首页 > 最新文献

2015 IEEE Conference on Computer Communications (INFOCOM)最新文献

英文 中文
High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility 基于可预测移动性的车辆众包中的高质量参与者招募
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218644
Zongjian He, Jiannong Cao, Xuefeng Liu
The potential of crowdsourcing for complex problem solving has been revealed by smartphones. Nowadays, vehicles have also been increasingly adopted as participants in crowd-sourcing applications. Different from smartphones, vehicles have the distinct advantage of predictable mobility, which brings new insight into improving the crowdsourcing quality. Unfortunately, utilizing the predictable mobility in participant recruitment poses a new challenge of considering not only current location but also the future trajectories of participants. Therefore, existing participant recruitment algorithms that only use the current location may not perform well. In this paper, based on the predicted trajectory, we present a new participant recruitment strategy for vehicle-based crowdsourcing. This strategy guarantees that the system can perform well using the currently recruited participants for a period of time in the future. The participant recruitment problem is proven to be NP-complete, and we propose two algorithms, a greedy approximation and a genetic algorithm, to find the solution for different application scenarios. The performance of our algorithms is demonstrated with traffic trace dataset. The results show that our algorithms outperform some existing approaches in terms of the crowdsourcing quality.
智能手机揭示了众包解决复杂问题的潜力。如今,车辆也越来越多地成为众包应用的参与者。与智能手机不同,汽车具有可预测移动性的明显优势,这为提高众包质量带来了新的见解。不幸的是,利用可预测的流动性在参与者招募中提出了一个新的挑战,即不仅要考虑参与者的当前位置,还要考虑参与者的未来轨迹。因此,现有的仅使用当前位置的参与者招聘算法可能表现不佳。本文基于预测轨迹,提出了一种新的基于车辆众包的参与者招募策略。这一策略保证了系统在未来一段时间内可以很好地使用当前招募的参与者。证明了参与者招募问题是np完全的,并提出了贪心逼近和遗传算法两种算法来寻找不同应用场景的解决方案。通过交通跟踪数据集验证了算法的性能。结果表明,我们的算法在众包质量方面优于现有的一些方法。
{"title":"High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility","authors":"Zongjian He, Jiannong Cao, Xuefeng Liu","doi":"10.1109/INFOCOM.2015.7218644","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218644","url":null,"abstract":"The potential of crowdsourcing for complex problem solving has been revealed by smartphones. Nowadays, vehicles have also been increasingly adopted as participants in crowd-sourcing applications. Different from smartphones, vehicles have the distinct advantage of predictable mobility, which brings new insight into improving the crowdsourcing quality. Unfortunately, utilizing the predictable mobility in participant recruitment poses a new challenge of considering not only current location but also the future trajectories of participants. Therefore, existing participant recruitment algorithms that only use the current location may not perform well. In this paper, based on the predicted trajectory, we present a new participant recruitment strategy for vehicle-based crowdsourcing. This strategy guarantees that the system can perform well using the currently recruited participants for a period of time in the future. The participant recruitment problem is proven to be NP-complete, and we propose two algorithms, a greedy approximation and a genetic algorithm, to find the solution for different application scenarios. The performance of our algorithms is demonstrated with traffic trace dataset. The results show that our algorithms outperform some existing approaches in terms of the crowdsourcing quality.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131122790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
Original SYN: Finding machines hidden behind firewalls 原始SYN:查找隐藏在防火墙后面的机器
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218441
Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall
We present an Internet measurement technique for finding machines that are hidden behind firewalls. That is, if a firewall prevents outside IP addresses from sending packets to an internal protected machine that is only accessible on the local network, our technique can still find the machine. We employ a novel TCP/IP side channel technique to achieve this. The technique uses side channels in “zombie” machines to learn information about the network from the perspective of a zombie. Unlike previous TCP/IP side channel techniques, our technique does not require a high packet rate and does not cause denial-of-service. We also make no assumptions about globally incrementing IPIDs, as do idle scans. This paper addresses two key questions about our technique: how many machines are there on the Internet that are hidden behind firewalls, and how common is ingress filtering that prevents our scan by not allowing spoofed IP packets into the network. We answer both of these questions, respectively, by finding 1,296 hidden machines and measuring that only 23.9% of our candidate zombie machines are on networks that perform ingress filtering.
