首页 > 最新文献

2016 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
Proactive Ethernet Congestion Control based on link utilization estimation 基于链路利用率估计的主动以太网拥塞控制
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440620
M. Bahnasy, Bochra Boughzala, H. Elbiaze, B. Alleyne, André Béliveau, C. Padala
In the quest of providing a deterministic backplane-like behaviour a mechanism called ECCP (Ethernet Congestion Control & Prevention) was proposed where specialized and expensive devices were replaced by commodity Ethernet switches while still keeping the router properties, e.g. low-latency packet delivery, no packet loss within the fabric and fair share of the bandwidth. However, ECCP uses a self-induced congestion probing model which can cause queue length fluctuation in addition to the network bandwidth wastage due to the probes. Therefore, we propose enhancements to the algorithm used by ECCP to reduce probe packet overhead. In our solution NoP-ECCP (ECCP with no probes), we use a link utilization estimation technique instead of the estimation of the available bandwidth. The results obtained through simulations show that NoP-ECCP outperforms ECCP in terms of fairness, link utilization and queue length.
在寻求提供一种确定性的类似backplane的行为的过程中,提出了一种称为ECCP(以太网拥塞控制和预防)的机制,在这种机制中,专用和昂贵的设备被商品以太网交换机取代,同时仍然保持路由器的属性,例如低延迟的数据包传输,在结构内没有数据包丢失和公平的带宽共享。然而,ECCP使用自诱导拥塞探测模型,除了由于探测造成的网络带宽浪费外,还可能导致队列长度波动。因此,我们提出对ECCP使用的算法进行改进,以减少探测数据包开销。在我们的解决方案NoP-ECCP(不带探针的ECCP)中,我们使用链路利用率估计技术而不是可用带宽估计。仿真结果表明,NoP-ECCP在公平性、链路利用率和队列长度方面都优于ECCP。
{"title":"Proactive Ethernet Congestion Control based on link utilization estimation","authors":"M. Bahnasy, Bochra Boughzala, H. Elbiaze, B. Alleyne, André Béliveau, C. Padala","doi":"10.1109/ICCNC.2016.7440620","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440620","url":null,"abstract":"In the quest of providing a deterministic backplane-like behaviour a mechanism called ECCP (Ethernet Congestion Control & Prevention) was proposed where specialized and expensive devices were replaced by commodity Ethernet switches while still keeping the router properties, e.g. low-latency packet delivery, no packet loss within the fabric and fair share of the bandwidth. However, ECCP uses a self-induced congestion probing model which can cause queue length fluctuation in addition to the network bandwidth wastage due to the probes. Therefore, we propose enhancements to the algorithm used by ECCP to reduce probe packet overhead. In our solution NoP-ECCP (ECCP with no probes), we use a link utilization estimation technique instead of the estimation of the available bandwidth. The results obtained through simulations show that NoP-ECCP outperforms ECCP in terms of fairness, link utilization and queue length.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cost effective mobile and static road side unit deployment for vehicular adhoc networks 具有成本效益的移动和静态道路侧单元部署车辆自组网
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440590
Donghyun Kim, Yesenia Velasco, Zishen Yang, Wei Wang, Rasheed Hussain, R. Uma
This paper investigates a new strategy to best deploy road side units so that their spatio-temporal coverage is maximized under a limited budget. For the first time in the literature, we consider three different RSU deployment strategies in a single framework, on static locations, public mobile transportation, and fully controllable vehicles. We first introduce a new strategy to abstract a map of city area into a grid graph. Then, we formulate the problem as a new optimization problem and show its NP-hardness. To solve this problem, we transform this problem into another optimization problem and propose a new polynomial running time approximation algorithm and show its performance ratio is at least the half of the best possible ratio.
