首页 > 最新文献

2019 International Conference on Information Networking (ICOIN)最新文献

英文 中文
3D- Deployment of Magnetic Induction Relays in Underwater Sensor Networks 水下传感器网络中磁感应继电器的三维部署
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718105
Sai Wang, Y. Shin
Magnetic induction (MI) communication is a promising technology for underwater sensor networks (UWSNs) due to several benefits such as small transmission delay and multipath fading negligibility. However, the majority deployment strategies of the MI relays focus on 1D and 2D networks. In this paper, a optimal relay deployment algorithm is proposed to deploy the relay nodes in the 3D UWSN. To balance the number of sensor nodes in each clustering space, the K-means algorithm is used to divide the network space. In addition, the locations of the relay nodes are important for saving energy. To solve this issue, we adopt a gradient descent algorithm to find the optimal coordinates of the relay nodes. Numerical analysis shows that the proposed algorithm is a practical deployment strategy.
磁感应通信技术具有传输时延小、多径衰落可忽略等优点,是水下传感器网络的一种很有前途的通信技术。然而,大多数MI中继的部署策略都集中在一维和二维网络上。本文提出了一种最优中继部署算法,用于三维UWSN中继节点的部署。为了平衡每个聚类空间中传感器节点的数量,使用K-means算法对网络空间进行划分。此外,中继节点的位置对节能也很重要。为了解决这一问题,我们采用梯度下降算法寻找中继节点的最优坐标。数值分析表明,该算法是一种实用的部署策略。
{"title":"3D- Deployment of Magnetic Induction Relays in Underwater Sensor Networks","authors":"Sai Wang, Y. Shin","doi":"10.1109/ICOIN.2019.8718105","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718105","url":null,"abstract":"Magnetic induction (MI) communication is a promising technology for underwater sensor networks (UWSNs) due to several benefits such as small transmission delay and multipath fading negligibility. However, the majority deployment strategies of the MI relays focus on 1D and 2D networks. In this paper, a optimal relay deployment algorithm is proposed to deploy the relay nodes in the 3D UWSN. To balance the number of sensor nodes in each clustering space, the K-means algorithm is used to divide the network space. In addition, the locations of the relay nodes are important for saving energy. To solve this issue, we adopt a gradient descent algorithm to find the optimal coordinates of the relay nodes. Numerical analysis shows that the proposed algorithm is a practical deployment strategy.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Fair and Efficient Bandwidth Sharing in User Provided Networks 用户提供网络中公平有效的带宽共享
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718187
S. E. Tasçi, Ömer Korçak
Since the first introduction of User Provided Networks (UPNs), considerable effort has been put into designing incentive mechanisms as one of the backing techniques needed to realize them. Concepts especially from game theory can be identified as the core building blocks of contemporary incentive mechanisms proposed in the literature. In this work a collaborative Internet sharing mechanism from a potential game theoretical point of view has been proposed while keeping simplicity, applicability in real world scenarios in mind. The proposed scheme supports multi-node deployments and favors fair bandwidth sharing among players as well as providing effective usage of globally available bandwidth. The proposed scheme converges to a Nash equilibrium in pure strategies, when played in best reply dynamics. In order to evaluate its performance it is compared to another scheme which is supposed to admit players' available bandwidth as its potential function. The second scheme has been investigated by rigorous simulations and shown to converge to a Nash equilibrium in pure strategies, although it still lacks an analytical demonstration to be proven as a potential game. Results show that as well as supporting multi-node deployments, the proposed scheme also fairly distributes the available bandwidth among players and increases the globally available bandwidth being shared.
