首页 > 最新文献

2023 17th International Conference on Telecommunications (ConTEL)最新文献

英文 中文
10 GBPS flow aggregation using commodity hardware 使用商用硬件的10gbps流聚合
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10198970
Lovre Gusar, Ivan Sicic, Karlo Slovenec, M. Mikuc
This paper proposes a flow aggregation application used on general-purpose hardware with a focus on low resource usage. The software is written using DPDK which enables high-speed packet processing on commodity hardware. The solution can handle 10 Gbps line rate traffic with 5 CPU cores while aggregating over 20 different flow metrics. It can handle over 5,000,000 concurrent flows with an upper limit of 12,582,912 concurrent flows stored in its data structures. In this paper, we show the system design choices and technologies used to process such traffic.
本文提出了一种用于通用硬件的流聚合应用程序,重点关注低资源使用。该软件使用DPDK编写,可以在商用硬件上实现高速数据包处理。该解决方案可以使用5个CPU内核处理10 Gbps的线路速率流量,同时聚合20多个不同的流量指标。它可以处理超过5,000,000个并发流,其数据结构中存储的并发流上限为12,582,912。在本文中,我们展示了系统设计选择和用于处理此类流量的技术。
{"title":"10 GBPS flow aggregation using commodity hardware","authors":"Lovre Gusar, Ivan Sicic, Karlo Slovenec, M. Mikuc","doi":"10.1109/ConTEL58387.2023.10198970","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10198970","url":null,"abstract":"This paper proposes a flow aggregation application used on general-purpose hardware with a focus on low resource usage. The software is written using DPDK which enables high-speed packet processing on commodity hardware. The solution can handle 10 Gbps line rate traffic with 5 CPU cores while aggregating over 20 different flow metrics. It can handle over 5,000,000 concurrent flows with an upper limit of 12,582,912 concurrent flows stored in its data structures. In this paper, we show the system design choices and technologies used to process such traffic.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125147405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Web Server Logs to Identify and Comprehend Anomalous User Activity 使用Web服务器日志来识别和理解异常的用户活动
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10199092
Lenka Benova, L. Hudec
This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for analyzing user activity in NGINX logs. The proposed method does not require a labeled dataset and is capable of efficiently identifying different user anomalies in large datasets with millions of daily requests. The results of the analysis provided a deeper understanding of user behavior when seeking updates through web requests and aided in interpreting the findings. Clustering the anomalies helped to produce typical clusters and further supported the interpretation of the results. This work provides valuable insights into user behavior in web server networks and highlights the importance of efficient anomaly detection techniques in large datasets. The findings have potential real-world applications in the field of cybersecurity, particularly in providing network security analysts with an automated and more objective approach to threat analysis. This study showcases the importance of automated methods for analyzing user activity in web server networks and provides a more objective and efficient approach to detecting user anomalies in large datasets. This approach contributes to the development of more effective and precise cybersecurity systems, ultimately improving the protection of network infrastructures from malicious attacks.
