如推文)的空间聚类。在这种情况下,我们的目标是在受影响的区域内找到高密度的区域,这些区域有大量关于特定需求的信息,我们简单地称之为“情况”。不幸的是,在流动性或变化的条件下,直接的空间聚类不仅不稳定或不可靠,而且无法认识到推文所表达的“情况”在其发布时间之后的一段时间内仍然有效。我们通过将衰减函数与每个信息内容相关联来解决这个问题,并定义了基于衰减模型的增量空间聚类算法(ISCA)。我们研究了增量聚类的性能作为衰减率的函数,以提供如何在不同情况下适当选择它的见解。
{"title":"Incremental Spatial Clustering for Spatial Big Crowd Data in Evolving Disaster Scenario","authors":"Yilang Wu, Amitangshu Pal, Junbo Wang, K. Kant","doi":"10.1109/CCNC.2019.8651840","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651840","url":null,"abstract":"Spatial clustering of the events scattered over a geographical region has many important applications, including the assessment of needs of the people affected by a disaster. In this paper we consider spatial clustering of social media data (e.g., tweets) generated by smart phones in the disaster region. Our goal in this context is to find high density areas within the affected area with abundance of messages concerning specific needs that we call simply as “situations”. Unfortunately, a direct spatial clustering is not only unstable or unreliable in the presence of mobility or changing conditions but also fails to recognize the fact that the “situation” expressed by a tweet remains valid for some time beyond the time of its emission. We address this by associating a decay function with each information content and define an incremental spatial clustering algorithm (ISCA) based on the decay model. We study the performance of incremental clustering as a function of decay rate to provide insights into how it can be chosen appropriately for different situations.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improving of Fairness by Dynamic Sensitivity Control and Transmission Power Control with Access Point Cooperation in Dense WLAN 基于接入点协作的动态灵敏度控制和传输功率控制提高密集无线局域网公平性
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651714
Koki Iwai, Takanobu Ohnuma, H. Shigeno, Yusuke Tanaka
Wireless Local Area Networks (WLANs) have been deployed more densely according to high wireless demands. In a dense environment where a lot of stations (STAs) located closely, co-channel interference decreases system performance seriously. IEEE 802.11ax Task Group focuses on spatial reuse that utilizes finite frequency resources to address this problem. Although existing studies about spatial reuse have been discussed so far, interference from other basic service sets (BSSs) and cooperation with each access point (AP) have not been considered fully. To enhance communication fairness, we propose fair Dynamic Sensitivity and Transmission Power Control (fairDSTPC) that adjusts CCAT and transmission power based on AP cooperation. We improve communication environment of BSS which results in the worst throughput by exchanging information, such as throughput and number of sent data frames, between APs. Simulation results showed that our method achieved effectiveness compared with existing method and legacy system. In an open space scenario, our method reached approximately two times higher 5% ile downlink throughput than an existing method while maintaining 5% ile uplink throughput and aggregate throughput.
