首页 > 最新文献

2018 Global Information Infrastructure and Networking Symposium (GIIS)最新文献

英文 中文
Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications 基于voronoi的大规模分布式应用备份路由研究
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635645
M. Grey, Markus Theil, M. Rossberg, G. Schäfer
The advent of critical applications that rely on Internet-based communication sheds light upon the robustness limitations of todays’s Internet infrastructure. A well-known expedient are overlay applications that provide means to reroute traffic in case of network failures, but the induced overhead of existing techniques is often considered prohibitively high. Within this work we present a highly scalable backup path mechanism for large-scale distributed applications that makes use of a spherical Voronoi-based technique for peer organization and a position-dependent path selection strategy. The achieved resilience benefit of the resulting backup paths is evaluated with simulations based on real-world data, which show that connection loss in about 75% of wide-area network failures can be avoided by only two proactively selected backup peers.
依赖于基于Internet的通信的关键应用程序的出现,揭示了当今Internet基础设施的健壮性限制。一个众所周知的权宜之计是覆盖应用程序,它提供了在网络故障时重新路由流量的方法,但是现有技术的开销通常被认为过高。在这项工作中,我们为大规模分布式应用程序提供了一种高度可扩展的备份路径机制,该机制利用基于球形voronoi的对等组织技术和位置依赖的路径选择策略。通过基于真实世界数据的模拟评估了由此产生的备份路径的弹性效益,结果表明,只有两个主动选择的备份对等体可以避免约75%的广域网故障中的连接丢失。
{"title":"Towards Voronoi-Based Backup Routing for Large-Scale Distributed Applications","authors":"M. Grey, Markus Theil, M. Rossberg, G. Schäfer","doi":"10.1109/GIIS.2018.8635645","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635645","url":null,"abstract":"The advent of critical applications that rely on Internet-based communication sheds light upon the robustness limitations of todays’s Internet infrastructure. A well-known expedient are overlay applications that provide means to reroute traffic in case of network failures, but the induced overhead of existing techniques is often considered prohibitively high. Within this work we present a highly scalable backup path mechanism for large-scale distributed applications that makes use of a spherical Voronoi-based technique for peer organization and a position-dependent path selection strategy. The achieved resilience benefit of the resulting backup paths is evaluated with simulations based on real-world data, which show that connection loss in about 75% of wide-area network failures can be avoided by only two proactively selected backup peers.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124787672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling the Energy Consumption of LoRaWAN in ns-3 Based on Real World Measurements 基于实际测量的ns-3中LoRaWAN的能耗建模
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635786
J. Finnegan, Stephen Brown, R. Farrell
LPWAN technologies are defined by their focus on extended coverage while maintaining energy efficiency, at the expense of data throughput. In this research we enable the analysis of LoRa, a key LPWAN technology, in terms of energy efficiency. We perform real-world measurements of a standard LoRa chip and use the results to develop an energy consumption module in ns-3. Our contributions are an analysis of the energy consumption of different states in a LoRa transmission by the SX1272, the LoRa transceiver that is used in most common LoRaWAN devices, beyond what is provided in the datasheet, and an energy consumption module for use in three of the LoRaWAN ns-3 modules described in research, enabling more accurate energy consumption analysis of LoRa-based systems.
