首页 > 最新文献

2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)最新文献

英文 中文
Performance Analysis of Relay Selection for IoT Networks over Generalized K Distribution 广义K分布下物联网网络中继选择性能分析
A. Dziri, M. Terré, N. Nasser
In the communication scheme for Internet of Things (IoT) systems, reliability and low power are essential in ensuring the connection of a large lot of terminals. Multi-Hop based cooperative communication is a promising tool towards achieving that goals. Moreover, in many works of research, the channel fading is limited to multi-paths fading modeled by Rayleigh or Nakagami-m distributions, or a combination of the two with pathloss fading. In this paper, we have explored the Generalized K fading which offers a more general distribution encompassing multi-paths fading, pathloss fading and shadowing. Thus, we investigate the Decode and Forward relaying strategy over Generalized K channels for multi-hops IoT networks. We derive analytical expressions of the average symbol error probability and the outage probability. Finally, we show the validity of the theoretical results by simulation.
在物联网(IoT)系统的通信方案中,可靠性和低功耗是保证大量终端连接的关键。基于多跳的协作通信是实现这一目标的一种很有前途的工具。此外,在许多研究工作中,信道衰落仅限于由Rayleigh或Nakagami-m分布建模的多径衰落,或者两者结合路径损失衰落。在本文中,我们探讨了广义K衰落,它提供了一个更一般的分布,包括多径衰落,路径损失衰落和阴影。因此,我们研究了多跳物联网网络的通用K通道上的解码和转发中继策略。导出了平均符号错误概率和中断概率的解析表达式。最后,通过仿真验证了理论结果的有效性。
{"title":"Performance Analysis of Relay Selection for IoT Networks over Generalized K Distribution","authors":"A. Dziri, M. Terré, N. Nasser","doi":"10.1109/IWCMC.2019.8766438","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766438","url":null,"abstract":"In the communication scheme for Internet of Things (IoT) systems, reliability and low power are essential in ensuring the connection of a large lot of terminals. Multi-Hop based cooperative communication is a promising tool towards achieving that goals. Moreover, in many works of research, the channel fading is limited to multi-paths fading modeled by Rayleigh or Nakagami-m distributions, or a combination of the two with pathloss fading. In this paper, we have explored the Generalized K fading which offers a more general distribution encompassing multi-paths fading, pathloss fading and shadowing. Thus, we investigate the Decode and Forward relaying strategy over Generalized K channels for multi-hops IoT networks. We derive analytical expressions of the average symbol error probability and the outage probability. Finally, we show the validity of the theoretical results by simulation.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116553653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Intelligent Deterministic D2D Communication in Narrow-band Internet of Things 窄带物联网中的智能确定性D2D通信
Alissa Nauman, M. Jamshed, Y. Ahmad, R. Ali, Yousaf Bin Zikria, S. Kim
To enable the internet of things (IoT) devices with increased coverage and optimized power consumption, the 3rd generation partnership (3GPP) standardizes the idea of narrowband IoT (NB-IoT) technology in the fifth generation (5G) of cellular communication. Re-transmission of control and data packets due to a poor link between user equipment (UE) and the base station (BS), is considered as one of the key feature in NB-IoT to ensure the data delivery of delay-sensitive applications, e.g. ambulance services and body sensor networks (BSN). This phenomenon degrades the energy efficiency of the already resource constrained systems. One key solution for NB-IoT UE is to exploit the device-to-device (D2D) communication using two hops instead of transmitting on a direct uplink, due to which the system performance increases. In an attempt to transmit the NB-IoT UE uplink data packet, splendid researchers have focused towards developing a D2D communication based strategy, which typically optimizes the expected packet delivery ratio (EDR) and end-to-end delay (EED) through an opportunistic method. However, such methodology imposes an additional delay due to the unavailability of active relaying nodes and increases the overall energy consumption of the system. This necessitates us to design an intelligent deterministic D2D (2D2D) relay selection strategy for delay sensitive NB-IoT UEs. The EDR and EED have been improved using deterministic programming based algorithm. Simulations with various parameters are carried out, and results are presented. Simulation results show that the deterministic algorithm gives better performance with a 10% increase in EDR and overcomes the additional delay.
