首页 > 最新文献

2018 Global Information Infrastructure and Networking Symposium (GIIS)最新文献

英文 中文
Adaptive Hybrid Scheme for Cooperative Communications 协同通信的自适应混合方案
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635731
Youstina Megalli, Wassim Alexan, A. El-Mahdy
Future wireless communication networks require stringent specifications in terms of much higher bit rates and reduced network energy usage. In this paper, a hybrid adaptive relaying technique is proposed to toggle between the full duplex (FD) and the half duplex (HD) relaying modes and at the same time selects between amplify-and-forward (AF) and decode-and-forward (DF) protocols according to certain criteria. The toggling between the FD and the HD relaying modes is carried out to improve the data rates with a trade-off in the bit-error-rate (BER) performance. FD has full data rate at the expense of the residual self interference (RSI) which deteriorates the BER performance. On the other hand, HD does not suffer from RSI, but it does so at the expense of halving the data rate of FD. Moreover, toggling between AF and DF for the relay is a trade-off between good performance provided by DF at the expense of complexity. Complexity is reduced by using AF at the expense of higher BER. Thus, two toggling thresholds are determined in order to toggle between FD and HD, as well as AF and DF. The performance of the proposed hybrid adaptive mode is evaluated by means of BER and capacity curves.
未来的无线通信网络在更高的比特率和更低的网络能耗方面需要严格的规范。本文提出了一种混合自适应中继技术,在全双工(FD)和半双工(HD)中继模式之间切换,同时根据一定的标准在放大转发(AF)和解码转发(DF)协议之间进行选择。FD和HD中继模式之间的切换是为了在误码率(BER)性能的权衡下提高数据速率。FD具有完全的数据速率,但其代价是残余自干扰(RSI),而RSI会降低误码率性能。另一方面,HD不会受到RSI的影响,但这样做的代价是将FD的数据速率减半。此外,在中继的AF和DF之间切换是在DF提供的良好性能与复杂性之间的权衡。以更高的误码率为代价使用自动对焦降低了复杂性。因此,为了在FD和HD之间以及AF和DF之间切换,确定了两个切换阈值。利用误码率曲线和容量曲线对混合自适应模式的性能进行了评价。
{"title":"Adaptive Hybrid Scheme for Cooperative Communications","authors":"Youstina Megalli, Wassim Alexan, A. El-Mahdy","doi":"10.1109/GIIS.2018.8635731","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635731","url":null,"abstract":"Future wireless communication networks require stringent specifications in terms of much higher bit rates and reduced network energy usage. In this paper, a hybrid adaptive relaying technique is proposed to toggle between the full duplex (FD) and the half duplex (HD) relaying modes and at the same time selects between amplify-and-forward (AF) and decode-and-forward (DF) protocols according to certain criteria. The toggling between the FD and the HD relaying modes is carried out to improve the data rates with a trade-off in the bit-error-rate (BER) performance. FD has full data rate at the expense of the residual self interference (RSI) which deteriorates the BER performance. On the other hand, HD does not suffer from RSI, but it does so at the expense of halving the data rate of FD. Moreover, toggling between AF and DF for the relay is a trade-off between good performance provided by DF at the expense of complexity. Complexity is reduced by using AF at the expense of higher BER. Thus, two toggling thresholds are determined in order to toggle between FD and HD, as well as AF and DF. The performance of the proposed hybrid adaptive mode is evaluated by means of BER and capacity curves.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Approaches for Preventing Honeypot Detection and Compromise 防止蜜罐检测和泄露的方法
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635603
Michail Tsikerdekis, S. Zeadally, Amy Schlesener, N. Sklavos
Honeypots have been used extensively for over two decades. However, their development is rarely accompanied with an understanding of how attackers are able to detect them. Further, our understanding of effective evasion strategies that prevent the detection of honeypots is limited. We present a classification of honeypot characteristics as well as honeypot detection evasion strategies which minimize the detection rates of honeypots. We also provide recommendations for future honeypot software which is more adaptable, modular and incorporate a dynamic intelligence design.