自从首次采用用户提供的网络以来,已作出相当大的努力来设计奖励机制,作为实现这些机制所需的支持技术之一。特别是博弈论的概念可以被认为是当代文献中提出的激励机制的核心组成部分。在这项工作中,从潜在博弈论的角度提出了一种协作的互联网共享机制,同时保持了简单性,在现实世界场景中的适用性。该方案支持多节点部署,有利于玩家之间的公平带宽共享,并提供全球可用带宽的有效利用。本文提出的方案在纯策略下收敛于纳什均衡。为了评估其性能,将其与另一种方案进行比较,该方案应该承认玩家的可用带宽作为其潜在功能。第二种方案已经通过严格的模拟进行了研究,并表明在纯策略中收敛于纳什均衡,尽管它仍然缺乏分析论证来证明它是一种潜在的博弈。结果表明,该方案在支持多节点部署的同时,公平地分配了玩家之间的可用带宽,增加了共享的全局可用带宽。
{"title":"On Fair and Efficient Bandwidth Sharing in User Provided Networks","authors":"S. E. Tasçi, Ömer Korçak","doi":"10.1109/ICOIN.2019.8718187","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718187","url":null,"abstract":"Since the first introduction of User Provided Networks (UPNs), considerable effort has been put into designing incentive mechanisms as one of the backing techniques needed to realize them. Concepts especially from game theory can be identified as the core building blocks of contemporary incentive mechanisms proposed in the literature. In this work a collaborative Internet sharing mechanism from a potential game theoretical point of view has been proposed while keeping simplicity, applicability in real world scenarios in mind. The proposed scheme supports multi-node deployments and favors fair bandwidth sharing among players as well as providing effective usage of globally available bandwidth. The proposed scheme converges to a Nash equilibrium in pure strategies, when played in best reply dynamics. In order to evaluate its performance it is compared to another scheme which is supposed to admit players' available bandwidth as its potential function. The second scheme has been investigated by rigorous simulations and shown to converge to a Nash equilibrium in pure strategies, although it still lacks an analytical demonstration to be proven as a potential game. Results show that as well as supporting multi-node deployments, the proposed scheme also fairly distributes the available bandwidth among players and increases the globally available bandwidth being shared.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks 基于路由缓存的移动Ad-Hoc网络控制包入侵检测SVM分类器
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718169
Robert Basomingera, Young-June Choi
For the security of mobile ad-hoc networks (MANETs), a group of wireless mobile nodes needs to cooperate by forwarding packets, to implement an intrusion detection system (IDS). Some of the current IDS implementations in a clustered MANET have designed mobile nodes to wait until the cluster head is elected before scanning the network and thus nodes may be, unfortunately, exposed to several control packet attacks by which nodes identify falsified routes to reach other nodes. In order to detect control packet attacks such as route falsification, we design a route cache sharing mechanism for a non-clustered network where all one-hop routing data are collected by each node for a cooperative host-based detection. The cooperative host-based detection system uses a Support Vector Machine classifier and achieves a detection rate of around 95%. By successfully detecting the route falsification attacks, nodes are given the capability to avoid other attacks such as black-hole and gray-hole, which are in many cases a result of a successful route falsification attack.
为了保证移动自组织网络(manet)的安全,需要一组无线移动节点通过转发数据包的方式进行协作,从而实现入侵检测系统(IDS)。目前在集群MANET中的一些IDS实现设计了移动节点等待,直到集群头被选出,然后才扫描网络,因此节点可能不幸地暴露在几个控制数据包攻击中,节点通过这些攻击识别到达其他节点的伪造路由。为了检测路由伪造等控制数据包攻击,我们设计了一种非集群网络的路由缓存共享机制,其中所有一跳路由数据由每个节点收集以进行基于主机的合作检测。基于协作主机的检测系统采用支持向量机分类器,检测率达到95%左右。通过成功检测路由伪造攻击,节点可以避免其他攻击,如黑洞和灰洞,这些攻击通常是路由伪造攻击成功的结果。
{"title":"Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks","authors":"Robert Basomingera, Young-June Choi","doi":"10.1109/ICOIN.2019.8718169","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718169","url":null,"abstract":"For the security of mobile ad-hoc networks (MANETs), a group of wireless mobile nodes needs to cooperate by forwarding packets, to implement an intrusion detection system (IDS). Some of the current IDS implementations in a clustered MANET have designed mobile nodes to wait until the cluster head is elected before scanning the network and thus nodes may be, unfortunately, exposed to several control packet attacks by which nodes identify falsified routes to reach other nodes. In order to detect control packet attacks such as route falsification, we design a route cache sharing mechanism for a non-clustered network where all one-hop routing data are collected by each node for a cooperative host-based detection. The cooperative host-based detection system uses a Support Vector Machine classifier and achieves a detection rate of around 95%. By successfully detecting the route falsification attacks, nodes are given the capability to avoid other attacks such as black-hole and gray-hole, which are in many cases a result of a successful route falsification attack.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Resource Centric Characterization and Classification of Applications Using KMeans for Multicores 以资源为中心的多核KMeans应用表征与分类
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8717981
Preeti Jain, S. Surve
The knowledge on the behavior of an application program towards consumption of shared resources in multicore systems could assist in characterizing and classifying these programs. Further categorizing applications assists in predicting optimal coschedules for multicores, which eventually leads to lower contention and enhance performance. The proposed work characterizes applications on the basis of variations in IPC due to various resource allocations. Further classification is done based on parameters of cache memory and Dram bandwidth utilization obtained using hardware counters. A statistical approach is used for classifying the applications. The variance values obtained for an application's behavior towards different resource allocations is considered to build training and test set and KMeans learning algorithm is applied to classify the workloads. The accuracy obtained with the proposed method is 85.71%.