为了使物联网(IoT)设备具有更大的覆盖范围和优化的功耗,第三代合作伙伴关系(3GPP)在第五代(5G)蜂窝通信中标准化了窄带物联网(NB-IoT)技术的概念。由于用户设备(UE)和基站(BS)之间的链路较差,控制和数据包的重新传输被认为是NB-IoT的关键特征之一,以确保延迟敏感应用(例如救护车服务和身体传感器网络(BSN))的数据传输。这种现象降低了本已资源受限的系统的能源效率。NB-IoT UE的一个关键解决方案是利用设备对设备(D2D)通信使用两跳,而不是在直接上行链路上传输,由于系统性能提高。在尝试传输NB-IoT UE上行数据包时,优秀的研究人员专注于开发基于D2D通信的策略,该策略通常通过机会主义方法优化预期数据包传输比(EDR)和端到端延迟(EED)。然而,这种方法由于有源中继节点不可用而增加了额外的延迟,并增加了系统的总体能耗。这就要求我们为延迟敏感型NB-IoT终端设计一种智能确定性D2D (2D2D)中继选择策略。采用基于确定性规划的算法对EDR和EED进行了改进。用不同的参数进行了仿真,并给出了仿真结果。仿真结果表明,确定性算法在EDR提高10%的情况下具有较好的性能,并且克服了额外的延迟。
{"title":"An Intelligent Deterministic D2D Communication in Narrow-band Internet of Things","authors":"Alissa Nauman, M. Jamshed, Y. Ahmad, R. Ali, Yousaf Bin Zikria, S. Kim","doi":"10.1109/IWCMC.2019.8766786","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766786","url":null,"abstract":"To enable the internet of things (IoT) devices with increased coverage and optimized power consumption, the 3rd generation partnership (3GPP) standardizes the idea of narrowband IoT (NB-IoT) technology in the fifth generation (5G) of cellular communication. Re-transmission of control and data packets due to a poor link between user equipment (UE) and the base station (BS), is considered as one of the key feature in NB-IoT to ensure the data delivery of delay-sensitive applications, e.g. ambulance services and body sensor networks (BSN). This phenomenon degrades the energy efficiency of the already resource constrained systems. One key solution for NB-IoT UE is to exploit the device-to-device (D2D) communication using two hops instead of transmitting on a direct uplink, due to which the system performance increases. In an attempt to transmit the NB-IoT UE uplink data packet, splendid researchers have focused towards developing a D2D communication based strategy, which typically optimizes the expected packet delivery ratio (EDR) and end-to-end delay (EED) through an opportunistic method. However, such methodology imposes an additional delay due to the unavailability of active relaying nodes and increases the overall energy consumption of the system. This necessitates us to design an intelligent deterministic D2D (2D2D) relay selection strategy for delay sensitive NB-IoT UEs. The EDR and EED have been improved using deterministic programming based algorithm. Simulations with various parameters are carried out, and results are presented. Simulation results show that the deterministic algorithm gives better performance with a 10% increase in EDR and overcomes the additional delay.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121764486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Towards a Distributed Computation Offloading Architecture for Cloud Robotics 面向云机器人的分布式计算卸载体系结构
Rihab Chaâri, O. Cheikhrouhou, A. Koubâa, H. Youssef, Habib Hmam
Cloud robotics is incessantly gaining ground, especially with the rapid expansion of wireless networks and Internet resources. In particular, computation offloading is emerging as a new trend, enabling robots with more powerful computation resources. It helps them to overcome the hardware and software limitations by leveraging parallel computing capabilities and the availability of large amounts of resources in the cloud. However, the performance gain of computation offloading in cloud robotics is still an ongoing research problem because of the conflicting factors that affect the performance. In this paper, we investigate this issue and we design a distributed cloud robotic architecture for computation offloading based on Kafka middleware as messaging broker. We experimentally validated our solution and tested its performance using image processing algorithms. Experimental results show a significant reduction in robot CPU load, as expected, with an increase in robot communication delays.