本文研究了在有限的预算条件下,如何优化部署路旁单位,使其时空覆盖范围最大化的新策略。在文献中,我们首次在单一框架中考虑了三种不同的RSU部署策略,分别是静态位置、公共移动交通和完全可控车辆。首先介绍了一种将城市区域地图抽象为网格图的新策略。然后,我们将该问题化为一个新的优化问题,并证明了它的np -硬度。为了解决这个问题,我们将这个问题转化为另一个优化问题,提出了一个新的多项式运行时间近似算法,并证明了它的性能比至少是最佳可能比的一半。
{"title":"Cost effective mobile and static road side unit deployment for vehicular adhoc networks","authors":"Donghyun Kim, Yesenia Velasco, Zishen Yang, Wei Wang, Rasheed Hussain, R. Uma","doi":"10.1109/ICCNC.2016.7440590","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440590","url":null,"abstract":"This paper investigates a new strategy to best deploy road side units so that their spatio-temporal coverage is maximized under a limited budget. For the first time in the literature, we consider three different RSU deployment strategies in a single framework, on static locations, public mobile transportation, and fully controllable vehicles. We first introduce a new strategy to abstract a map of city area into a grid graph. Then, we formulate the problem as a new optimization problem and show its NP-hardness. To solve this problem, we transform this problem into another optimization problem and propose a new polynomial running time approximation algorithm and show its performance ratio is at least the half of the best possible ratio.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126332787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Selective encryption and component-oriented deduplication for mobile cloud data computing 移动云数据计算的选择性加密和面向组件的重复数据删除
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440636
Sejun Song, Baek-Young Choi, Daehee Kim
As smart devices gain their popularity and usage applications become versatile, the users are also hoping to perform resource intensive tasks at anywhere and anytime as conveniently as using their static computers. To overcome the smart device's intrinsic resource limitations in processing, storage, and power, emerging collaborative mobile cloud technologies such as Mobile Cloud Computing (MCC), Mobile-Edge Computing (MEC), and Fog Computing (FC) augment the smart device's capabilities by leveraging distributed and remote cloud resources. However, in collaborative computing environments, the demand for big data processing and exchanges among smart devices is considered as a significant challenge. An effective technique to reduce data at a source device is essential to save network bandwidth and storage spaces. It, in turn, improves the data processing overhead as well as reduces the security vulnerability caused by data movement among the smart devices. In this paper, we design and develop a novel Selective Encryption and Component-Oriented Deduplication (SEACOD) application that achieves both fast and effective data encryption and reduction for MCC services. Specifically, SEACOD efficiently deduplicates redundant objects in files, emails, as well as images exploiting object-level components based on their structures. It also effectively reduces the overall encryption overhead on the mobile devices by adaptively applying compression and encryption methods according to the decomposed data types. Our evaluation using real datasets of structured files shows that the proposed scheme accomplishes as good of storage savings as a variable-block deduplication, while being as fast as a file-level or a large fixed-size block-level deduplication.
随着智能设备的普及和使用应用的多样化,用户也希望像使用静态计算机一样随时随地方便地执行资源密集型任务。为了克服智能设备在处理、存储和功率方面的固有资源限制,新兴的协作移动云技术,如移动云计算(MCC)、移动边缘计算(MEC)和雾计算(FC),通过利用分布式和远程云资源,增强了智能设备的功能。然而,在协作计算环境中,智能设备之间对大数据处理和交换的需求被认为是一个重大挑战。一种有效的减少源设备上数据的技术对于节省网络带宽和存储空间至关重要。从而提高了数据处理开销,减少了智能设备间数据移动带来的安全漏洞。在本文中,我们设计并开发了一种新的选择性加密和面向组件的重复数据删除(SEACOD)应用程序,该应用程序实现了MCC服务的快速有效的数据加密和减少。具体来说,SEACOD有效地删除文件、电子邮件以及基于其结构利用对象级组件的图像中的冗余对象。它还通过根据分解的数据类型自适应地应用压缩和加密方法,有效地降低了移动设备上的总体加密开销。我们使用结构化文件的真实数据集进行的评估表明,所提出的方案实现了与可变块重复数据删除一样好的存储节省,同时与文件级或大型固定大小块级重复数据删除一样快。
{"title":"Selective encryption and component-oriented deduplication for mobile cloud data computing","authors":"Sejun Song, Baek-Young Choi, Daehee Kim","doi":"10.1109/ICCNC.2016.7440636","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440636","url":null,"abstract":"As smart devices gain their popularity and usage applications become versatile, the users are also hoping to perform resource intensive tasks at anywhere and anytime as conveniently as using their static computers. To overcome the smart device's intrinsic resource limitations in processing, storage, and power, emerging collaborative mobile cloud technologies such as Mobile Cloud Computing (MCC), Mobile-Edge Computing (MEC), and Fog Computing (FC) augment the smart device's capabilities by leveraging distributed and remote cloud resources. However, in collaborative computing environments, the demand for big data processing and exchanges among smart devices is considered as a significant challenge. An effective technique to reduce data at a source device is essential to save network bandwidth and storage spaces. It, in turn, improves the data processing overhead as well as reduces the security vulnerability caused by data movement among the smart devices. In this paper, we design and develop a novel Selective Encryption and Component-Oriented Deduplication (SEACOD) application that achieves both fast and effective data encryption and reduction for MCC services. Specifically, SEACOD efficiently deduplicates redundant objects in files, emails, as well as images exploiting object-level components based on their structures. It also effectively reduces the overall encryption overhead on the mobile devices by adaptively applying compression and encryption methods according to the decomposed data types. Our evaluation using real datasets of structured files shows that the proposed scheme accomplishes as good of storage savings as a variable-block deduplication, while being as fast as a file-level or a large fixed-size block-level deduplication.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120947142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Smart and connected e-Health lab for standards validation and conformance 智能和连接的电子健康实验室,用于标准验证和一致性
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440623
Wei Liu, U. Krieger, E. K. Park, S. S. Zhu
This paper reports our innovation in a Smart and Connected e-Health Service (SCeHS) lab approach for e-Health standards validation. The lab platform has been designed for SCeHS which is a next generation solution following the initial Big Data e-Health Service (BDeHS) initiative. After a number of e-Health standards are summarized, we present our validation designs for conformance to those e-Health standards.
