首页 > 最新文献

2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)最新文献

英文 中文
Watch and be watched: Compromising all Smart TV generations 观看和被观看:危及所有智能电视一代
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866594
Benjamin Michéle, Andrew Karpow
Smart TVs are slowly becoming ubiquitous in households and offices, offering an ever-growing number of features such as Internet access, media players, and built-in cameras and microphones. They are physically placed in sensitive locations and connected to trusted home and business networks. These TVs use the same operating systems and software stacks as regular PCs, leaving them vulnerable to similar software-based attacks. Even worse, security updates are provided much less frequently and stop completely after the TV has reached end-of-life. Furthermore, as these systems are closed, it is nearly impossible for end users to examine if the TV is vulnerable or if it has been compromised. This paper demonstrates that Smart TVs in their current state must not be considered trustworthy and therefore pose a severe security and privacy threat. We show that the integrated media player - a feature offered on nearly every Smart TV on the market, ranging from entry level to high end models and regardless of the vendor - is highly vulnerable. We developed a practical proof-of-concept attack using a malicious video file that gives an attacker permanent, full control over the device, yet is completely undetectable by the user. Furthermore, we provide fully functional payloads for stealthily tapping into a TV's camera and microphone.
智能电视在家庭和办公室中逐渐普及,提供越来越多的功能,如互联网接入、媒体播放器、内置摄像头和麦克风。它们被物理放置在敏感位置,并连接到可信的家庭和商业网络。这些电视使用与普通个人电脑相同的操作系统和软件栈,使它们容易受到类似的基于软件的攻击。更糟糕的是,安全更新提供的频率要低得多,并且在电视寿命结束后完全停止。此外,由于这些系统是封闭的,最终用户几乎不可能检查电视是否易受攻击或是否已被破坏。本文论证了当前状态下的智能电视一定不能被认为是值得信赖的,因此构成了严重的安全和隐私威胁。我们的研究表明,集成媒体播放器——市场上几乎所有智能电视都有这个功能,从入门级到高端型号,无论厂商如何——是非常脆弱的。我们开发了一种实用的概念验证攻击,使用恶意视频文件,攻击者可以永久,完全控制设备,但用户完全无法检测到。此外,我们还提供了功能齐全的有效载荷,可以悄无声息地接入电视的摄像头和麦克风。
{"title":"Watch and be watched: Compromising all Smart TV generations","authors":"Benjamin Michéle, Andrew Karpow","doi":"10.1109/CCNC.2014.6866594","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866594","url":null,"abstract":"Smart TVs are slowly becoming ubiquitous in households and offices, offering an ever-growing number of features such as Internet access, media players, and built-in cameras and microphones. They are physically placed in sensitive locations and connected to trusted home and business networks. These TVs use the same operating systems and software stacks as regular PCs, leaving them vulnerable to similar software-based attacks. Even worse, security updates are provided much less frequently and stop completely after the TV has reached end-of-life. Furthermore, as these systems are closed, it is nearly impossible for end users to examine if the TV is vulnerable or if it has been compromised. This paper demonstrates that Smart TVs in their current state must not be considered trustworthy and therefore pose a severe security and privacy threat. We show that the integrated media player - a feature offered on nearly every Smart TV on the market, ranging from entry level to high end models and regardless of the vendor - is highly vulnerable. We developed a practical proof-of-concept attack using a malicious video file that gives an attacker permanent, full control over the device, yet is completely undetectable by the user. Furthermore, we provide fully functional payloads for stealthily tapping into a TV's camera and microphone.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"37 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133489339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
AgSec: Secure and efficient CDMA-based aggregation for smart metering systems AgSec:用于智能计量系统的安全高效的基于cdma的聚合
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866615
Navid Alamatsaz, Arash Boustani, Murtuza Jadliwala, V. Namboodiri
Security and privacy concerns in the future power grid have recently received tremendous focus from security advocates. Most existing security mechanisms utilize cryptographic techniques that are computationally expensive and bandwidth intensive. However, aggregating the large outputs of these cryptographic algorithms has not been considered thoroughly. Smart Grid Networks (SGN) generally have limitations on bandwidth, network capacity and energy. Hence, utilizing data aggregation algorithms, the limited bandwidth can be efficiently utilized. Most of the aggregation algorithms use statistical functions such as minimum, maximum, and average. before transmitting data over the network. Existing aggregation algorithms, in SGNs, are generally expensive in terms of communication overhead, processing load and delay. However, our proposed CDMA-based data aggregation method provides access to all the data of all the smart meters in the root node, which in this case is the Utility Center, while keeping the smart metering data secure. The efficiency of the proposed method is confirmed by mathematical analysis.