本研究报告提出了一项在web服务器请求的大型数据集中识别用户异常的研究。以一家网络安全公司的web服务器网络为例,我们提出了一种分析NGINX日志中用户活动的技术。该方法不需要标记数据集,能够在每天数百万个请求的大型数据集中有效地识别不同的用户异常。分析结果提供了对用户在通过网络请求寻求更新时的行为的更深入的理解,并有助于解释研究结果。将异常聚类有助于产生典型的聚类,并进一步支持对结果的解释。这项工作为web服务器网络中的用户行为提供了有价值的见解,并强调了在大型数据集中高效异常检测技术的重要性。这些发现在网络安全领域有潜在的实际应用,特别是在为网络安全分析师提供自动化和更客观的威胁分析方法方面。本研究展示了在web服务器网络中分析用户活动的自动化方法的重要性,并提供了一种更客观、更有效的方法来检测大型数据集中的用户异常。这种方法有助于开发更有效和精确的网络安全系统,最终提高对网络基础设施免受恶意攻击的保护。
{"title":"Using Web Server Logs to Identify and Comprehend Anomalous User Activity","authors":"Lenka Benova, L. Hudec","doi":"10.1109/ConTEL58387.2023.10199092","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199092","url":null,"abstract":"This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for analyzing user activity in NGINX logs. The proposed method does not require a labeled dataset and is capable of efficiently identifying different user anomalies in large datasets with millions of daily requests. The results of the analysis provided a deeper understanding of user behavior when seeking updates through web requests and aided in interpreting the findings. Clustering the anomalies helped to produce typical clusters and further supported the interpretation of the results. This work provides valuable insights into user behavior in web server networks and highlights the importance of efficient anomaly detection techniques in large datasets. The findings have potential real-world applications in the field of cybersecurity, particularly in providing network security analysts with an automated and more objective approach to threat analysis. This study showcases the importance of automated methods for analyzing user activity in web server networks and provides a more objective and efficient approach to detecting user anomalies in large datasets. This approach contributes to the development of more effective and precise cybersecurity systems, ultimately improving the protection of network infrastructures from malicious attacks.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123296271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Non-Interfering Radio Communication System for the SKA Astronomy Project: 1570902849 Contel 2023 一种用于SKA天文项目的无干扰无线电通信系统:1570902849
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10199029
R. Wolhuter, Jason Fynn
This paper describes the design of a wide area digital mobile radio network intended for use in the Square Kilometer Array radio quiet zone. The stringent limitations on radio frequency emissions are a major design constraint on the system. Three bands of operation are investigated and compared based on their feasibility and potential for radio frequency interference to the astronomical receivers hosted on the site. Various measurement and analysis procedures which characterize the risks presented by the recommended system are described, as well as a field test of a procured test system setup. Finally, an overall systems design is presented. The recommended system has been deemed acceptable to be implemented in the required area.
本文介绍了一种用于平方公里阵列无线电安静区的广域数字移动无线网络的设计。对射频发射的严格限制是系统设计的主要制约因素。对三种波段的操作进行了可行性和潜在的无线电频率干扰的研究和比较。描述了描述推荐系统所呈现的风险特征的各种测量和分析程序,以及采购的测试系统设置的现场测试。最后,给出了系统总体设计方案。建议的制度已被认为可以在规定的领域实施。
{"title":"A Non-Interfering Radio Communication System for the SKA Astronomy Project: 1570902849 Contel 2023","authors":"R. Wolhuter, Jason Fynn","doi":"10.1109/ConTEL58387.2023.10199029","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199029","url":null,"abstract":"This paper describes the design of a wide area digital mobile radio network intended for use in the Square Kilometer Array radio quiet zone. The stringent limitations on radio frequency emissions are a major design constraint on the system. Three bands of operation are investigated and compared based on their feasibility and potential for radio frequency interference to the astronomical receivers hosted on the site. Various measurement and analysis procedures which characterize the risks presented by the recommended system are described, as well as a field test of a procured test system setup. Finally, an overall systems design is presented. The recommended system has been deemed acceptable to be implemented in the required area.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"163 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129270833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Squeezing the Most Out of Congestion Window for Self-Clocked Rate Adaptation Algorithm in a 5G Environment 5G环境下自时钟速率自适应算法的最大拥塞窗口挤出
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10199010
Haider Dhia Zubaydi, A. Jagmagji, S. Molnár
The congestion problem arises in current networking paradigms. Researchers seek different approaches to address this issue by proposing algorithms to control or avoid congestion. One of the primary approaches to handling efficient congestion is specifying the amount of data to be transmitted during a period, referred to as the congestion window (cwnd). This paper aims to optimize the congestion window modification by assessing and utilizing the Self-Clocked Rate Adaptation for Multimedia (SCReAM) algorithm's parameters. Our results indicate that we increased the average congestion window by 164.6% in the classic mode and 67.64% in the L4S/ECN mode.