随着无线网络和互联网资源的迅速扩张,云机器人技术正在不断发展壮大。特别是,计算卸载正在成为一种新的趋势,使机器人具有更强大的计算资源。它通过利用并行计算能力和云中大量资源的可用性,帮助他们克服硬件和软件限制。然而,由于影响云机器人性能的相互冲突的因素,计算卸载的性能增益仍然是一个正在进行的研究问题。在本文中,我们研究了这个问题,并设计了一个分布式云机器人架构,用于基于Kafka中间件作为消息代理的计算卸载。我们通过实验验证了我们的解决方案,并使用图像处理算法测试了其性能。实验结果表明,随着机器人通信延迟的增加,机器人CPU负载显著降低。
{"title":"Towards a Distributed Computation Offloading Architecture for Cloud Robotics","authors":"Rihab Chaâri, O. Cheikhrouhou, A. Koubâa, H. Youssef, Habib Hmam","doi":"10.1109/IWCMC.2019.8766504","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766504","url":null,"abstract":"Cloud robotics is incessantly gaining ground, especially with the rapid expansion of wireless networks and Internet resources. In particular, computation offloading is emerging as a new trend, enabling robots with more powerful computation resources. It helps them to overcome the hardware and software limitations by leveraging parallel computing capabilities and the availability of large amounts of resources in the cloud. However, the performance gain of computation offloading in cloud robotics is still an ongoing research problem because of the conflicting factors that affect the performance. In this paper, we investigate this issue and we design a distributed cloud robotic architecture for computation offloading based on Kafka middleware as messaging broker. We experimentally validated our solution and tested its performance using image processing algorithms. Experimental results show a significant reduction in robot CPU load, as expected, with an increase in robot communication delays.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122039656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Cloud and Fog based Architecture for Energy Management of Smart City by using Meta-heuristic Techniques 基于元启发式技术的云雾智慧城市能源管理体系结构
A. Butt, Sajjad Khan, Tehreem Ashfaq, Sakeena Javaid, Norin Abdul Sattar, N. Javaid
Cloud servers provide services over the internet by using Virtual Machines (VMs). The power consumption of Physical Machines (PMs) needs to be considered, as VMs are running on physical machines. When a consumer sends request to the cloud, it takes time to respond because of distant location of cloud. Due to which delay and latency issue arises. Fog is introduced to overcome the peculiarities of cloud. In fog computing environment, the operational challenges for the research community are: reducing the energy consumption and load balancing. The energy consumption of the fog resources depends on the requests that are allocated to the set of VMs. This is a challenging task. In this paper, three layered architecture cloud, fog and consumer layer are proposed. The cloud and fog provide VMs to run the consumers’ application quickly. The meta-heuristic algorithm that is: Genetic Algorithm (GA) is proposed and Binary Particle Swarm Optimization (BPSO) is implemented to balance the set of requests on VMs of cloud and fog. The proposed and implemented algorithm is compared with existing PSO and BAT algorithms to measure efficiency. The Closest Data Center (CDC), Optimize Response Time (ORT), Reconfigure Dynamically with Load (RDL) is implemented to optimize the Response Time (RT) and Processing Time (PT). These policies also decide which requests are allocated to which Data Center (DC). The proposed GA and implemented BPSO are use to minimize the computational cost and also decrease the RT and PT of DCs.
云服务器通过虚拟机(vm)在互联网上提供服务。虚拟机运行在物理机上,需要考虑物理机的功耗。当使用者向云发送请求时,由于云的位置较远,需要花费一些时间来响应。因此出现了延迟和延迟问题。引入雾是为了克服云的特性。在雾计算环境下,研究人员面临的操作挑战是:降低能耗和平衡负载。雾资源的能耗取决于分配给这组虚拟机的请求。这是一项具有挑战性的任务。本文提出了云层、雾层和消费者层三层架构。云和雾提供vm来快速运行用户的应用程序。提出了一种元启发式算法,即遗传算法(GA)和二进制粒子群优化算法(BPSO)来平衡云雾虚拟机上的请求集。将所提出和实现的算法与现有的PSO和BAT算法进行了比较,以衡量效率。实现了最近的数据中心(CDC)、优化响应时间(ORT)和负载重新配置(RDL),以优化响应时间(RT)和处理时间(PT)。这些策略还决定将哪些请求分配给哪个数据中心(DC)。提出的遗传算法和实现的BPSO能够最大限度地减少计算成本,同时也降低了DCs的RT和PT。
{"title":"A Cloud and Fog based Architecture for Energy Management of Smart City by using Meta-heuristic Techniques","authors":"A. Butt, Sajjad Khan, Tehreem Ashfaq, Sakeena Javaid, Norin Abdul Sattar, N. Javaid","doi":"10.1109/IWCMC.2019.8766702","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766702","url":null,"abstract":"Cloud servers provide services over the internet by using Virtual Machines (VMs). The power consumption of Physical Machines (PMs) needs to be considered, as VMs are running on physical machines. When a consumer sends request to the cloud, it takes time to respond because of distant location of cloud. Due to which delay and latency issue arises. Fog is introduced to overcome the peculiarities of cloud. In fog computing environment, the operational challenges for the research community are: reducing the energy consumption and load balancing. The energy consumption of the fog resources depends on the requests that are allocated to the set of VMs. This is a challenging task. In this paper, three layered architecture cloud, fog and consumer layer are proposed. The cloud and fog provide VMs to run the consumers’ application quickly. The meta-heuristic algorithm that is: Genetic Algorithm (GA) is proposed and Binary Particle Swarm Optimization (BPSO) is implemented to balance the set of requests on VMs of cloud and fog. The proposed and implemented algorithm is compared with existing PSO and BAT algorithms to measure efficiency. The Closest Data Center (CDC), Optimize Response Time (ORT), Reconfigure Dynamically with Load (RDL) is implemented to optimize the Response Time (RT) and Processing Time (PT). These policies also decide which requests are allocated to which Data Center (DC). The proposed GA and implemented BPSO are use to minimize the computational cost and also decrease the RT and PT of DCs.