我们提出了一种Internet测量技术,用于查找隐藏在防火墙后面的机器。也就是说,如果防火墙阻止外部IP地址向只能在本地网络上访问的内部受保护机器发送数据包,我们的技术仍然可以找到该机器。我们采用了一种新颖的TCP/IP侧信道技术来实现这一点。该技术使用“僵尸”机器中的侧通道,从僵尸的角度学习网络信息。与以前的TCP/IP侧通道技术不同,我们的技术不需要高数据包速率,也不会导致拒绝服务。我们也没有对全局递增的ipid做任何假设,空闲扫描也是如此。本文解决了关于我们技术的两个关键问题:互联网上有多少机器隐藏在防火墙后面,以及通过不允许欺骗的IP数据包进入网络来阻止我们扫描的入口过滤有多普遍。我们分别通过找到1296台隐藏的机器并测量只有23.9%的候选僵尸机器在执行入口过滤的网络上来回答这两个问题。
{"title":"Original SYN: Finding machines hidden behind firewalls","authors":"Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall","doi":"10.1109/INFOCOM.2015.7218441","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218441","url":null,"abstract":"We present an Internet measurement technique for finding machines that are hidden behind firewalls. That is, if a firewall prevents outside IP addresses from sending packets to an internal protected machine that is only accessible on the local network, our technique can still find the machine. We employ a novel TCP/IP side channel technique to achieve this. The technique uses side channels in “zombie” machines to learn information about the network from the perspective of a zombie. Unlike previous TCP/IP side channel techniques, our technique does not require a high packet rate and does not cause denial-of-service. We also make no assumptions about globally incrementing IPIDs, as do idle scans. This paper addresses two key questions about our technique: how many machines are there on the Internet that are hidden behind firewalls, and how common is ingress filtering that prevents our scan by not allowing spoofed IP packets into the network. We answer both of these questions, respectively, by finding 1,296 hidden machines and measuring that only 23.9% of our candidate zombie machines are on networks that perform ingress filtering.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114379025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Adaptive online power-management for Bluetooth Low Energy 低功耗蓝牙自适应在线电源管理
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218661
Philipp H. Kindt, Daniel Yunge, Mathias Gopp, S. Chakraborty
Bluetooth Low Energy is a time-slotted wireless protocol aimed towards low power communication for battery-driven devices. As a power-management capability, whenever there is less data to send, the slave is allowed to remain in a low power mode during a given number of time-slots in a row. However, since the master does not know the exact sleep behavior of the slave, it has to wake-up at every time-slot and repeat its packets until the slave is awake. As a result, applications with variable throughput lead to many energy-consuming idle-slots at the master. In such applications, usually the connection parameters are chosen considering the worst case at design time and remain constant during operation. In this paper, we propose a novel power-management framework for BLE. Rather than skipping slots at the slave side, the proposed system updates the interval between two consecutive time-slots during runtime by applying online algorithms. To avoid data-loss or high delays, the framework guarantees that constraints on latency are met and buffers never overflow. Energy measurements of three different test-cases show that up to 42 percent of the energy consumption of a BLE master can be saved with our power management system.