拥塞问题出现在当前的网络模式中。研究人员寻求不同的方法来解决这个问题,提出算法来控制或避免拥塞。有效处理拥塞的主要方法之一是指定在一个时间段内要传输的数据量,该时间段称为拥塞窗口(cwnd)。本文旨在通过评估和利用多媒体自时钟速率自适应(SCReAM)算法的参数来优化拥塞窗口的修改。结果表明,经典模式和L4S/ECN模式的平均拥塞窗口分别增加了164.6%和67.64%。
{"title":"Squeezing the Most Out of Congestion Window for Self-Clocked Rate Adaptation Algorithm in a 5G Environment","authors":"Haider Dhia Zubaydi, A. Jagmagji, S. Molnár","doi":"10.1109/ConTEL58387.2023.10199010","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199010","url":null,"abstract":"The congestion problem arises in current networking paradigms. Researchers seek different approaches to address this issue by proposing algorithms to control or avoid congestion. One of the primary approaches to handling efficient congestion is specifying the amount of data to be transmitted during a period, referred to as the congestion window (cwnd). This paper aims to optimize the congestion window modification by assessing and utilizing the Self-Clocked Rate Adaptation for Multimedia (SCReAM) algorithm's parameters. Our results indicate that we increased the average congestion window by 164.6% in the classic mode and 67.64% in the L4S/ECN mode.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123997695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Data Aggregation in Cultural Heritage Monitoring: NMEC Case Study 文化遗产监测中的安全数据聚合:NMEC案例研究
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10198917
Raghda Samir, Salsabil Adel, Irene Samy, T. Ismail
Intelligent management plays a vital role in the preservation and success of cultural heritage, particularly in the context of museums. To ensure the long-term safeguarding of valuable and significant artifacts housed in museums, regular inspections are necessary. In this specific research study, the National Museum of Egyptian Civilization (NMEC) serves as a case study. To effectively monitor the museum's environment and protect its cultural assets, a wireless sensor network (WSN) is proposed. This network comprises various sensors that monitor crucial environmental factors such as temperature, humidity, and light levels. These sensors collect data, which is then aggregated using a cluster-tree-based architecture. During the aggregation process, the trust score of each node is taken into consideration when selecting cluster heads. This trust score serves as a measure of reliability and ensures that the most trustworthy nodes are responsible for data aggregation and transmission. Ultimately, the collected data is transmitted from the cluster heads (CHs) to the sink base station (BS) located outside the cultural site. To determine the optimal route for data transmission, a routing strategy is employed, considering both the path trust score and energy consumption. The path with the highest trust score and the lowest energy consumption is selected for data transmission, ensuring efficient and reliable communication within the network. The research findings indicate that the system's throughput remains stable throughout 50 sensing iterations. However, after 500 iterations, the throughput experiences a gradual decay to approximately 75% of its initial value. Additionally, the energy consumption of the network remains low, with a measurement of less than 0.2J after 500 iterations.
智能管理在文化遗产的保护和成功中起着至关重要的作用,特别是在博物馆的背景下。为了确保博物馆中珍贵和重要的文物得到长期保护,定期检查是必要的。在这项具体的研究中,埃及文明国家博物馆(NMEC)作为一个案例研究。为了有效地监测博物馆环境,保护文物,提出了一种无线传感器网络(WSN)。该网络由各种传感器组成,用于监测关键的环境因素,如温度、湿度和光照水平。这些传感器收集数据,然后使用基于集群树的架构进行聚合。在聚类过程中,选取簇头时会考虑每个节点的信任得分。该信任分数用于衡量可靠性,并确保最值得信任的节点负责数据聚合和传输。最终,收集到的数据从群集头(CHs)传输到位于文化遗址外的汇聚基站(BS)。为了确定数据传输的最优路径,采用了一种考虑路径信任评分和能量消耗的路由策略。选择信任得分最高、能耗最低的路径进行数据传输,保证网络内通信高效可靠。研究结果表明,该系统的吞吐量在50次传感迭代中保持稳定。然而,在500次迭代之后,吞吐量逐渐衰减到其初始值的大约75%。此外,网络的能量消耗仍然很低,500次迭代后的测量值小于0.2J。
{"title":"Secure Data Aggregation in Cultural Heritage Monitoring: NMEC Case Study","authors":"Raghda Samir, Salsabil Adel, Irene Samy, T. Ismail","doi":"10.1109/ConTEL58387.2023.10198917","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10198917","url":null,"abstract":"Intelligent management plays a vital role in the preservation and success of cultural heritage, particularly in the context of museums. To ensure the long-term safeguarding of valuable and significant artifacts housed in museums, regular inspections are necessary. In this specific research study, the National Museum of Egyptian Civilization (NMEC) serves as a case study. To effectively monitor the museum's environment and protect its cultural assets, a wireless sensor network (WSN) is proposed. This network comprises various sensors that monitor crucial environmental factors such as temperature, humidity, and light levels. These sensors collect data, which is then aggregated using a cluster-tree-based architecture. During the aggregation process, the trust score of each node is taken into consideration when selecting cluster heads. This trust score serves as a measure of reliability and ensures that the most