未来电网的安全和隐私问题最近受到了安全倡导者的极大关注。大多数现有的安全机制使用的加密技术在计算上是昂贵的,并且带宽密集。然而,聚合这些加密算法的大量输出并没有得到充分的考虑。智能电网通常在带宽、网络容量和能源方面存在限制。因此,利用数据聚合算法,可以有效地利用有限的带宽。大多数聚合算法使用最小值、最大值和平均值等统计函数。在通过网络传输数据之前。在sgn中,现有的聚合算法在通信开销、处理负载和延迟方面通常是昂贵的。然而,我们提出的基于cdma的数据聚合方法提供了对根节点(在本例中是公用事业中心)中所有智能电表的所有数据的访问,同时保证了智能电表数据的安全。数学分析证实了该方法的有效性。
{"title":"AgSec: Secure and efficient CDMA-based aggregation for smart metering systems","authors":"Navid Alamatsaz, Arash Boustani, Murtuza Jadliwala, V. Namboodiri","doi":"10.1109/CCNC.2014.6866615","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866615","url":null,"abstract":"Security and privacy concerns in the future power grid have recently received tremendous focus from security advocates. Most existing security mechanisms utilize cryptographic techniques that are computationally expensive and bandwidth intensive. However, aggregating the large outputs of these cryptographic algorithms has not been considered thoroughly. Smart Grid Networks (SGN) generally have limitations on bandwidth, network capacity and energy. Hence, utilizing data aggregation algorithms, the limited bandwidth can be efficiently utilized. Most of the aggregation algorithms use statistical functions such as minimum, maximum, and average. before transmitting data over the network. Existing aggregation algorithms, in SGNs, are generally expensive in terms of communication overhead, processing load and delay. However, our proposed CDMA-based data aggregation method provides access to all the data of all the smart meters in the root node, which in this case is the Utility Center, while keeping the smart metering data secure. The efficiency of the proposed method is confirmed by mathematical analysis.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Distributed data centric similarity storage scheme in wireless sensor network 无线传感器网络中以数据为中心的分布式相似度存储方案
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866633
K. Ahmed, M. Gregory
Due to the sensor hardware inaccuracy and deviation of environmental parameter, detection of imprecise data by sensor is very likely. Hence, similarity searching problem is receiving significant consideration and became an important problem to resolve. However, most of the state-of-the-art Data Centric Storage (DCS) Schemes lack optimization for similarity query of the events. This paper proposes a distributed metric based data centric similarity storage scheme (DMDCS). DMDCS takes the advantage of the idea of a vector index method, called iDistance and transforms the issue of similarity searching into the problem of interval search in one dimension. Experimental results show that DMDCS yields significant improvements on the efficiency of data querying compared with existing approaches.
