Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200055
Min-A Kim, Seung-Geun Yoo, Hyoung-Do Kim, Kyeung-Ho Shin, Hyoung-Kyu Song
Reconfigurable intelligent surface (RIS) is considered as a promising technology for next-generation 6G wireless system by controlling the propagation environment that degrades the quality of received signals in wireless communication. In contrast to the conventional RIS architecture in which an impedance of each RIS element is grounded, the general architecture having an impedance network connected to each other element can more flexibly control the signal. The computational complexity by optimization of the scattering matrix of the general RIS architecture increases according to the size of the channel matrix. Therefore, as the number of users increases, high computational complexity is paid for optimizing the scattering matrix. This paper proposes the effective scattering matrix design for RIS based on group connected impedance network in multi-user multiple-input multiple-output(MU-MIMO) wireless communication systems. By limiting the number of supported users per group to one, it is possible to effectively reduce computational complexity and ensure appropriate performance compared to the optimization of the scattering matrix that maximizes the channel gain of all users.
{"title":"Scattering Matrix Design of Reconfigurable Intelligent Surface Based on Group Connected Impedance Network in MU-MIMO System","authors":"Min-A Kim, Seung-Geun Yoo, Hyoung-Do Kim, Kyeung-Ho Shin, Hyoung-Kyu Song","doi":"10.1109/ICUFN57995.2023.10200055","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200055","url":null,"abstract":"Reconfigurable intelligent surface (RIS) is considered as a promising technology for next-generation 6G wireless system by controlling the propagation environment that degrades the quality of received signals in wireless communication. In contrast to the conventional RIS architecture in which an impedance of each RIS element is grounded, the general architecture having an impedance network connected to each other element can more flexibly control the signal. The computational complexity by optimization of the scattering matrix of the general RIS architecture increases according to the size of the channel matrix. Therefore, as the number of users increases, high computational complexity is paid for optimizing the scattering matrix. This paper proposes the effective scattering matrix design for RIS based on group connected impedance network in multi-user multiple-input multiple-output(MU-MIMO) wireless communication systems. By limiting the number of supported users per group to one, it is possible to effectively reduce computational complexity and ensure appropriate performance compared to the optimization of the scattering matrix that maximizes the channel gain of all users.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123977937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200347
Ashkan Gholamhosseinian, J. Seitz
This paper proposes a centralized autonomous intersection management scheme for heterogeneous connected vehicles (HCVs). Contributions of this work are as follows. First, we sustainably classify heterogeneous vehicles with their distinctive safety-related characteristics. Second, we conduct a safe and efficient coordination algorithm with respect to some criteria such as vehicle types, road priorities and right of way rules. Third, we consider the impact of different road conditions, vehicle characteristics, load, and braking technology on the system performance. Forth, we demonstrate the efficiency of the system under various traffic densities with symmetric and asymmetric vehicle distribution. Besides, system performance is to be compared with traffic lights (TLs) scenarios in terms of throughput, average travel time (ATT), intersection busy time (IBT), channel busy rate (CBR), and packet loss rate (PLR) in various road conditions.
{"title":"Plenary Autonomous Intersection Management Protocol for Heterogeneous Connected Vehicles","authors":"Ashkan Gholamhosseinian, J. Seitz","doi":"10.1109/ICUFN57995.2023.10200347","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200347","url":null,"abstract":"This paper proposes a centralized autonomous intersection management scheme for heterogeneous connected vehicles (HCVs). Contributions of this work are as follows. First, we sustainably classify heterogeneous vehicles with their distinctive safety-related characteristics. Second, we conduct a safe and efficient coordination algorithm with respect to some criteria such as vehicle types, road priorities and right of way rules. Third, we consider the impact of different road conditions, vehicle characteristics, load, and braking technology on the system performance. Forth, we demonstrate the efficiency of the system under various traffic densities with symmetric and asymmetric vehicle distribution. Besides, system performance is to be compared with traffic lights (TLs) scenarios in terms of throughput, average travel time (ATT), intersection busy time (IBT), channel busy rate (CBR), and packet loss rate (PLR) in various road conditions.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200609
Phanidarapu Mounika, Younggun Pu, Kangyoon Lee
This paper presents a second order Sigma-Delta (SD) Analog-to-Digital Converter (ADC) is designed to achieve low power and high resolution in sensor applications. To reduce the power, CIC filter has been implemented as decimation filter. The digital filter's decimation factor can be adjusted, allowing it to be reconfigured for use with various data rates and input signal bandwidths. The proposed SD-ADC consists of Input Multiplexer, Input Buffer, Current Generator, Reference Generator bias, Common Mode Voltage generator, Clock divider, ADC Core and Digital Decimation Filter. The proposed SD-ADC has an Effective number of Bits (ENOB) of 15.2 bits and Signal to Noise and Distortion Ratio (SNDR) of 80.6 dB. The designed SD-ADC is implemented with $0.13 mu mathrm{m}$ Technology using 1.5V power supply and consumes 0.94 mA of current with input frequency of 1 kHz.