trustworthy nodes are responsible for data aggregation and transmission. Ultimately, the collected data is transmitted from the cluster heads (CHs) to the sink base station (BS) located outside the cultural site. To determine the optimal route for data transmission, a routing strategy is employed, considering both the path trust score and energy consumption. The path with the highest trust score and the lowest energy consumption is selected for data transmission, ensuring efficient and reliable communication within the network. The research findings indicate that the system's throughput remains stable throughout 50 sensing iterations. However, after 500 iterations, the throughput experiences a gradual decay to approximately 75% of its initial value. Additionally, the energy consumption of the network remains low, with a measurement of less than 0.2J after 500 iterations.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114674890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection 网络入侵检测中自编码器的数据集间通用性评价
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10199097
Ivan Sicic, Nikola Petrović, Karlo Slovenec, M. Mikuc
With the improving sophistication of computer network intrusions and the rising rate of number of novel attacks, the research focus in network intrusion detection has shifted to unsupervised and semi-supervised methods that have better zero-day detection ability and their ability to generalize across different network environments. Recently published datasets that have the same flow features but different network environments and attacks have eased the research on generalisability and improved method comparison abilities. This paper aims to continue the strive towards generalisability by examining the performance of, primarily autoencoder, and PCA, in an inter-dataset network intrusion detection tasks as these methods have not yet been evaluated across different network environments. The results indicate that while the performance of the traditionally used methods does not fully transfer on different network environments, they do perform better than a random classifier.
随着计算机网络入侵复杂程度的提高和新型攻击方式的不断增多,网络入侵检测的研究重点已转向无监督和半监督方法,这些方法具有更好的零日检测能力和在不同网络环境下的泛化能力。最近发表的具有相同流特征但不同网络环境和攻击的数据集,简化了通用性的研究,提高了方法的比较能力。本文旨在通过检查自动编码器和PCA在数据集间网络入侵检测任务中的性能,继续努力实现通用性,因为这些方法尚未在不同的网络环境中进行评估。结果表明,虽然传统方法的性能在不同的网络环境中不能完全转移,但它们确实比随机分类器表现得更好。
{"title":"Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection","authors":"Ivan Sicic, Nikola Petrović, Karlo Slovenec, M. Mikuc","doi":"10.1109/ConTEL58387.2023.10199097","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199097","url":null,"abstract":"With the improving sophistication of computer network intrusions and the rising rate of number of novel attacks, the research focus in network intrusion detection has shifted to unsupervised and semi-supervised methods that have better zero-day detection ability and their ability to generalize across different network environments. Recently published datasets that have the same flow features but different network environments and attacks have eased the research on generalisability and improved method comparison abilities. This paper aims to continue the strive towards generalisability by examining the performance of, primarily autoencoder, and PCA, in an inter-dataset network intrusion detection tasks as these methods have not yet been evaluated across different network environments. The results indicate that while the performance of the traditionally used methods does not fully transfer on different network environments, they do perform better than a random classifier.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unified Course Module on 5G and Fixed 5G Networks 5G与固定5G网络统一课程模块
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10198907
D. Uzunidis, G. Pagiatakis, I. Moscholios, M. Logothetis
This paper analyzes a course module on the five Generations of wireless and fixed networks which was presented as a part of the undergraduate course “Broadband Communications”. This course was offered at the Dept. of Electrical & Electronic Engineering, School of Pedagogical & Technological Education (ASPETE), Athens, Greece. The main objective of this module is three-fold. First, to introduce the students to the fixed generations taxonomy, the definition of which is assigned to the currently formed ETSI Industry Specification Group (ISG) F5G. Secondly, to unify the students” knowledge accumulated during their previous telecom-related courses as it was totally decoupled in two parts, either wireless or optical. Finally, to discuss the state-of-the-art technology, paving the way for the students to enter as professionals the fifth-generation era. The course module covered six teaching hours at the final 1.5 week of “Broadband Communications” course. To evaluate the impact of this module, the students were asked to fill a questionnaire upon module completion.
