首页 > 最新文献

2022 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems 基于卷积神经网络的无人机系统虚假数据注入攻击检测方法
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912761
C. Titouna, Farid Naït-Abdesselam
With the growing use of Unmanned Aerial Vehicles (UAVs) in military and civilian applications, cyber-attacks are increasing significantly. Therefore, detection of attacks becomes indispensable for such systems. In this paper, we focus on the detection of False Data Injection (FDI) attacks in Unmanned Aerial Systems (UASs). Considered to be the most performed attack, an attacker injects fake data into the system in order to disrupt the final decision. To combat this threat, our proposal is built on image analysis and classification. First, we resize the received image in order to adapt it to feed the classifier using the Nearest Neighbor Interpolation (NNI). Second, we train, validate, and test a Convolutional Neural Network (CNN) to perform the image classification. Finally, we compare each classification result classes to a neighborhood using Euclidean distance. Numerical results on the VisDrone dataset demonstrate the efficiency of our proposal under a set of metrics.
随着无人驾驶飞行器(uav)在军事和民用领域的应用越来越广泛,网络攻击也越来越多。因此,对这些系统进行攻击检测是必不可少的。本文主要研究了无人机系统中虚假数据注入(FDI)攻击的检测问题。攻击者将虚假数据注入系统以破坏最终决策,这被认为是执行次数最多的攻击。为了对抗这种威胁,我们的建议建立在图像分析和分类的基础上。首先,我们调整接收到的图像的大小,以便使用最近邻插值(NNI)使其适应分类器。其次,我们训练、验证和测试卷积神经网络(CNN)来执行图像分类。最后,我们使用欧几里得距离将每个分类结果类与邻域进行比较。在VisDrone数据集上的数值结果证明了我们的建议在一组指标下的有效性。
{"title":"A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems","authors":"C. Titouna, Farid Naït-Abdesselam","doi":"10.1109/ISCC55528.2022.9912761","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912761","url":null,"abstract":"With the growing use of Unmanned Aerial Vehicles (UAVs) in military and civilian applications, cyber-attacks are increasing significantly. Therefore, detection of attacks becomes indispensable for such systems. In this paper, we focus on the detection of False Data Injection (FDI) attacks in Unmanned Aerial Systems (UASs). Considered to be the most performed attack, an attacker injects fake data into the system in order to disrupt the final decision. To combat this threat, our proposal is built on image analysis and classification. First, we resize the received image in order to adapt it to feed the classifier using the Nearest Neighbor Interpolation (NNI). Second, we train, validate, and test a Convolutional Neural Network (CNN) to perform the image classification. Finally, we compare each classification result classes to a neighborhood using Euclidean distance. Numerical results on the VisDrone dataset demonstrate the efficiency of our proposal under a set of metrics.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MBSFN and SC-PTM as Solutions to Reduce Energy Consumption in Cellular Networks MBSFN和SC-PTM作为降低蜂窝网络能耗的解决方案
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912818
J. Vargas, C. Thienot, X. Lagrange
Reducing mobile network and device energy consumption is one of the main objectives of the fifth and future sixth-generation (5G and 6G) cellular networks. This paper studies the Base Station (BS) and User Equipment (UE) energy consumption in scenarios where many users demand the same content and broadcast transmission might be used. We present analytical models to calculate the energy consumption in uni-cast, Multicast Broadcast Single Frequency Network (MBSFN), and Single-Cell Point-to-Multipoint (SC-PTM). Furthermore, we calculate the number of users per cell from which SC-PTM or MBSFN help to reduce BS and UE energy consumption compared to unicast.