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
UAV detection and identification in the Internet of Things 物联网中的无人机检测与识别
Jingcheng Zhao, Xinru Fu, Zongkai Yang, Fengtong Xu
Unmanned Aerial Vehicles (UAVs) have been widely used in fifth-generation (5G) and the Internet of Things (IoT) because they can carry devices for communications and IoT and fly in a flexible and controllable manner. At present, in flight control, the UAV is mainly positioned by satellite. However, it may be interfered by the strong electromagnetic deception signal. A method for UAV assisted positioning is needed. In this work, we propose a new method of using radar to position the UAV. The range resolution capability of the wideband radar is used to acquire the target position in the detection area. The time-frequency analysis method is used to analyze the micro-Doppler effect generated by the rotation of the UAV rotor, and to identify whether the detected target is a UAV. The cepstrum method is used to estimate the feature data of the UAV such as the number of rotors and the speed, then the UAV is classified by the obtained feature data. The simulation results of the number of rotors, the rotation speed of each rotor and the position of the UAV is shown in the article.
无人驾驶飞行器(uav)可以携带通信和物联网设备,并以灵活可控的方式飞行,因此在第五代(5G)和物联网(IoT)领域得到了广泛应用。目前,在飞行控制方面,无人机主要采用卫星定位。但是,它可能受到强电磁欺骗信号的干扰。需要一种无人机辅助定位方法。在这项工作中,我们提出了一种利用雷达定位无人机的新方法。利用宽带雷达的距离分辨能力获取探测区域内的目标位置。采用时频分析法对无人机旋翼旋转产生的微多普勒效应进行分析,识别被探测目标是否为无人机。利用倒谱法对无人机的旋翼数、速度等特征数据进行估计,然后根据得到的特征数据对无人机进行分类。文中给出了旋翼数、各旋翼转速和无人机位置的仿真结果。
{"title":"UAV detection and identification in the Internet of Things","authors":"Jingcheng Zhao, Xinru Fu, Zongkai Yang, Fengtong Xu","doi":"10.1109/IWCMC.2019.8766519","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766519","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have been widely used in fifth-generation (5G) and the Internet of Things (IoT) because they can carry devices for communications and IoT and fly in a flexible and controllable manner. At present, in flight control, the UAV is mainly positioned by satellite. However, it may be interfered by the strong electromagnetic deception signal. A method for UAV assisted positioning is needed. In this work, we propose a new method of using radar to position the UAV. The range resolution capability of the wideband radar is used to acquire the target position in the detection area. The time-frequency analysis method is used to analyze the micro-Doppler effect generated by the rotation of the UAV rotor, and to identify whether the detected target is a UAV. The cepstrum method is used to estimate the feature data of the UAV such as the number of rotors and the speed, then the UAV is classified by the obtained feature data. The simulation results of the number of rotors, the rotation speed of each rotor and the position of the UAV is shown in the article.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Software Defined Internet of Vehicles: a survey from QoS and scalability perspectives 软件定义的汽车互联网:从服务质量和可扩展性角度的调查
K. Smida, H. Tounsi, M. Frikha, Yeqiong Song
The idea of leveraging Software Defined Networking (SDN) in vehicular networks has drawn a lot of attention in the last years. SDN flexibility and programmability brought promising solutions for VANET challenges, namely Quality of Services (QoS) and scalability which are the main characteristics of Internet of Vehicles (IoV). Such networks are characterized by fast topological changes due to their variable dynamicity and density. In fact, SDN decouples control plane and data plane, providing programmability to configure the network. However, based on a single controller, SDN is criticized for not supporting scalability and for decreasing the overall network Quality of service. Using multiple controllers becomes the tendency of recent works to meet the need of large networks. Throughout this paper, we survey the proposed SDN-based architectures for vehicular networks. Considering the control plane impact, centralized or distributed, the QoS improvements brought by theses architectures are studied and criticized in order to derive the suitability of each proposal to resolve the IoV challenges and meet its requirements for the various applications.
