首页 > 最新文献

2016 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
Analysis and characterisation of botnet scan traffic 僵尸网络扫描流量的分析与表征
Pub Date : 2016-02-15 DOI: 10.1109/ICCNC.2016.7440627
Angelos K. Marnerides, A. Mauthe
Botnets compose a major source of malicious activity over a network and their early identification and detection is considered as a top priority by security experts. The majority of botmasters rely heavily on a scan procedure in order to detect vulnerable hosts and establish their botnets via a command and control (C&C) server. In this paper we examine the statistical characteristics of the scan process invoked by the Mariposa and Zeus botnets and demonstrate the applicability of conditional entropy as a robust metric for profiling it using real pre-captured operational data. Our analysis conducted on real datasets demonstrates that the distributional behaviour of conditional entropy for Mariposa and Zeus-related scan flows differs significantly from flows manifested by the commonly used NMAP scans. In contrast with the typically used by attackers Stealth and Connect NMAP scans, we show that consecutive scanning flows initiated by the C&C servers of the examined botnets exhibit a high dependency between themselves in regards of their conditional entropy. Thus, we argue that the observation of such scan flows under our proposed scheme can sufficiently aid network security experts towards the adequate profiling and early identification of botnet activity.
僵尸网络构成了网络上恶意活动的主要来源,安全专家认为其早期识别和检测是重中之重。大多数僵尸主机严重依赖扫描过程来检测易受攻击的主机,并通过命令和控制(C&C)服务器建立僵尸网络。在本文中,我们研究了Mariposa和Zeus僵尸网络调用的扫描过程的统计特征,并证明了条件熵作为使用真实预捕获的操作数据进行分析的鲁棒度量的适用性。我们对真实数据集进行的分析表明,Mariposa和zeus相关扫描流的条件熵分布行为与常用的NMAP扫描所显示的流有很大不同。与攻击者通常使用的隐身和连接NMAP扫描相比,我们表明,由被检查僵尸网络的C&C服务器发起的连续扫描流在条件熵方面表现出高度依赖性。因此,我们认为在我们提出的方案下观察这种扫描流可以充分帮助网络安全专家对僵尸网络活动进行充分的分析和早期识别。
{"title":"Analysis and characterisation of botnet scan traffic","authors":"Angelos K. Marnerides, A. Mauthe","doi":"10.1109/ICCNC.2016.7440627","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440627","url":null,"abstract":"Botnets compose a major source of malicious activity over a network and their early identification and detection is considered as a top priority by security experts. The majority of botmasters rely heavily on a scan procedure in order to detect vulnerable hosts and establish their botnets via a command and control (C&C) server. In this paper we examine the statistical characteristics of the scan process invoked by the Mariposa and Zeus botnets and demonstrate the applicability of conditional entropy as a robust metric for profiling it using real pre-captured operational data. Our analysis conducted on real datasets demonstrates that the distributional behaviour of conditional entropy for Mariposa and Zeus-related scan flows differs significantly from flows manifested by the commonly used NMAP scans. In contrast with the typically used by attackers Stealth and Connect NMAP scans, we show that consecutive scanning flows initiated by the C&C servers of the examined botnets exhibit a high dependency between themselves in regards of their conditional entropy. Thus, we argue that the observation of such scan flows under our proposed scheme can sufficiently aid network security experts towards the adequate profiling and early identification of botnet activity.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115681792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance evaluation for multi-antenna vehicular communication based on IEEE 802.11p standard 基于IEEE 802.11p标准的多天线车载通信性能评价
Pub Date : 2016-02-15 DOI: 10.1109/ICCNC.2016.7440592
Shuangshuang Han, Kai Zhao, Liuqing Yang, Xiang Cheng
Multi-input multi-output (MEMO) has been a promising technique for wireless communication areas, such as intelligent transportation systems. In this paper, we present performance evaluation of a multi-antenna transceiver for Wireless Access in Vehicular Environments (WAVE) according to IEEE 802.11p standard. Herein, MIMO WAVE is performed by employing three MIMO schemes, namely, Alamouti, vertical BLAST (V-BLAST) and space shift keying (SSK) scheme. The above three MIMO schemes are discussed and compared, considering the influence of different driving velocity and with/without line of sight (LOS) on the system performance. Based on the analysis and simulation results, it can be found that compared with single antenna systems, V-BLAST scheme would significantly increase the transmission data rate, while Alamouti and SSK scheme could improve the reliability and robustness even under poor receive conditions.
