首页 > 最新文献

2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

英文 中文
Fully Homomorphic Encryption based Privacy-Preserving Data Acquisition and Computation for Contact Tracing 基于全同态加密的接触跟踪隐私保护数据采集与计算
K. Sinha, P. Majumder, S. K. Ghosh
For public health surveillance systems, privacy is a major issue in storing and sharing of personal medical data. Often, patients and organizations are unwilling to divulge personal medical data for fear of compromising their privacy because although the data may be encrypted, the encrypted values typically need to be first decrypted to perform any computation on the data. Unfortunately, such a barrier in easy sharing of data can severely hamper the ability to respond in a timely and effective manner to a crisis scenario, as evident in the case of the ongoing COVID-19 pandemic. To overcome this critical obstacle, we propose in this paper a novel privacy-preserving encryption mechanism for storage and computation of sensitive healthcare data. Our scheme is based on the use of a secure fully homomorphic encryption scheme, so that the required computations can be performed directly on the encrypted data values without the need for any decryption. The ability to execute queries or computation directly on encrypted data, without the need for decryption, is not present in any existing public-health surveillance system. We propose a novel computational model and also develop an algorithm for contact tracing with COVID-19 pandemic as a case study. We have simulated our proposed approach using the ElGamal encryption algorithm to check the correctness and effectiveness of our proposed approach. The results show that our proposed solution is effective in providing adequate security while supporting the computational needs for contact-tracing. Besides contact-tracing, our new data-encryption technique can have a much broader impact in the field of healthcare. By executing queries or computations directly on encrypted data, our innovative solution would make the sharing of data in healthcare-related research and industry significantly simpler and faster. The use of such a data encryption scheme to store and transmit sensitive healthcare data over a network can not only allay the fear of compromising sensitive information but also ensure HIPAA-compliance.
对于公共卫生监测系统来说,隐私是存储和共享个人医疗数据的一个主要问题。通常,患者和组织不愿意泄露个人医疗数据,因为担心损害其隐私,因为尽管数据可能是加密的,但通常需要先对加密的值进行解密,才能对数据执行任何计算。不幸的是,这种难以共享数据的障碍可能严重妨碍及时有效地应对危机情景的能力,正在发生的COVID-19大流行就是明证。为了克服这一关键障碍,我们在本文中提出了一种新的隐私保护加密机制,用于存储和计算敏感的医疗保健数据。我们的方案基于使用安全的全同态加密方案,因此可以直接对加密的数据值执行所需的计算,而不需要任何解密。在不需要解密的情况下直接对加密数据执行查询或计算的能力,在任何现有的公共卫生监测系统中都不存在。我们提出了一种新的计算模型,并开发了一种COVID-19大流行接触者追踪算法作为案例研究。我们使用ElGamal加密算法模拟了我们提出的方法,以检查我们提出的方法的正确性和有效性。结果表明,我们提出的解决方案有效地提供了足够的安全性,同时支持了接触追踪的计算需求。除了接触者追踪,我们的新数据加密技术可以在医疗保健领域产生更广泛的影响。通过直接对加密数据执行查询或计算,我们的创新解决方案将使医疗保健相关研究和行业的数据共享变得更加简单和快速。使用这种数据加密方案在网络上存储和传输敏感的医疗保健数据,不仅可以减轻对泄露敏感信息的担忧,还可以确保符合hipaa。
{"title":"Fully Homomorphic Encryption based Privacy-Preserving Data Acquisition and Computation for Contact Tracing","authors":"K. Sinha, P. Majumder, S. K. Ghosh","doi":"10.1109/ANTS50601.2020.9342834","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342834","url":null,"abstract":"For public health surveillance systems, privacy is a major issue in storing and sharing of personal medical data. Often, patients and organizations are unwilling to divulge personal medical data for fear of compromising their privacy because although the data may be encrypted, the encrypted values typically need to be first decrypted to perform any computation on the data. Unfortunately, such a barrier in easy sharing of data can severely hamper the ability to respond in a timely and effective manner to a crisis scenario, as evident in the case of the ongoing COVID-19 pandemic. To overcome this critical obstacle, we propose in this paper a novel privacy-preserving encryption mechanism for storage and computation of sensitive healthcare data. Our scheme is based on the use of a secure fully homomorphic encryption scheme, so that the required computations can be performed directly on the encrypted data values without the need for any decryption. The ability to execute queries or computation directly on encrypted data, without the need for decryption, is not present in any existing public-health surveillance system. We propose a novel computational model and also develop an algorithm for contact tracing with COVID-19 pandemic as a case study. We have simulated our proposed approach using the ElGamal encryption algorithm to check the correctness and effectiveness of our proposed approach. The results show that our proposed solution is effective in providing adequate security while supporting the computational needs for contact-tracing. Besides contact-tracing, our new data-encryption technique can have a much broader impact in the field of healthcare. By executing queries or computations directly on encrypted data, our innovative solution would make the sharing of data in healthcare-related research and industry significantly simpler and faster. The use of such a data encryption scheme to store and transmit sensitive healthcare data over a network can not only allay the fear of compromising sensitive information but also ensure HIPAA-compliance.