了解应用程序在多核系统中对共享资源消耗的行为可以帮助描述和分类这些程序。进一步对应用程序进行分类有助于预测多核的最佳协同调度,从而最终降低争用并提高性能。拟议的工作是根据各种资源分配导致的IPC变化来描述应用程序的特征。根据使用硬件计数器获得的缓存内存和Dram带宽利用率参数进行进一步分类。使用统计方法对应用程序进行分类。考虑应用程序对不同资源分配行为的方差值来构建训练和测试集,并使用KMeans学习算法对工作负载进行分类。该方法的准确率为85.71%。
{"title":"Resource Centric Characterization and Classification of Applications Using KMeans for Multicores","authors":"Preeti Jain, S. Surve","doi":"10.1109/ICOIN.2019.8717981","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8717981","url":null,"abstract":"The knowledge on the behavior of an application program towards consumption of shared resources in multicore systems could assist in characterizing and classifying these programs. Further categorizing applications assists in predicting optimal coschedules for multicores, which eventually leads to lower contention and enhance performance. The proposed work characterizes applications on the basis of variations in IPC due to various resource allocations. Further classification is done based on parameters of cache memory and Dram bandwidth utilization obtained using hardware counters. A statistical approach is used for classifying the applications. The variance values obtained for an application's behavior towards different resource allocations is considered to build training and test set and KMeans learning algorithm is applied to classify the workloads. The accuracy obtained with the proposed method is 85.71%.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Service Function Chaining by Resource Usage Learning in SDN/NFV Environment SDN/NFV环境下基于资源使用学习的动态业务功能链
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718190
Sang Il Kim, Hwa-sung Kim
Recently, to reflect diverse service requirements increasing with the popularization of various Internet devices, network functions virtualization (NFV) is attracting attention as the core technology of the next-generation network. In keeping with the progress of NFV, service function chaining (SFC) for specific network service appeared, and SFC refers to a technique for the sequential abstraction of service functions. In connection with the existing study's method for dynamic service chaining that dynamically generates a service chain through reinforcement learning, considering a node, at which service functions operate for efficient service chaining in the NFV environment, and the usage of resources such as CPU, memory, and network usage, this paper investigated a method for more stable dynamic service function chaining by flexibly calculating a fixed weight for the $r$ value, which was derived from an experiment, according to the amount of remaining resources at the relevant node.
近年来,随着各种互联网设备的普及,网络功能虚拟化(network functions virtualization, NFV)作为下一代网络的核心技术,日益受到人们的关注。随着NFV的发展,出现了针对特定网络业务的业务功能链(service function chains, SFC), SFC是一种对业务功能进行顺序抽象的技术。结合已有研究通过强化学习动态生成服务链的动态服务链方法,考虑NFV环境下业务功能运行的节点,以及CPU、内存、网络等资源的使用情况,通过灵活计算r值的固定权值,研究了一种更稳定的动态服务功能链方法。这是由实验得出的,根据相关节点的剩余资源量。
{"title":"Dynamic Service Function Chaining by Resource Usage Learning in SDN/NFV Environment","authors":"Sang Il Kim, Hwa-sung Kim","doi":"10.1109/ICOIN.2019.8718190","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718190","url":null,"abstract":"Recently, to reflect diverse service requirements increasing with the popularization of various Internet devices, network functions virtualization (NFV) is attracting attention as the core technology of the next-generation network. In keeping with the progress of NFV, service function chaining (SFC) for specific network service appeared, and SFC refers to a technique for the sequential abstraction of service functions. In connection with the existing study's method for dynamic service chaining that dynamically generates a service chain through reinforcement learning, considering a node, at which service functions operate for efficient service chaining in the NFV environment, and the usage of resources such as CPU, memory, and network usage, this paper investigated a method for more stable dynamic service function chaining by flexibly calculating a fixed weight for the $r$ value, which was derived from an experiment, according to the amount of remaining resources at the relevant node.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks 基于软件定义网络中ARP更新状态的ARP投毒攻击检测
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718158
Youngpin Kim, S. Ahn, Nguyen Canh Thang, DongHo Choi, Minho Park
Recently, the novel networking technology Software-Defined Networking(SDN) and Service Function Chaining(SFC) are rapidly growing, and security issues are also emerging for SDN and SFC. However, the research about security and safety on a novel networking environment is still unsatisfactory, and the vulnerabilities have been revealed continuously. Among these security issues, this paper addresses the ARP Poisoning attack to exploit SFC vulnerability, and proposes a method to defend the attack. The proposed method recognizes the repetitive ARP reply which is a feature of ARP Poisoning attack, and detects ARP Poisoning attack. The proposed method overcomes the limitations of the existing detection methods. The proposed method also detects the presence of an attack more accurately.