多输入多输出(MEMO)技术在智能交通系统等无线通信领域已成为一种很有前途的技术。本文提出了一种基于IEEE 802.11p标准的车载无线接入(WAVE)多天线收发器的性能评估。本文采用三种MIMO方案进行MIMO WAVE,即Alamouti、垂直BLAST (V-BLAST)和空间移位键控(SSK)方案。考虑不同驱动速度和有无视距对系统性能的影响,对上述三种MIMO方案进行了讨论和比较。通过分析和仿真结果可以发现,与单天线系统相比,V-BLAST方案可以显著提高传输数据速率,而Alamouti和SSK方案即使在接收条件较差的情况下也可以提高可靠性和鲁棒性。
{"title":"Performance evaluation for multi-antenna vehicular communication based on IEEE 802.11p standard","authors":"Shuangshuang Han, Kai Zhao, Liuqing Yang, Xiang Cheng","doi":"10.1109/ICCNC.2016.7440592","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440592","url":null,"abstract":"Multi-input multi-output (MEMO) has been a promising technique for wireless communication areas, such as intelligent transportation systems. In this paper, we present performance evaluation of a multi-antenna transceiver for Wireless Access in Vehicular Environments (WAVE) according to IEEE 802.11p standard. Herein, MIMO WAVE is performed by employing three MIMO schemes, namely, Alamouti, vertical BLAST (V-BLAST) and space shift keying (SSK) scheme. The above three MIMO schemes are discussed and compared, considering the influence of different driving velocity and with/without line of sight (LOS) on the system performance. Based on the analysis and simulation results, it can be found that compared with single antenna systems, V-BLAST scheme would significantly increase the transmission data rate, while Alamouti and SSK scheme could improve the reliability and robustness even under poor receive conditions.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Echo decomposition based time delay sensor with sub-sample resolution 基于回波分解的亚样本分辨率时延传感器
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440608
S. Bettadapura, A. Beex
Time-delay estimation (TDE) sensors can be used to effectively locate a transmitting source. Our aim is to use distributed TDE sensors that are relatively inexpensive. The latter is the result of two constraints: a single analog to digital converter is used for sampling the sum of two sensor output signals, and the sampling interval is substantially larger than the practically required time delay resolution. This approach leads to the requirement for sub-sample interval delay estimation from overlapping different echoes of a received signal. No specific a priori assumptions are made regarding the nature of the received signal. We adapt the time-frequency ratio of mixtures (TFRM) approach for blind source separation for our TDE sensor. Our experimental set-up consists of two microphones placed at non-equal distances from an acoustic source. The TDEs are then used for source localization.
时延估计(TDE)传感器可以用来有效地定位发射源。我们的目标是使用相对便宜的分布式TDE传感器。后者是两个约束的结果:使用单个模数转换器对两个传感器输出信号的总和进行采样,采样间隔大大大于实际所需的时间延迟分辨率。这种方法导致需要对接收信号的重叠不同回波进行子样本间隔延迟估计。对于接收到的信号的性质,没有作出具体的先验假设。我们将混合时频比(TFRM)方法应用于TDE传感器的盲源分离。我们的实验装置由两个麦克风组成,它们与声源的距离不等。然后将tde用于源定位。
{"title":"Echo decomposition based time delay sensor with sub-sample resolution","authors":"S. Bettadapura, A. Beex","doi":"10.1109/ICCNC.2016.7440608","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440608","url":null,"abstract":"Time-delay estimation (TDE) sensors can be used to effectively locate a transmitting source. Our aim is to use distributed TDE sensors that are relatively inexpensive. The latter is the result of two constraints: a single analog to digital converter is used for sampling the sum of two sensor output signals, and the sampling interval is substantially larger than the practically required time delay resolution. This approach leads to the requirement for sub-sample interval delay estimation from overlapping different echoes of a received signal. No specific a priori assumptions are made regarding the nature of the received signal. We adapt the time-frequency ratio of mixtures (TFRM) approach for blind source separation for our TDE sensor. Our experimental set-up consists of two microphones placed at non-equal distances from an acoustic source. The TDEs are then used for source localization.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117235802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the scalability and effectiveness of a cache pollution based DoS attack in information centric networks 信息中心网络中基于缓存污染的DoS攻击的可扩展性和有效性研究
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440666
Jeffery Gouge, A. Seetharam, Swapnoneel Roy