LPWAN技术专注于扩展覆盖范围,同时保持能源效率,以牺牲数据吞吐量为代价。在本研究中,我们从能源效率的角度分析了LPWAN的关键技术LoRa。我们对标准LoRa芯片进行了实际测量,并使用结果开发了ns-3中的能耗模块。我们的贡献是分析SX1272在LoRa传输中不同状态的能耗,SX1272是最常见的LoRaWAN设备中使用的LoRa收发器,超出了数据表中提供的内容,以及用于研究中描述的三个LoRaWAN ns-3模块的能耗模块,从而能够更准确地分析基于LoRa的系统的能耗。
{"title":"Modeling the Energy Consumption of LoRaWAN in ns-3 Based on Real World Measurements","authors":"J. Finnegan, Stephen Brown, R. Farrell","doi":"10.1109/GIIS.2018.8635786","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635786","url":null,"abstract":"LPWAN technologies are defined by their focus on extended coverage while maintaining energy efficiency, at the expense of data throughput. In this research we enable the analysis of LoRa, a key LPWAN technology, in terms of energy efficiency. We perform real-world measurements of a standard LoRa chip and use the results to develop an energy consumption module in ns-3. Our contributions are an analysis of the energy consumption of different states in a LoRa transmission by the SX1272, the LoRa transceiver that is used in most common LoRaWAN devices, beyond what is provided in the datasheet, and an energy consumption module for use in three of the LoRaWAN ns-3 modules described in research, enabling more accurate energy consumption analysis of LoRa-based systems.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Adaptation of Carrier Sensing Threshold to Increase Throughput in Dense 802.11ac Wireless Networks 采用载波感知阈值提高密集802.11ac无线网络的吞吐量
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635766
O. Topal, Günes Karabulut-Kurt, Akin Soysal
Carrier sensing mechanisms in many of today’s wireless devices are based on virtual carrier sensing and physical carrier sensing. Virtual carrier sensing functions through the use of request to send and clear to send handshake signaling. Physical carrier sensing makes use of the carrier sense threshold (CST), which indeed aims to mitigate the collisions and interference related problems. In densely deployed networks, however, such classic carrier sensing mechanisms limit the spatial reuse rate, which can result in unsatisfied user demands. In this paper, an adaptive carrier sensing algorithm, which adjusts the CST depending on the overall throughput gain and fairness among the networks, is proposed to increase the spatial reuse and the system throughput. The connectivity issue of the associated clients has been addressed. As a first step, the effect of CST change is investigated in terms of airtime usage, fairness and different node densities in a simple grid 802.11ac dense network deployment. The performance evaluation of the proposed approach is done by using Network Simulator-3 (ns-3). Simulation results show that with the use of the proposed approach, the overall system throughput can be increased by as much as 100% of the throughput provided by the traditional carrier sense multiple access (CSMA)protocol.
目前许多无线设备中的载波感知机制都是基于虚拟载波感知和物理载波感知。虚拟载波感知功能通过使用请求发送和清除发送握手信令实现。物理载波感知利用载波感知阈值(CST),其目的确实是为了减轻碰撞和干扰相关的问题。然而,在密集部署的网络中,这种经典的载波感知机制限制了空间复用率,可能导致用户需求得不到满足。本文提出了一种自适应载波感知算法,该算法根据网络间的总体吞吐量增益和公平性来调整CST,以提高空间复用和系统吞吐量。关联客户端的连通性问题已经解决。作为第一步,在简单的网格802.11ac密集网络部署中,从通话时间使用、公平性和不同节点密度方面研究了CST变化的影响。利用Network Simulator-3 (ns-3)对该方法进行了性能评估。仿真结果表明,采用该方法,系统整体吞吐量比传统的载波感知多址(CSMA)协议提高了100%。
{"title":"Adaptation of Carrier Sensing Threshold to Increase Throughput in Dense 802.11ac Wireless Networks","authors":"O. Topal, Günes Karabulut-Kurt, Akin Soysal","doi":"10.1109/GIIS.2018.8635766","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635766","url":null,"abstract":"Carrier sensing mechanisms in many of today’s wireless devices are based on virtual carrier sensing and physical carrier sensing. Virtual carrier sensing functions through the use of request to send and clear to send handshake signaling. Physical carrier sensing makes use of the carrier sense threshold (CST), which indeed aims to mitigate the collisions and interference related problems. In densely deployed networks, however, such classic carrier sensing mechanisms limit the spatial reuse rate, which can result in unsatisfied user demands. In this paper, an adaptive carrier sensing algorithm, which adjusts the CST depending on the overall throughput gain and fairness among the networks, is proposed to increase the spatial reuse and the system throughput. The connectivity issue of the associated clients has been addressed. As a first step, the effect of CST change is investigated in terms of airtime usage, fairness and different node densities in a simple grid 802.11ac dense network deployment. The performance evaluation of the proposed approach is done by using Network Simulator-3 (ns-3). Simulation results show that with the use of the proposed approach, the overall system throughput can be increased by as much as 100% of the throughput provided by the traditional carrier sense multiple access (CSMA)protocol.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree 基于CART决策树的智能电网异常入侵检测系统
