Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580410
Yilin Wang, Caidan Zhao, Gege Luo
The radar realizes unmanned aerial vehicle (UAV) recognition using the micro-Doppler effect caused by UAV rotors' rotation to extract micro-Doppler features of rotor echo signals. For example, principal component analysis (PCA) algorithm can extract features from the time-frequency spectrums obtained by the time-frequency analysis or its corresponding images. However, conventional frequency spectrums have a large amount of data, and PCA requires additional data dimension conversion when processing samples, prone to high covariance matrix dimensions and high computational complexity, which causes the time delay of feature extraction to increase exponentially. Therefore, in order to achieve lightweight and efficient individual recognition of small UAVs, this paper performs fast fourier transform (FFT) along the time dimension on spectrums, uses two-dimension principal component analysis (2DPCA) to reduce the data dimension to extract UAV micro-Doppler features, and send them to supervised learning classifiers to obtain the recognition results. The feature extraction algorithm takes a single sample as a calculation unit, which avoids high-dimensional data conversion, reduces computational complexity, and shortens the feature extraction time delay, with an average recognition rate of 98.44%.
{"title":"A lightweight UAV recognition algorithm based on micro-Doppler features","authors":"Yilin Wang, Caidan Zhao, Gege Luo","doi":"10.1109/iccc52777.2021.9580410","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580410","url":null,"abstract":"The radar realizes unmanned aerial vehicle (UAV) recognition using the micro-Doppler effect caused by UAV rotors' rotation to extract micro-Doppler features of rotor echo signals. For example, principal component analysis (PCA) algorithm can extract features from the time-frequency spectrums obtained by the time-frequency analysis or its corresponding images. However, conventional frequency spectrums have a large amount of data, and PCA requires additional data dimension conversion when processing samples, prone to high covariance matrix dimensions and high computational complexity, which causes the time delay of feature extraction to increase exponentially. Therefore, in order to achieve lightweight and efficient individual recognition of small UAVs, this paper performs fast fourier transform (FFT) along the time dimension on spectrums, uses two-dimension principal component analysis (2DPCA) to reduce the data dimension to extract UAV micro-Doppler features, and send them to supervised learning classifiers to obtain the recognition results. The feature extraction algorithm takes a single sample as a calculation unit, which avoids high-dimensional data conversion, reduces computational complexity, and shortens the feature extraction time delay, with an average recognition rate of 98.44%.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":" 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132125168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our paper considers a scenario where an UAV collects data from multiple ground nodes (GNs). The UAV flying energy consumption and the data transmit energy consumption of GNs are regarded as a whole constraint. Through jointly optimizing the data collection scheduling, UAV trajectory, data collection time and data transmit power of GNs, we propose an optimization problem to maximize the minimum amount of data collected from GNs, which improves the fairness of data collected from each GN and reduce data collection time corresponding to the obtained trajectory. Because the formulated problem is non-convex, we first break it down into several subproblems, and then an iterative optimization algorithm is proposed to deal with the above problems through applying successive convex approximation (SCA) technique and block coordinate descent (BCD) method. Simulations show that the optimization algorithm accomplishes the above goal vary well.
{"title":"UAV-Based and Energy-Constrained Data Collection System with Trajectory, Time, and Collection Scheduling Optimization","authors":"Kehao Wang, Zheng Tang, Pei Liu, Yirui Cong, Xiangke Wang, Dejin Kong, Yitong Li","doi":"10.1109/iccc52777.2021.9580291","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580291","url":null,"abstract":"Our paper considers a scenario where an UAV collects data from multiple ground nodes (GNs). The UAV flying energy consumption and the data transmit energy consumption of GNs are regarded as a whole constraint. Through jointly optimizing the data collection scheduling, UAV trajectory, data collection time and data transmit power of GNs, we propose an optimization problem to maximize the minimum amount of data collected from GNs, which improves the fairness of data collected from each GN and reduce data collection time corresponding to the obtained trajectory. Because the formulated problem is non-convex, we first break it down into several subproblems, and then an iterative optimization algorithm is proposed to deal with the above problems through applying successive convex approximation (SCA) technique and block coordinate descent (BCD) method. Simulations show that the optimization algorithm accomplishes the above goal vary well.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580361
Rui Sun, M. Tao
For federated learning, each device participates in the model learning in a collaborative training manner. Due to the constraint of delay and energy consumption in actual wireless environment, resource allocation is essential for the convergence speed of federated learning. This paper analyzes the convergence bound of federated learning from a theoretical perspective, based on which, we propose a greedy control policy that combines aggregation frequency control and device scheduling together. The proposed policy minimizes the loss of model training under a given time and energy budget with a greedy strategy which eliminates the device with the worst performance gain in each step. Simulation results show that under different wireless environments, the proposed global control policy achieves higher accuracy than the commonly used federated learning algorithms and has a good robustness to non-i.i.d. data.