蜜罐已经被广泛使用了二十多年。然而,它们的发展很少伴随着对攻击者如何能够检测到它们的理解。此外,我们对防止蜜罐检测的有效规避策略的理解是有限的。我们提出了一种蜜罐特征的分类以及蜜罐检测规避策略,使蜜罐的检测率降到最低。我们还提出了未来蜜罐软件的建议,该软件具有更强的适应性,模块化和集成动态智能设计。
{"title":"Approaches for Preventing Honeypot Detection and Compromise","authors":"Michail Tsikerdekis, S. Zeadally, Amy Schlesener, N. Sklavos","doi":"10.1109/GIIS.2018.8635603","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635603","url":null,"abstract":"Honeypots have been used extensively for over two decades. However, their development is rarely accompanied with an understanding of how attackers are able to detect them. Further, our understanding of effective evasion strategies that prevent the detection of honeypots is limited. We present a classification of honeypot characteristics as well as honeypot detection evasion strategies which minimize the detection rates of honeypots. We also provide recommendations for future honeypot software which is more adaptable, modular and incorporate a dynamic intelligence design.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Waveform Flexibility in Database-Oriented Cognitive Wireless Systems 面向数据库的认知无线系统中的波形灵活性
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635698
Lukasz Kulacz, P. Kryszkiewicz, Adrian Kliks, J. Pérez-Romero
In this paper we discuss the idea of waveform flexibility in future wireless networks utilizing cognitive radio functionality. Mainly, we consider the possibility to adjust the shape of the waveform based on the information about the surrounding environment stored in a dedicated context-information database. In our approach, the cognitive terminal has an option to select one of four available waveforms to adapt itself in the best way to the constraints delivered by the database. In this paper we present the key concept of waveform flexibility, the proposed algorithm for waveform selection and the achieved simulation results.
在本文中,我们讨论了利用认知无线电功能的未来无线网络中波形灵活性的想法。我们主要考虑了基于存储在专用上下文信息数据库中的周围环境信息来调整波形形状的可能性。在我们的方法中,认知终端可以选择四种可用波形中的一种,以最佳方式适应数据库提供的约束。本文提出了波形柔性的关键概念,提出了波形选择的算法,并给出了仿真结果。
{"title":"Waveform Flexibility in Database-Oriented Cognitive Wireless Systems","authors":"Lukasz Kulacz, P. Kryszkiewicz, Adrian Kliks, J. Pérez-Romero","doi":"10.1109/GIIS.2018.8635698","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635698","url":null,"abstract":"In this paper we discuss the idea of waveform flexibility in future wireless networks utilizing cognitive radio functionality. Mainly, we consider the possibility to adjust the shape of the waveform based on the information about the surrounding environment stored in a dedicated context-information database. In our approach, the cognitive terminal has an option to select one of four available waveforms to adapt itself in the best way to the constraints delivered by the database. In this paper we present the key concept of waveform flexibility, the proposed algorithm for waveform selection and the achieved simulation results.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122397532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Analysis of Forward Error Correction Codes in Relay Aided Networks 中继辅助网络中前向纠错码的安全性分析
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635659
Mehmet Ozgun Demir, Günes Karabulut-Kurt, Guido Dartmann, G. Ascheid, A. E. Pusane
Network security and data confidentiality of transmitted information are among the non-functional requirements of industrial wireless sensor networks (IWSNs) in addition to latency, reliability and energy efficiency requirements. Physical layer security techniques are promising solutions to assist cryptographic methods in the presence of an eavesdropper in IWSN setups. In this paper, we propose a physical layer security scheme, which is based on both insertion of an random error vector to forward error correction (FEC) codewords and transmission over decentralized relay nodes. Reed-Solomon and Golay codes are selected as FEC coding schemes and the security performance of the proposed model is evaluated with the aid of decoding error probability of an eavesdropper. The results show that security level is highly based on the location of the eavesdropper and secure communication can be achieved when some of channels between eavesdropper and relay nodes are significantly noisier.