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635743
Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis
The Smart Grid (SG) paradigm constitutes the new technological evolution of the traditional electrical grid, providing remote monitoring and controlling capabilities among all its operations through computing services. These new capabilities offer a lot of benefits, such as better energy management, increased reliability and security, as well as more economical pricing. However, despite these advantages, it introduces significant security challenges, as the computing systems and the corresponding communications are characterized by several cybersecurity threats. An efficient solution against cyberattacks is the Intrusion Detection Systems (IDS). These systems usually operate as a second line of defence and have the ability to detect or even prevent cyberattacks in near real-time. In this paper, we present a new IDS for the Advanced Metering Infrastructure (AMI) utilizing machine learning capabilities based on a decision tree. Decision trees have been used for multiple classification problems like the distinguishment between the normal and malicious activities. The experimental evaluation demonstrates the efficiency of the proposed IDS, as the Accuracy and the True Positive Rate of our IDS reach 0.996 and 0.993 respectively.
智能电网(SG)范式构成了传统电网的新技术演变,通过计算服务在其所有操作中提供远程监控能力。这些新功能带来了很多好处,比如更好的能源管理、更高的可靠性和安全性,以及更经济的价格。然而,尽管有这些优势,它引入了重大的安全挑战,因为计算系统和相应的通信具有几个网络安全威胁的特征。入侵检测系统(IDS)是对抗网络攻击的有效解决方案。这些系统通常作为第二道防线,具有检测甚至实时阻止网络攻击的能力。在本文中,我们提出了一种基于决策树的机器学习能力的高级计量基础设施(AMI)的新IDS。决策树已被用于多种分类问题,如区分正常活动和恶意活动。实验验证了该方法的有效性,检测准确率和真阳性率分别达到0.996和0.993。
{"title":"An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree","authors":"Panagiotis I. Radoglou-Grammatikis, P. Sarigiannidis","doi":"10.1109/GIIS.2018.8635743","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635743","url":null,"abstract":"The Smart Grid (SG) paradigm constitutes the new technological evolution of the traditional electrical grid, providing remote monitoring and controlling capabilities among all its operations through computing services. These new capabilities offer a lot of benefits, such as better energy management, increased reliability and security, as well as more economical pricing. However, despite these advantages, it introduces significant security challenges, as the computing systems and the corresponding communications are characterized by several cybersecurity threats. An efficient solution against cyberattacks is the Intrusion Detection Systems (IDS). These systems usually operate as a second line of defence and have the ability to detect or even prevent cyberattacks in near real-time. In this paper, we present a new IDS for the Advanced Metering Infrastructure (AMI) utilizing machine learning capabilities based on a decision tree. Decision trees have been used for multiple classification problems like the distinguishment between the normal and malicious activities. The experimental evaluation demonstrates the efficiency of the proposed IDS, as the Accuracy and the True Positive Rate of our IDS reach 0.996 and 0.993 respectively.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122156088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Detection of LDDoS Attacks Based on TCP Connection Parameters 基于TCP连接参数的ddos攻击检测
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635701
Michael Siracusano, S. Shiaeles, B. Ghita
Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy. They force vulnerable webservers to open all available connections to the adversary, denying resources to real users. Mitigation advice focuses on solutions that potentially degrade quality of service for legitimate connections. Furthermore, without accurate detection mechanisms, distributed attacks can bypass these defences. A methodology for detection of LDDoS attacks, based on characteristics of malicious TCP flows, is proposed within this paper. Research will be conducted using combinations of two datasets: one generated from a simulated network, the other from the publically available CIC DoS dataset. Both contain the attacks slowread, slowheaders and slowbody, alongside legitimate web browsing. TCP flow features are extracted from all connections. Experimentation was carried out using six supervised AI algorithms to categorise attack from legitimate flows. Decision trees and kNN accurately classified up to 99.99% of flows, with exceptionally low false positive and false negative rates, demonstrating the potential of AI in LDDoS detection.