由于传感器硬件的不精确和环境参数的偏差,传感器很可能检测到不精确的数据。因此,相似度搜索问题日益受到重视,成为亟待解决的重要问题。然而,大多数最先进的数据中心存储(DCS)方案缺乏对事件相似性查询的优化。提出了一种基于分布式度量的以数据为中心的相似度存储方案。DMDCS利用了一种称为iDistance的向量索引方法的思想,将相似性搜索问题转化为一维的区间搜索问题。实验结果表明,与现有方法相比,DMDCS在数据查询效率上有显著提高。
{"title":"Distributed data centric similarity storage scheme in wireless sensor network","authors":"K. Ahmed, M. Gregory","doi":"10.1109/CCNC.2014.6866633","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866633","url":null,"abstract":"Due to the sensor hardware inaccuracy and deviation of environmental parameter, detection of imprecise data by sensor is very likely. Hence, similarity searching problem is receiving significant consideration and became an important problem to resolve. However, most of the state-of-the-art Data Centric Storage (DCS) Schemes lack optimization for similarity query of the events. This paper proposes a distributed metric based data centric similarity storage scheme (DMDCS). DMDCS takes the advantage of the idea of a vector index method, called iDistance and transforms the issue of similarity searching into the problem of interval search in one dimension. Experimental results show that DMDCS yields significant improvements on the efficiency of data querying compared with existing approaches.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125822174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A study of SSL Proxy attacks on Android and iOS mobile applications Android和iOS移动应用的SSL代理攻击研究
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866553
John Hubbard, Ken Weimer, Yu Chen
According to recent articles in popular technology websites, some mobile applications function in an insecure manner when presented with untrusted SSL certificates. These non-browser based applications seem to, in the absence of a standard way of alerting a user of an SSL error, accept any certificate presented to it. This paper intends to research these claims and show whether or not an invisible proxy based SSL attack can indeed steal user's credentials from mobile applications, and which types applications are most likely to be vulnerable to this attack vector. To ensure coverage of the most popular platforms, applications on both Android 4.2 and iOS 6 are tested. The results of our study showed that stealing credentials is indeed possible using invisible proxy man in the middle attacks.
根据流行技术网站上最近的文章,当提供不受信任的SSL证书时,一些移动应用程序以不安全的方式运行。这些非基于浏览器的应用程序似乎在缺乏提醒用户SSL错误的标准方法的情况下,接受提供给它的任何证书。本文打算研究这些说法,并展示基于不可见代理的SSL攻击是否确实可以从移动应用程序窃取用户的凭据,以及哪种类型的应用程序最容易受到这种攻击向量的攻击。为了确保覆盖最流行的平台,应用程序在Android 4.2和iOS 6上都进行了测试。我们的研究结果表明,使用中间隐形代理攻击窃取凭证确实是可能的。
{"title":"A study of SSL Proxy attacks on Android and iOS mobile applications","authors":"John Hubbard, Ken Weimer, Yu Chen","doi":"10.1109/CCNC.2014.6866553","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866553","url":null,"abstract":"According to recent articles in popular technology websites, some mobile applications function in an insecure manner when presented with untrusted SSL certificates. These non-browser based applications seem to, in the absence of a standard way of alerting a user of an SSL error, accept any certificate presented to it. This paper intends to research these claims and show whether or not an invisible proxy based SSL attack can indeed steal user's credentials from mobile applications, and which types applications are most likely to be vulnerable to this attack vector. To ensure coverage of the most popular platforms, applications on both Android 4.2 and iOS 6 are tested. The results of our study showed that stealing credentials is indeed possible using invisible proxy man in the middle attacks.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126795253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
OpenFlow-based Proxy mobile IPv6 over software defined network (SDN) 基于openflow的代理移动IPv6软件定义网络(SDN)
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866558
Seong-Mun Kim, Hyon-Young Choi, Pill-Won Park, Sung-Gi Min, Youn-Hee Han
Software Defined Network (SDN) is widely deployed by using OpenFlow protocol for the implementation of flexible networking. A lot of researches are progressing to adapt OpenFlow to existing network architectures. PMIPv6 is proposed to handle the network-based local mobility using IP tunneling. However, it has some weak points such as IP tunneling overhead and sharing same path for the data and the control planes. In this paper, we propose OpenFlow-based Proxy Mobile IPv6 (PMIPv6) to obtain the advantages of the OpenFlow architecture for PMIPv6 network. The proposed scheme separates the mobility management function from the components of PMIPv6. It preserves the functionalities and messages defined in PMIPv6 but reconstructs components to take the advantages offered by the OpenFlow architecture. The reconstructed components set the flow table of switches located in the path as the controller of OpenFlow. The proposed scheme removes the tunneling to forward user traffic and separates the data and the control planes. OpenFlow-based PMIPv6 offers more flexible deployment architecture.