无线局域网(Wireless Local Area network, wlan)的部署越来越密集。在多站密集分布的环境中,同信道干扰严重影响系统性能。IEEE 802.11ax任务组专注于空间重用,利用有限的频率资源来解决这个问题。虽然现有的空间重用研究已经有了一定的进展,但对其他基本服务集(bss)的干扰以及与每个接入点(AP)的合作等方面的考虑还不够充分。为了提高通信公平性,我们提出了公平动态灵敏度和传输功率控制(fairDSTPC),该控制基于AP合作来调整CCAT和传输功率。通过在ap之间交换吞吐量和发送数据帧数等信息,改善了导致BSS吞吐量最差的通信环境。仿真结果表明,与现有方法和遗留系统相比,该方法取得了较好的效果。在开放空间场景中,我们的方法达到了比现有方法高两倍的5%文件下行吞吐量,同时保持了5%的文件上行吞吐量和总吞吐量。
{"title":"Improving of Fairness by Dynamic Sensitivity Control and Transmission Power Control with Access Point Cooperation in Dense WLAN","authors":"Koki Iwai, Takanobu Ohnuma, H. Shigeno, Yusuke Tanaka","doi":"10.1109/CCNC.2019.8651714","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651714","url":null,"abstract":"Wireless Local Area Networks (WLANs) have been deployed more densely according to high wireless demands. In a dense environment where a lot of stations (STAs) located closely, co-channel interference decreases system performance seriously. IEEE 802.11ax Task Group focuses on spatial reuse that utilizes finite frequency resources to address this problem. Although existing studies about spatial reuse have been discussed so far, interference from other basic service sets (BSSs) and cooperation with each access point (AP) have not been considered fully. To enhance communication fairness, we propose fair Dynamic Sensitivity and Transmission Power Control (fairDSTPC) that adjusts CCAT and transmission power based on AP cooperation. We improve communication environment of BSS which results in the worst throughput by exchanging information, such as throughput and number of sent data frames, between APs. Simulation results showed that our method achieved effectiveness compared with existing method and legacy system. In an open space scenario, our method reached approximately two times higher 5% ile downlink throughput than an existing method while maintaining 5% ile uplink throughput and aggregate throughput.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128100089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analyzing Latency and Dropping in Today’s Internet of Multimedia Things 分析当今多媒体物联网中的延迟和下降
Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651876
Maha Alaslani, B. Shihada
Internet of Multimedia Things (IoMT) applications such as real-time multimedia based security and monitoring in smart homes, hospitals, cities, and smart transportation management systems are of the most difficult systems to deploy. These services are highly time sensitive and require Quality of service (QoS) guarantees. QoS requirements are key factors that lead to variations of multimedia traffic quality and the Quality of Experience (QoE) for the end users. IoMT devices transmit measurements to a predefined IoMT application server subject to maximum QoS constraint. The delay and dropping are essential constraints as delayed packets are considered useless for the IoMT applications. Our objective is to obtain an approximate expression of the blocking probability due to either buffer overflow or violating certain end-to-end threshold. For this purpose, we employ M/G/1 framework for our network. We validate the proposed analytical model and demonstrate the blocking probability and end-to-end delay. We anticipate that our results are critical for optimizing IoMT network design and deployment.
多媒体物联网(IoMT)应用,如智能家居、医院、城市和智能交通管理系统中基于实时多媒体的安全和监控,是最难部署的系统。这些业务对时间高度敏感,需要QoS (Quality service)保证。QoS需求是导致多媒体流量质量和终端用户体验质量变化的关键因素。IoMT设备在最大QoS约束下将测量值传输到预定义的IoMT应用服务器。延迟和丢弃是必要的限制,因为延迟的数据包被认为对IoMT应用程序毫无用处。我们的目标是获得由于缓冲区溢出或违反某些端到端阈值而导致的阻塞概率的近似表达式。为此,我们的网络采用M/G/1框架。我们验证了所提出的分析模型,并演示了阻塞概率和端到端延迟。我们预计我们的结果对于优化IoMT网络设计和部署至关重要。
{"title":"Analyzing Latency and Dropping in Today’s Internet of Multimedia Things","authors":"Maha Alaslani, B. Shihada","doi":"10.1109/CCNC.2019.8651876","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651876","url":null,"abstract":"Internet of Multimedia Things (IoMT) applications such as real-time multimedia based security and monitoring in smart homes, hospitals, cities, and smart transportation management systems are of the most difficult systems to deploy. These services are highly time sensitive and require Quality of service (QoS) guarantees. QoS requirements are key factors that lead to variations of multimedia traffic quality and the Quality of Experience (QoE) for the end users. IoMT devices transmit measurements to a predefined IoMT application server subject to maximum QoS constraint. The delay and dropping are essential constraints as delayed packets are considered useless for the IoMT applications. Our objective is to obtain an approximate expression of the blocking probability due to either buffer overflow or violating certain end-to-end threshold. For this purpose, we employ M/G/1 framework for our network. We validate the proposed analytical model and demonstrate the blocking probability and end-to-end delay. We anticipate that our results are critical for optimizing IoMT network design and deployment.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132973525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1