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Low Complexity Convolutional Neural Networks for Wireless Receiver Chain Optimization 低复杂度卷积神经网络无线接收机链优化
Marjan Radi, E. Matús, G. Fettweis
Technologies for 5G and beyond open up new chances for enabling new applications, which leads to an increasing variety of requirements, possible scenarios, and possible engineering decisions for wireless systems. Thus, having dynamic and robust techniques that can adapt to this huge variety has become more important than ever. One of the challenging adaptations is to select the most appropriate receiver architecture i.e. the architecture that gives the required performance with the least possible complexity, while modifying it dynamically based on the effects of having an instantaneous mix of a data sequence, channel effects, noise, and transmitter/receiver chains imperfections and impairments. One of the most innovative techniques is using convolutional neural networks (CNNs) as an initial pre-process that is capable of predicting the best receiver architecture. The technique depends on using offline pre-trained CNNs that can classify every incoming packet dynamically and assign it to the most appropriate receiver architecture. The technique shows high performance and accuracy that leads to higher certainty of the required resources and processing time, and consequently, better scheduling for the processes in the available receiver architectures and processing elements. Despite that, the technique adds an extra complexity due to the added CNNs. Although CNNs operations as multiplications have lower complexity than the operations in the receiver blocks, the added complexity due to using the CNNs is so high that they lead to total higher complexity than just using a higher complexity receiver in many cases.Here we propose a low complexity approach that gives an equivalent performance of the state of the art technique. Our approach here depends on reducing the size of the used CNNs by introducing parts of the incoming packet to the input layers of the CNNs instead of introducing the whole packet as in literature state of art, which reduces the added complexity due to the CNNs while keeping the advantage of the pre-knowledge of the required resources and the corresponding processing time. We show different approaches of how to extract enough information from the packet without the need to use all of it as input for the CNN, and analyzing the performance for every approach; then showing the total complexity reduction due to our new proposal.
5G及以后的技术为实现新应用开辟了新的机会,这导致无线系统的需求、可能的场景和可能的工程决策越来越多。因此,拥有能够适应这种巨大多样性的动态和健壮的技术变得比以往任何时候都更加重要。其中一个具有挑战性的适应是选择最合适的接收器架构,即以尽可能少的复杂性提供所需性能的架构,同时根据数据序列、信道效果、噪声和发送/接收链缺陷和损伤的瞬时混合效果动态修改它。最具创新性的技术之一是使用卷积神经网络(cnn)作为能够预测最佳接收器架构的初始预处理。该技术依赖于使用离线预训练的cnn,它可以动态地对每个传入数据包进行分类,并将其分配给最合适的接收器架构。该技术具有较高的性能和准确性,可提高所需资源和处理时间的确定性,从而在可用的接收器体系结构和处理元素中更好地调度进程。尽管如此,由于增加了cnn,这项技术增加了额外的复杂性。尽管作为乘法运算的cnn操作的复杂性低于接收器块中的操作,但由于使用cnn而增加的复杂性如此之高,以至于在许多情况下,它们比使用更高复杂度的接收器导致的总复杂性更高。在这里,我们提出了一种低复杂性的方法,它提供了最先进技术的等效性能。我们在这里的方法依赖于通过将部分传入数据包引入cnn的输入层来减小所使用的cnn的大小,而不是像目前的文献那样引入整个数据包,这减少了由于cnn增加的复杂性,同时保持了所需资源和相应处理时间的预先知识的优势。我们展示了如何从数据包中提取足够信息的不同方法,而不需要将所有信息用作CNN的输入,并分析了每种方法的性能;然后显示由于我们的新提议而减少的总复杂性。
{"title":"Low Complexity Convolutional Neural Networks for Wireless Receiver Chain Optimization","authors":"Marjan Radi, E. Matús, G. Fettweis","doi":"10.1109/ANTS50601.2020.9342807","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342807","url":null,"abstract":"Technologies for 5G and beyond open up new chances for enabling new applications, which leads to an increasing variety of requirements, possible scenarios, and possible engineering decisions for wireless systems. Thus, having dynamic and robust techniques that can adapt to this huge variety has become more important than ever. One of the challenging adaptations is to select the most appropriate receiver architecture i.e. the architecture that gives the required performance with the least possible complexity, while