除了延迟、可靠性和能效要求外,工业无线传感器网络(iwsn)的非功能性要求还包括网络安全性和传输信息的数据保密性。物理层安全技术是在IWSN设置中存在窃听者的情况下协助加密方法的有前途的解决方案。在本文中,我们提出了一种物理层安全方案,该方案基于插入随机错误向量以转发纠错(FEC)码字和在分散中继节点上传输。选择Reed-Solomon码和Golay码作为FEC编码方案,并借助窃听者的译码错误概率对所提模型的安全性能进行评价。结果表明,该方案的安全等级与窃听者所处的位置高度相关,在窃听者与中继节点之间的某些信道噪声较大的情况下可以实现安全通信。
{"title":"Security Analysis of Forward Error Correction Codes in Relay Aided Networks","authors":"Mehmet Ozgun Demir, Günes Karabulut-Kurt, Guido Dartmann, G. Ascheid, A. E. Pusane","doi":"10.1109/GIIS.2018.8635659","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635659","url":null,"abstract":"Network security and data confidentiality of transmitted information are among the non-functional requirements of industrial wireless sensor networks (IWSNs) in addition to latency, reliability and energy efficiency requirements. Physical layer security techniques are promising solutions to assist cryptographic methods in the presence of an eavesdropper in IWSN setups. In this paper, we propose a physical layer security scheme, which is based on both insertion of an random error vector to forward error correction (FEC) codewords and transmission over decentralized relay nodes. Reed-Solomon and Golay codes are selected as FEC coding schemes and the security performance of the proposed model is evaluated with the aid of decoding error probability of an eavesdropper. The results show that security level is highly based on the location of the eavesdropper and secure communication can be achieved when some of channels between eavesdropper and relay nodes are significantly noisier.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Utility Decisions for QoE-QoS Driven Applications in Practical Mobile Broadband Networks 实际移动宽带网络中qos驱动应用的效用决策
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635761
V. Karyotis, Marios Avgeris, Michalis Michaloliakos, K. Tsagkaris, S. Papavassiliou
This paper focuses on the design, experimental validation and evaluation of a utility based decision-making approach for wireless (mobile) broadband networks. We extend a utility function framework incorporating flow and user related parameters to be driven by both QoE, QoS parameters and utilize the (mobile) broadband infrastructure of the EU-project MONROE, in order to perform extensive realistic experiments, revealing the operation of the utility function design and quantifying its potentials. We utilize our decision-making approach in two QoE-QoS related applications, namely access network selection and load-balancing in wireless networks with multiple available network interface capabilities. Through experimentation and analysis we investigate the impact of various network aspects, such as mobility, network provider, etc., on access interface switching and relevant applications. Such results can be further exploited for improving the QoE in mobile broadband networks.
本文重点研究了一种基于效用的无线(移动)宽带网络决策方法的设计、实验验证和评估。我们扩展了一个效用函数框架,其中包含由QoE和QoS参数驱动的流量和用户相关参数,并利用欧盟项目MONROE的(移动)宽带基础设施,以便进行广泛的现实实验,揭示效用函数设计的操作并量化其潜力。我们在两个与qos - qos相关的应用中使用我们的决策方法,即具有多个可用网络接口功能的无线网络中的接入网选择和负载平衡。通过实验和分析,我们研究了各种网络方面,如移动性、网络提供商等,对接入接口交换和相关应用的影响。这些结果可以进一步用于改善移动宽带网络的QoE。
{"title":"Utility Decisions for QoE-QoS Driven Applications in Practical Mobile Broadband Networks","authors":"V. Karyotis, Marios Avgeris, Michalis Michaloliakos, K. Tsagkaris, S. Papavassiliou","doi":"10.1109/GIIS.2018.8635761","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635761","url":null,"abstract":"This paper focuses on the design, experimental validation and evaluation of a utility based decision-making approach for wireless (mobile) broadband networks. We extend a utility function framework incorporating flow and user related parameters to be driven by both QoE, QoS parameters and utilize the (mobile) broadband infrastructure of the EU-project MONROE, in order to perform extensive realistic experiments, revealing the operation of the utility function design and quantifying its potentials. We utilize our decision-making approach in two QoE-QoS related applications, namely access network selection and load-balancing in wireless networks with multiple available network interface capabilities. Through experimentation and analysis we investigate the impact of various network aspects, such as mobility, network provider, etc., on access interface switching and relevant applications. Such results can be further exploited for improving the QoE in mobile broadband networks.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive Control of Statistical Data Aggregation to Minimize Latency in IoT Gateway 物联网网关统计数据聚合自适应控制最小化时延
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635712
H. Yoshino, Kenko Ota, T. Hiraguri
Latency-critical Internet of Things (IoT) applications, such as factory automation and smart grids, have received great attention recently. To satisfy the stringent latency requirements for such applications, it is important to suppress the latency in an IoT gateway that aggregates a large amount of small-sized data from massive IoT devices. In a previous study, we have analyzed two fundamental statistical data aggregation schemes for the IoT gateway: constant interval and constant number, and derived simple and accurate estimation formulas for the optimal aggregation parameters under steady-state conditions with a Poisson arrival. In this paper, we propose an adaptive control scheme of statistical data aggregation that minimizes the latency when time variation exists in the arrival rate. Applying the estimation formula of the optimal aggregation number to the proposed scheme, we realized adaptive control of the aggregation number according to the offered traffic. The transient and average characteristics of the proposed scheme with time-variant inputs were clarified by simulation. The results indicate that the proposed scheme achieved stable and nearly theoretically optimal latency, even during an overloaded traffic condition.