软件定义网络SDN (Software Defined Network)被广泛部署,采用OpenFlow协议实现灵活的组网。为了使OpenFlow适应现有的网络架构,许多研究正在进行中。提出了PMIPv6协议,利用IP隧道来处理基于网络的本地移动。然而,它有一些弱点,如IP隧道开销和数据和控制平面共享相同的路径。在本文中,我们提出了基于OpenFlow的代理移动IPv6 (Proxy Mobile IPv6, PMIPv6),以获得OpenFlow架构在PMIPv6网络中的优势。该方案将移动管理功能从PMIPv6的组件中分离出来。它保留了PMIPv6中定义的功能和消息,但重构了组件以利用OpenFlow体系结构提供的优势。重构组件将位于路径中的交换机流表作为OpenFlow的控制器。该方案消除了转发用户流量的隧道,并将数据平面和控制平面分开。基于openflow的PMIPv6提供了更灵活的部署架构。
{"title":"OpenFlow-based Proxy mobile IPv6 over software defined network (SDN)","authors":"Seong-Mun Kim, Hyon-Young Choi, Pill-Won Park, Sung-Gi Min, Youn-Hee Han","doi":"10.1109/CCNC.2014.6866558","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866558","url":null,"abstract":"Software Defined Network (SDN) is widely deployed by using OpenFlow protocol for the implementation of flexible networking. A lot of researches are progressing to adapt OpenFlow to existing network architectures. PMIPv6 is proposed to handle the network-based local mobility using IP tunneling. However, it has some weak points such as IP tunneling overhead and sharing same path for the data and the control planes. In this paper, we propose OpenFlow-based Proxy Mobile IPv6 (PMIPv6) to obtain the advantages of the OpenFlow architecture for PMIPv6 network. The proposed scheme separates the mobility management function from the components of PMIPv6. It preserves the functionalities and messages defined in PMIPv6 but reconstructs components to take the advantages offered by the OpenFlow architecture. The reconstructed components set the flow table of switches located in the path as the controller of OpenFlow. The proposed scheme removes the tunneling to forward user traffic and separates the data and the control planes. OpenFlow-based PMIPv6 offers more flexible deployment architecture.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124490165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
SCTP-C2: Cross-layer Cognitive SCTP for multimedia streaming over multi-homed wireless networks 跨层认知SCTP用于多家庭无线网络上的多媒体流
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866576
Yuanlong Cao, Changqiao Xu, Jianfeng Guan, Hongke Zhang
Stream Control Transport Protocol (SCTP)-based multimedia streaming has gained variety of attentions and resulted in many peer-reviewed publications. However, there is no MAC-SCTP cross-layer path switching strategy appropriate for wireless networking, where wireless error tends to occur frequently due to the intrinsic wireless link characteristics. As a remedy, we in this paper propose a novel Cross-layer Cognitive SCTP (SCTP-C2) for efficient multimedia data delivery by jointly considering the characteristics of MAC layer and transport layer. A Cross-layer Path Switching Trigger (CPST) is designed in SCTP-C2 to improve the efficiency of the path switching mechanism and further provide an optimal congestion window (cwnd) fast recovery scheme after path switching. A Congestion-aware Multimedia Data Distributor (CMDD) is introduced in SCTP-C2 to overcome a "hot-potato" congestion problem and enable an optimal transmission behavior by identifying network congestion. The results gained by a close realistic simulation topology show that how SCTP-C2 outperforms existing SCTP protocol in terms of consumers' experience of quality for multimedia streaming service.