本文报告了我们在智能和连接电子卫生服务(SCeHS)实验室方法中的创新,用于电子卫生标准验证。该实验室平台是为SCeHS设计的,这是继最初的大数据电子卫生服务(BDeHS)计划之后的下一代解决方案。在总结了一些电子健康标准之后,我们提出了符合这些电子健康标准的验证设计。
{"title":"Smart and connected e-Health lab for standards validation and conformance","authors":"Wei Liu, U. Krieger, E. K. Park, S. S. Zhu","doi":"10.1109/ICCNC.2016.7440623","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440623","url":null,"abstract":"This paper reports our innovation in a Smart and Connected e-Health Service (SCeHS) lab approach for e-Health standards validation. The lab platform has been designed for SCeHS which is a next generation solution following the initial Big Data e-Health Service (BDeHS) initiative. After a number of e-Health standards are summarized, we present our validation designs for conformance to those e-Health standards.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Watermarking for detecting freeloader misbehavior in software-defined networks 用于检测软件定义网络中不正当行为的水印
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440628
Younghee Park, Sang-Yoon Chang, Lavanya M. Krishnamurthy
Software-defined networking (SDN) provides network operators a high level of flexibility and programability through the separation of the control plane from the data plane. When initiating traffic, users are required to install flow rules that direct the traffic routing. This process requires communication between control and data plane and results in significant overhead and enables the controller to monitor the traffic and its source. In this paper, we introduce a novel misbehavior, called freeloading, where attackers bypass the process of installing flow rules. The attackers thus can send traffic with an unfair advantage in delay (enabling them to launch more timely threats) and significantly reduce the risk of attacker detection by the network controller (especially if further threats were launched). To prevent such attack, we develop a flow watermarking technique that embeds a secret message into the data payload. It facilitates ownership of the established flow rules, so that only the legitimate owners of flow rules can send packets using their own rules and the network can help detect the misuse cases of the installed flow rules.
软件定义网络(SDN)通过将控制平面与数据平面分离,为网络运营商提供了高度的灵活性和可编程性。用户发起流量时,需要安装流规则,引导流量的路由。这个过程需要控制平面和数据平面之间的通信,开销很大,控制器可以监控流量及其来源。在本文中,我们介绍了一种新的错误行为,称为免费加载,攻击者绕过安装流规则的过程。因此,攻击者可以以不公平的延迟优势发送流量(使他们能够更及时地发起威胁),并大大降低网络控制器检测到攻击者的风险(特别是在发起进一步威胁的情况下)。为了防止这种攻击,我们开发了一种流水印技术,该技术将秘密消息嵌入到数据有效载荷中。它简化了已建立的流规则的所有权,只有合法的流规则所有者才能使用自己的规则发送数据包,并且网络可以帮助检测已安装的流规则的误用情况。
{"title":"Watermarking for detecting freeloader misbehavior in software-defined networks","authors":"Younghee Park, Sang-Yoon Chang, Lavanya M. Krishnamurthy","doi":"10.1109/ICCNC.2016.7440628","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440628","url":null,"abstract":"Software-defined networking (SDN) provides network operators a high level of flexibility and programability through the separation of the control plane from the data plane. When initiating traffic, users are required to install flow rules that direct the traffic routing. This process requires communication between control and data plane and results in significant overhead and enables the controller to monitor the traffic and its source. In this paper, we introduce a novel misbehavior, called freeloading, where attackers bypass the process of installing flow rules. The attackers thus can send traffic with an unfair advantage in delay (enabling them to launch more timely threats) and significantly reduce the risk of attacker detection by the network controller (especially if further threats were launched). To prevent such attack, we develop a flow watermarking technique that embeds a secret message into the data payload. It facilitates ownership of the established flow rules, so that only the legitimate owners of flow rules can send packets using their own rules and the network can help detect the misuse cases of the installed flow rules.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Enhanced DRX-aware scheduling for mobile users in LTE networks 增强了LTE网络中移动用户的drx感知调度