近年来,新型网络技术软件定义网络(SDN)和业务功能链(SFC)迅速发展,SDN和SFC的安全问题也不断涌现,但在新型网络环境下的安全与安全研究仍不尽如人意,漏洞不断暴露。在这些安全问题中,本文讨论了利用SFC漏洞的ARP投毒攻击,并提出了一种防御方法。该方法识别了ARP投毒攻击的特征——重复的ARP应答,从而检测出ARP投毒攻击。该方法克服了现有检测方法的局限性。该方法还可以更准确地检测攻击的存在。
{"title":"ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks","authors":"Youngpin Kim, S. Ahn, Nguyen Canh Thang, DongHo Choi, Minho Park","doi":"10.1109/ICOIN.2019.8718158","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718158","url":null,"abstract":"Recently, the novel networking technology Software-Defined Networking(SDN) and Service Function Chaining(SFC) are rapidly growing, and security issues are also emerging for SDN and SFC. However, the research about security and safety on a novel networking environment is still unsatisfactory, and the vulnerabilities have been revealed continuously. Among these security issues, this paper addresses the ARP Poisoning attack to exploit SFC vulnerability, and proposes a method to defend the attack. The proposed method recognizes the repetitive ARP reply which is a feature of ARP Poisoning attack, and detects ARP Poisoning attack. The proposed method overcomes the limitations of the existing detection methods. The proposed method also detects the presence of an attack more accurately.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133709085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed ID/Locator Resolution System for Inter Mesh Networks 网状网络的分布式ID/定位器解析系统
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718162
M. Ohnishi, Kazuyuki Shudo
We propose an ID/Locator resolution system for super wide area wireless mesh networks constructed using Delaunay overlay networks. Unlike conventional mobile ad-hoc network protocols, the proposed system does not use flooding to spread the locator notification messages of each node. The proposed method sends one-hop locator notifications on skip links such as skip graphs. The proposed system realized scalability by controlling the route, frequency, and storing locations of the locator notification message. Specifically, when the number of nodes increases, the average load on communication links and the message database of each node are approximately O(log n), where n is the total number of nodes. The scalability of the proposed method is confirmed through simulations.
提出了一种基于Delaunay覆盖网络的超广域无线网状网络的ID/Locator解析系统。与传统的移动自组织网络协议不同,该系统不使用泛洪来传播每个节点的定位器通知消息。该方法在跳图等跳链上发送单跳定位器通知。该系统通过控制定位器通知消息的路由、频率和存储位置来实现可扩展性。具体来说,当节点数量增加时,每个节点的通信链路和消息数据库的平均负载约为O(log n),其中n为节点总数。通过仿真验证了该方法的可扩展性。
{"title":"Distributed ID/Locator Resolution System for Inter Mesh Networks","authors":"M. Ohnishi, Kazuyuki Shudo","doi":"10.1109/ICOIN.2019.8718162","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718162","url":null,"abstract":"We propose an ID/Locator resolution system for super wide area wireless mesh networks constructed using Delaunay overlay networks. Unlike conventional mobile ad-hoc network protocols, the proposed system does not use flooding to spread the locator notification messages of each node. The proposed method sends one-hop locator notifications on skip links such as skip graphs. The proposed system realized scalability by controlling the route, frequency, and storing locations of the locator notification message. Specifically, when the number of nodes increases, the average load on communication links and the message database of each node are approximately O(log n), where n is the total number of nodes. The scalability of the proposed method is confirmed through simulations.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122779914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Driving Car Meets Multi-Access Edge Computing for Deep Learning-Based Caching 自动驾驶汽车满足基于深度学习的缓存的多访问边缘计算
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718113
Anselme Ndikumana, C. Hong
In the future, self-driving cars are expected to be involved in public transportation. Once passengers are comfortable with them, the self-driving cars will be new spaces for entertainment. However, getting infotainment contents from Data Centers (DCs) can be perturbed by the high end-to-end delay. To address this issue, we propose caching for infotainment contents in close proximity to the self-driving cars and in self-driving cars. In our proposal, Multi-access Edge Computing (MEC) helps self-driving cars by deploying MEC servers to the edge of the network at macro base stations (BSs), WiFi access points (WAPs), and roadside units (RSUs) for caching infotainment contents in close proximity to the self-driving cars. Based on the passenger's features learned via self-driving car deep learning approach proposed in this paper, the self-driving car can download infotainment contents that are appropriate to its passengers from MEC servers and cache them. The simulation results show that our prediction for the infotainment contents need to be cached in close proximity to the self-driving cars can achieve 99.28% accuracy.