基于流控制传输协议(SCTP)的多媒体流已经引起了人们的广泛关注,并发表了许多同行评议的论文。然而,目前还没有适合无线网络的MAC-SCTP跨层路径交换策略,无线网络由于其固有的无线链路特性,往往会频繁出现无线错误。为此,我们结合MAC层和传输层的特点,提出了一种新的跨层认知SCTP (SCTP- c2),以实现高效的多媒体数据传输。在SCTP-C2中设计了一个跨层路径交换触发器(CPST),以提高路径交换机制的效率,并进一步提供路径交换后的最佳拥塞窗口(cwnd)快速恢复方案。在scp - c2中引入了一个感知拥塞的多媒体数据分发器(CMDD),以克服“棘手的”拥塞问题,并通过识别网络拥塞实现最佳传输行为。仿真结果表明,SCTP- c2在用户体验多媒体流媒体服务质量方面优于现有的SCTP协议。
{"title":"SCTP-C2: Cross-layer Cognitive SCTP for multimedia streaming over multi-homed wireless networks","authors":"Yuanlong Cao, Changqiao Xu, Jianfeng Guan, Hongke Zhang","doi":"10.1109/CCNC.2014.6866576","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866576","url":null,"abstract":"Stream Control Transport Protocol (SCTP)-based multimedia streaming has gained variety of attentions and resulted in many peer-reviewed publications. However, there is no MAC-SCTP cross-layer path switching strategy appropriate for wireless networking, where wireless error tends to occur frequently due to the intrinsic wireless link characteristics. As a remedy, we in this paper propose a novel Cross-layer Cognitive SCTP (SCTP-C2) for efficient multimedia data delivery by jointly considering the characteristics of MAC layer and transport layer. A Cross-layer Path Switching Trigger (CPST) is designed in SCTP-C2 to improve the efficiency of the path switching mechanism and further provide an optimal congestion window (cwnd) fast recovery scheme after path switching. A Congestion-aware Multimedia Data Distributor (CMDD) is introduced in SCTP-C2 to overcome a \"hot-potato\" congestion problem and enable an optimal transmission behavior by identifying network congestion. The results gained by a close realistic simulation topology show that how SCTP-C2 outperforms existing SCTP protocol in terms of consumers' experience of quality for multimedia streaming service.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Nash bargaining solution based user association optimization in HetNets 基于HetNets用户关联优化的纳什议价方案
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866631
Dantong Liu, Yue Chen, K. K. Chai, Tiankui Zhang
In this paper, a fair user association scheme is proposed for heterogeneous networks (HetNets), where the user association optimization is formulated as a Nash bargaining problem. The optimization objective is to maximize the sum of rate related utility, under users' minimal rate constrains, while considering user fairness and load balance between cells in different tiers. Nash bargaining solution and coalition are adopted to solve this optimization problem. Firstly, a two-player bargaining scheme is developed for two base stations (BSs) to bargain user association. Then this two-player scheme is extended to a multi-player bargaining scheme with the aid of Hungarian algorithm that optimally groups BSs into pairs. Simulation results show that the proposed scheme can effectively offload users from macrocells, improve user fairness, and also achieve comparable sum rate to the scheme that maximizes the sum rate without considering user fairness.
本文提出了一种异构网络(HetNets)的公平用户关联方案,其中用户关联优化被描述为纳什议价问题。优化目标是在用户最小速率约束下,考虑用户公平性和不同层单元间的负载均衡,使速率相关效用总和最大化。采用纳什议价方案和联盟方案求解该优化问题。首先,提出了一种针对两个基站进行用户关联议价的双机议价方案。然后利用匈牙利算法将该二人方案扩展为多人议价方案,该算法将BSs最优分组成对。仿真结果表明,该方案可以有效地将用户从宏单元中剥离出来,提高用户公平性,并且与不考虑用户公平性的最大化和率方案相比,可以获得相当的和率。
{"title":"Nash bargaining solution based user association optimization in HetNets","authors":"Dantong Liu, Yue Chen, K. K. Chai, Tiankui Zhang","doi":"10.1109/CCNC.2014.6866631","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866631","url":null,"abstract":"In this paper, a fair user association scheme is proposed for heterogeneous networks (HetNets), where the user association optimization is formulated as a Nash bargaining problem. The optimization objective is to maximize the sum of rate related utility, under users' minimal rate constrains, while considering user fairness and load balance between cells in different tiers. Nash bargaining solution and coalition are adopted to solve this optimization problem. Firstly, a two-player bargaining scheme is developed for two base stations (BSs) to bargain user association. Then this two-player scheme is extended to a multi-player bargaining scheme with the aid of Hungarian algorithm that optimally groups BSs into pairs. Simulation results show that the proposed scheme can effectively offload users from macrocells, improve user fairness, and also achieve comparable sum rate to the scheme that maximizes the sum rate without considering user fairness.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134537704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Smart Grid in radio access networks (SG-RAN): Smart energy management at cell-sites 无线接入网络中的智能电网(SG-RAN):蜂窝站点的智能能源管理
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866546
Ying Li, Jianzhong Zhang, Mian Dong
In this paper, we research on an interdisciplinary field of how the Smart Grid can help energy cost reduction in wireless communications. We study how the advances in the Smart Grid such as the information on predicted electricity price can be used to help reduce the energy cost of the cellular networks. Particularly, smart energy management at cell-sites is studied to minimize the electricity cost for mobile operators by leveraging time-varying electricity prices in the Smart Grid. We first propose a theoretical framework to optimally manage energy at a single cell-site (without and with energy harvester, respectively) by judiciously choosing which power source (the Power-Grid or a storage-battery) to use, when and how much to use in the cell-site; as well as controlling when and how much to charge the storage-battery. Moreover, we extend the framework from a single cell-site to a network including multiple cell-sites with different electricity prices or energy storage capacity, etc., where cell association, power control, and scheduling can be jointly considered to provide load shifting and cell ON/OFF to achieve mobile network operation with the lowest electricity cost.