With the exponential growth of content, the Internet is undergoing a transformation from a host-centric approach to a content-centric one, popularly known as an Information Centric Networks (ICN). ICN aims to improve user performance by incorporating in-network caching at storage enabled nodes. In this paper, we explore the scalability and effectiveness of a targeted denial of service attack (DoS) designed for ICN [1]. In this attack, malicious nodes periodically request unpopular content, thereby replacing popular content in the caches enroute to the custodian with unpopular ones. The intuition behind this attack is that legitimate requests for the evicted content cannot be served from enroute caches and have to be forwarded towards the custodian, thus degrading user performance. Our goal in this paper is not to propose a sophisticated attack, but to investigate the scalability and potency of this brute force attack in ICN. By performing exhaustive and rigorous experimentation on realistic Internet topologies, and by exploring a wide range of simulation parameters we observe the following: (i) this attack is moderately successful in small scale networks comprising of less than 100 nodes, (ii) the potency of the attack rapidly decreases, and becomes ineffective as the network size increases to few thousand nodes, and (iii) the attack is more effective against a FIFO caching policy in comparison to LRU. Our results demonstrate that if the entire Internet or large MANETs are transformed into an ICN, this attack is likely to be unsuccessful.
随着内容的指数级增长,Internet正在经历从以主机为中心的方法向以内容为中心的方法的转变,这种转变通常被称为信息中心网络(Information Centric Networks, ICN)。ICN旨在通过在启用存储的节点上合并网络内缓存来提高用户性能。在本文中,我们探讨了针对ICN设计的定向拒绝服务攻击(DoS)的可扩展性和有效性[1]。在这种攻击中,恶意节点定期请求不受欢迎的内容,从而用不受欢迎的内容替换缓存中的热门内容。这种攻击背后的直觉是,对被驱逐内容的合法请求不能从路由缓存中得到服务,而必须转发给托管,从而降低了用户性能。我们在本文中的目标不是提出一个复杂的攻击,而是研究这种蛮力攻击在ICN中的可扩展性和效力。通过对现实的互联网拓扑进行详尽而严格的实验,并通过探索广泛的模拟参数,我们观察到以下情况:(i)这种攻击在由少于100个节点组成的小规模网络中是中等成功的,(ii)攻击的有效性迅速降低,并且随着网络规模增加到几千个节点而变得无效,(iii)与LRU相比,攻击对FIFO缓存策略更有效。我们的研究结果表明,如果将整个互联网或大型manet转换为ICN,则这种攻击可能会失败。
{"title":"On the scalability and effectiveness of a cache pollution based DoS attack in information centric networks","authors":"Jeffery Gouge, A. Seetharam, Swapnoneel Roy","doi":"10.1109/ICCNC.2016.7440666","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440666","url":null,"abstract":"With the exponential growth of content, the Internet is undergoing a transformation from a host-centric approach to a content-centric one, popularly known as an Information Centric Networks (ICN). ICN aims to improve user performance by incorporating in-network caching at storage enabled nodes. In this paper, we explore the scalability and effectiveness of a targeted denial of service attack (DoS) designed for ICN [1]. In this attack, malicious nodes periodically request unpopular content, thereby replacing popular content in the caches enroute to the custodian with unpopular ones. The intuition behind this attack is that legitimate requests for the evicted content cannot be served from enroute caches and have to be forwarded towards the custodian, thus degrading user performance. Our goal in this paper is not to propose a sophisticated attack, but to investigate the scalability and potency of this brute force attack in ICN. By performing exhaustive and rigorous experimentation on realistic Internet topologies, and by exploring a wide range of simulation parameters we observe the following: (i) this attack is moderately successful in small scale networks comprising of less than 100 nodes, (ii) the potency of the attack rapidly decreases, and becomes ineffective as the network size increases to few thousand nodes, and (iii) the attack is more effective against a FIFO caching policy in comparison to LRU. Our results demonstrate that if the entire Internet or large MANETs are transformed into an ICN, this attack is likely to be unsuccessful.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A new highly accurate workload model for campus email traffic 一个新的高精度校园电子邮件流量工作负载模型
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440639
Spyros Boukoros, Athina Kalampogia, P. Koutsakis
E-mail has become a de-facto means of communication. Mail servers try to manage the explosive growth of e-mail usage and offer users good quality of service, while spam e-mails are expected to account for 90% of the e-mail traffic. The exceedingly heavy workload can lead to the replacement of existing e-mail servers due to their inability to cope with performance standards and storing capacity. In this study, we focus on modeling the workload of the email servers of a medium-sized Greek university, for all types of traffic (user and system e-mails, as well as spam). We collected a vast amount of e-mail logs with high variations in terms of size and volume over time. We tested some of the most popular distributions for workload characterization and used powerful statistical tests to evaluate our findings. Interestingly we come to different conclusions in comparison with previous works in the field. Our work indicates that, with the exception of some outliers, campus email traffic can be modeled and predicted quite accurately.