本文设计了一种二阶Sigma-Delta (SD)模数转换器(ADC),以实现传感器应用中的低功耗和高分辨率。为了降低功耗,CIC滤波器被实现为抽取滤波器。数字滤波器的抽取因子可以调整,允许它被重新配置,以使用各种数据速率和输入信号带宽。所提出的SD-ADC由输入多路复用器、输入缓冲器、电流发生器、参考偏置发生器、共模电压发生器、时钟分频器、ADC核心和数字抽取滤波器组成。该SD-ADC的有效位数(ENOB)为15.2位,信噪比和失真比(SNDR)为80.6 dB。所设计的SD-ADC采用$0.13 mu maththrm {m}$ Technology,采用1.5V电源,功耗为0.94 mA,输入频率为1 kHz。
{"title":"A 1.4mW Sigma Delta ADC with Configurable Filter for Sensor Applications","authors":"Phanidarapu Mounika, Younggun Pu, Kangyoon Lee","doi":"10.1109/ICUFN57995.2023.10200609","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200609","url":null,"abstract":"This paper presents a second order Sigma-Delta (SD) Analog-to-Digital Converter (ADC) is designed to achieve low power and high resolution in sensor applications. To reduce the power, CIC filter has been implemented as decimation filter. The digital filter's decimation factor can be adjusted, allowing it to be reconfigured for use with various data rates and input signal bandwidths. The proposed SD-ADC consists of Input Multiplexer, Input Buffer, Current Generator, Reference Generator bias, Common Mode Voltage generator, Clock divider, ADC Core and Digital Decimation Filter. The proposed SD-ADC has an Effective number of Bits (ENOB) of 15.2 bits and Signal to Noise and Distortion Ratio (SNDR) of 80.6 dB. The designed SD-ADC is implemented with $0.13 mu mathrm{m}$ Technology using 1.5V power supply and consumes 0.94 mA of current with input frequency of 1 kHz.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10199801
Lien-En Hung, Chun-Kuan Lee, Hsu-Feng Hsiao
Data loss or errors happen frequently on real networks. A common way of addressing this issue is packet retransmission, at the cost of potentially excessive transmission delay. For applications such as multimedia streaming, using channel coding to combat packet loss or errors is a more attractive option. Rateless codes have been an interesting approach due to their lower coding complexity and versatility. Layer-aligned multipriority rateless codes were originally designed for streaming with the capability of unequal error protection. In this paper, we are interested in finding a better degree distribution for such codes. We firstly derive the safety criteria of ripple sizes using a proposed leaping random walk model. In addition, we design an estimate function to predict the ripple size variation for the layer-aligned multipriority rateless codes. To achieve a better degree distribution, we use a genetic algorithm to optimize a multi-objective problem that we have formulated. This enabled us to improve the overall performance of the coding methods. Our simulation results demonstrate that the optimized degree distribution lead to significant improvements in error correction and data recovery rates.