{"title":"A Greedy Control Policy for Latency and Energy Constrained Wireless Federated Learning","authors":"Rui Sun, M. Tao","doi":"10.1109/iccc52777.2021.9580361","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580361","url":null,"abstract":"For federated learning, each device participates in the model learning in a collaborative training manner. Due to the constraint of delay and energy consumption in actual wireless environment, resource allocation is essential for the convergence speed of federated learning. This paper analyzes the convergence bound of federated learning from a theoretical perspective, based on which, we propose a greedy control policy that combines aggregation frequency control and device scheduling together. The proposed policy minimizes the loss of model training under a given time and energy budget with a greedy strategy which eliminates the device with the worst performance gain in each step. Simulation results show that under different wireless environments, the proposed global control policy achieves higher accuracy than the commonly used federated learning algorithms and has a good robustness to non-i.i.d. data.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580244
Wenjung Jiang, Ming Yue, Xiaojun Yuan, Yong Zuo
This paper considers the joint design of device activity detection and channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) based grant-free non-orthogonal multiple access (NOMA) systems. In specific, we leverage the correlation of the channel frequency responses in typical narrow-band massive machine-type communication (mMTC) to establish a blockwise linear channel model. In the proposed channel model, the continuous OFDM subcarriers are divided into several subblocks. A linear function with only two variables (mean and slope) is used to approximate the frequency-selective channel in each sub-block. This significantly reduces the number of variables to be determined in channel estimation. We then formulate the joint active device detection and channel estimation as a Bayesian inference problem. By exploiting the block-sparsity of the channel matrix, an efficient turbo message passing (Turbo- MP) algorithm is developed to resolve the Bayesian inference problem with near- linear complexity. We show that Turbo-MP achieves superior performance over the state-of-the-art algorithms.
{"title":"Massive Connectivity in MIMO-OFDM Systems With Frequency Selectivity Compensation","authors":"Wenjung Jiang, Ming Yue, Xiaojun Yuan, Yong Zuo","doi":"10.1109/iccc52777.2021.9580244","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580244","url":null,"abstract":"This paper considers the joint design of device activity detection and channel estimation in multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) based grant-free non-orthogonal multiple access (NOMA) systems. In specific, we leverage the correlation of the channel frequency responses in typical narrow-band massive machine-type communication (mMTC) to establish a blockwise linear channel model. In the proposed channel model, the continuous OFDM subcarriers are divided into several subblocks. A linear function with only two variables (mean and slope) is used to approximate the frequency-selective channel in each sub-block. This significantly reduces the number of variables to be determined in channel estimation. We then formulate the joint active device detection and channel estimation as a Bayesian inference problem. By exploiting the block-sparsity of the channel matrix, an efficient turbo message passing (Turbo- MP) algorithm is developed to resolve the Bayesian inference problem with near- linear complexity. We show that Turbo-MP achieves superior performance over the state-of-the-art algorithms.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580294
Xianyu Zhang, Tao Liang, K. An, Yifu Sun
This paper investigates the secure transmission for multi-user massive MIMO system with finite alphabet inputs, where a multi-antenna eavesdropper attempts to wiretap the confidential data to legitimate users. Specifically, by exploiting the null-space artificial noise (AN) generation for security enhancement, the closed-form expression of an approximated ergodic secrecy rate is derived with respect to key system parameters including the number of the antennas and users, transmit power, finite alphabet set, etc. Considering the large antenna regime, the behavior of the asymptotic ergodic secrecy rate is also analyzed. Based on the asymptotical results, a low complexity power allocation optimization problem for maximizing the achievable secrecy rate is then presented. Numerical results demonstrate the accuracy of the analytical expressions, as well as the effectiveness of the proposed power control algorithm.