电子邮件已经成为一种事实上的通信手段。邮件服务器试图管理电子邮件使用的爆炸性增长,并为用户提供高质量的服务,而垃圾邮件预计将占电子邮件流量的90%。由于现有的电子邮件服务器无法满足性能标准和存储容量,非常繁重的工作负载可能导致更换现有的电子邮件服务器。在本研究中,我们重点对希腊一所中等规模大学的电子邮件服务器的工作负载进行建模,包括所有类型的流量(用户和系统电子邮件,以及垃圾邮件)。我们收集了大量的电子邮件日志,随着时间的推移,它们的大小和数量变化很大。我们测试了一些最流行的分布来描述工作负载,并使用强大的统计测试来评估我们的发现。有趣的是,我们得出的结论与该领域以前的研究结果不同。我们的工作表明,除了一些异常值,校园电子邮件流量可以非常准确地建模和预测。
{"title":"A new highly accurate workload model for campus email traffic","authors":"Spyros Boukoros, Athina Kalampogia, P. Koutsakis","doi":"10.1109/ICCNC.2016.7440639","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440639","url":null,"abstract":"E-mail has become a de-facto means of communication. Mail servers try to manage the explosive growth of e-mail usage and offer users good quality of service, while spam e-mails are expected to account for 90% of the e-mail traffic. The exceedingly heavy workload can lead to the replacement of existing e-mail servers due to their inability to cope with performance standards and storing capacity. In this study, we focus on modeling the workload of the email servers of a medium-sized Greek university, for all types of traffic (user and system e-mails, as well as spam). We collected a vast amount of e-mail logs with high variations in terms of size and volume over time. We tested some of the most popular distributions for workload characterization and used powerful statistical tests to evaluate our findings. Interestingly we come to different conclusions in comparison with previous works in the field. Our work indicates that, with the exception of some outliers, campus email traffic can be modeled and predicted quite accurately.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116042052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Characteristic time based routing in information centric networks 信息中心网络中基于特征时间的路由
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440574
Bitan Bandyopadhyay, A. Seetharam, A. Mukherjee, M. K. Naskar
Information centric networking (ICN) aims to transform today's Internet from a host-centric model to a content-centric one by caching content internally within the network at storage-enabled nodes. Recently, multiple routing and cache management strategies have been proposed [1]-[6] to improve the user-level performance (e.g., content-download latency) in ICN. In this paper, we propose a simple routing strategy that leverages the concept of characteristic time to improve content-download latency. Characteristic time for a content in a cache indicates the amount of time in future a recently accessed content is likely to remain in that cache. Our proposed algorithm (CTR) uses characteristic time information to forward requests to caches where the content is likely to be found. CTR augments native routing strategies (e.g., Dijkstra's algorithm), works with existing cache management policies and thus can be implemented in ICN prototypes with minimal effort. We perform exhaustive simulations using realistic Internet topologies (e.g., GEANT, WIDE, TISCALI, ROCKETFUEL [7]) and demonstrate that the CTR algorithm provides approximately 10-50% improvement in latency over state-of-the-art routing and caching management strategies for ICN for a wide range of simulation parameters.