在本文中,我们研究了一个跨学科领域的智能电网如何帮助降低无线通信的能源成本。我们研究了智能电网的进步,如预测电价的信息可以用来帮助降低蜂窝网络的能源成本。特别地,研究了蜂窝站点的智能能源管理,通过利用智能电网中的时变电价,使移动运营商的电力成本最小化。我们首先提出了一个理论框架,通过明智地选择使用哪种电源(电网或蓄电池),何时以及在蜂窝站点使用多少,来优化管理单个蜂窝站点的能量(分别是无能量收集器和有能量收集器);以及控制何时给蓄电池充电和充电多少。此外,我们将框架从单个蜂窝站点扩展到包含多个具有不同电价或储能容量等的蜂窝站点的网络,其中可以共同考虑蜂窝关联,功率控制和调度,以提供负载转移和蜂窝开/关,以实现最低的电力成本的移动网络运行。
{"title":"Smart Grid in radio access networks (SG-RAN): Smart energy management at cell-sites","authors":"Ying Li, Jianzhong Zhang, Mian Dong","doi":"10.1109/CCNC.2014.6866546","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866546","url":null,"abstract":"In this paper, we research on an interdisciplinary field of how the Smart Grid can help energy cost reduction in wireless communications. We study how the advances in the Smart Grid such as the information on predicted electricity price can be used to help reduce the energy cost of the cellular networks. Particularly, smart energy management at cell-sites is studied to minimize the electricity cost for mobile operators by leveraging time-varying electricity prices in the Smart Grid. We first propose a theoretical framework to optimally manage energy at a single cell-site (without and with energy harvester, respectively) by judiciously choosing which power source (the Power-Grid or a storage-battery) to use, when and how much to use in the cell-site; as well as controlling when and how much to charge the storage-battery. Moreover, we extend the framework from a single cell-site to a network including multiple cell-sites with different electricity prices or energy storage capacity, etc., where cell association, power control, and scheduling can be jointly considered to provide load shifting and cell ON/OFF to achieve mobile network operation with the lowest electricity cost.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131122057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AHP and game theory based approach for network selection in heterogeneous wireless networks 基于AHP和博弈论的异构无线网络网络选择方法
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866617
Bin Liu, Hui Tian, Bin Wang, Bo Fan
Due to the lack of spectrum resources in wireless networks, to efficiently make use of the existing heterogeneous wireless networks is of significant importance. Network selection mechanism plays an important role for mobile users to target a network under the principle “always best connected (ABC)” in heterogeneous wireless environment. In this paper, a novel approach for network selection based on the combination of analytic hierarchy process (AHP) and bankruptcy game which is a special type of an N-person cooperative game is proposed and investigated. The AHP method takes the responsibility of evaluating weights of multiple decision criteria, which depends more on the consideration from the user side. On the other hand, the bankruptcy game is mainly used to assess the potentials of available candidate networks. Finally, the combination of AHP and bankruptcy game evaluates the potential contribution ratio (PCR) of each candidate network and the network with the largest PCR is selected.