延迟关键型物联网(IoT)应用,如工厂自动化和智能电网,最近受到了极大的关注。为了满足此类应用的严格延迟要求,在聚合大量物联网设备的大量小尺寸数据的物联网网关中,抑制延迟非常重要。在之前的研究中,我们分析了物联网网关的两种基本统计数据聚合方案:恒定间隔和恒定数量,并推导出具有泊松到达的稳态条件下最优聚合参数的简单准确估计公式。在本文中,我们提出了一种统计数据聚合的自适应控制方案,使到达率存在时间变化时的延迟最小化。将最优聚合数估计公式应用于所提方案,实现了根据所提供的流量对聚合数的自适应控制。通过仿真验证了该方案在时变输入条件下的瞬态和平均特性。结果表明,即使在超载的交通条件下,该方案也能获得稳定且接近理论上最优的延迟。
{"title":"Adaptive Control of Statistical Data Aggregation to Minimize Latency in IoT Gateway","authors":"H. Yoshino, Kenko Ota, T. Hiraguri","doi":"10.1109/GIIS.2018.8635712","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635712","url":null,"abstract":"Latency-critical Internet of Things (IoT) applications, such as factory automation and smart grids, have received great attention recently. To satisfy the stringent latency requirements for such applications, it is important to suppress the latency in an IoT gateway that aggregates a large amount of small-sized data from massive IoT devices. In a previous study, we have analyzed two fundamental statistical data aggregation schemes for the IoT gateway: constant interval and constant number, and derived simple and accurate estimation formulas for the optimal aggregation parameters under steady-state conditions with a Poisson arrival. In this paper, we propose an adaptive control scheme of statistical data aggregation that minimizes the latency when time variation exists in the arrival rate. Applying the estimation formula of the optimal aggregation number to the proposed scheme, we realized adaptive control of the aggregation number according to the offered traffic. The transient and average characteristics of the proposed scheme with time-variant inputs were clarified by simulation. The results indicate that the proposed scheme achieved stable and nearly theoretically optimal latency, even during an overloaded traffic condition.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122777152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy Consumption and Proximity Accuracy of BLE Beacons for Internet of Things Applications 物联网应用中BLE信标的能耗和接近精度
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635746
Andrew Mackey, P. Spachos
In the Internet of Things (IoT) era, with millions of connected devices to the internet, indoor location services regarding room discovery and resource identification/tracking are among the most popular applications for smart homes and smart buildings. Bluetooth Low Energy (BLE) beacons are a promising solution to improve the scalability and accuracy of indoor localization applications. They are low cost, configurable, small transmitters designed to attract attention to a specific location. In this paper, we investigate three popular BLE beacon devices available on the market and compare them in terms of energy consumption and proximity accuracy for indoor localization services. In addition, two state-estimation filters are developed for the Android mobile platform in order to improve the proximity accuracy when using smartphone devices. Specifically, a static Kalman filter and Gaussian filter are implemented.