降低移动网络和设备的能耗是第五代和未来的第六代(5G和6G)蜂窝网络的主要目标之一。本文研究了在多个用户需求相同内容且可能使用广播传输的情况下,基站(BS)和用户设备(UE)的能耗。我们提出了计算单播、多播广播单频网络(MBSFN)和单细胞点对多点(SC-PTM)的能量消耗的分析模型。此外,我们计算了与单播相比,SC-PTM或MBSFN有助于减少BS和UE能耗的每个小区的用户数量。
{"title":"MBSFN and SC-PTM as Solutions to Reduce Energy Consumption in Cellular Networks","authors":"J. Vargas, C. Thienot, X. Lagrange","doi":"10.1109/ISCC55528.2022.9912818","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912818","url":null,"abstract":"Reducing mobile network and device energy consumption is one of the main objectives of the fifth and future sixth-generation (5G and 6G) cellular networks. This paper studies the Base Station (BS) and User Equipment (UE) energy consumption in scenarios where many users demand the same content and broadcast transmission might be used. We present analytical models to calculate the energy consumption in uni-cast, Multicast Broadcast Single Frequency Network (MBSFN), and Single-Cell Point-to-Multipoint (SC-PTM). Furthermore, we calculate the number of users per cell from which SC-PTM or MBSFN help to reduce BS and UE energy consumption compared to unicast.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-enabled Wireless Powered Communication Networks: A Joint Scheduling and Trajectory Optimization Approach 无人机无线通信网络:一种联合调度和轨迹优化方法
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9913016
Ziwen An, Yanheng Liu, Geng Sun, Hongyang Pan, Aimin Wang
Unmanned aerial vehicle (UAV)-enabled wireless powered communication networks (WPCN) are promising technologies in Internet of Things (IoTs). However, energy-constrained devices and connectivity in complex environments are two major challenges for IoTs. We consider a UAV-enabled WPCN scenario that a UAV can connect with the ground IoT devices (IoTDs). To connect and fly faster, UAV needs to be scheduled reasonably and the corresponding trajectory should be optimized. Thus, we formulate a UAV scheduling and trajectory optimization problem (USTOP) to minimize the total time so that improving the charging and transmission efficiency. Since conventional methods are difficult to solve USTOP, we propose an improved simulated annealing (ISA) with the variable size changing mechanism, the conflict resolution mechanism and the hybrid evolution method to solve it. Simulation results verify the effectiveness and performance of ISA under different scales of the network, and the stability of the proposed algorithm is verified.
基于无人机(UAV)的无线通信网络(WPCN)是物联网(iot)中很有前途的技术。然而,能源受限的设备和复杂环境中的连接是物联网面临的两大挑战。我们考虑了一个无人机支持的WPCN场景,其中无人机可以与地面物联网设备(iotd)连接。为了更快地连接和飞行,需要对无人机进行合理的调度,并优化相应的轨迹。为此,我们制定了无人机调度和轨迹优化问题(USTOP),以最小化总时间,从而提高充电和传输效率。针对传统方法难以求解USTOP问题的特点,提出了一种改进的模拟退火(ISA)方法,结合变尺寸变化机制、冲突解决机制和混合进化方法来求解USTOP问题。仿真结果验证了ISA在不同网络规模下的有效性和性能,验证了所提算法的稳定性。
{"title":"UAV-enabled Wireless Powered Communication Networks: A Joint Scheduling and Trajectory Optimization Approach","authors":"Ziwen An, Yanheng Liu, Geng Sun, Hongyang Pan, Aimin Wang","doi":"10.1109/ISCC55528.2022.9913016","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9913016","url":null,"abstract":"Unmanned aerial vehicle (UAV)-enabled wireless powered communication networks (WPCN) are promising technologies in Internet of Things (IoTs). However, energy-constrained devices and connectivity in complex environments are two major challenges for IoTs. We consider a UAV-enabled WPCN scenario that a UAV can connect with the ground IoT devices (IoTDs). To connect and fly faster, UAV needs to be scheduled reasonably and the corresponding trajectory should be optimized. Thus, we formulate a UAV scheduling and trajectory optimization problem (USTOP) to minimize the total time so that improving the charging and transmission efficiency. Since conventional methods are difficult to solve USTOP, we propose an improved simulated annealing (ISA) with the variable size changing mechanism, the conflict resolution mechanism and the hybrid evolution method to solve it. Simulation results verify the effectiveness and performance of ISA under different scales of the network, and the stability of the proposed algorithm is verified.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly Detection in Logical Sub-Views of WSNs wsn逻辑子视图中的异常检测
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912826
R. Zakrzewski, Trevor P. Martin, G. Oikonomou
Wireless sensor networks are often distributed, diverse, and large making their monitoring hard. One way to tackle it is to focus on part of the system by creating logical sub-views which can be seen as proxies of the overall system operations. In this manuscript, logical sub-views consist of traffic aggregators and their topology which are monitored for anomaly. The aggregators are selected based on diversity and importance in the system and they are modelled as graphs to capture aggregation topology and data distributions. The aggregators' selection criteria, the method for comparison of partially overlapping sub-views, normal aggregation profiles acquisition, and measures of anomaly are proposed. A simulated wireless sensor network is used to acquire data at the edge and apply the method to demonstrate that focusing on system sub-views and comparing aggregation profiles facilitates anomaly detection also caused elsewhere in the system and the impact the anomaly has on aggregators.