{"title":"Secure Communication for Multi-user Massive MIMO System With Finite Alphabet Inputs","authors":"Xianyu Zhang, Tao Liang, K. An, Yifu Sun","doi":"10.1109/iccc52777.2021.9580294","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580294","url":null,"abstract":"This paper investigates the secure transmission for multi-user massive MIMO system with finite alphabet inputs, where a multi-antenna eavesdropper attempts to wiretap the confidential data to legitimate users. Specifically, by exploiting the null-space artificial noise (AN) generation for security enhancement, the closed-form expression of an approximated ergodic secrecy rate is derived with respect to key system parameters including the number of the antennas and users, transmit power, finite alphabet set, etc. Considering the large antenna regime, the behavior of the asymptotic ergodic secrecy rate is also analyzed. Based on the asymptotical results, a low complexity power allocation optimization problem for maximizing the achievable secrecy rate is then presented. Numerical results demonstrate the accuracy of the analytical expressions, as well as the effectiveness of the proposed power control algorithm.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133092643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580360
Jianyu Wang, Wenchi Cheng, Hailin Zhang
Magnetic induction (MI) communications are widely used to realize through-the-earth transmissions due to the advantages of high penetration efficiency, stable channel, and small antenna size. However, traditional MI communications are mainly based on single or multiple carriers with resonant frequencies, which makes the achievable rate much less than the capacity of frequency-selective MI channel. To approach the capacity of frequency-selective MI channel, we formulate the orthogonal-frequency-division-multiplexing (OFDM) based MI communication framework, where resonant frequency and nonresonant frequencies are comprehensively utilized. Also, multiple transmit coils are equipped for the aboveground user to enhance the receive power of the underground user with single coil. We propose the optimal current control scheme in closed-form, which aims at maximizing the achievable rate under the constraint of transmit power. Based on the proposed current control scheme, the approximate expression for the capacity of frequency-selective multiple-input-single-output MI (MISO-MI) channel is given. Numerical results verify our theoretical analyses and show that MISO-OFDM based MI communication system can significantly increase the achievable rate. It is also shown that the proposed current control scheme can achieve larger achievable rate as compared with other schemes.
{"title":"Optimal Current Control for MISO-OFDM Based Through-the-Earth Communications with Magnetic Induction","authors":"Jianyu Wang, Wenchi Cheng, Hailin Zhang","doi":"10.1109/iccc52777.2021.9580360","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580360","url":null,"abstract":"Magnetic induction (MI) communications are widely used to realize through-the-earth transmissions due to the advantages of high penetration efficiency, stable channel, and small antenna size. However, traditional MI communications are mainly based on single or multiple carriers with resonant frequencies, which makes the achievable rate much less than the capacity of frequency-selective MI channel. To approach the capacity of frequency-selective MI channel, we formulate the orthogonal-frequency-division-multiplexing (OFDM) based MI communication framework, where resonant frequency and nonresonant frequencies are comprehensively utilized. Also, multiple transmit coils are equipped for the aboveground user to enhance the receive power of the underground user with single coil. We propose the optimal current control scheme in closed-form, which aims at maximizing the achievable rate under the constraint of transmit power. Based on the proposed current control scheme, the approximate expression for the capacity of frequency-selective multiple-input-single-output MI (MISO-MI) channel is given. Numerical results verify our theoretical analyses and show that MISO-OFDM based MI communication system can significantly increase the achievable rate. It is also shown that the proposed current control scheme can achieve larger achievable rate as compared with other schemes.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580440
Xinyue Chen, Zihao Zhou, Li Zhang, Chengxiang Wang, Jie Huang
Developing multi-frequency cooperation algorithms in wireless communication systems has been a topic of interest since the ever-growing complexity and network density prompt the current system to work at multiple frequencies. In this paper, firstly a wideband multiple-input and multiple-output (MIMO) channel model capable of reflecting characteristics in multi-frequency systems is presented, in which channel impulse response is given, and then large-scale and small-scale channel model parameters are investigated for their frequency dependence. In order to gain deeper insight into the behaviors of channels with different sub-6 GHz bands, a simulation setup is established, which compares multiple channel properties at widely available frequencies, namely 2.4, 3.5, and 5 GHz. Statistical properties such as time auto correlation function (ACF), and frequency correlation function (FCF) of the same frequency, spatial correlation coefficients between different frequencies, as well as instantaneous delay power spectrum density (PSD)) are among the metrics to be compared. Analysis of the comparisons offers insightful discoveries about channel characteristics. After justifying the presented multi-frequency channel model with data from measurement results, it is concluded that the model can be used to develop and evaluate multi-frequency communication protocols and systems.