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440569
Yu Liu, M. Huynh, D. Ghosal
The Discontinuous Reception (DRX) mechanism which is widely adopted in LTE to conserve the user equipment (UE)'s battery resources, not only introduces high handover latency but also reduces the downlink scheduler efficiency. A key objective of this work is to design battery power aware scheduling by incorporating the per-UE DRX parameters (such as the On Duration Timer) in downlink scheduling. This allows maximizing the UEs battery lifetime while satisfying the application qualify of service (QoS) requirement. In this paper, we propose an enhanced DRX-Aware scheduling (eDAS) mechanism that can balance the trade-off between application QoS requirements and UE's power consumption. The eDAS scheduler accounts for both static and mobile UEs. Simulation analysis shows that the proposed eDAS scheme achieves lower packet loss rate and packet delay when compared with traditional scheduling algorithms such as Proportional Fairness (PF) and Maximum Largest Weighted Delay First (M-LWDF), while still achieving significant power conservation.
为了节省用户设备(UE)的电池资源,在LTE中广泛采用的不连续接收(DRX)机制不仅带来了高切换延迟,而且降低了下行调度程序的效率。这项工作的一个关键目标是通过在下行链路调度中结合每ue DRX参数(如On Duration Timer)来设计电池电量感知调度。这允许最大限度地延长ue的电池寿命,同时满足应用程序服务质量(QoS)要求。在本文中,我们提出了一种增强的drx感知调度(eDAS)机制,可以平衡应用QoS需求和UE功耗之间的权衡。eDAS调度器同时负责静态和移动ue。仿真分析表明,与比例公平(PF)和最大加权延迟优先(M-LWDF)等传统调度算法相比,eDAS方案具有更低的丢包率和数据包延迟,同时仍具有显著的节能效果。
{"title":"Enhanced DRX-aware scheduling for mobile users in LTE networks","authors":"Yu Liu, M. Huynh, D. Ghosal","doi":"10.1109/ICCNC.2016.7440569","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440569","url":null,"abstract":"The Discontinuous Reception (DRX) mechanism which is widely adopted in LTE to conserve the user equipment (UE)'s battery resources, not only introduces high handover latency but also reduces the downlink scheduler efficiency. A key objective of this work is to design battery power aware scheduling by incorporating the per-UE DRX parameters (such as the On Duration Timer) in downlink scheduling. This allows maximizing the UEs battery lifetime while satisfying the application qualify of service (QoS) requirement. In this paper, we propose an enhanced DRX-Aware scheduling (eDAS) mechanism that can balance the trade-off between application QoS requirements and UE's power consumption. The eDAS scheduler accounts for both static and mobile UEs. Simulation analysis shows that the proposed eDAS scheme achieves lower packet loss rate and packet delay when compared with traditional scheduling algorithms such as Proportional Fairness (PF) and Maximum Largest Weighted Delay First (M-LWDF), while still achieving significant power conservation.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ZigBee network system for observing operating activities of work vehicles 用于观察作业车辆作业活动的ZigBee网络系统
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440555
T. Kobayashi, Hiroshi Yamamoto, K. Yamazaki
Observing activities of working vehicles on a work site, such as a factory, is important in regard to managing the lifetime of vehicles and achieving high operational availability. However, it is a problem that an administrator cannot completely grasp the activities of a working vehicle. Existing systems cannot cover a large area, particularly in an indoor environment. A system is proposed for monitoring operating activities of working vehicles, regardless of whether they are operating indoors or outdoors. The system calculates the activity rate of a vehicle by analyzing the topology of a network configured by the wireless technology ZigBee. In addition, it was experimentally verified that network topology and RSSI can be used to estimate activities of working vehicles.