无线传感器网络通常是分布的、多样的、庞大的,这使得它们的监控变得困难。解决这个问题的一种方法是通过创建逻辑子视图来关注系统的一部分,这些子视图可以被视为整个系统操作的代理。在本文中,逻辑子视图由流量聚合器及其拓扑组成,用于监视异常。根据系统中的多样性和重要性选择聚合器,并将其建模为图,以捕获聚合拓扑和数据分布。提出了聚合器的选择标准、部分重叠子视图的比较方法、正常聚合剖面的获取以及异常度量方法。利用模拟无线传感器网络获取边缘数据,并应用该方法证明,关注系统子视图和比较聚合概况有助于检测系统其他地方引起的异常以及异常对聚合器的影响。
{"title":"Anomaly Detection in Logical Sub-Views of WSNs","authors":"R. Zakrzewski, Trevor P. Martin, G. Oikonomou","doi":"10.1109/ISCC55528.2022.9912826","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912826","url":null,"abstract":"Wireless sensor networks are often distributed, diverse, and large making their monitoring hard. One way to tackle it is to focus on part of the system by creating logical sub-views which can be seen as proxies of the overall system operations. In this manuscript, logical sub-views consist of traffic aggregators and their topology which are monitored for anomaly. The aggregators are selected based on diversity and importance in the system and they are modelled as graphs to capture aggregation topology and data distributions. The aggregators' selection criteria, the method for comparison of partially overlapping sub-views, normal aggregation profiles acquisition, and measures of anomaly are proposed. A simulated wireless sensor network is used to acquire data at the edge and apply the method to demonstrate that focusing on system sub-views and comparing aggregation profiles facilitates anomaly detection also caused elsewhere in the system and the impact the anomaly has on aggregators.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(POSTER) Using MACsec to protect a Network Functions Virtualisation infrastructure (POSTER)使用MACsec保护网络功能虚拟化基础设施
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912955
A. Lioy, Ignazio Pedone, Silvia Sisinni
IEEE 802.1AE is a standard for Media Access Control security (MACsec), which enables data integrity, authentication, and confidentiality for traffic in a broadcast domain. This protects network communications against attacks at link layer, hence it provides a higher degree of security and flexibility compared to other security protocols, such as IPsec. Softwarised network infrastructures, based on Network Functions Virtualisation (NFV) and Software Defined Networking (SDN), provide higher flexibility than traditional networks. Nonetheless, these networks have a larger attack surface compared to legacy infrastructures based on hardware appliances. In this scenario, communication security is important to ensure that the traffic in a broadcast domain is not intercepted or manipulated. We propose an architecture for centralised management of MACsec-enabled switches in a NFV environment. Moreover, we present a PoC that integrates MACsec in the Open Source MANO NFV framework and we evaluate its performance.