在过去几年中,在车载网络中利用软件定义网络(SDN)的想法引起了很多关注。SDN的灵活性和可编程性为车联网的挑战带来了有希望的解决方案,即服务质量(QoS)和可扩展性,这是车联网(IoV)的主要特征。这种网络由于其动态和密度的变化,具有快速拓扑变化的特点。实际上,SDN解耦了控制平面和数据平面,提供了配置网络的可编程性。然而,基于单一控制器的SDN因不支持可伸缩性和降低整体网络服务质量而受到批评。为适应大型网络的需要,采用多控制器已成为近年来工作的趋势。在本文中,我们概述了基于sdn的车用网络架构。考虑到控制平面的影响,无论是集中式的还是分布式的,对这些架构所带来的QoS改进进行了研究和批评,以得出每个方案在解决车联网挑战和满足各种应用需求方面的适用性。
{"title":"Software Defined Internet of Vehicles: a survey from QoS and scalability perspectives","authors":"K. Smida, H. Tounsi, M. Frikha, Yeqiong Song","doi":"10.1109/IWCMC.2019.8766647","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766647","url":null,"abstract":"The idea of leveraging Software Defined Networking (SDN) in vehicular networks has drawn a lot of attention in the last years. SDN flexibility and programmability brought promising solutions for VANET challenges, namely Quality of Services (QoS) and scalability which are the main characteristics of Internet of Vehicles (IoV). Such networks are characterized by fast topological changes due to their variable dynamicity and density. In fact, SDN decouples control plane and data plane, providing programmability to configure the network. However, based on a single controller, SDN is criticized for not supporting scalability and for decreasing the overall network Quality of service. Using multiple controllers becomes the tendency of recent works to meet the need of large networks. Throughout this paper, we survey the proposed SDN-based architectures for vehicular networks. Considering the control plane impact, centralized or distributed, the QoS improvements brought by theses architectures are studied and criticized in order to derive the suitability of each proposal to resolve the IoV challenges and meet its requirements for the various applications.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129570112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Enhancing Firewall Filter Performance Using Neural Networks 利用神经网络增强防火墙过滤性能
Heba Saleous, Z. Trabelsi
The Internet has grown to a point where people all over the world have grown dependent of the convenient communication medium that is being provided. However, with this dependency, malicious traffic has become a major concern. Because of this, firewalls are a mandatory part of any network, due to their ability to filter the traffic based on rules that state which packets should be accepted or denied. However, filter rules must be manually configured by a network administrator, and packets that do not fit any rule may be subject to wrong judgment by the firewall. This can become tedious in larger networks. Neural networks can learn the filter rules that have been set by administrators in order to decide if packets that do not fit any specific rules should be accepted or denied. The neural network will be trained with existing packet data and their firewall actions, and then tested to determine its filtering accuracy compared to the firewall.