观察工作车辆在工作场所(如工厂)的活动,对于管理车辆的使用寿命和实现高操作可用性非常重要。然而,管理员不能完全掌握工作车辆的活动是一个问题。现有的系统不能覆盖大面积,特别是在室内环境中。提出了一种监测工作车辆的操作活动的系统,无论它们是在室内还是室外操作。该系统通过分析无线技术ZigBee配置的网络拓扑结构来计算车辆的活动率。此外,实验验证了网络拓扑和RSSI可以用来估计工作车辆的活动。
{"title":"ZigBee network system for observing operating activities of work vehicles","authors":"T. Kobayashi, Hiroshi Yamamoto, K. Yamazaki","doi":"10.1109/ICCNC.2016.7440555","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440555","url":null,"abstract":"Observing activities of working vehicles on a work site, such as a factory, is important in regard to managing the lifetime of vehicles and achieving high operational availability. However, it is a problem that an administrator cannot completely grasp the activities of a working vehicle. Existing systems cannot cover a large area, particularly in an indoor environment. A system is proposed for monitoring operating activities of working vehicles, regardless of whether they are operating indoors or outdoors. The system calculates the activity rate of a vehicle by analyzing the topology of a network configured by the wireless technology ZigBee. In addition, it was experimentally verified that network topology and RSSI can be used to estimate activities of working vehicles.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131507801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient mobile association in device-to-device-enabled heterogeneous networks 支持设备对设备的异构网络中的节能移动关联
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440663
Sa Xiao, Xiangwei Zhou, Daquan Feng, Y. Yuan-Wu, Geoffrey Y. Li, Wenting Guo
In this paper, we investigate energy-efficient mobile association for users with the capability of device-to-device (D2D) communications in heterogeneous networks. To maximize the energy efficiency (EE) of uplink transmission while guaranteeing the quality-of-service requirement of users, we first propose a brute-force-based mobile association algorithm, which requires complete channel state information and searches all association candidates. To reduce the cost involved in computation, channel estimation, and feedback, we also develop a distance-based mobile association (DMA) algorithm, which operates according to geographical information of access points and D2D relay nodes and with much lower computational complexity. Simulation results demonstrate that the proposed DMA algorithm can achieve a good tradeoff between the EE and complexity.
在本文中,我们研究了在异构网络中具有设备对设备(D2D)通信能力的用户节能移动关联。为了在保证用户服务质量需求的同时最大限度地提高上行链路传输的能量效率,首先提出了一种基于蛮力的移动关联算法,该算法需要完整的信道状态信息并搜索所有候选关联。为了减少计算、信道估计和反馈所涉及的成本,我们还开发了基于距离的移动关联(DMA)算法,该算法根据接入点和D2D中继节点的地理信息进行操作,并且计算复杂度大大降低。仿真结果表明,该算法能够很好地平衡EE和复杂度。
{"title":"Energy-efficient mobile association in device-to-device-enabled heterogeneous networks","authors":"Sa Xiao, Xiangwei Zhou, Daquan Feng, Y. Yuan-Wu, Geoffrey Y. Li, Wenting Guo","doi":"10.1109/ICCNC.2016.7440663","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440663","url":null,"abstract":"In this paper, we investigate energy-efficient mobile association for users with the capability of device-to-device (D2D) communications in heterogeneous networks. To maximize the energy efficiency (EE) of uplink transmission while guaranteeing the quality-of-service requirement of users, we first propose a brute-force-based mobile association algorithm, which requires complete channel state information and searches all association candidates. To reduce the cost involved in computation, channel estimation, and feedback, we also develop a distance-based mobile association (DMA) algorithm, which operates according to geographical information of access points and D2D relay nodes and with much lower computational complexity. Simulation results demonstrate that the proposed DMA algorithm can achieve a good tradeoff between the EE and complexity.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133608479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Protection of location privacy in continuous LBSs against adversaries with background information 针对具有背景信息的攻击者,连续lbs中的位置隐私保护
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440649
Ben Niu, Sheng Gao, Fenghua Li, Hui Li, Zongqing Lu
Privacy issues in continuous Location-Based Services (LBSs) have gained attractive attentions in literature over recent years. In this paper, we illustrate the limitations of existing work and define an entropy-based privacy metric to quantify the privacy degree based on a set of vital observations. To tackle the privacy issues, we propose an efficient privacy-preserving scheme, DUMMY-T, which aims to protect LBSs user's privacy against adversaries with background information. By our Dummy Locations Generating (DLG) algorithm, we first generate a set of realistic dummy locations for each snapshot with considering the minimum cloaking region and background information. Further, our proposed Dummy Paths Constructing (DPC) algorithm guarantees the location reachability by taking the maximum distance of the moving mobile users into consideration. Security analysis and empirical evaluation results further verify the effectiveness and efficiency of our DUMMY-T.