IEEE 802.1AE是媒体访问控制安全(Media Access Control security, MACsec)标准,用于保证广播域中的数据完整性、身份验证和机密性。这可以保护网络通信免受链路层的攻击,因此与IPsec等其他安全协议相比,它提供了更高的安全性和灵活性。基于NFV (network Functions virtualization)和SDN (Software Defined Networking)技术的软件化网络基础设施提供了比传统网络更高的灵活性。尽管如此,与基于硬件设备的传统基础设施相比,这些网络具有更大的攻击面。在这种情况下,通信安全对于确保广播域中的流量不被拦截或操纵非常重要。我们提出了一种在NFV环境中集中管理启用macsec的交换机的架构。此外,我们提出了一个将MACsec集成到开源MANO NFV框架中的PoC,并对其性能进行了评估。
{"title":"(POSTER) Using MACsec to protect a Network Functions Virtualisation infrastructure","authors":"A. Lioy, Ignazio Pedone, Silvia Sisinni","doi":"10.1109/ISCC55528.2022.9912955","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912955","url":null,"abstract":"IEEE 802.1AE is a standard for Media Access Control security (MACsec), which enables data integrity, authentication, and confidentiality for traffic in a broadcast domain. This protects network communications against attacks at link layer, hence it provides a higher degree of security and flexibility compared to other security protocols, such as IPsec. Softwarised network infrastructures, based on Network Functions Virtualisation (NFV) and Software Defined Networking (SDN), provide higher flexibility than traditional networks. Nonetheless, these networks have a larger attack surface compared to legacy infrastructures based on hardware appliances. In this scenario, communication security is important to ensure that the traffic in a broadcast domain is not intercepted or manipulated. We propose an architecture for centralised management of MACsec-enabled switches in a NFV environment. Moreover, we present a PoC that integrates MACsec in the Open Source MANO NFV framework and we evaluate its performance.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127752095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoviFL: Edge-Assisted Federated Learning for Remote COVID-19 Detection in an AIoMT Framework CoviFL:边缘辅助联邦学习在AIoMT框架中的远程COVID-19检测
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912999
Aneesh Bhattacharya, Risav Rana, Venkanna Udutalapally, Debanjan Das
Detection of COVID-19 has been a global challenge due to the lack of proper resources across all regions. Recently, research has been conducted for non-invasive testing of COVID-19 using an individual's cough audio as input to deep learning models. However, these methods do not pay sufficient attention to resource and infrastructure constraints for real-life practical deployment and the lack of focus on maintaining user data privacy makes these solutions unsuitable for large-scale use. We propose a resource-efficient CoviFL framework using an AIoMT approach for remote COVID-19 detection while maintaining user data privacy. Federated learning has been used to decentralize the CoviFL CNN model training and test the COVID-19 status of users with an accuracy of 93.01 % on portable AIoMT edge devices. Experiments on real-world datasets suggest that the proposed CoviF L solution is promising for large-scale deployment even in resource and infrastructure-constrained environments making it suitable for remote COVID-19 detection.
由于所有区域都缺乏适当的资源,COVID-19的检测一直是一项全球性挑战。最近,研究人员利用个人咳嗽音频作为深度学习模型的输入,进行了COVID-19非侵入性检测。然而,这些方法在实际部署中没有充分关注资源和基础设施的限制,并且缺乏对维护用户数据隐私的关注,使得这些解决方案不适合大规模使用。我们提出了一个资源高效的CoviFL框架,使用AIoMT方法进行远程COVID-19检测,同时保持用户数据隐私。在便携式AIoMT边缘设备上,使用联邦学习去中心化CoviFL CNN模型训练和测试用户的COVID-19状态,准确率为93.01%。在真实数据集上的实验表明,即使在资源和基础设施受限的环境中,所提出的CoviF - L解决方案也有望进行大规模部署,从而适用于远程COVID-19检测。
{"title":"CoviFL: Edge-Assisted Federated Learning for Remote COVID-19 Detection in an AIoMT Framework","authors":"Aneesh Bhattacharya, Risav Rana, Venkanna Udutalapally, Debanjan Das","doi":"10.1109/ISCC55528.2022.9912999","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912999","url":null,"abstract":"Detection of COVID-19 has been a global challenge due to the lack of proper resources across all regions. Recently, research has been conducted for non-invasive testing of COVID-19 using an individual's cough audio as input to deep learning models. However, these methods do not pay sufficient attention to resource and infrastructure constraints for real-life practical deployment and the lack of focus on maintaining user data privacy makes these solutions unsuitable for large-scale use. We propose a resource-efficient CoviFL framework using an AIoMT approach for remote COVID-19 detection while maintaining user data privacy. Federated learning has been used to decentralize the CoviFL CNN model training and test the COVID-19 status of users with an accuracy of 93.01 % on portable AIoMT edge devices. Experiments on real-world datasets suggest that the proposed CoviF L solution is promising for large-scale deployment even in resource and infrastructure-constrained environments making it suitable for remote COVID-19 detection.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127878732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rapid Identification and Characterization of Laser Injected Clock Faults through OBIC Mapping 基于OBIC映射的激光注入时钟故障快速识别与表征
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912873
Nicholas Lurski, A. Monica, Brooke Peterson, S. Papadakis
Clock glitching is a powerful tool for security analysis of embedded devices. It can be difficult to introduce this type of fault, especially when the clock is driven internally. For this reason, Laser Fault Injection (LFI) is attractive as a method to induce glitches in clocking behavior of a device. In this paper, we outline a methodology for rapidly mapping the silicon features utilized by an FPGA design, identifying areas of interest from that map, performing LFI testing, and characterizing the injected faults. By using this framework, we identify three unique faulting behaviors of the internal clock for the Xilinx Spartan 6 FPGA.