低速率应用层分布式拒绝服务(ddos)攻击既强大又隐蔽。它们迫使易受攻击的web服务器向攻击者打开所有可用的连接,拒绝向真实用户提供资源。缓解建议侧重于可能降低合法连接服务质量的解决方案。此外,如果没有准确的检测机制,分布式攻击可以绕过这些防御。本文提出了一种基于恶意TCP流特征的ddos攻击检测方法。研究将使用两个数据集的组合进行:一个来自模拟网络,另一个来自公开的CIC DoS数据集。两者都包含攻击slowread, slowwheaders和slowbody,以及合法的网页浏览。从所有连接中提取TCP流特征。实验使用六种有监督的人工智能算法对合法流量的攻击进行分类。决策树和kNN可准确分类高达99.99%的流量,假阳性和假阴性率极低,证明了AI在LDDoS检测中的潜力。
{"title":"Detection of LDDoS Attacks Based on TCP Connection Parameters","authors":"Michael Siracusano, S. Shiaeles, B. Ghita","doi":"10.1109/GIIS.2018.8635701","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635701","url":null,"abstract":"Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy. They force vulnerable webservers to open all available connections to the adversary, denying resources to real users. Mitigation advice focuses on solutions that potentially degrade quality of service for legitimate connections. Furthermore, without accurate detection mechanisms, distributed attacks can bypass these defences. A methodology for detection of LDDoS attacks, based on characteristics of malicious TCP flows, is proposed within this paper. Research will be conducted using combinations of two datasets: one generated from a simulated network, the other from the publically available CIC DoS dataset. Both contain the attacks slowread, slowheaders and slowbody, alongside legitimate web browsing. TCP flow features are extracted from all connections. Experimentation was carried out using six supervised AI algorithms to categorise attack from legitimate flows. Decision trees and kNN accurately classified up to 99.99% of flows, with exceptionally low false positive and false negative rates, demonstrating the potential of AI in LDDoS detection.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Diversity in Direct Mobile-to-Mobile Communication Systems: An Experimental Approach 直接移动到移动通信系统的多样性:一种实验方法
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635726
K. Maliatsos, L. Marantis, P. Bithas, A. Kanatas
-5G aspires to be the technology that will create, support and enhance automation and industry digitization use cases providing inherent support to device-centric communications, i.e., vehicular (V2X) and Device-to-Device (D2D) communications, tactile internet, as well as Internet-of-Things (IoT) applications. Moreover, 5G deployment options include support of multiple (novel and established) radio access networks (RAN). In this multi-RAN, massive machine-type communication environment, a variety of broadcast, multicast and unicast applications must be simultaneously supported. In this work, we present an implementation of a diversity engine enabled by adaptive, novel, printed ESPAR antennas. The scheme improves system performance in terms of reliability and throughput with increased Signal-to-Noise Ratio (SNR) with simultaneous broadcast and directive support. The scheme was implemented and demonstrated for vehicular use cases in the context of the Horizon 2020 project ROADART.