modifying it dynamically based on the effects of having an instantaneous mix of a data sequence, channel effects, noise, and transmitter/receiver chains imperfections and impairments. One of the most innovative techniques is using convolutional neural networks (CNNs) as an initial pre-process that is capable of predicting the best receiver architecture. The technique depends on using offline pre-trained CNNs that can classify every incoming packet dynamically and assign it to the most appropriate receiver architecture. The technique shows high performance and accuracy that leads to higher certainty of the required resources and processing time, and consequently, better scheduling for the processes in the available receiver architectures and processing elements. Despite that, the technique adds an extra complexity due to the added CNNs. Although CNNs operations as multiplications have lower complexity than the operations in the receiver blocks, the added complexity due to using the CNNs is so high that they lead to total higher complexity than just using a higher complexity receiver in many cases.Here we propose a low complexity approach that gives an equivalent performance of the state of the art technique. Our approach here depends on reducing the size of the used CNNs by introducing parts of the incoming packet to the input layers of the CNNs instead of introducing the whole packet as in literature state of art, which reduces the added complexity due to the CNNs while keeping the advantage of the pre-knowledge of the required resources and the corresponding processing time. We show different approaches of how to extract enough information from the packet without the need to use all of it as input for the CNN, and analyzing the performance for every approach; then showing the total complexity reduction due to our new proposal.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Maximum Likelihood Algorithm-based Mitigation technique for impulsive noise in MIMO-OFDM systems 基于鲁棒极大似然算法的MIMO-OFDM系统脉冲噪声抑制技术
S. Girija, R. Rao
Non-Gaussian impulsive noise impacts the equalizers and signal detectors directly in the wireless system. The major problem in the multiple-input multiple-output (MIMO)-related applications is the blind source equalization and separation, where the users transmit multiple digital signals in a linear channel that is received using the array of antennas. The noise in the received signals is impulsive in nature, which is mitigated in the research by implementing the Robust Maximum Likelihood Algorithm (RMLA) for handling the degradation of the performance in the wireless system. The constant modulus cost function formulated using RMLA is used for modeling the equalizer to adaptively suppress the influence of the impulsive noise. The effectiveness of the proposed RMLA based impulse noise mitigation is evaluated based on the evaluation metrics, such as Bit Error Rate (BER), Mean Square Error (MSE), and Symbol Error Rate (SER) corresponding to the Signal-to-Noise Ratio (SNR) and dissimilar antenna array size. The proposed RMLA based BE method provided minimum BER values of 0.0021, 0.0044, 0.0142, and minimum MSE value of 0.0006, 0.0012, and 0.0037 with the Rayleigh channel, minimum BER values of 0.0006, 0.0012, and 0.0013, and minimum MSE value of 0.0003 with the Rician channel.
在无线系统中,非高斯脉冲噪声直接影响均衡器和信号检测器。多输入多输出(MIMO)相关应用中的主要问题是盲源均衡和分离,其中用户在使用天线阵列接收的线性信道中发送多个数字信号。接收信号中的噪声本质上是脉冲噪声,在研究中采用鲁棒极大似然算法(RMLA)来处理无线系统的性能下降问题。利用RMLA构造的常模代价函数对均衡器进行建模,自适应抑制脉冲噪声的影响。基于信噪比(SNR)和不同天线阵列尺寸对应的误码率(BER)、均方误差(MSE)和符号错误率(SER)等评价指标,对所提出的基于RMLA的脉冲噪声抑制效果进行了评价。Rayleigh信道的最小误码率分别为0.0021、0.0044、0.0142,最小MSE分别为0.0006、0.0012、0.0037,在ricar信道的最小误码率分别为0.0006、0.0012、0.0013,最小MSE分别为0.0003。
{"title":"Robust Maximum Likelihood Algorithm-based Mitigation technique for impulsive noise in MIMO-OFDM systems","authors":"S. Girija, R. Rao","doi":"10.1109/ANTS50601.2020.9342789","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342789","url":null,"abstract":"Non-Gaussian impulsive noise impacts the equalizers and signal detectors directly in the wireless system. The major problem in the multiple-input multiple-output (MIMO)-related applications is the blind source equalization and separation, where the users transmit multiple digital signals in a linear channel that is received using the array of antennas. The noise in the received signals is impulsive in nature, which is mitigated in the research by implementing the Robust Maximum Likelihood Algorithm (RMLA) for handling the degradation of the performance in the wireless system. The constant modulus cost function formulated using RMLA is used for modeling the equalizer to adaptively suppress the influence of the impulsive noise. The effectiveness of the proposed RMLA based impulse noise mitigation is evaluated based on the evaluation metrics, such as Bit Error Rate (BER), Mean Square Error (MSE), and Symbol Error Rate (SER) corresponding to the Signal-to-Noise Ratio (SNR) and dissimilar antenna array size. The proposed RMLA based BE method provided minimum BER values of 0.0021, 0.0044, 0.0142, and minimum MSE value of 0.0006, 0.0012, and 0.0037 with the Rayleigh channel, minimum BER values of 0.0006, 0.0012, and 0.0013, and minimum MSE value of 0.0003 with the Rician channel.