近年来,基于位置的连续服务(lbs)中的隐私问题引起了广泛的关注。在本文中,我们说明了现有工作的局限性,并定义了一个基于熵的隐私度量,以基于一组重要观察来量化隐私程度。为了解决隐私问题,我们提出了一种有效的隐私保护方案,DUMMY-T,该方案旨在保护lbs用户的隐私免受具有背景信息的攻击者的攻击。通过虚拟位置生成(DLG)算法,我们首先为每个快照生成一组真实的虚拟位置,并考虑最小隐藏区域和背景信息。此外,我们提出的虚拟路径构造(DPC)算法通过考虑移动用户的最大距离来保证位置的可达性。安全性分析和实证评价结果进一步验证了我们的DUMMY-T的有效性和效率。
{"title":"Protection of location privacy in continuous LBSs against adversaries with background information","authors":"Ben Niu, Sheng Gao, Fenghua Li, Hui Li, Zongqing Lu","doi":"10.1109/ICCNC.2016.7440649","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440649","url":null,"abstract":"Privacy issues in continuous Location-Based Services (LBSs) have gained attractive attentions in literature over recent years. In this paper, we illustrate the limitations of existing work and define an entropy-based privacy metric to quantify the privacy degree based on a set of vital observations. To tackle the privacy issues, we propose an efficient privacy-preserving scheme, DUMMY-T, which aims to protect LBSs user's privacy against adversaries with background information. By our Dummy Locations Generating (DLG) algorithm, we first generate a set of realistic dummy locations for each snapshot with considering the minimum cloaking region and background information. Further, our proposed Dummy Paths Constructing (DPC) algorithm guarantees the location reachability by taking the maximum distance of the moving mobile users into consideration. Security analysis and empirical evaluation results further verify the effectiveness and efficiency of our DUMMY-T.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133657947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Optical power control to efficiently handle flex-grid spectrum gain over existing fixed-grid network infrastructures 光功率控制,有效地处理现有固定电网基础设施的柔性电网频谱增益
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440674
M. Kanj, E. L. Rouzic, Djamel Amar, Jean-Luc Augé, Bernard A. Cousin, N. Brochier
The exponential traffic growth in optical networks has triggered the evolution from Fixed-Grid to Flex-Grid technology. This evolution allows better spectral efficiency and spectrum usage over current networks in order to facilitate dynamic and huge traffic demands. The integration of Flex-Grid technology increases the number of optical channels established over optical links, leading, however, to an increase in amplification power and possibly saturating optical amplifiers. In this work, we propose a power adaptation process that takes advantage of link optical signal to noise ratio (OSNR) margins to allow network operators to support this power increase while maintaining the use of legacy amplifiers. Results show that controlling channel optical power benefits from the Flex-Grid in terms of spectrum and capacity gain using in-place amplifier infrastructure.
光网络业务的指数级增长引发了固定网格技术向柔性网格技术的演进。这种演进使频谱效率和频谱使用优于当前网络,以满足动态和巨大的流量需求。柔性网格技术的集成增加了在光链路上建立的光通道的数量,然而,导致放大功率的增加和可能饱和的光放大器。在这项工作中,我们提出了一种功率自适应过程,该过程利用链路光信噪比(OSNR)余量,允许网络运营商在保持使用传统放大器的同时支持这种功率增加。结果表明,利用就地放大器基础设施,柔性网格在频谱和容量增益方面对控制通道光功率有好处。
{"title":"Optical power control to efficiently handle flex-grid spectrum gain over existing fixed-grid network infrastructures","authors":"M. Kanj, E. L. Rouzic, Djamel Amar, Jean-Luc Augé, Bernard A. Cousin, N. Brochier","doi":"10.1109/ICCNC.2016.7440674","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440674","url":null,"abstract":"The exponential traffic growth in optical networks has triggered the evolution from Fixed-Grid to Flex-Grid technology. This evolution allows better spectral efficiency and spectrum usage over current networks in order to facilitate dynamic and huge traffic demands. The integration of Flex-Grid technology increases the number of optical channels established over optical links, leading, however, to an increase in amplification power and possibly saturating optical amplifiers. In this work, we propose a power adaptation process that takes advantage of link optical signal to noise ratio (OSNR) margins to allow network operators to support this power increase while maintaining the use of legacy amplifiers. Results show that controlling channel optical power benefits from the Flex-Grid in terms of spectrum and capacity gain using in-place amplifier infrastructure.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132004405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2016 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1