5g希望成为一种技术,能够创造、支持和增强自动化和工业数字化用例,为以设备为中心的通信提供内在支持,即车辆(V2X)和设备对设备(D2D)通信、触觉互联网以及物联网(IoT)应用。此外,5G部署选项包括支持多个(新的和已建立的)无线接入网络(RAN)。在这种多ran、大规模机器型通信环境中,必须同时支持多种广播、组播和单播应用。在这项工作中,我们提出了一种由自适应、新颖的印刷ESPAR天线实现的分集引擎。该方案在可靠性和吞吐量方面提高了系统性能,提高了信噪比(SNR),同时支持广播和指令。该方案在地平线2020项目ROADART的背景下实施并演示了车辆用例。
{"title":"Diversity in Direct Mobile-to-Mobile Communication Systems: An Experimental Approach","authors":"K. Maliatsos, L. Marantis, P. Bithas, A. Kanatas","doi":"10.1109/GIIS.2018.8635726","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635726","url":null,"abstract":"-5G aspires to be the technology that will create, support and enhance automation and industry digitization use cases providing inherent support to device-centric communications, i.e., vehicular (V2X) and Device-to-Device (D2D) communications, tactile internet, as well as Internet-of-Things (IoT) applications. Moreover, 5G deployment options include support of multiple (novel and established) radio access networks (RAN). In this multi-RAN, massive machine-type communication environment, a variety of broadcast, multicast and unicast applications must be simultaneously supported. In this work, we present an implementation of a diversity engine enabled by adaptive, novel, printed ESPAR antennas. The scheme improves system performance in terms of reliability and throughput with increased Signal-to-Noise Ratio (SNR) with simultaneous broadcast and directive support. The scheme was implemented and demonstrated for vehicular use cases in the context of the Horizon 2020 project ROADART.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Grid Architecture, Communications and Data Model: The WiseGRID approach 智能电网架构、通信和数据模型:WiseGRID方法
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635708
D. Stratogiannis, Stamatia Gkiala-Fikari
Current technical, social, economic and environmental trends impose the optimization of power grid and energy management via the digitalization and Smart Grid (SG) development. The SG incorporates advanced communications and pervasive computing capabilities ensuring improvement in terms of control, efficiency, reliability, flexibility and safety along with novel advanced services to customers and business actors in the energy market. In this paper, the architecture, communications and enhanced data model developed under the WiseGRID project are presented, exploring the main challenges and requirements for the design and deployment of the ICT infrastructure required as part of a complex SG system. In particular, in this work special focus is given on the Smart Grid Architecture Model (SGAM) employed and on two of the main ICT tools developed to establish the interoperability among the entities involved in the SG. Finally, the work performed towards the development of a harmonized data model for SGs is presented in order to be used during the demonstration phase of the project.
当前的技术、社会、经济和环境趋势通过数字化和智能电网(SG)的发展对电网和能源管理进行了优化。SG集成了先进的通信和普适性计算能力,确保了在控制、效率、可靠性、灵活性和安全性方面的改进,并为能源市场的客户和业务参与者提供了新颖的先进服务。本文介绍了在WiseGRID项目下开发的体系结构、通信和增强数据模型,探讨了设计和部署作为复杂SG系统一部分所需的ICT基础设施的主要挑战和要求。特别是,本工作特别关注所采用的智能电网架构模型(SGAM)和为在SG中涉及的实体之间建立互操作性而开发的两个主要ICT工具。最后,介绍了为SGs开发统一数据模型所做的工作,以便在项目的演示阶段使用。
{"title":"Smart Grid Architecture, Communications and Data Model: The WiseGRID approach","authors":"D. Stratogiannis, Stamatia Gkiala-Fikari","doi":"10.1109/GIIS.2018.8635708","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635708","url":null,"abstract":"Current technical, social, economic and environmental trends impose the optimization of power grid and energy management via the digitalization and Smart Grid (SG) development. The SG incorporates advanced communications and pervasive computing capabilities ensuring improvement in terms of control, efficiency, reliability, flexibility and safety along with novel advanced services to customers and business actors in the energy market. In this paper, the architecture, communications and enhanced