{"title":"Optimization of Degree Distribution for Layer-aligned Multipriority Rateless Codes based on Safety Criteria of Ripple","authors":"Lien-En Hung, Chun-Kuan Lee, Hsu-Feng Hsiao","doi":"10.1109/ICUFN57995.2023.10199801","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199801","url":null,"abstract":"Data loss or errors happen frequently on real networks. A common way of addressing this issue is packet retransmission, at the cost of potentially excessive transmission delay. For applications such as multimedia streaming, using channel coding to combat packet loss or errors is a more attractive option. Rateless codes have been an interesting approach due to their lower coding complexity and versatility. Layer-aligned multipriority rateless codes were originally designed for streaming with the capability of unequal error protection. In this paper, we are interested in finding a better degree distribution for such codes. We firstly derive the safety criteria of ripple sizes using a proposed leaping random walk model. In addition, we design an estimate function to predict the ripple size variation for the layer-aligned multipriority rateless codes. To achieve a better degree distribution, we use a genetic algorithm to optimize a multi-objective problem that we have formulated. This enabled us to improve the overall performance of the coding methods. Our simulation results demonstrate that the optimized degree distribution lead to significant improvements in error correction and data recovery rates.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200350
Nazmul Islam, Seokjoo Shin
Conventional M-ary Quadrature Amplitude Modulation (M-QAM) constellation designs such as rectangular constellation, are based on mathematical data and estimated channel models to achieve equal probability of error for transmitted bits in communication systems. However, these designs are suboptimal as they are not receptive to practical channel conditions or system performance due to their fixed lattice structure, and their performance degrades with a higher number of bits per symbol. Deep learning (DL) based end-to-end communication systems can be utilized to circumvent these challenges for better overall performance. Such systems are implemented as deep neural network (DNN) autoencoders, where trainable constellations and neural demappers (ND) can be jointly trained to achieve optimum constellation design for a higher data rate communication system. In this study, we evaluate the performance of two NDs that implement trainable constellation design and compared them with two baseline demapping algorithms in an end-to-end communication system. In the analysis, the NDs outperformed the baseline demappers for higher bits per symbol transmission, and trainable constellation design corresponding to 1024-QAM achieved the highest gain of 0.8 dB compared to the baseline demappers.
{"title":"Evaluation of Neural Demappers for Trainable Constellation in an End-to-End Communication System","authors":"Nazmul Islam, Seokjoo Shin","doi":"10.1109/ICUFN57995.2023.10200350","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200350","url":null,"abstract":"Conventional M-ary Quadrature Amplitude Modulation (M-QAM) constellation designs such as rectangular constellation, are based on mathematical data and estimated channel models to achieve equal probability of error for transmitted bits in communication systems. However, these designs are suboptimal as they are not receptive to practical channel conditions or system performance due to their fixed lattice structure, and their performance degrades with a higher number of bits per symbol. Deep learning (DL) based end-to-end communication systems can be utilized to circumvent these challenges for better overall performance. Such systems are implemented as deep neural network (DNN) autoencoders, where trainable constellations and neural demappers (ND) can be jointly trained to achieve optimum constellation design for a higher data rate communication system. In this study, we evaluate the performance of two NDs that implement trainable constellation design and compared them with two baseline demapping algorithms in an end-to-end communication system. In the analysis, the NDs outperformed the baseline demappers for higher bits per symbol transmission, and trainable constellation design corresponding to 1024-QAM achieved the highest gain of 0.8 dB compared to the baseline demappers.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200331
Jae-Ho Choi, Junhong Im, Hae-Jun Song, Ki-Hyung Kim
The Home IoT device market is expanding rapidly, which has led to the increasing adoption of these devices in the home. However, IoT devices have long been challenged by various vulnerabilities and pose unique security challenges compared to other devices. This paper aims to redefine the process of entering the Home IoT environment by leveraging Decentralized Identifier(DID) authentication, and proposes a comprehensive approach to using Verifiable Credential(VC) and Verifiable Presentation(VP) to control access from outsiders like visitors. Through security analysis, this paper also highlights how these authentication and permission controls address traditional vulnerabilities and provide improved security over traditional IoT authentication methods. The results of this study shed light on the significant impact this methodology can have on the security of the Home IoT environment.
{"title":"Home IoT Authority Control Method Based on DID Auth","authors":"Jae-Ho Choi, Junhong Im, Hae-Jun Song, Ki-Hyung Kim","doi":"10.1109/ICUFN57995.2023.10200331","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200331","url":null,"abstract":"The Home IoT device market is expanding rapidly, which has led to the increasing adoption of these devices in the home. However, IoT devices have long been challenged by various vulnerabilities and pose unique security challenges compared to other devices. This paper aims to redefine the process of entering the Home IoT environment by leveraging Decentralized Identifier(DID) authentication, and proposes a comprehensive approach to using Verifiable Credential(VC) and Verifiable Presentation(VP) to control access from outsiders like visitors. Through security analysis, this paper also highlights how these authentication and permission controls address traditional vulnerabilities and provide improved security over traditional IoT authentication methods. The results of this study shed light on the significant impact this methodology can have on the security of the Home IoT environment.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10201060
Ansa Shermin, S. Dhongdi
This paper presents a use case of multi-hop time synchronization for autonomous underwater vehicles (AUVs) performing lawn mower trajectory. The work showcases a time synchronization protocol that could address mobility in multi-hop underwater scenarios. An existing time synchronization protocol named Doppler-Enhanced time synchronization (DE-sync) protocol is chosen and extended to an application-specific multi-hop scenario. It further considers the error analysis in the elapsed time duration after message exchanges in each hop. Simulations have been performed using MATLAB. It is observed that DE-sync shows better performance in terms of synchronization error than the other similar protocols. It is also found that error increases with the number of hops but with limited bounds.