低功耗蓝牙是一种时隙无线协议,旨在为电池驱动的设备提供低功耗通信。作为一种电源管理功能,只要要发送的数据较少,就允许从服务器在给定的连续时隙中保持低功耗模式。但是,由于主服务器不知道从服务器的确切睡眠行为,因此它必须在每个时隙唤醒并重复其数据包,直到从服务器醒来。因此,具有可变吞吐量的应用程序会在主服务器上产生许多消耗能量的空闲插槽。在此类应用中,通常在设计时考虑最坏情况选择连接参数,并在运行期间保持不变。在本文中,我们提出了一种新的低功耗电源管理框架。该系统不是跳过从端时隙,而是通过在线算法在运行时更新两个连续时隙之间的间隔。为了避免数据丢失或高延迟,该框架保证满足延迟限制,并且缓冲区永远不会溢出。三个不同测试用例的能量测量表明,使用我们的电源管理系统可以节省高达42%的BLE主机能耗。
{"title":"Adaptive online power-management for Bluetooth Low Energy","authors":"Philipp H. Kindt, Daniel Yunge, Mathias Gopp, S. Chakraborty","doi":"10.1109/INFOCOM.2015.7218661","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218661","url":null,"abstract":"Bluetooth Low Energy is a time-slotted wireless protocol aimed towards low power communication for battery-driven devices. As a power-management capability, whenever there is less data to send, the slave is allowed to remain in a low power mode during a given number of time-slots in a row. However, since the master does not know the exact sleep behavior of the slave, it has to wake-up at every time-slot and repeat its packets until the slave is awake. As a result, applications with variable throughput lead to many energy-consuming idle-slots at the master. In such applications, usually the connection parameters are chosen considering the worst case at design time and remain constant during operation. In this paper, we propose a novel power-management framework for BLE. Rather than skipping slots at the slave side, the proposed system updates the interval between two consecutive time-slots during runtime by applying online algorithms. To avoid data-loss or high delays, the framework guarantees that constraints on latency are met and buffers never overflow. Energy measurements of three different test-cases show that up to 42 percent of the energy consumption of a BLE master can be saved with our power management system.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114918564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Composite event coverage in wireless sensor networks with heterogeneous sensors 异构传感器无线传感器网络中的复合事件覆盖
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218385
Jing Gao, Jianzhong Li, Zhipeng Cai, Hong Gao
Event monitoring is a popular task carried out by Wireless Sensor Networks (WSNs). A composite event involves multiple properties requiring different types of sensors to monitor. Considering the costs of different deployment of heterogeneous sensors and the total budget for a monitored region, this paper investigates the composite event coverage problem with the purpose of optimizing coverage quality subjecting to the constraint of not exceeding the total budget. This is a novel coverage problem which is different from the traditional ones where deployment costs of sensors, total budget and composite events are not considered. Two exact algorithms are proposed whose time complexities are O(nk) and O(nk-1) respectively in the worst case, and a (1 - e-1)-approximate algorithm are designed. The simulation results indicate the efficiency and effectiveness of the proposed algorithms.
事件监测是无线传感器网络(WSNs)的一项热门任务。复合事件涉及多个属性,需要不同类型的传感器进行监视。考虑异构传感器不同部署的成本和监测区域的总预算,在不超过总预算的约束下,以优化覆盖质量为目的,研究了复合事件覆盖问题。这是一个不同于传统的不考虑传感器部署成本、总预算和复合事件的覆盖问题。提出了两种最坏情况下时间复杂度分别为O(nk)和O(nk-1)的精确算法,并设计了一种(1 - e-1)近似算法。仿真结果表明了该算法的有效性和有效性。
{"title":"Composite event coverage in wireless sensor networks with heterogeneous sensors","authors":"Jing Gao, Jianzhong Li, Zhipeng Cai, Hong Gao","doi":"10.1109/INFOCOM.2015.7218385","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218385","url":null,"abstract":"Event monitoring is a popular task carried out by Wireless Sensor Networks (WSNs). A composite event involves multiple properties requiring different types of sensors to monitor. Considering the costs of different deployment of heterogeneous sensors and the total budget for a monitored region, this paper investigates the composite event coverage problem with the purpose of optimizing coverage quality subjecting to the constraint of not exceeding the total budget. This is a novel coverage problem which is different from the traditional ones where deployment costs of sensors, total budget and composite events are not considered. Two exact algorithms are proposed whose time complexities are O(nk) and O(nk-1) respectively in the worst case, and a (1 - e-1)-approximate algorithm are designed. The simulation results indicate the efficiency and effectiveness of the proposed algorithms.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116288888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
ExPerio — Exploiting periodicity for opportunistic energy-efficient data transmission 利用周期性的机会节能数据传输
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218370
Philipp H. Kindt, Han Jing, N. Peters, S. Chakraborty
Reducing the energy consumption to the minimum is a crucial design requirement for all body area sensor networks. Sensors deployed on the human body, especially at the limbs often move along different positions. Usually, the transmit power is set to a sufficiently high value to achieve reliable transmission for the constellation with highest attenuation. For periodic movements, data transmission can be carried out at the position of the lowest path loss between the sender and the receiver, provided this position can be reliably identified. We propose a novel framework that predicts this position using acceleration data and the received signal strength. By learning a correlation between these signals, accurate predictions can be performed and up to 24.7% of the power spent by a Bluetooth Low Energy module for the transmission of a packet can be saved while still achieving the same packet error rate as with sending using the higher transmit power.