本文分析了本科《宽带通信》课程中关于五代无线和固定网络的课程模块。本课程由希腊雅典教育与技术教育学院(ASPETE)电气与电子工程系开设。本模块的主要目标有三个方面。首先,向学生们介绍固定代分类法,其定义分配给目前成立的ETSI行业规范组(ISG) F5G。其次,将学生在之前的电信相关课程中积累的知识统一起来,因为它完全解耦为无线和光学两部分。最后,讨论最先进的技术,为学生作为专业人士进入第五代时代铺平道路。本课程模块涵盖了“宽带通信”课程最后1.5周的6课时。为了评估这个模块的影响,学生们被要求在模块完成后填写一份问卷。
{"title":"A Unified Course Module on 5G and Fixed 5G Networks","authors":"D. Uzunidis, G. Pagiatakis, I. Moscholios, M. Logothetis","doi":"10.1109/ConTEL58387.2023.10198907","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10198907","url":null,"abstract":"This paper analyzes a course module on the five Generations of wireless and fixed networks which was presented as a part of the undergraduate course “Broadband Communications”. This course was offered at the Dept. of Electrical & Electronic Engineering, School of Pedagogical & Technological Education (ASPETE), Athens, Greece. The main objective of this module is three-fold. First, to introduce the students to the fixed generations taxonomy, the definition of which is assigned to the currently formed ETSI Industry Specification Group (ISG) F5G. Secondly, to unify the students” knowledge accumulated during their previous telecom-related courses as it was totally decoupled in two parts, either wireless or optical. Finally, to discuss the state-of-the-art technology, paving the way for the students to enter as professionals the fifth-generation era. The course module covered six teaching hours at the final 1.5 week of “Broadband Communications” course. To evaluate the impact of this module, the students were asked to fill a questionnaire upon module completion.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121454571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical Modeling of the Influence of Connection Handoff on Blocking Probabilities in 5G Mobile Networks 5G移动网络中连接切换对阻塞概率影响的分析建模
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10198886
M. Głąbowski, M. Sobieraj
The paper proposes an analytical approach to occupancy distribution and blocking probability calculation in 5G mobile networks with connection handoff mechanisms, carrying a mixture of multiple traffic streams generated by multi-service sources. The results of analytical calculations of the blocking probability in a group of 5G cells are compared with the simulation data.
本文提出了一种具有连接切换机制的5G移动网络中承载多业务源产生的多流量混合流的占用分布和阻塞概率计算的分析方法。对一组5G小区阻塞概率的分析计算结果与仿真数据进行了比较。
{"title":"Analytical Modeling of the Influence of Connection Handoff on Blocking Probabilities in 5G Mobile Networks","authors":"M. Głąbowski, M. Sobieraj","doi":"10.1109/ConTEL58387.2023.10198886","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10198886","url":null,"abstract":"The paper proposes an analytical approach to occupancy distribution and blocking probability calculation in 5G mobile networks with connection handoff mechanisms, carrying a mixture of multiple traffic streams generated by multi-service sources. The results of analytical calculations of the blocking probability in a group of 5G cells are compared with the simulation data.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127429454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Secure Variants of the MQTT Protocol on Resource-Constraint Devices for Precision Agriculture 评估精准农业资源约束设备上MQTT协议的安全变体
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10199102
Mislav Has, M. Kusek, Ivana Podnar Žarko
When it comes to securing IoT communication, it is critical to employ secure communication technologies that can ensure that sensitive information exchanged between IoT devices and fog/edge/cloud services remains confidential. Since typical IoT devices are resource-constraint, it is challenging to use and deploy secure IoT protocols on such devices: It is thus critical to study the overhead of such protocols for resource-constrained devices, as it significantly affects the performance of an overall IoT solution. In this paper, we analyze the secure variants of the widely used messaging protocol MQ Telemetry Transport (MQTT), namely MQTT with TLS and MQTT with AES. We report the results of our performance evaluation in the context of an IoT solution for Precision Agriculture using an STM32 microcontroller with an NB-IoT module to compare these variants with plain MQTT and determine the most appropriate options based on the amount of data transmitted and achieved security level.