时钟故障是嵌入式设备安全分析的有力工具。引入这种类型的故障是很困难的,特别是当时钟是内部驱动的时候。由于这个原因,激光故障注入(LFI)作为一种诱导器件时钟行为故障的方法很有吸引力。在本文中,我们概述了一种快速映射FPGA设计所使用的硅特征的方法,从该映射中识别感兴趣的区域,执行LFI测试,并表征注入故障。通过使用该框架,我们识别了Xilinx Spartan 6 FPGA内部时钟的三种独特故障行为。
{"title":"Rapid Identification and Characterization of Laser Injected Clock Faults through OBIC Mapping","authors":"Nicholas Lurski, A. Monica, Brooke Peterson, S. Papadakis","doi":"10.1109/ISCC55528.2022.9912873","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912873","url":null,"abstract":"Clock glitching is a powerful tool for security analysis of embedded devices. It can be difficult to introduce this type of fault, especially when the clock is driven internally. For this reason, Laser Fault Injection (LFI) is attractive as a method to induce glitches in clocking behavior of a device. In this paper, we outline a methodology for rapidly mapping the silicon features utilized by an FPGA design, identifying areas of interest from that map, performing LFI testing, and characterizing the injected faults. By using this framework, we identify three unique faulting behaviors of the internal clock for the Xilinx Spartan 6 FPGA.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: The RAINBOW Analytics Stack for the Fog Continuum 演示:用于雾连续体的RAINBOW分析堆栈
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9913026
Moysis Symeonides, Demetris Trihinas, Joanna Georgiou, Michalis Kasioulis, G. Pallis, M. Dikaiakos, Theodoros Toliopoulos, A. Michailidou, A. Gounaris
With the proliferation of raw Internet of Things (IoTs) data, Fog Computing is emerging as a computing paradigm for delay-sensitive streaming analytics with operators deploying big data distributed engines on Fog resources [1]. Nevertheless, the current (Cloud-based) distributed analytics solutions are unaware of the unique characteristics of Fog realms. For instance, task placement algorithms consider homogeneous underlying resources without considering the Fog nodes' heterogeneity and the non-uniform network connections, resulting in sub-optimal processing performance. Moreover, data quality can play an important role, where corrupted data, and network uncertainty may lead to less useful results. In turn, energy consumption can critically impact the overall cost and liveness of the underlying processing infrastructure. Specifically, scheduling tasks on nodes with energy-hungry profiles or battery-powered devices may temporarily be beneficial for the performance, but it may increase the overall cost, or/and the battery-powered devices may not be available when needed. A Fog-enabled analytics stack must allow users to optimize Fog-specific indicators or trade-offs among them. For instance, users may sacrifice a portion of the execution performance to minimize energy consumption or vice versa. Except for the performance issues raised by Fog, the state-of-the-art distributed processing engines offer only low-level procedural programming interfaces with operators facing a steep learning curve to master them. So, query abstractions are crucial for minimizing the deployment time, errors, and debugging.