在物联网(IoT)时代,数以百万计的设备连接到互联网,关于房间发现和资源识别/跟踪的室内定位服务是智能家居和智能建筑最受欢迎的应用之一。蓝牙低功耗(BLE)信标是一种很有前途的解决方案,可以提高室内定位应用的可扩展性和准确性。它们是低成本,可配置的小型发射器,旨在吸引对特定位置的注意。在本文中,我们研究了市场上三种流行的BLE信标设备,并比较了它们在室内定位服务中的能耗和接近精度。此外,针对Android移动平台开发了两种状态估计滤波器,以提高智能手机设备使用时的接近精度。具体来说,实现了静态卡尔曼滤波器和高斯滤波器。
{"title":"Energy Consumption and Proximity Accuracy of BLE Beacons for Internet of Things Applications","authors":"Andrew Mackey, P. Spachos","doi":"10.1109/GIIS.2018.8635746","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635746","url":null,"abstract":"In the Internet of Things (IoT) era, with millions of connected devices to the internet, indoor location services regarding room discovery and resource identification/tracking are among the most popular applications for smart homes and smart buildings. Bluetooth Low Energy (BLE) beacons are a promising solution to improve the scalability and accuracy of indoor localization applications. They are low cost, configurable, small transmitters designed to attract attention to a specific location. In this paper, we investigate three popular BLE beacon devices available on the market and compare them in terms of energy consumption and proximity accuracy for indoor localization services. In addition, two state-estimation filters are developed for the Android mobile platform in order to improve the proximity accuracy when using smartphone devices. Specifically, a static Kalman filter and Gaussian filter are implemented.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quality of Coverage: A Novel Approach to Coverage for Mobile Crowd Sensing Systems 覆盖质量:移动人群传感系统覆盖的一种新方法
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635769
Sherif B. Azmy, N. Zorba, H. Hassanein
Mobile Crowd Sensing (MCS) is an effective paradigm that utilizes the crowd as an extended instrument for the purpose of collecting data. However, utilizing the crowd comes with the risks stemming from the crowd's heterogeneity. Thus, the MCS administrator must carefully recruit and evaluate MCS participants for the reliable execution of MCS tasks. In this paper, we tackle some of the criteria required for the proper characterization of an Area of Interest $(AoI)$. We propose a coverage metric aimed at MCS systems that takes into consideration the global view of the AoI as a whole, as well as a local picture with regards to the subdivisions with the AoI. The developed coverage metric allows the MCS administrator to identify which regions within the AoI are lacking, in terms of quality, and how they can be compensated by moving participants from neighboring regions. We demonstrate the performance of the presented metric by means of a computer simulation.
移动人群感知(MCS)是一种有效的范例,它利用人群作为收集数据的扩展工具。然而,利用人群也伴随着人群异质性带来的风险。因此,为了可靠地执行MCS任务,MCS管理员必须仔细地招募和评估MCS参与者。在本文中,我们处理了对兴趣区域$(AoI)$进行适当表征所需的一些标准。我们提出了一个针对MCS系统的覆盖度量,它考虑了AoI作为一个整体的全局视图,以及AoI细分的局部图像。开发的覆盖度量允许MCS管理员确定AoI中哪些区域在质量方面存在不足,以及如何通过从邻近区域转移参与者来弥补这些不足。我们通过计算机仿真证明了所提出的度量的性能。
{"title":"Quality of Coverage: A Novel Approach to Coverage for Mobile Crowd Sensing Systems","authors":"Sherif B. Azmy, N. Zorba, H. Hassanein","doi":"10.1109/GIIS.2018.8635769","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635769","url":null,"abstract":"Mobile Crowd Sensing (MCS) is an effective paradigm that utilizes the crowd as an extended instrument for the purpose of collecting data. However, utilizing the crowd comes with the risks stemming from the crowd's heterogeneity. Thus, the MCS administrator must carefully recruit and evaluate MCS participants for the reliable execution of MCS tasks. In this paper, we tackle some of the criteria required for the proper characterization of an Area of Interest $(AoI)$. We propose a coverage metric aimed at MCS systems that takes into consideration the global view of the AoI as a whole, as well as a local picture with regards to the subdivisions with the AoI. The developed coverage metric allows the MCS administrator to identify which regions within the AoI are lacking, in terms of quality, and how they can be compensated by moving participants from neighboring regions. We demonstrate the performance of the presented metric by means of a computer simulation.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm AES加密算法素数+探测侧信道攻击的运行时检测
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635767
M. Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, R. N. B. Rais, Vianney Lapôtre, G. Gogniat
This paper presents a run-time detection mechanism for access-driven cache-based Side-Channel Attacks (CSCAs) on Intel’s x86 architecture. We demonstrate the detection capability and effectiveness of proposed mechanism on Prime+Probe attcks. The mechanism comprises of multiple machine learning models, which use real-time data from the HPCs for detection. Experiments are performed with two different implementations of AES cryptosystem while under Prime+Probe attack. We provide results under stringent design constraints such as: realistic system load conditions, real-time detection accuracy, speed, system-wide performance overhead and distribution of error (i.e., false positives and negatives) for the used machine learning models. Our results show detection accuracy of $> 99$% for Prime+Probe attack with performance overhead of 3-4% at the highest detection speed, i.e., within 1-2% completion of 4800 AES encryption rounds needed to complete a successful attack.