未来,自动驾驶汽车有望涉足公共交通领域。一旦乘客对它们感到舒适,自动驾驶汽车将成为娱乐的新空间。然而,从数据中心(dc)获取信息娱乐内容可能会受到高端到端延迟的干扰。为了解决这个问题,我们建议对自动驾驶汽车附近和自动驾驶汽车中的信息娱乐内容进行缓存。在我们的提案中,多接入边缘计算(MEC)通过在宏基站(BSs)、WiFi接入点(wap)和路边单元(rsu)的网络边缘部署MEC服务器来帮助自动驾驶汽车,以缓存自动驾驶汽车附近的信息娱乐内容。基于本文提出的自动驾驶汽车深度学习方法学习到的乘客特征,自动驾驶汽车可以从MEC服务器下载适合乘客的信息娱乐内容并缓存。仿真结果表明,我们对需要缓存在自动驾驶汽车附近的信息娱乐内容的预测可以达到99.28%的准确率。
{"title":"Self-Driving Car Meets Multi-Access Edge Computing for Deep Learning-Based Caching","authors":"Anselme Ndikumana, C. Hong","doi":"10.1109/ICOIN.2019.8718113","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718113","url":null,"abstract":"In the future, self-driving cars are expected to be involved in public transportation. Once passengers are comfortable with them, the self-driving cars will be new spaces for entertainment. However, getting infotainment contents from Data Centers (DCs) can be perturbed by the high end-to-end delay. To address this issue, we propose caching for infotainment contents in close proximity to the self-driving cars and in self-driving cars. In our proposal, Multi-access Edge Computing (MEC) helps self-driving cars by deploying MEC servers to the edge of the network at macro base stations (BSs), WiFi access points (WAPs), and roadside units (RSUs) for caching infotainment contents in close proximity to the self-driving cars. Based on the passenger's features learned via self-driving car deep learning approach proposed in this paper, the self-driving car can download infotainment contents that are appropriate to its passengers from MEC servers and cache them. The simulation results show that our prediction for the infotainment contents need to be cached in close proximity to the self-driving cars can achieve 99.28% accuracy.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Optimal and Secure Controller Placement in SDN Based Smart City Network 基于SDN的智慧城市网络中控制器的优化和安全配置
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718165
Samir Kumar Tarai, S. Shailendra
The exponential growth of Internet of Things (IoT) devices and cloud based systems has resulted in an increased demand of new services and applications. In an IoT network like smart city, it is desirable that these services and applications can be provisioned on demand and securely. SDN (Software Defined Networking) has emerged as a new paradigm that facilitates on demand provisioning of the network, services and applications. An efficient and secure controller placement is the key to the efficient deployment of an SDN based network. In this paper, we have addressed the dual problem of optimal and secure controller placement in an SDN based network such that it optimizes the flow setup time for dynamically changing network conditions. Our approach takes care of controller fault tolerance by introducing a well-defined strategy of Master-Equal-Slave (M-E-S) controllers combination. We have built our own Java based simulator and extensive simulations have been carried out to verify the proposed algorithms.