随着原始物联网(iot)数据的激增,雾计算正在成为延迟敏感流分析的计算范式,运营商在雾资源上部署大数据分布式引擎[1]。然而,当前的(基于云的)分布式分析解决方案并没有意识到雾域的独特特征。例如,任务放置算法考虑同构的底层资源,而没有考虑雾节点的异构性和网络连接的非均匀性,导致处理性能次优。此外,数据质量可以发挥重要作用,其中损坏的数据和网络的不确定性可能导致不太有用的结果。反过来,能源消耗会严重影响底层处理基础设施的总体成本和活力。具体来说,在具有高能耗配置文件或电池供电设备的节点上调度任务可能暂时有利于性能,但它可能会增加总体成本,或者/并且电池供电的设备可能在需要时不可用。支持fog的分析堆栈必须允许用户优化特定于fog的指标或在它们之间进行权衡。例如,用户可能会牺牲一部分执行性能来最小化能耗,反之亦然。除了Fog引起的性能问题外,最先进的分布式处理引擎只提供低级的过程编程接口,操作人员要掌握它们需要陡峭的学习曲线。因此,查询抽象对于最小化部署时间、错误和调试至关重要。
{"title":"Demo: The RAINBOW Analytics Stack for the Fog Continuum","authors":"Moysis Symeonides, Demetris Trihinas, Joanna Georgiou, Michalis Kasioulis, G. Pallis, M. Dikaiakos, Theodoros Toliopoulos, A. Michailidou, A. Gounaris","doi":"10.1109/ISCC55528.2022.9913026","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9913026","url":null,"abstract":"With the proliferation of raw Internet of Things (IoTs) data, Fog Computing is emerging as a computing paradigm for delay-sensitive streaming analytics with operators deploying big data distributed engines on Fog resources [1]. Nevertheless, the current (Cloud-based) distributed analytics solutions are unaware of the unique characteristics of Fog realms. For instance, task placement algorithms consider homogeneous underlying resources without considering the Fog nodes' heterogeneity and the non-uniform network connections, resulting in sub-optimal processing performance. Moreover, data quality can play an important role, where corrupted data, and network uncertainty may lead to less useful results. In turn, energy consumption can critically impact the overall cost and liveness of the underlying processing infrastructure. Specifically, scheduling tasks on nodes with energy-hungry profiles or battery-powered devices may temporarily be beneficial for the performance, but it may increase the overall cost, or/and the battery-powered devices may not be available when needed. A Fog-enabled analytics stack must allow users to optimize Fog-specific indicators or trade-offs among them. For instance, users may sacrifice a portion of the execution performance to minimize energy consumption or vice versa. Except for the performance issues raised by Fog, the state-of-the-art distributed processing engines offer only low-level procedural programming interfaces with operators facing a steep learning curve to master them. So, query abstractions are crucial for minimizing the deployment time, errors, and debugging.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Scheduling Stabilization for Solar Energy Harvesting Internet of Things Devices 太阳能收集物联网设备的任务调度稳定
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9913061
A. Caruso, S. Chessa, Soledad Escolar, Fernando Rincón Calle, J. C. López
Energy neutrality of Internet of Things devices powered with energy harvesting is a concept introduced to let these devices operate uninterruptedly. A method to achieve it is by letting the device scheduling different tasks characterized by different energy costs (and quality), depending on the current energy production of the energy harvesting subsystem and on the residual battery charge. In this context, we propose a novel scheduling problem that aims at keeping the energy neutrality of the scheduling while maximizing the overall quality of the executed tasks and minimizing the leaps of quality among consecutive tasks, so to improve the stability of the output of the device itself. We propose for this problem an algorithm based on a dynamic programming approach that can be executed even on low-power devices. By simulation we show that, with respect to the state of the art, the scheduling by our algorithm greatly improve the stability of the device with a minor penalty in terms of overall quality.