将能量消耗降至最低是所有身体区域传感器网络的关键设计要求。安装在人体,尤其是四肢上的传感器经常沿着不同的位置移动。通常将发射功率设置得足够高,以便在衰减最大的星座实现可靠传输。对于周期性移动,只要能够可靠地识别出发送方和接收方之间路径损耗最小的位置,就可以进行数据传输。我们提出了一个新的框架,利用加速度数据和接收到的信号强度来预测这个位置。通过学习这些信号之间的相关性,可以进行准确的预测,并且可以节省24.7%的蓝牙低功耗模块用于传输数据包的功率,同时仍然实现与使用更高传输功率发送相同的数据包错误率。
{"title":"ExPerio — Exploiting periodicity for opportunistic energy-efficient data transmission","authors":"Philipp H. Kindt, Han Jing, N. Peters, S. Chakraborty","doi":"10.1109/INFOCOM.2015.7218370","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218370","url":null,"abstract":"Reducing the energy consumption to the minimum is a crucial design requirement for all body area sensor networks. Sensors deployed on the human body, especially at the limbs often move along different positions. Usually, the transmit power is set to a sufficiently high value to achieve reliable transmission for the constellation with highest attenuation. For periodic movements, data transmission can be carried out at the position of the lowest path loss between the sender and the receiver, provided this position can be reliably identified. We propose a novel framework that predicts this position using acceleration data and the received signal strength. By learning a correlation between these signals, accurate predictions can be performed and up to 24.7% of the power spent by a Bluetooth Low Energy module for the transmission of a packet can be saved while still achieving the same packet error rate as with sending using the higher transmit power.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Low-complexity multi-resource packet scheduling for network function virtualization 面向网络功能虚拟化的低复杂度多资源分组调度
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218517
Xin Li, Chen Qian
Network functions are widely deployed in modern networks, providing various network services ranging from intrusion detection to HTTP caching. Various virtual network function instances can be consolidated into one physical middlebox. Depending on the type of services, packet processing for different flows consumes different hardware resources in the middlebox. Previous solutions of multi-resource packet scheduling suffer from high computational complexity and memory cost for packet buffering and scheduling, especially when the number of flows is large. In this paper, we design a novel low-complexity and space-efficient packet scheduling algorithm called Myopia, which supports multi-resource environments such as network function virtualization. Myopia is developed based upon the fact that most Internet traffic is contributed by a small fraction of elephant flows. Myopia schedules elephant flows with precise control and treats mice flows using FIFO, to achieve simplicity of packet buffering and scheduling. We will demonstrate, via theoretical analysis, prototype implementation, and simulations, that Myopia achieves multi-resource fairness at low cost with short packet delay.
网络功能在现代网络中被广泛部署,提供从入侵检测到HTTP缓存等各种网络服务。各种虚拟网络功能实例可以整合到一个物理中间盒中。根据服务类型的不同,不同流的数据包处理在中间盒中消耗不同的硬件资源。以往的多资源包调度方案存在着数据包缓冲和调度的计算复杂度和内存消耗高的问题,特别是在流量较大的情况下。本文设计了一种新颖的低复杂度和空间效率的数据包调度算法——近视算法,该算法支持网络功能虚拟化等多资源环境。近视是基于这样一个事实,即大多数互联网流量是由大象流量的一小部分贡献的。近视算法对大象流进行精确的调度,对老鼠流进行FIFO处理,实现了数据包缓冲和调度的简单性。我们将通过理论分析、原型实现和模拟来证明,近视以低成本和短数据包延迟实现多资源公平性。
{"title":"Low-complexity multi-resource packet scheduling for network function virtualization","authors":"Xin Li, Chen Qian","doi":"10.1109/INFOCOM.2015.7218517","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218517","url":null,"abstract":"Network functions are widely deployed in modern networks, providing various network services ranging from intrusion detection to HTTP caching. Various virtual network function instances can be consolidated into one physical middlebox. Depending on the type of services, packet processing for different flows consumes different hardware resources in the middlebox. Previous solutions of multi-resource packet scheduling suffer from high computational complexity and memory cost for packet buffering and scheduling, especially when the number of flows is large. In this paper, we design a novel low-complexity and space-efficient packet scheduling algorithm called Myopia, which supports multi-resource environments such as network function virtualization. Myopia is developed based upon the fact that most Internet traffic is contributed by a small fraction of elephant flows. Myopia schedules elephant flows with precise control and treats mice flows using FIFO, to achieve simplicity of packet buffering and scheduling. We will demonstrate, via theoretical analysis, prototype implementation, and simulations, that Myopia achieves multi-resource fairness at low cost with short packet delay.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Quantized conflict graphs for wireless network optimization 无线网络优化的量化冲突图
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218608
Yanchao Zhao, Wenzhong Li, Jie Wu, Sanglu Lu