{"title":"Comparison and Modeling of Multi-Frequency Wideband Channels at Sub-6 GHz Bands","authors":"Xinyue Chen, Zihao Zhou, Li Zhang, Chengxiang Wang, Jie Huang","doi":"10.1109/iccc52777.2021.9580440","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580440","url":null,"abstract":"Developing multi-frequency cooperation algorithms in wireless communication systems has been a topic of interest since the ever-growing complexity and network density prompt the current system to work at multiple frequencies. In this paper, firstly a wideband multiple-input and multiple-output (MIMO) channel model capable of reflecting characteristics in multi-frequency systems is presented, in which channel impulse response is given, and then large-scale and small-scale channel model parameters are investigated for their frequency dependence. In order to gain deeper insight into the behaviors of channels with different sub-6 GHz bands, a simulation setup is established, which compares multiple channel properties at widely available frequencies, namely 2.4, 3.5, and 5 GHz. Statistical properties such as time auto correlation function (ACF), and frequency correlation function (FCF) of the same frequency, spatial correlation coefficients between different frequencies, as well as instantaneous delay power spectrum density (PSD)) are among the metrics to be compared. Analysis of the comparisons offers insightful discoveries about channel characteristics. After justifying the presented multi-frequency channel model with data from measurement results, it is concluded that the model can be used to develop and evaluate multi-frequency communication protocols and systems.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114485699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malicious URLs result in malware installation, privacy leakage and illegal funding of mobile devices and computers. However, attackers frequently change domain names of URLs to avoid static detection and the malicious URL detection has to address variance in structure of domain names, which seriously degrades the detection accuracy in fixed detection policy selection and impedes optimal policy selection with theoretical analysis. In this paper, we propose an accurate detection of malicious URLs to protect Internet users from accessing malicious URLs, which designs a multi-feature analysis architecture to exploit lexical and content-based features and applies reinforcement learning (RL) to choose the detection mode and parameter. We provide a lightweight RL-based detection with transfer learning and a deep RL-based detection to further improve the detection accuracy for the server with sufficient computation resources. Malicious URLs that have specific domain name features including long numeric string or high percentage of the numeric character or alphabetic string without syllables are considered and simulation results show that this scheme improves the detection accuracy and increases the utility compared with the benchmark scheme.