以能量收集为动力的物联网设备的能量中立性是为了使这些设备不间断地运行而引入的概念。实现这一目标的一种方法是,根据能量收集子系统的当前能量生产和电池剩余电量,让设备调度具有不同能量成本(和质量)特征的不同任务。在此背景下,我们提出了一种新的调度问题,旨在保持调度的能量中性,同时最大限度地提高执行任务的整体质量,并尽量减少连续任务之间的质量飞跃,从而提高设备自身输出的稳定性。针对这一问题,我们提出了一种基于动态规划方法的算法,该算法甚至可以在低功耗设备上执行。通过仿真,我们表明,相对于目前的状态,我们的算法调度极大地提高了设备的稳定性,在整体质量方面的损失很小。
{"title":"Task Scheduling Stabilization for Solar Energy Harvesting Internet of Things Devices","authors":"A. Caruso, S. Chessa, Soledad Escolar, Fernando Rincón Calle, J. C. López","doi":"10.1109/ISCC55528.2022.9913061","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9913061","url":null,"abstract":"Energy neutrality of Internet of Things devices powered with energy harvesting is a concept introduced to let these devices operate uninterruptedly. A method to achieve it is by letting the device scheduling different tasks characterized by different energy costs (and quality), depending on the current energy production of the energy harvesting subsystem and on the residual battery charge. In this context, we propose a novel scheduling problem that aims at keeping the energy neutrality of the scheduling while maximizing the overall quality of the executed tasks and minimizing the leaps of quality among consecutive tasks, so to improve the stability of the output of the device itself. We propose for this problem an algorithm based on a dynamic programming approach that can be executed even on low-power devices. By simulation we show that, with respect to the state of the art, the scheduling by our algorithm greatly improve the stability of the device with a minor penalty in terms of overall quality.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116040484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Contact Heart Rate Signal Extraction and Identification Based on Speckle Image 基于散斑图像的非接触心率信号提取与识别
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912795
Tianyu Meng, Dali Zhu, Xiaodong Xie, Hualin Zeng
The biometric technology of heart signal has always been an important research direction of identity recognition. In this paper, we propose a method for heart rate signal extraction and identification based on speckle images. It contains two parts: contactless heart rate signal acquisition and identification. Irradiate the human body with laser to get speckle images, and obtain the heart rate signal by image correlation and filtering. Next, build a dataset with signals and the convolutional neural network model is used to realize the identification. The experimental results show that, the speckle image correlation method can achieve heart rate signal extraction in places where the pulse vibration is weak. In addition, compared with k- Nearest Neighbor and random forest, the convolutional neural model is more accurate in identification. The model achieved an accuracy of 87.33 % on the dataset, which confirms that it is effective for identification based on non-contact heart rate signal.
心脏信号的生物识别技术一直是身份识别的一个重要研究方向。本文提出了一种基于散斑图像的心率信号提取与识别方法。它包括两部分:非接触式心率信号采集和识别。用激光照射人体得到散斑图像,通过图像相关和滤波得到心率信号。其次,利用信号构建数据集,利用卷积神经网络模型实现识别。实验结果表明,散斑图像相关方法可以在脉冲振动较弱的地方实现心率信号的提取。此外,与k近邻和随机森林相比,卷积神经模型的识别精度更高。该模型在数据集上的准确率达到87.33%,证实了该模型对基于非接触心率信号的识别是有效的。
{"title":"Non-Contact Heart Rate Signal Extraction and Identification Based on Speckle Image","authors":"Tianyu Meng, Dali Zhu, Xiaodong Xie, Hualin Zeng","doi":"10.1109/ISCC55528.2022.9912795","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912795","url":null,"abstract":"The biometric technology of heart signal has always been an important research direction of identity recognition. In this paper, we propose a method for heart rate signal extraction and identification based on speckle images. It contains two parts: contactless heart rate signal acquisition and identification. Irradiate the human body with laser to get speckle images, and obtain the heart rate signal by image correlation and filtering. Next, build a dataset with signals and the convolutional neural network model is used to realize the identification. The experimental results show that, the speckle image correlation method can achieve heart rate signal extraction in places where the pulse vibration is weak. In addition, compared with k- Nearest Neighbor and random forest, the convolutional neural model is more accurate in identification. The model achieved an accuracy of 87.33 % on the dataset, which confirms that it is effective for identification based on non-contact heart rate signal.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114225215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1