Conflict graph has been widely used for wireless network optimization in dealing with the issues of channel assignment, spectrum allocation, links scheduling and etc. Despite its simplicity, the traditional conflict graph suffers from two drawbacks. On one hand, it is a rough representation of the interference condition, which is inaccurate and will cause suboptimal results for wireless network optimization. On the other hand, it only defines the interference between two entities, which neglects the accumulative effect of small amount interference. In this paper, we propose the model of quantized conflict graph (QCG) to tackle the above issues. The properties, usage and construction methods of QCG are explored. We show that in its matrix form, a QCG owns the properties of low-rank and high-similarity. These properties give birth to three complementary QCG estimation strategies, namely low-rank approximation approach, similarity based approach, and comprehensive approach, to construct the QCG efficiently and accurately from partial interference measurement results. We further explore the potential of QCG for wireless network optimization by applying QCG in minimizing the total network interference. Extensive experiments using real collected wireless network are conducted to evaluate the system performance, which confirm the efficiency of the proposed algorithms.
冲突图被广泛应用于无线网络优化中,用于解决信道分配、频谱分配、链路调度等问题。尽管简单,传统的冲突图有两个缺点。一方面,它是干扰情况的粗略表示,不准确,会导致无线网络优化的次优结果。另一方面,它只定义了两个实体之间的干扰,忽略了少量干扰的累积效应。本文提出了量化冲突图(QCG)模型来解决上述问题。探讨了QCG的性质、用途和施工方法。我们证明了在其矩阵形式下,QCG具有低秩和高相似的性质。这些特性产生了三种互补的QCG估计策略,即低秩近似法、基于相似度的方法和综合方法,以便从部分干涉测量结果高效、准确地构建QCG。我们进一步探索了QCG在无线网络优化中的潜力,将QCG应用于最小化网络总干扰。在实际采集的无线网络上进行了大量的实验,以评估系统的性能,验证了所提算法的有效性。
{"title":"Quantized conflict graphs for wireless network optimization","authors":"Yanchao Zhao, Wenzhong Li, Jie Wu, Sanglu Lu","doi":"10.1109/INFOCOM.2015.7218608","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218608","url":null,"abstract":"Conflict graph has been widely used for wireless network optimization in dealing with the issues of channel assignment, spectrum allocation, links scheduling and etc. Despite its simplicity, the traditional conflict graph suffers from two drawbacks. On one hand, it is a rough representation of the interference condition, which is inaccurate and will cause suboptimal results for wireless network optimization. On the other hand, it only defines the interference between two entities, which neglects the accumulative effect of small amount interference. In this paper, we propose the model of quantized conflict graph (QCG) to tackle the above issues. The properties, usage and construction methods of QCG are explored. We show that in its matrix form, a QCG owns the properties of low-rank and high-similarity. These properties give birth to three complementary QCG estimation strategies, namely low-rank approximation approach, similarity based approach, and comprehensive approach, to construct the QCG efficiently and accurately from partial interference measurement results. We further explore the potential of QCG for wireless network optimization by applying QCG in minimizing the total network interference. Extensive experiments using real collected wireless network are conducted to evaluate the system performance, which confirm the efficiency of the proposed algorithms.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133220893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
ADMM based algorithm for eICIC configuration in heterogeneous cellular networks 基于ADMM的异构蜂窝网络eICIC配置算法
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218399
Hao Zhou, Yusheng Ji, Xiaoyan Wang, Bao-hua Zhao
Interference management is one of the most important issues in the heterogeneous cellular networks (HetNet) with macro and pico cells. The enhanced inter cell interference coordination (eICIC) has been proposed to protect downlink pico cell transmissions by mitigating interference from neighboring macro cells. The adaptive eICIC configuration problem is studied in this paper to adjust the parameters including the ratio of Almost Blank Subframes (ABS) and the bias of cell range expansion (RE). We formulate the problem as a general form consensus problem with regularization, and solve the problem by providing an efficient distributed optimization framework. Our algorithm is based on the alternating direction method of multipliers (ADMM) in which the solutions to local subproblems on each macro cell and pico cell are coordinated to find a solution to the global problem for the whole network. We also propose the dynamic programming based algorithms to solve the local subproblems on macro cell or pico cell. The simulation results demonstrate the efficiency of the proposed algorithm compared with existing approaches, and verify the convergence properties of the proposed algorithm.