本文提出了一种基于Intel x86架构的基于缓存的访问驱动侧信道攻击(csca)的运行时检测机制。我们证明了所提出的机制对Prime+Probe攻击的检测能力和有效性。该机制由多个机器学习模型组成,这些模型使用来自hpc的实时数据进行检测。在Prime+Probe攻击下,用两种不同实现的AES密码系统进行了实验。我们在严格的设计约束下提供结果,例如:真实的系统负载条件,实时检测精度,速度,系统范围的性能开销和使用的机器学习模型的误差分布(即假阳性和阴性)。我们的研究结果表明,在最高检测速度下,Prime+Probe攻击的检测准确率> 99 %,性能开销为3-4%,即在完成4800 AES加密轮所需的1-2%内完成一次成功的攻击。
{"title":"Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm","authors":"M. Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, R. N. B. Rais, Vianney Lapôtre, G. Gogniat","doi":"10.1109/GIIS.2018.8635767","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635767","url":null,"abstract":"This paper presents a run-time detection mechanism for access-driven cache-based Side-Channel Attacks (CSCAs) on Intel’s x86 architecture. We demonstrate the detection capability and effectiveness of proposed mechanism on Prime+Probe attcks. The mechanism comprises of multiple machine learning models, which use real-time data from the HPCs for detection. Experiments are performed with two different implementations of AES cryptosystem while under Prime+Probe attack. We provide results under stringent design constraints such as: realistic system load conditions, real-time detection accuracy, speed, system-wide performance overhead and distribution of error (i.e., false positives and negatives) for the used machine learning models. Our results show detection accuracy of $> 99$% for Prime+Probe attack with performance overhead of 3-4% at the highest detection speed, i.e., within 1-2% completion of 4800 AES encryption rounds needed to complete a successful attack.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Game-theoretic Learning-based QoS Satisfaction in Autonomous Mobile Edge Computing 自主移动边缘计算中基于博弈论学习的QoS满足
Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635770
P. Apostolopoulos, Eirini-Eleni Tsiropoulou, S. Papavassiliou
Mobile Edge Computing (MEC) has arisen as an effective computation paradigm to deal with the advanced application requirements in Internet of Things (IOT). In this paper, we treat the joint problem of autonomous MEC servers’ operation and mobile devices’ QoS satisfaction in a fully distributed IOT network. The autonomous MEC servers’ activation is formulated as a minority game and through a distributed learning algorithm each server determines whether it becomes active or not. The mobile devices acting as stochastic learning automata select in a fully distributed manner an active server to get associated with for computation offloading, while for energy efficiency considerations, a non- cooperative game of satisfaction form among the IOT devices is formulated to determine the transmission power of each device in order to guarantee its QoS satisfaction. The performance evaluation of the proposed framework is achieved via modeling and simulation and detailed numerical and comparative results demonstrate its effectiveness, scalability, and robustness.
移动边缘计算(MEC)作为一种处理物联网(IOT)高级应用需求的有效计算范式而兴起。本文研究了全分布式物联网网络中自主MEC服务器运行和移动设备QoS满足的联合问题。自主MEC服务器的激活被制定为一个小众游戏,通过分布式学习算法,每个服务器决定是否激活。移动设备作为随机学习自动机,以完全分布式的方式选择一个主动服务器与之关联以进行计算卸载,同时出于能效考虑,制定了物联网设备间非合作的满足形式博弈,确定每台设备的传输功率,以保证其QoS满意度。通过建模和仿真对所提出的框架进行了性能评估,详细的数值和比较结果证明了其有效性、可扩展性和鲁棒性。
{"title":"Game-theoretic Learning-based QoS Satisfaction in Autonomous Mobile Edge Computing","authors":"P. Apostolopoulos, Eirini-Eleni Tsiropoulou, S. Papavassiliou","doi":"10.1109/GIIS.2018.8635770","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635770","url":null,"abstract":"Mobile Edge Computing (MEC) has arisen as an effective computation paradigm to deal with the advanced application requirements in Internet of Things (IOT). In this paper, we treat the joint problem of autonomous MEC servers’ operation and mobile devices’ QoS satisfaction in a fully distributed IOT network. The autonomous MEC servers’ activation is formulated as a minority game and through a distributed learning algorithm each server determines whether it becomes active or not. The mobile devices acting as stochastic learning automata select in a fully distributed manner an active server to get associated with for computation offloading, while for energy efficiency considerations, a non- cooperative game of satisfaction form among the IOT devices is formulated to determine the transmission power of each device in order to guarantee its QoS satisfaction. The performance evaluation of the proposed framework is achieved via modeling and simulation and detailed numerical and comparative results demonstrate its effectiveness, scalability, and robustness.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
2018 Global Information Infrastructure and Networking Symposium (GIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1