信息中心网络(ICN)旨在通过在支持存储的节点上缓存网络内部的内容,将当今的Internet从以主机为中心的模型转变为以内容为中心的模型。最近,人们提出了多种路由和缓存管理策略[1]-[6],以提高ICN的用户级性能(例如,内容下载延迟)。在本文中,我们提出了一个简单的路由策略,利用特征时间的概念来改善内容下载延迟。缓存中内容的特征时间表示最近访问的内容将来可能留在该缓存中的时间量。我们提出的算法(CTR)使用特征时间信息将请求转发到可能找到内容的缓存。CTR增强了本地路由策略(例如,Dijkstra的算法),与现有的缓存管理策略一起工作,因此可以在ICN原型中以最小的努力实现。我们使用现实的互联网拓扑(例如,GEANT, WIDE, TISCALI, ROCKETFUEL b[7])进行详尽的模拟,并证明CTR算法在广泛的模拟参数范围内,比最先进的ICN路由和缓存管理策略提供了大约10-50%的延迟改进。
{"title":"Characteristic time based routing in information centric networks","authors":"Bitan Bandyopadhyay, A. Seetharam, A. Mukherjee, M. K. Naskar","doi":"10.1109/ICCNC.2016.7440574","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440574","url":null,"abstract":"Information centric networking (ICN) aims to transform today's Internet from a host-centric model to a content-centric one by caching content internally within the network at storage-enabled nodes. Recently, multiple routing and cache management strategies have been proposed [1]-[6] to improve the user-level performance (e.g., content-download latency) in ICN. In this paper, we propose a simple routing strategy that leverages the concept of characteristic time to improve content-download latency. Characteristic time for a content in a cache indicates the amount of time in future a recently accessed content is likely to remain in that cache. Our proposed algorithm (CTR) uses characteristic time information to forward requests to caches where the content is likely to be found. CTR augments native routing strategies (e.g., Dijkstra's algorithm), works with existing cache management policies and thus can be implemented in ICN prototypes with minimal effort. We perform exhaustive simulations using realistic Internet topologies (e.g., GEANT, WIDE, TISCALI, ROCKETFUEL [7]) and demonstrate that the CTR algorithm provides approximately 10-50% improvement in latency over state-of-the-art routing and caching management strategies for ICN for a wide range of simulation parameters.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116576223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
OUS: Optimal user selection in MU-MIMO WLAN ou: MU-MIMO WLAN中最优用户选择
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440681
Yizirui Zhou, Anfu Zhou, Min Liu
In multiuser MIMO (MU-MIMO) networks, different users can transmit packets to the AP concurrently, thereby network capacity could be significantly improved. Previous works, using the conventional user selection schemes, have shown the promise of MU-MIMO in practical WLANs. However, we find that, to harness the full potential of MU-MIMO, an optimal user selection scheme is required. In this paper, we formulate the user selection problem in MU-MIMO as a discrete constrained optimization problem, and by decomposing and solving this problem, we design an optimal selection scheme called OUS. OUS efficiently allocates network resources so as to improve both the overall throughput of a network and fairness among users. We conduct extensive simulations to evaluate performance of OUS, and the simulation results show that compared with previous works, OUS improves the overall throughput by 40% and improves the fairness by 30% in most cases.