干扰管理是宏微异构蜂窝网络(HetNet)中最重要的问题之一。增强小区间干扰协调(enhanced inter cell interference coordination, eICIC)通过减轻相邻宏小区的干扰来保护下行微小区传输。本文研究了自适应eICIC配置问题,以调整包括几乎空白子帧(ABS)比率和小区范围扩展(RE)偏差在内的参数。我们将该问题表述为正则化的一般形式一致性问题,并通过提供一个高效的分布式优化框架来解决该问题。该算法基于交替方向乘法器(ADMM),通过协调各宏单元和微单元上的局部子问题的解来寻找整个网络的全局问题的解。我们还提出了基于动态规划的算法来解决宏单元或微单元上的局部子问题。仿真结果证明了该算法与现有算法的有效性,并验证了该算法的收敛性。
{"title":"ADMM based algorithm for eICIC configuration in heterogeneous cellular networks","authors":"Hao Zhou, Yusheng Ji, Xiaoyan Wang, Bao-hua Zhao","doi":"10.1109/INFOCOM.2015.7218399","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218399","url":null,"abstract":"Interference management is one of the most important issues in the heterogeneous cellular networks (HetNet) with macro and pico cells. The enhanced inter cell interference coordination (eICIC) has been proposed to protect downlink pico cell transmissions by mitigating interference from neighboring macro cells. The adaptive eICIC configuration problem is studied in this paper to adjust the parameters including the ratio of Almost Blank Subframes (ABS) and the bias of cell range expansion (RE). We formulate the problem as a general form consensus problem with regularization, and solve the problem by providing an efficient distributed optimization framework. Our algorithm is based on the alternating direction method of multipliers (ADMM) in which the solutions to local subproblems on each macro cell and pico cell are coordinated to find a solution to the global problem for the whole network. We also propose the dynamic programming based algorithms to solve the local subproblems on macro cell or pico cell. The simulation results demonstrate the efficiency of the proposed algorithm compared with existing approaches, and verify the convergence properties of the proposed algorithm.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On 2-way neighbor discovery in wireless networks with directional antennas 定向天线无线网络中的双向邻居发现
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218439
Hao Cai, T. Wolf
Neighbor discovery is a crucial first step in configuring and managing a wireless network. Most existing studies on neighbor discovery are based on broadcast algorithms, where nodes send 1-way messages without getting response from their neighbors. However, when directional antennas are used, the ability to coordinate with a neighbor is crucial for later communication between nodes, which requires handshake-based (at least 2-way) protocols. In this paper, we provide a detailed analysis of neighbor discovery protocols with 2-way communication when using directional antennas. Based on this analysis, we present the design of a randomized 2-way neighbor discovery algorithm that uses a selective feedback. Our result shows that a node needs Θ(n2/k) time to discover its n neighbors with k antenna sectors, which yields a significant performance improvement over pure randomized algorithms. We also extend our schemes to practical cases, where the number of neighbors is unknown, and show a factor of no more than 4/3 slowdown in performance.