data model developed under the WiseGRID project are presented, exploring the main challenges and requirements for the design and deployment of the ICT infrastructure required as part of a complex SG system. In particular, in this work special focus is given on the Smart Grid Architecture Model (SGAM) employed and on two of the main ICT tools developed to establish the interoperability among the entities involved in the SG. Finally, the work performed towards the development of a harmonized data model for SGs is presented in order to be used during the demonstration phase of the project.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Throughput-Aware RRHs Clustering in Cloud Radio Access Networks 云无线接入网中感知吞吐量的RRHs聚类
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635647
Nazih Salhab, Rana Rahim, R. Langar
Cloud-Radio Access Network (C-RAN) is an attractive solution to Mobile Network Operators. Firstly, C-RAN leverages the effect of pooling multiple Baseband Units (BBUs) to offer centralized processing resources while hosting them on cloud. This results in multiple benefits ranging from statistical multiplexing gains, to energy efficiency. Secondly, C-RAN allows deploying Remote Radio Heads (RRHs) in proximity of end-users allowing exploiting Inter-Cell Interference Cancellation (ICIC) to maximize throughput by coordinating multiple RRHs. In this context, we propose, in this paper, a new throughput-aware RRHs clustering method for C-RAN that maximizes the throughput for end-users, while meeting multiple constrained resources on BBUs. Our approach consists of two stages: First, individual throughput value and requirements of each RRH are calculated taking into account the Signal-to-Interference-plus-Noise Ratio (SINR) values and the distance between RRHs and users. Then, they are included into a k-dimensional Multiple-Choice Knapsack Problem (k-MCKP) subject to several constraints in terms of required resources in order to form RRHs clusters that maximize the global throughput. Simulation results demonstrate the good performance of our proposal in terms of end-users throughput, spectral efficiency and execution time, when compared with the optimal solution and the basic strategy using no-clustering scenarios.
云无线接入网(C-RAN)对移动网络运营商来说是一个很有吸引力的解决方案。首先,C-RAN利用池化多个基带单元(bbu)的效果来提供集中的处理资源,同时将它们托管在云上。这带来了多种好处,从统计复用增益到能源效率。其次,C-RAN允许在终端用户附近部署远程无线电头(RRHs),允许利用小区间干扰消除(ICIC)通过协调多个RRHs来最大化吞吐量。在此背景下,本文提出了一种新的C-RAN吞吐量感知RRHs聚类方法,该方法可以在满足BBUs上多个约束资源的同时最大化最终用户的吞吐量。我们的方法包括两个阶段:首先,考虑到信噪比(SINR)值和RRH与用户之间的距离,计算每个RRH的单个吞吐量值和要求。然后,将它们纳入k维多项选择背包问题(k-MCKP)中,并根据所需资源进行若干约束,以形成最大化全球吞吐量的RRHs集群。仿真结果表明,在终端用户吞吐量、频谱效率和执行时间方面,与使用无集群场景的最优解决方案和基本策略相比,我们的建议具有良好的性能。
{"title":"Throughput-Aware RRHs Clustering in Cloud Radio Access Networks","authors":"Nazih Salhab, Rana Rahim, R. Langar","doi":"10.1109/GIIS.2018.8635647","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635647","url":null,"abstract":"Cloud-Radio Access Network (C-RAN) is an attractive solution to Mobile Network Operators. Firstly, C-RAN leverages the effect of pooling multiple Baseband Units (BBUs) to offer centralized processing resources while hosting them on cloud. This results in multiple benefits ranging from statistical multiplexing gains, to energy efficiency. Secondly, C-RAN allows deploying Remote Radio Heads (RRHs) in proximity of end-users allowing exploiting Inter-Cell Interference Cancellation (ICIC) to maximize throughput by coordinating multiple RRHs. In this context, we propose, in this paper, a new throughput-aware RRHs clustering method for C-RAN that maximizes the throughput for end-users, while meeting multiple constrained resources on BBUs. Our approach consists of two stages: First, individual throughput value and requirements of each RRH are calculated taking into account the Signal-to-Interference-plus-Noise Ratio (SINR) values and the distance between RRHs and users. Then, they are included into a k-dimensional Multiple-Choice Knapsack Problem (k-MCKP) subject to several constraints in terms of required resources in order to form RRHs clusters that maximize the global throughput. Simulation results demonstrate the good performance of our proposal in terms of end-users throughput, spectral efficiency and execution time, when compared with the optimal solution and the basic strategy using no-clustering scenarios.