在多用户MIMO (MU-MIMO)网络中,不同的用户可以同时向AP发送数据包,从而可以显著提高网络容量。以往的工作,使用传统的用户选择方案,已经显示出MU-MIMO在实际无线局域网中的前景。然而,我们发现,要充分利用MU-MIMO的潜力,需要一个最佳的用户选择方案。本文将MU-MIMO中的用户选择问题表述为一个离散约束优化问题,并通过对该问题的分解和求解,设计了一种称为OUS的最优选择方案。ou可以有效地分配网络资源,从而提高网络的整体吞吐量和用户之间的公平性。我们进行了大量的仿真来评估ou的性能,仿真结果表明,与以前的工作相比,ou在大多数情况下提高了40%的总吞吐量,提高了30%的公平性。
{"title":"OUS: Optimal user selection in MU-MIMO WLAN","authors":"Yizirui Zhou, Anfu Zhou, Min Liu","doi":"10.1109/ICCNC.2016.7440681","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440681","url":null,"abstract":"In multiuser MIMO (MU-MIMO) networks, different users can transmit packets to the AP concurrently, thereby network capacity could be significantly improved. Previous works, using the conventional user selection schemes, have shown the promise of MU-MIMO in practical WLANs. However, we find that, to harness the full potential of MU-MIMO, an optimal user selection scheme is required. In this paper, we formulate the user selection problem in MU-MIMO as a discrete constrained optimization problem, and by decomposing and solving this problem, we design an optimal selection scheme called OUS. OUS efficiently allocates network resources so as to improve both the overall throughput of a network and fairness among users. We conduct extensive simulations to evaluate performance of OUS, and the simulation results show that compared with previous works, OUS improves the overall throughput by 40% and improves the fairness by 30% in most cases.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124696906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-aware mobile sensing in vehicular networks 车载网络中的隐私感知移动传感
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440648
Mingming Guo, N. Pissinou, S. S. Iyengar
Multiple sensors with different functions on sensor-enabled devices on a mobile vehicle are generating large amount of data in real time which consists of a vehicular user's instant context. Context-aware services and applications utilize users' contexts to provide personalized services in return. However, most of the context-aware applications are selfish and very curious of users' sensitive information. In this work, we propose a framework for privacy preserving mobile sensing by caching on mobile vehicles. The framework combines a context releasing component with sensitive data caching capability to achieve strong contextual privacy for mobile vehicles. The main strength of our approach is to improve the privacy level by data caching for sensitive contexts as well as the quality of query results. Finally, we conduct simulations to evaluate our framework for effectiveness and efficiency.
移动车辆上的传感器设备上具有不同功能的多个传感器正在实时生成大量数据,这些数据包括车辆用户的即时上下文。上下文感知服务和应用程序利用用户的上下文来提供个性化服务作为回报。然而,大多数上下文感知应用程序都是自私的,对用户的敏感信息非常好奇。在这项工作中,我们提出了一个通过在移动车辆上缓存来保护隐私的移动传感框架。该框架结合了上下文释放组件和敏感数据缓存功能,为移动车辆实现了强大的上下文隐私。我们的方法的主要优点是通过对敏感上下文的数据缓存以及查询结果的质量来提高隐私级别。最后,我们进行模拟来评估我们的框架的有效性和效率。
{"title":"Privacy-aware mobile sensing in vehicular networks","authors":"Mingming Guo, N. Pissinou, S. S. Iyengar","doi":"10.1109/ICCNC.2016.7440648","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440648","url":null,"abstract":"Multiple sensors with different functions on sensor-enabled devices on a mobile vehicle are generating large amount of data in real time which consists of a vehicular user's instant context. Context-aware services and applications utilize users' contexts to provide personalized services in return. However, most of the context-aware applications are selfish and very curious of users' sensitive information. In this work, we propose a framework for privacy preserving mobile sensing by caching on mobile vehicles. The framework combines a context releasing component with sensitive data caching capability to achieve strong contextual privacy for mobile vehicles. The main strength of our approach is to improve the privacy level by data caching for sensitive contexts as well as the quality of query results. Finally, we conduct simulations to evaluate our framework for effectiveness and efficiency.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Traffic-aware backoff design for IEEE 802.11(ac) IEEE 802.11(ac)的流量感知回退设计
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440661
Chun-Hao Liu, D. Cabric
Current WiFi systems based on the IEEE 802.11 standard apply carrier sense multiple access with collision avoidance (CSMA/CA) to prevent users from transmitting simultaneously on the same channel. However, due to its random backoff nature, CSMA/CA does not perform well if the number of users is large. In this paper, we first measure traffic statistics, i.e., average ON/OFF periods and duty cycle, on the IEEE 802.11(ac) WLAN channel. Then we exploit the estimated duty cycle to design two functions, i.e., arctangent and Weibull functions, to adapt backoff parameters in CSMA/CA. For these two proposed functions, the backoff parameters initially increase as the estimated duty cycle increases, but they finally saturate and decrease respectively. The simulations show our proposed backoff functions outperform the conventional scheme using constant backoff parameters in terms of throughput performance.