{"title":"Application of Multi-hop Time synchronization on a Network of AUVs Performing Lawn Mower Trajectory","authors":"Ansa Shermin, S. Dhongdi","doi":"10.1109/ICUFN57995.2023.10201060","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10201060","url":null,"abstract":"This paper presents a use case of multi-hop time synchronization for autonomous underwater vehicles (AUVs) performing lawn mower trajectory. The work showcases a time synchronization protocol that could address mobility in multi-hop underwater scenarios. An existing time synchronization protocol named Doppler-Enhanced time synchronization (DE-sync) protocol is chosen and extended to an application-specific multi-hop scenario. It further considers the error analysis in the elapsed time duration after message exchanges in each hop. Simulations have been performed using MATLAB. It is observed that DE-sync shows better performance in terms of synchronization error than the other similar protocols. It is also found that error increases with the number of hops but with limited bounds.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129648422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10199977
Zain Ul Arifeen, Jang-Eui Hong, B. Seo, Jae-Won Suh
The number of vehicles on the road has increased significantly, which pose a number of challenges to cope with for traffic management. Especially road accidents need instant attention to reduce the loss of people life and their property. In this paper, we propose a traffic accident detection and classification framework, which automatically detects accident in traffic videos using deep networks features and also classify that accident into car-car and car-bike collisions. The proposed framework works in two phases. Accident anomaly detection: We explore three convolution neural networks (CNN’s) named GoogLeNet, AlexNet and VGGNet, where deep features are extracted using these networks and a one class support vector machine (OCSVM) is trained on each network deep features, which are used to detect accident anomalies in a outlier fashion. Accident anomaly classification: where a multi-class SVM model is trained using the features of the detected accident frames and is used to classify accident into car-car and car-bike collisions. The experimental results on UCF-Crime road accident video sequences show that the proposed approach achieves high accuracy on both traffic accident anomaly detection and classification.
{"title":"Traffic Accident Detection and Classification in Videos based on Deep Network Features","authors":"Zain Ul Arifeen, Jang-Eui Hong, B. Seo, Jae-Won Suh","doi":"10.1109/ICUFN57995.2023.10199977","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199977","url":null,"abstract":"The number of vehicles on the road has increased significantly, which pose a number of challenges to cope with for traffic management. Especially road accidents need instant attention to reduce the loss of people life and their property. In this paper, we propose a traffic accident detection and classification framework, which automatically detects accident in traffic videos using deep networks features and also classify that accident into car-car and car-bike collisions. The proposed framework works in two phases. Accident anomaly detection: We explore three convolution neural networks (CNN’s) named GoogLeNet, AlexNet and VGGNet, where deep features are extracted using these networks and a one class support vector machine (OCSVM) is trained on each network deep features, which are used to detect accident anomalies in a outlier fashion. Accident anomaly classification: where a multi-class SVM model is trained using the features of the detected accident frames and is used to classify accident into car-car and car-bike collisions. The experimental results on UCF-Crime road accident video sequences show that the proposed approach achieves high accuracy on both traffic accident anomaly detection and classification.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10199434
Carl Christian Chaguile, Melchizedek I. Alipio, Miroslav Bures
The Internet of Things (IoT) uses Low-Power Wide Area Networks (LPWAN) for applications that require long-range, energy-efficient, and low-cost end devices. LoRaWAN is one of the most popular LPWAN technologies because of its key features and openness making it highly suitable for IoT. Despite its exceptional features, some challenges faced by this technology are optimizing the protocol used for scheduling, low data rate, and duty cycle restrictions. One possible way to address these challenges is by using cross-layer optimization. This optimization technique violates the restrictions of the traditional OSI protocol stack giving freedom to its protocol layers. However, there is currently no summary of cross-layer methods implemented in LoRaWAN. This paper presents a classification of state-of-the-art cross-layer approaches that were used in optimizing the LoRaWAN technology in IoT. The cross-layer techniques were classified based on the merging of adjacent layers, direct communication between layers, and completely new abstractions. In addition, this paper identified the issues and challenges featured in these state-of-the-art cross-layer approaches. Finally, this paper serves as an overview of the performance of cross-layer optimization in LoRaWAN technology for IoT applications.