互联网已经发展到一个地步,世界各地的人们都越来越依赖于它所提供的方便的交流媒介。然而,由于这种依赖性,恶意流量已成为一个主要问题。正因为如此,防火墙是任何网络的必要组成部分,因为它们能够根据规则过滤流量,这些规则规定哪些数据包应该被接受或拒绝。但是,过滤规则必须由网络管理员手工配置,不符合规则的报文可能会被防火墙错误判断。在较大的网络中,这可能会变得乏味。神经网络可以学习管理员设置的过滤规则,以决定不符合任何特定规则的数据包是应该接受还是拒绝。神经网络将使用现有的数据包数据及其防火墙动作进行训练,然后测试以确定其与防火墙相比的过滤精度。
{"title":"Enhancing Firewall Filter Performance Using Neural Networks","authors":"Heba Saleous, Z. Trabelsi","doi":"10.1109/IWCMC.2019.8766576","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766576","url":null,"abstract":"The Internet has grown to a point where people all over the world have grown dependent of the convenient communication medium that is being provided. However, with this dependency, malicious traffic has become a major concern. Because of this, firewalls are a mandatory part of any network, due to their ability to filter the traffic based on rules that state which packets should be accepted or denied. However, filter rules must be manually configured by a network administrator, and packets that do not fit any rule may be subject to wrong judgment by the firewall. This can become tedious in larger networks. Neural networks can learn the filter rules that have been set by administrators in order to decide if packets that do not fit any specific rules should be accepted or denied. The neural network will be trained with existing packet data and their firewall actions, and then tested to determine its filtering accuracy compared to the firewall.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128004425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced ADR for LoRaWAN networks with mobility 具有移动性的LoRaWAN网络的增强ADR
Norhane Benkahla, H. Tounsi, Yeqiong Song, M. Frikha
LoRa is becoming an attractive low cost and low power WAN solution for many real-world IoT applications. LoRa has been designed for static end-devices to individually use the optimal configuration through an adaptive data rate mechanism (ADR), thanks to the possibility to choose a set of LoRa physical layer transmission parameters. However a large class of IoT applications (e.g. connected farm) also includes mobile nodes with specific mobility patterns. For those applications, the current ADR control algorithm may not be efficient when the radio channel attenuation rapidly changes because of the node mobility. This paper contributes to enhance the ADR mechanism by taking into account the position of the mobile devices and their trajectories in order to have a dynamic allocation. The Enhanced-ADR (E-ADR) minimizes the transmission time and energy consumption as well as packet loss for mobile devices. The testbed-based experiments show that E-ADR improves the quality of service (QoS) of the overall networks.
LoRa正在成为许多现实世界物联网应用的低成本和低功耗广域网解决方案。由于可以选择一组LoRa物理层传输参数,LoRa被设计为静态终端设备通过自适应数据速率机制(ADR)单独使用最佳配置。然而,大量的物联网应用(如联网农场)也包括具有特定移动模式的移动节点。在这些应用中,由于节点的移动性,当无线信道衰减迅速变化时,现有的ADR控制算法可能效率不高。本文通过考虑移动设备的位置及其运动轨迹来增强ADR机制,从而实现动态分配。E-ADR (Enhanced-ADR)可以最大限度地减少移动设备的传输时间和能耗,减少丢包。基于试验台的实验表明,E-ADR提高了整个网络的服务质量。
{"title":"Enhanced ADR for LoRaWAN networks with mobility","authors":"Norhane Benkahla, H. Tounsi, Yeqiong Song, M. Frikha","doi":"10.1109/IWCMC.2019.8766738","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766738","url":null,"abstract":"LoRa is becoming an attractive low cost and low power WAN solution for many real-world IoT applications. LoRa has been designed for static end-devices to individually use the optimal configuration through an adaptive data rate mechanism (ADR), thanks to the possibility to choose a set of LoRa physical layer transmission parameters. However a large class of IoT applications (e.g. connected farm) also includes mobile nodes with specific mobility patterns. For those applications, the current ADR control algorithm may not be efficient when the radio channel attenuation rapidly changes because of the node mobility. This paper contributes to enhance the ADR mechanism by taking into account the position of the mobile devices and their trajectories in order to have a dynamic allocation. The Enhanced-ADR (E-ADR) minimizes the transmission time and energy consumption as well as packet loss for mobile devices. The testbed-based experiments show that E-ADR improves the quality of service (QoS) of the overall networks.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124526356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Secure Semi-Blind AF relaying networks using multiple eavesdroppers 使用多个窃听器的安全半盲AF中继网络
W. H. Alouane
In this paper, we investigate a secure semi-blind amplify-and-forward (AF) relaying system over Rayleigh fading channels. We consider a reactive relay selection where the relay is selected based on the highest instantaneous signal-to-noise ratio (SNR) of the second hop. We evaluate the ergodic secrecy capacity using source-assisted jamming (SAJ) and considering that relays act as eavesdroppers. In order to improve the secrecy performance, a direct link between the source and destination is considered. Numerical results are presented to verify the accuracy of the proposed mathematical analysis. Moreover, a comparison between secure semi-blind AF relaying system and secure channel-state-information (CSI)-assisted AF relaying system is performed to further prove the exactness of our analysis. The proposed secure semi-blind AF relaying system has a simpler mathematical analysis and a comparable secrecy performance as compared to secure CSI-assisted AF relaying system.