目前基于IEEE 802.11标准的WiFi系统采用载波感知多址防碰撞(carrier sense multiple access with collision avoidance, CSMA/CA)来防止用户在同一信道上同时传输。然而,由于其随机回退性质,如果用户数量很大,CSMA/CA表现不佳。在本文中,我们首先测量了IEEE 802.11(ac) WLAN信道上的流量统计数据,即平均开/关周期和占空比。然后利用估计占空比设计两个函数,即反正切函数和威布尔函数,以适应CSMA/CA中的回退参数。对于这两种提出的函数,随着估计占空比的增加,退退参数开始增加,但最终分别趋于饱和和减小。仿真结果表明,我们提出的回退函数在吞吐量性能方面优于使用恒定回退参数的传统方案。
{"title":"Traffic-aware backoff design for IEEE 802.11(ac)","authors":"Chun-Hao Liu, D. Cabric","doi":"10.1109/ICCNC.2016.7440661","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440661","url":null,"abstract":"Current WiFi systems based on the IEEE 802.11 standard apply carrier sense multiple access with collision avoidance (CSMA/CA) to prevent users from transmitting simultaneously on the same channel. However, due to its random backoff nature, CSMA/CA does not perform well if the number of users is large. In this paper, we first measure traffic statistics, i.e., average ON/OFF periods and duty cycle, on the IEEE 802.11(ac) WLAN channel. Then we exploit the estimated duty cycle to design two functions, i.e., arctangent and Weibull functions, to adapt backoff parameters in CSMA/CA. For these two proposed functions, the backoff parameters initially increase as the estimated duty cycle increases, but they finally saturate and decrease respectively. The simulations show our proposed backoff functions outperform the conventional scheme using constant backoff parameters in terms of throughput performance.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121467402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ergodic capacity-based energy optimization algorithm in massive MIMO systems 大规模MIMO系统中基于遍历容量的能量优化算法
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440616
P. Kou, Xiaohui Li, Ruohan Guo, Y. Hei
Antenna selection and power optimization are low-cost low-complexity alternative methods to capture many of the advantages of massive MIMO systems. However, the computation complexity of antenna selection and power optimization grows rapidly with the number of antennas. Aiming at this problem, we derive an ergodic expression of energy efficiency for massive MIMO systems. And on the basis of it, we present a joint antenna selection and power optimization algorithm. To solve the joint optimization algorithm, the fractional programming is introduced to accelerate the convergence speed. Moreover, the user selection is considered to get the maximum ergodic energy efficiency. The simulation results show that the proposed algorithm can achieve nearly optimal energy efficiency with low computation complexity and fast convergence speed.
天线选择和功率优化是捕获大规模MIMO系统许多优点的低成本、低复杂度的替代方法。然而,天线选择和功率优化的计算复杂度随着天线数量的增加而迅速增加。针对这一问题,我们导出了大规模MIMO系统能量效率的遍历表达式。在此基础上,提出了一种联合天线选择和功率优化算法。在求解联合优化算法时,引入分式规划来加快收敛速度。同时,考虑用户的选择以获得最大的遍历能源效率。仿真结果表明,该算法具有较低的计算复杂度和较快的收敛速度,能达到接近最优的能效。
{"title":"Ergodic capacity-based energy optimization algorithm in massive MIMO systems","authors":"P. Kou, Xiaohui Li, Ruohan Guo, Y. Hei","doi":"10.1109/ICCNC.2016.7440616","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440616","url":null,"abstract":"Antenna selection and power optimization are low-cost low-complexity alternative methods to capture many of the advantages of massive MIMO systems. However, the computation complexity of antenna selection and power optimization grows rapidly with the number of antennas. Aiming at this problem, we derive an ergodic expression of energy efficiency for massive MIMO systems. And on the basis of it, we present a joint antenna selection and power optimization algorithm. To solve the joint optimization algorithm, the fractional programming is introduced to accelerate the convergence speed. Moreover, the user selection is considered to get the maximum ergodic energy efficiency. The simulation results show that the proposed algorithm can achieve nearly optimal energy efficiency with low computation complexity and fast convergence speed.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1