邻居发现是配置和管理无线网络的关键第一步。现有的邻居发现研究大多基于广播算法,节点发送单向消息而不需要邻居的响应。然而,当使用定向天线时,与邻居的协调能力对于节点之间的后期通信至关重要,这需要基于握手(至少双向)的协议。在本文中,我们提供了详细的分析邻居发现协议与双向通信时,使用定向天线。在此基础上,我们设计了一种随机的双向邻居发现算法,该算法使用选择性反馈。我们的结果表明,一个节点需要Θ(n2/k)时间来发现具有k个天线扇区的n个邻居,这比纯随机算法产生了显着的性能提高。我们还将我们的方案扩展到实际情况,其中邻居的数量是未知的,并且显示性能下降的因素不超过4/3。
{"title":"On 2-way neighbor discovery in wireless networks with directional antennas","authors":"Hao Cai, T. Wolf","doi":"10.1109/INFOCOM.2015.7218439","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218439","url":null,"abstract":"Neighbor discovery is a crucial first step in configuring and managing a wireless network. Most existing studies on neighbor discovery are based on broadcast algorithms, where nodes send 1-way messages without getting response from their neighbors. However, when directional antennas are used, the ability to coordinate with a neighbor is crucial for later communication between nodes, which requires handshake-based (at least 2-way) protocols. In this paper, we provide a detailed analysis of neighbor discovery protocols with 2-way communication when using directional antennas. Based on this analysis, we present the design of a randomized 2-way neighbor discovery algorithm that uses a selective feedback. Our result shows that a node needs Θ(n2/k) time to discover its n neighbors with k antenna sectors, which yields a significant performance improvement over pure randomized algorithms. We also extend our schemes to practical cases, where the number of neighbors is unknown, and show a factor of no more than 4/3 slowdown in performance.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125760625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Rate alteration attacks in smart grid 智能电网中的变化率攻击
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218623
Subhankar Mishra, Xiang Li, Alan Kuhnle, M. Thai, Jungtaek Seo
Smart Grid addresses the problem of existing power grid's increasing complexity, growing demand and requirement for greater reliability, through two-way communication and automated residential load control among others. These features also makes the Smart Grid a target for a number of cyber attacks. In the paper, we study the problem of rate alteration attack (RAA) through fabrication of price messages which induces changes in load profiles of individual users and eventually causes major alteration in the load profile of the entire network. Combining with cascading failure, it ends up with a highly damaging attack. We prove that the problem is NP-Complete and provide its inapproximability. We devise two approaches for the problem, former deals with maximizing failure of lines with the given resource and then extending the effect with cascading failure while the later takes cascading potential into account while choosing the lines to fail. To get more insight into the impact of RAA, we also extend our algorithms to maximize number of node failures. Empirical results on both IEEE Bus data and real network help us evaluate our approaches under various settings of grid parameters.
智能电网通过双向通信和自动化居民负荷控制等解决了现有电网日益复杂、需求不断增长和可靠性要求更高的问题。这些特点也使智能电网成为许多网络攻击的目标。本文研究了费率变更攻击(rate change attack, RAA)的问题,该攻击通过伪造价格信息引起单个用户的负荷分布变化,最终导致整个网络的负荷分布发生重大变化。结合级联故障,它最终会产生极具破坏性的攻击。我们证明了这个问题是np完全的,并给出了它的不可逼近性。针对这一问题,我们设计了两种方法,第一种方法是在给定资源条件下使线路失效最大化,然后通过级联失效来扩展效果;第二种方法是在选择故障线路时考虑级联电位。为了更深入地了解RAA的影响,我们还扩展了我们的算法,以最大化节点故障的数量。在IEEE总线数据和实际网络上的实证结果帮助我们在不同的网格参数设置下评估我们的方法。
{"title":"Rate alteration attacks in smart grid","authors":"Subhankar Mishra, Xiang Li, Alan Kuhnle, M. Thai, Jungtaek Seo","doi":"10.1109/INFOCOM.2015.7218623","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218623","url":null,"abstract":"Smart Grid addresses the problem of existing power grid's increasing complexity, growing demand and requirement for greater reliability, through two-way communication and automated residential load control among others. These features also makes the Smart Grid a target for a number of cyber attacks. In the paper, we study the problem of rate alteration attack (RAA) through fabrication of price messages which induces changes in load profiles of individual users and eventually causes major alteration in the load profile of the entire network. Combining with cascading failure, it ends up with a highly damaging attack. We prove that the problem is NP-Complete and provide its inapproximability. We devise two approaches for the problem, former deals with maximizing failure of lines with the given resource and then extending the effect with cascading failure while the later takes cascading potential into account while choosing the lines to fail. To get more insight into the impact of RAA, we also extend our algorithms to maximize number of node failures. Empirical results on both IEEE Bus data and real network help us evaluate our approaches under various settings of grid parameters.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125536524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
2015 IEEE Conference on Computer Communications (INFOCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1