本文研究了一种基于瑞利衰落信道的安全半盲放大转发(AF)中继系统。我们考虑无功中继选择,其中中继是根据第二跳的最高瞬时信噪比(SNR)选择的。我们利用源辅助干扰(SAJ)来评估遍历保密能力,并考虑中继作为窃听器。为了提高保密性能,考虑了源端和目的端之间的直接链路。数值结果验证了所提数学分析的准确性。通过对安全半盲自动对焦中继系统和安全信道状态信息辅助自动对焦中继系统的比较,进一步证明了本文分析的准确性。与安全的csi辅助自动对焦中继系统相比,所提出的安全半盲自动对焦中继系统具有更简单的数学分析和相当的保密性能。
{"title":"Secure Semi-Blind AF relaying networks using multiple eavesdroppers","authors":"W. H. Alouane","doi":"10.1109/IWCMC.2019.8766643","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766643","url":null,"abstract":"In this paper, we investigate a secure semi-blind amplify-and-forward (AF) relaying system over Rayleigh fading channels. We consider a reactive relay selection where the relay is selected based on the highest instantaneous signal-to-noise ratio (SNR) of the second hop. We evaluate the ergodic secrecy capacity using source-assisted jamming (SAJ) and considering that relays act as eavesdroppers. In order to improve the secrecy performance, a direct link between the source and destination is considered. Numerical results are presented to verify the accuracy of the proposed mathematical analysis. Moreover, a comparison between secure semi-blind AF relaying system and secure channel-state-information (CSI)-assisted AF relaying system is performed to further prove the exactness of our analysis. The proposed secure semi-blind AF relaying system has a simpler mathematical analysis and a comparable secrecy performance as compared to secure CSI-assisted AF relaying system.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124263368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay Study in Multi-controller Software Defined Vehicular Network Using OpenDaylight for Emergency Applications 基于OpenDaylight的多控制器软件定义车辆网络应急时延研究
K. Smida, H. Tounsi, M. Frikha, Yeqiong Song
SDN is a promising solution for vehicular networks challenges. Distributing the SDN control plane achieved more scalability and performance. However, synchronization between different controllers of network state generates extra-delay that is not suitable with delay-sensitive applications in vehicular networks like emergency services. In this paper, we investigate the e2e (end-to-end) delay in variable density vehicular scenarios with variable number of controllers. Our experiments prove the benefits of using multi-controllers in terms of delay but also the need of the deployment of the effective number according to the vehicular network density.
SDN是解决车载网络挑战的一个很有前途的解决方案。分布式SDN控制平面实现了更高的可扩展性和性能。然而,不同的网络状态控制器之间的同步会产生额外的延迟,这不适用于应急服务等对延迟敏感的车载网络应用。本文研究了具有可变数量控制器的变密度车辆场景下的端到端延迟问题。我们的实验证明了多控制器在时延方面的好处,但也证明了根据车辆网络密度部署有效数量的必要性。
{"title":"Delay Study in Multi-controller Software Defined Vehicular Network Using OpenDaylight for Emergency Applications","authors":"K. Smida, H. Tounsi, M. Frikha, Yeqiong Song","doi":"10.1109/IWCMC.2019.8766633","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766633","url":null,"abstract":"SDN is a promising solution for vehicular networks challenges. Distributing the SDN control plane achieved more scalability and performance. However, synchronization between different controllers of network state generates extra-delay that is not suitable with delay-sensitive applications in vehicular networks like emergency services. In this paper, we investigate the e2e (end-to-end) delay in variable density vehicular scenarios with variable number of controllers. Our experiments prove the benefits of using multi-controllers in terms of delay but also the need of the deployment of the effective number according to the vehicular network density.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114701611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1