物联网(IoT)采用低功耗广域网(Low-Power Wide Area network, LPWAN)来满足需要远程、节能和低成本终端设备的应用。LoRaWAN是最流行的LPWAN技术之一,因为它的关键特性和开放性使其非常适合物联网。尽管具有特殊的功能,但该技术面临的一些挑战是优化用于调度、低数据速率和占空比限制的协议。解决这些挑战的一种可能方法是使用跨层优化。这种优化技术打破了传统OSI协议栈的限制,使其协议层具有自由度。然而,目前还没有关于在LoRaWAN中实现的跨层方法的总结。本文介绍了用于优化物联网中LoRaWAN技术的最先进的跨层方法的分类。跨层技术根据相邻层的合并、层之间的直接通信和全新的抽象进行分类。此外,本文还确定了这些最先进的跨层方法所面临的问题和挑战。最后,本文概述了物联网应用中LoRaWAN技术的跨层优化性能。
{"title":"A Classification of Cross-Layer Optimization Approaches in LoRaWAN for Internet of Things","authors":"Carl Christian Chaguile, Melchizedek I. Alipio, Miroslav Bures","doi":"10.1109/ICUFN57995.2023.10199434","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10199434","url":null,"abstract":"The Internet of Things (IoT) uses Low-Power Wide Area Networks (LPWAN) for applications that require long-range, energy-efficient, and low-cost end devices. LoRaWAN is one of the most popular LPWAN technologies because of its key features and openness making it highly suitable for IoT. Despite its exceptional features, some challenges faced by this technology are optimizing the protocol used for scheduling, low data rate, and duty cycle restrictions. One possible way to address these challenges is by using cross-layer optimization. This optimization technique violates the restrictions of the traditional OSI protocol stack giving freedom to its protocol layers. However, there is currently no summary of cross-layer methods implemented in LoRaWAN. This paper presents a classification of state-of-the-art cross-layer approaches that were used in optimizing the LoRaWAN technology in IoT. The cross-layer techniques were classified based on the merging of adjacent layers, direct communication between layers, and completely new abstractions. In addition, this paper identified the issues and challenges featured in these state-of-the-art cross-layer approaches. Finally, this paper serves as an overview of the performance of cross-layer optimization in LoRaWAN technology for IoT applications.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127402637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-04DOI: 10.1109/ICUFN57995.2023.10200823
Seunghwan Son, Myeonghyun Kim, Youngho Park
Internet of vehicles (IoV) is an expanded concept of vehicular ad-hoc networks (VANET), and it is more scalable and can be combined with the latest mobile communication technology such as 5G and 6G. The IoV environment aims to realize autonomous driving through communication such as vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and vehicle-to-person (V2P). Among them, V2I interaction is the most basic communication. In IoV environments, vehicles have mobility, and it is very frequent to authenticate with the same RSU or another RSU after authenticating with a RSU in its first region. If the authentication process is repeated in re-authentication situations, it can put a burden on the vehicle and RSU and have negatively the performance of the network. In this paper, we proposed authentication protocols considering three situations: Initial authentication, re-authentication, and handover authentication. We demonstrate that our scheme has resistance to various attack scenarios, and compared the performance of the proposed scheme with existing schemes.
{"title":"A Lightweight Seamless Authentication Scheme for Edge-Assisted IoV networks","authors":"Seunghwan Son, Myeonghyun Kim, Youngho Park","doi":"10.1109/ICUFN57995.2023.10200823","DOIUrl":"https://doi.org/10.1109/ICUFN57995.2023.10200823","url":null,"abstract":"Internet of vehicles (IoV) is an expanded concept of vehicular ad-hoc networks (VANET), and it is more scalable and can be combined with the latest mobile communication technology such as 5G and 6G. The IoV environment aims to realize autonomous driving through communication such as vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and vehicle-to-person (V2P). Among them, V2I interaction is the most basic communication. In IoV environments, vehicles have mobility, and it is very frequent to authenticate with the same RSU or another RSU after authenticating with a RSU in its first region. If the authentication process is repeated in re-authentication situations, it can put a burden on the vehicle and RSU and have negatively the performance of the network. In this paper, we proposed authentication protocols considering three situations: Initial authentication, re-authentication, and handover authentication. We demonstrate that our scheme has resistance to various attack scenarios, and compared the performance of the proposed scheme with existing schemes.","PeriodicalId":341881,"journal":{"name":"2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}