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130332864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Joint Power Allocation and Transmission Time Selection in Duty-cycled Wireless Sensor Networks 无线传感器网络中联合功率分配与传输时间选择
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635725
Christos N. Efrem, A. Panagopoulos
Energy-aware resource allocation plays an important role in battery-limited wireless sensor networks (WSNs), as it improves network performance, in terms of energy savings, and prolongs network lifetime as well. In this paper, we study a duty-cycled WSN where the sensor nodes transmit their data simultaneously to a central access point and then return to sleep mode (this process is repeated in each time period). In particular, we propose a joint power allocation and transmission time selection algorithm in order to minimize the maximum energy consumption of the sensor nodes, under power and time constraints as well as quality-of-service (QoS) requirements. In the problem formulation, we also take into account the circuit energy consumption of each sensor node. Moreover, the proposed algorithm, which is based on a successive convex approximation method, converges very quickly and achieves a Karush-Kuhn-Tucker (KKT) solution for the problem. Finally, numerical results reveal that the proposed technique provides significant performance gain when compared to a baseline scheme.
在电池有限的无线传感器网络(WSNs)中,能量感知的资源分配具有重要的作用,因为它可以提高网络性能、节约能源并延长网络寿命。在本文中,我们研究了一个占空比WSN,其中传感器节点将其数据同时传输到中心接入点,然后返回到睡眠模式(该过程在每个时间段重复)。特别是,我们提出了一种联合功率分配和传输时间选择算法,以便在功率和时间约束以及服务质量(QoS)要求下最小化传感器节点的最大能量消耗。在问题的表述中,我们还考虑了每个传感器节点的电路能耗。此外,该算法基于连续凸逼近方法,收敛速度非常快,并实现了问题的Karush-Kuhn-Tucker (KKT)解。最后,数值结果表明,与基线方案相比,该技术提供了显着的性能增益。
{"title":"Joint Power Allocation and Transmission Time Selection in Duty-cycled Wireless Sensor Networks","authors":"Christos N. Efrem, A. Panagopoulos","doi":"10.1109/GIIS.2018.8635725","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635725","url":null,"abstract":"Energy-aware resource allocation plays an important role in battery-limited wireless sensor networks (WSNs), as it improves network performance, in terms of energy savings, and prolongs network lifetime as well. In this paper, we study a duty-cycled WSN where the sensor nodes transmit their data simultaneously to a central access point and then return to sleep mode (this process is repeated in each time period). In particular, we propose a joint power allocation and transmission time selection algorithm in order to minimize the maximum energy consumption of the sensor nodes, under power and time constraints as well as quality-of-service (QoS) requirements. In the problem formulation, we also take into account the circuit energy consumption of each sensor node. Moreover, the proposed algorithm, which is based on a successive convex approximation method, converges very quickly and achieves a Karush-Kuhn-Tucker (KKT) solution for the problem. Finally, numerical results reveal that the proposed technique provides significant performance gain when compared to a baseline scheme.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Copyright notice] (版权)
Pub Date : 2018-10-01 DOI: 10.1109/giis.2018.8635702
{"title":"[Copyright notice]","authors":"","doi":"10.1109/giis.2018.8635702","DOIUrl":"https://doi.org/10.1109/giis.2018.8635702","url":null,"abstract":"","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 Global Information Infrastructure and Networking Symposium (GIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1