物联网(IoT)设备和基于云的系统的指数级增长导致了对新服务和应用程序的需求增加。在像智慧城市这样的物联网网络中,希望这些服务和应用程序可以按需安全地提供。软件定义网络(SDN, Software Defined Networking)作为一种新的范例已经出现,它促进了网络、服务和应用的按需供应。有效和安全的控制器放置是有效部署基于SDN的网络的关键。在本文中,我们解决了在基于SDN的网络中优化和安全控制器放置的双重问题,从而优化了动态变化的网络条件下的流量设置时间。我们的方法通过引入一个定义良好的主-相等-从(M-E-S)控制器组合策略来处理控制器容错性。我们已经建立了自己的基于Java的模拟器,并进行了大量的仿真来验证所提出的算法。
{"title":"Optimal and Secure Controller Placement in SDN Based Smart City Network","authors":"Samir Kumar Tarai, S. Shailendra","doi":"10.1109/ICOIN.2019.8718165","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718165","url":null,"abstract":"The exponential growth of Internet of Things (IoT) devices and cloud based systems has resulted in an increased demand of new services and applications. In an IoT network like smart city, it is desirable that these services and applications can be provisioned on demand and securely. SDN (Software Defined Networking) has emerged as a new paradigm that facilitates on demand provisioning of the network, services and applications. An efficient and secure controller placement is the key to the efficient deployment of an SDN based network. In this paper, we have addressed the dual problem of optimal and secure controller placement in an SDN based network such that it optimizes the flow setup time for dynamically changing network conditions. Our approach takes care of controller fault tolerance by introducing a well-defined strategy of Master-Equal-Slave (M-E-S) controllers combination. We have built our own Java based simulator and extensive simulations have been carried out to verify the proposed algorithms.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction Based Sub-Task Offloading in Mobile Edge Computing 移动边缘计算中基于预测的子任务卸载
Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718183
Kitae Kim, Jared Lynskey, S. Kang, C. Hong
Mobile Edge Cloud Computing has been developed and introduced to provide low-latency service in close proximity to users. In this environment., resource constrained UE (user equipment) incapable to execute complex applications (i.e VR/AR., Deep Learning., Image Processing Applications) can dynamically offload computationally demanding tasks to neighboring MEC nodes. To process tasks even faster with MEC nodes., we can divide one task into several sub-tasks and offload to multiple MEC nodes simultaneously., thereby each sub-task will be processed in parallel. In this paper., we predict the total processing duration of each task on each candidate MEC node using Linear Regression. According to the previously observed state of each MEC node., we offload sub-tasks to their respective edge node. We also developed a monitoring module at core cloud. The results show a decrease in execution duration when we offload an entire application to one edge node compared with local execution.
移动边缘云计算已经被开发和引入,以在用户附近提供低延迟的服务。在这种环境下。,资源受限的UE(用户设备)无法执行复杂的应用程序(如VR/AR)。深度学习。(图像处理应用程序)可以动态地将计算要求高的任务卸载到邻近的MEC节点。使用MEC节点更快地处理任务。,我们可以将一个任务分成若干个子任务,并同时卸载到多个MEC节点。,因此每个子任务将并行处理。在本文中。,我们使用线性回归预测每个候选MEC节点上每个任务的总处理时间。根据之前观测到的每个MEC节点的状态。,我们将子任务卸载到各自的边缘节点。我们还在core cloud开发了一个监控模块。结果表明,与本地执行相比,将整个应用程序卸载到一个边缘节点可以减少执行时间。
{"title":"Prediction Based Sub-Task Offloading in Mobile Edge Computing","authors":"Kitae Kim, Jared Lynskey, S. Kang, C. Hong","doi":"10.1109/ICOIN.2019.8718183","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718183","url":null,"abstract":"Mobile Edge Cloud Computing has been developed and introduced to provide low-latency service in close proximity to users. In this environment., resource constrained UE (user equipment) incapable to execute complex applications (i.e VR/AR., Deep Learning., Image Processing Applications) can dynamically offload computationally demanding tasks to neighboring MEC nodes. To process tasks even faster with MEC nodes., we can divide one task into several sub-tasks and offload to multiple MEC nodes simultaneously., thereby each sub-task will be processed in parallel. In this paper., we predict the total processing duration of each task on each candidate MEC node using Linear Regression. According to the previously observed state of each MEC node., we offload sub-tasks to their respective edge node. We also developed a monitoring module at core cloud. The results show a decrease in execution duration when we offload an entire application to one edge node compared with local execution.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2019 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1