{"title":"Reinforcement Learning Based Accurate Detection of Malicious URLs with Multi-Feature Analysis","authors":"Xiaoyue Wan, Pengmin Li, Yuhuan Wang, Wei Wei, Liang Xiao","doi":"10.1109/iccc52777.2021.9580433","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580433","url":null,"abstract":"Malicious URLs result in malware installation, privacy leakage and illegal funding of mobile devices and computers. However, attackers frequently change domain names of URLs to avoid static detection and the malicious URL detection has to address variance in structure of domain names, which seriously degrades the detection accuracy in fixed detection policy selection and impedes optimal policy selection with theoretical analysis. In this paper, we propose an accurate detection of malicious URLs to protect Internet users from accessing malicious URLs, which designs a multi-feature analysis architecture to exploit lexical and content-based features and applies reinforcement learning (RL) to choose the detection mode and parameter. We provide a lightweight RL-based detection with transfer learning and a deep RL-based detection to further improve the detection accuracy for the server with sufficient computation resources. Malicious URLs that have specific domain name features including long numeric string or high percentage of the numeric character or alphabetic string without syllables are considered and simulation results show that this scheme improves the detection accuracy and increases the utility compared with the benchmark scheme.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114501117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580331
Meng Wang, Qinghe Du
This paper studies wireless covert monitoring technologies, where multiple legitimate monitors (LMs) make use of intelligent reflecting surface (IRS) to sustainably intercept information sent from a suspicious transmitter (ST) to a suspicious receiver (SR). In particular, we propose an IRS-aided active monitoring scheme aligning with the regular two-phase transmissions between the ST and SR. In the pilot-transmission (PT) phase, LMs adopt a pilot spoofing strategy, where LMs control an IRS to reflect pilot signals sent by the SR, leading the ST's channel estimation towards LMs' direction. In the data-transmission (DT) phase, the IRS is controlled to reflect the ST's signals in a way that the LMs' received signal-to-noise ratios (SNR) are optimized, while helping maintain the SR's received SNR beyond a certain threshold to achieve sustainable monitoring. We formulate a phase-shift-matrix optimization problem over PT and DT phases. The minorization-maximization (MM) algorithm was applied to deal with the non-convex optimization such that we can efficiently obtain the optimized phase-shift matrices. Simulation results presented demonstrate the SNR gain improvement and monitoring range expansion introduced by our proposed scheme over the traditional passive monitoring approach.
{"title":"Phase Shift Matrix Optimization for IRS-Aided Legitimate Monitoring","authors":"Meng Wang, Qinghe Du","doi":"10.1109/iccc52777.2021.9580331","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580331","url":null,"abstract":"This paper studies wireless covert monitoring technologies, where multiple legitimate monitors (LMs) make use of intelligent reflecting surface (IRS) to sustainably intercept information sent from a suspicious transmitter (ST) to a suspicious receiver (SR). In particular, we propose an IRS-aided active monitoring scheme aligning with the regular two-phase transmissions between the ST and SR. In the pilot-transmission (PT) phase, LMs adopt a pilot spoofing strategy, where LMs control an IRS to reflect pilot signals sent by the SR, leading the ST's channel estimation towards LMs' direction. In the data-transmission (DT) phase, the IRS is controlled to reflect the ST's signals in a way that the LMs' received signal-to-noise ratios (SNR) are optimized, while helping maintain the SR's received SNR beyond a certain threshold to achieve sustainable monitoring. We formulate a phase-shift-matrix optimization problem over PT and DT phases. The minorization-maximization (MM) algorithm was applied to deal with the non-convex optimization such that we can efficiently obtain the optimized phase-shift matrices. Simulation results presented demonstrate the SNR gain improvement and monitoring range expansion introduced by our proposed scheme over the traditional passive monitoring approach.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129882496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1109/iccc52777.2021.9580199
Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao
As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.
{"title":"Secure network slicing deployment in edge computing","authors":"Yun Li, Xuefei Zhang, Xiaodong Xu, Xiaofeng Tao","doi":"10.1109/iccc52777.2021.9580199","DOIUrl":"https://doi.org/10.1109/iccc52777.2021.9580199","url":null,"abstract":"As a key technology of 5G, network slicing can meet the different needs of different users and realize customized services. In some uRLLC application scenarios, network slicing can be combined with edge computing technology to better realize low latency service and ensure that data will not be uploaded to the core network. It can realize local storage and computing of data, to better protect the privacy of user data. Therefore, network slicing combined with edge computing is meaningful. To achieve this, we firstly propose a network slicing architecture in edge computing and realize the user access authentication to prove the advantage of the architecture. Secondly security constraints are described by trust degree, to meet the security requirements. Lastly we formulate the model as a mixed-integer linear program (MILP) and then evaluate our solution against a typical solution. Simulation results show that our scheme can provide a secure and efficient resource allocation solution. In short, this paper can be referred to when deploying secure network slicing in edge computing.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131981399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}