在保护物联网通信时,采用安全通信技术至关重要,这些技术可以确保物联网设备与雾/边缘/云服务之间交换的敏感信息保密。由于典型的物联网设备是资源受限的,因此在此类设备上使用和部署安全的物联网协议具有挑战性:因此,研究资源受限设备的此类协议的开销至关重要,因为它会显著影响整体物联网解决方案的性能。本文分析了广泛使用的消息协议MQ遥测传输(MQTT)的安全变体,即带TLS的MQTT和带AES的MQTT。我们报告了我们在精准农业物联网解决方案背景下的性能评估结果,使用带有NB-IoT模块的STM32微控制器将这些变体与普通MQTT进行比较,并根据传输的数据量和实现的安全级别确定最合适的选项。
{"title":"Evaluating Secure Variants of the MQTT Protocol on Resource-Constraint Devices for Precision Agriculture","authors":"Mislav Has, M. Kusek, Ivana Podnar Žarko","doi":"10.1109/ConTEL58387.2023.10199102","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199102","url":null,"abstract":"When it comes to securing IoT communication, it is critical to employ secure communication technologies that can ensure that sensitive information exchanged between IoT devices and fog/edge/cloud services remains confidential. Since typical IoT devices are resource-constraint, it is challenging to use and deploy secure IoT protocols on such devices: It is thus critical to study the overhead of such protocols for resource-constrained devices, as it significantly affects the performance of an overall IoT solution. In this paper, we analyze the secure variants of the widely used messaging protocol MQ Telemetry Transport (MQTT), namely MQTT with TLS and MQTT with AES. We report the results of our performance evaluation in the context of an IoT solution for Precision Agriculture using an STM32 microcontroller with an NB-IoT module to compare these variants with plain MQTT and determine the most appropriate options based on the amount of data transmitted and achieved security level.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122904139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smartphone Beam Profile in a Screen-to-Camera-Based Optical Communication System 基于屏幕到摄像头的光通信系统中的智能手机光束轮廓
Pub Date : 2023-07-11 DOI: 10.1109/ConTEL58387.2023.10199032
Vaigai Nayaki Yokar, H. Le‐Minh, Zabih Ghassemlooy, Othman Isam Younus, L. N. Alves, W. Woo, Turky Almutairi
This paper presents an experimental investigation of a screen-to-camera-based communication (S2C) system. The study examines the performance of the smartphone transmitter (Tx) screen in terms of power received, beam profile, and Lambertian order as well as evaluates the impact of different transmission conditions such as distance, tilt, and rotation angles. The results demonstrate that for the line of sight (LOS) link, the Tx has an average Lambertian order of 3.5 and a transmission accuracy of over 100%. Overall, the study demonstrates the potential of optical camera communication technology for the development of efficient and reliable S2C systems.
本文介绍了一种基于屏幕到摄像机的通信(S2C)系统的实验研究。该研究考察了智能手机发射机(Tx)屏幕在接收功率、波束轮廓和兰伯阶等方面的性能,并评估了不同传输条件(如距离、倾斜和旋转角度)的影响。结果表明,对于视距(LOS)链路,Tx的平均朗伯阶为3.5,传输精度超过100%。总体而言,该研究证明了光学摄像机通信技术在开发高效可靠的S2C系统方面的潜力。
{"title":"Smartphone Beam Profile in a Screen-to-Camera-Based Optical Communication System","authors":"Vaigai Nayaki Yokar, H. Le‐Minh, Zabih Ghassemlooy, Othman Isam Younus, L. N. Alves, W. Woo, Turky Almutairi","doi":"10.1109/ConTEL58387.2023.10199032","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199032","url":null,"abstract":"This paper presents an experimental investigation of a screen-to-camera-based communication (S2C) system. The study examines the performance of the smartphone transmitter (Tx) screen in terms of power received, beam profile, and Lambertian order as well as evaluates the impact of different transmission conditions such as distance, tilt, and rotation angles. The results demonstrate that for the line of sight (LOS) link, the Tx has an average Lambertian order of 3.5 and a transmission accuracy of over 100%. Overall, the study demonstrates the potential of optical camera communication technology for the development of efficient and reliable S2C systems.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 17th International Conference on Telecommunications (ConTEL)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1