由于无线网络频谱资源的缺乏,有效利用现有的异构无线网络具有重要意义。在异构无线环境下,网络选择机制对移动用户在“始终最佳连接”原则下选择网络起着重要作用。本文提出并研究了一种基于层次分析法(AHP)和破产博弈(n人合作博弈的一种特殊类型)相结合的网络选择新方法。AHP方法承担了多个决策准则的权重评估责任,更多地依赖于用户方面的考虑。另一方面,破产博弈主要用于评估可用候选网络的潜力。最后,结合AHP和破产博弈对各候选网络的潜在贡献比(PCR)进行评估,选择PCR最大的网络。
{"title":"AHP and game theory based approach for network selection in heterogeneous wireless networks","authors":"Bin Liu, Hui Tian, Bin Wang, Bo Fan","doi":"10.1109/CCNC.2014.6866617","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866617","url":null,"abstract":"Due to the lack of spectrum resources in wireless networks, to efficiently make use of the existing heterogeneous wireless networks is of significant importance. Network selection mechanism plays an important role for mobile users to target a network under the principle “always best connected (ABC)” in heterogeneous wireless environment. In this paper, a novel approach for network selection based on the combination of analytic hierarchy process (AHP) and bankruptcy game which is a special type of an N-person cooperative game is proposed and investigated. The AHP method takes the responsibility of evaluating weights of multiple decision criteria, which depends more on the consideration from the user side. On the other hand, the bankruptcy game is mainly used to assess the potentials of available candidate networks. Finally, the combination of AHP and bankruptcy game evaluates the potential contribution ratio (PCR) of each candidate network and the network with the largest PCR is selected.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133309492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Resilient mesh-tree overlay for differentiated temporal requirement service in P2P streaming P2P流中差异化时间需求服务的弹性网格树覆盖
Pub Date : 2014-07-28 DOI: 10.1109/CCNC.2014.6866587
Jiaming Li, C. Yeo, I. Soon
Robustness is an important issue in tree based P2P streaming applications. In this paper, a new criterion to evaluate robustness is proposed. The criterion is derived from examining the weakest link of stream sources serving a peer. The quality of connection is defined as how complementary the connection is to the other existing connections in order to improve the completeness of the downloading stream as well as the backup copies. Peers can thus find better connection combination and experience the best stream quality and backup robustness from the existing connections. The collective maximization of robustness among peers rather than maximization of a peer's own resource alleviates the contention for resources, and helps the peers to reasonably allocate and utilize the limited network resources. Simulation results show marked performance improvement over other related proposals in terms of stream quality, speed of recovery from failure and ability to respond quickly to changing overlay and network dynamics.
鲁棒性是基于树的P2P流媒体应用的一个重要问题。本文提出了一种新的鲁棒性评价准则。该标准是通过检查为对等体提供服务的流源的最薄弱环节得出的。连接的质量定义为该连接与其他现有连接的互补程度,以提高下载流和备份副本的完整性。对等体可以从现有的连接中找到更好的连接组合,体验到最好的流质量和备份鲁棒性。对等体之间鲁棒性的集体最大化,而不是对等体自身资源的最大化,缓解了对资源的争夺,有助于对等体合理分配和利用有限的网络资源。仿真结果表明,与其他相关方案相比,该方案在流质量、故障恢复速度以及快速响应覆盖层和网络动态变化的能力方面有了显著的性能改进。
{"title":"Resilient mesh-tree overlay for differentiated temporal requirement service in P2P streaming","authors":"Jiaming Li, C. Yeo, I. Soon","doi":"10.1109/CCNC.2014.6866587","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6866587","url":null,"abstract":"Robustness is an important issue in tree based P2P streaming applications. In this paper, a new criterion to evaluate robustness is proposed. The criterion is derived from examining the weakest link of stream sources serving a peer. The quality of connection is defined as how complementary the connection is to the other existing connections in order to improve the completeness of the downloading stream as well as the backup copies. Peers can thus find better connection combination and experience the best stream quality and backup robustness from the existing connections. The collective maximization of robustness among peers rather than maximization of a peer's own resource alleviates the contention for resources, and helps the peers to reasonably allocate and utilize the limited network resources. Simulation results show marked performance improvement over other related proposals in terms of stream quality, speed of recovery from failure and ability to respond quickly to changing overlay and network dynamics.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122305368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1