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128655235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CPW-fed Super Wideband Dielectric Resonator Antenna 一种cpw馈电超宽带介质谐振器天线
Sachin Agrawal
In this paper, a coplanar waveguide (CPW)-fed super wideband (SWB) dielectric resonator antenna (DRA) is proposed. It consists of a rectangular DR situated at the center of the rectangular slot both excited by a tapered feedline. In addition, a circular stub is added at the top portion of the feed in such a way that it excites the DR efficiently. From simulation results, it is found that the presence of DR in the proposed antenna design improves the impedance matching throughout the band and hence enhances the impedance bandwidth by downshifting the lower cutoff frequency from 3 GHz to 1 GHz. It is observed that the proposed antenna achieved an impedance bandwidth of more than 175% ranging from 1 GHz to 15 GHz with a bandwidth ratio of more than 15:1. Besides, it is investigated that the presence of DR raises the peak gain from -5.6 dBi to 1.24 dBi at 1 GHz. It achieved a maximum gain of 7.2 dBi at 5.1 GHz. Further, the proposed antenna exhibits an almost stable radiation pattern in the entire frequency range.
本文提出了一种共面波导馈电超宽带介质谐振器天线。它由位于矩形槽中心的矩形DR组成,两者都由锥形馈线激励。此外,在feed的顶部添加了一个圆形存根,以便有效地激发DR。仿真结果表明,在该天线设计中,DR的存在改善了整个频段的阻抗匹配,从而通过将下截止频率从3 GHz降频到1 GHz来提高阻抗带宽。结果表明,该天线在1 GHz ~ 15 GHz范围内实现了175%以上的阻抗带宽,带宽比大于15:1。此外,研究了DR的存在使1ghz时的峰值增益从-5.6 dBi提高到1.24 dBi。它在5.1 GHz时实现了7.2 dBi的最大增益。此外,所提出的天线在整个频率范围内表现出几乎稳定的辐射方向图。
{"title":"A CPW-fed Super Wideband Dielectric Resonator Antenna","authors":"Sachin Agrawal","doi":"10.1109/ANTS50601.2020.9342823","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342823","url":null,"abstract":"In this paper, a coplanar waveguide (CPW)-fed super wideband (SWB) dielectric resonator antenna (DRA) is proposed. It consists of a rectangular DR situated at the center of the rectangular slot both excited by a tapered feedline. In addition, a circular stub is added at the top portion of the feed in such a way that it excites the DR efficiently. From simulation results, it is found that the presence of DR in the proposed antenna design improves the impedance matching throughout the band and hence enhances the impedance bandwidth by downshifting the lower cutoff frequency from 3 GHz to 1 GHz. It is observed that the proposed antenna achieved an impedance bandwidth of more than 175% ranging from 1 GHz to 15 GHz with a bandwidth ratio of more than 15:1. Besides, it is investigated that the presence of DR raises the peak gain from -5.6 dBi to 1.24 dBi at 1 GHz. It achieved a maximum gain of 7.2 dBi at 5.1 GHz. Further, the proposed antenna exhibits an almost stable radiation pattern in the entire frequency range.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129081621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-efficient Mobile Backhaul Network Design over TWDM-PON 基于TWDM-PON的低成本移动回程网络设计
Md Shahbaz Akhtar, Pramit Biswas, Aneek Adhya, S. Majhi
In recent times, time and wavelength division multiplexed passive optical networks (TWDM-PONs) are recognized as promising transport network technology for mobile backhaul design. TWDM-PON is a multi-wavelength PON technology that offers high reliability, low maintenance cost, high capacity, and long transmission reach. In this paper, we propose a recursive clustering algorithm (RCA) to design cost-efficient TWDM-PON architecture for providing backhaul connectivity to the macro-cell base stations (BSs). Based on the geographical locations of BSs, RCA explores the optimal number of BS clusters, the size of each cluster, the most suitable location of remote nodes for passive device placement, and the best fiber route from operator’s central office to the BS’s locations. The primary objective is to reduce the total cost by minimizing the total length of deployed fibers. We also employ cable-conduit sharing, where the cable-conduits deployed for existing fiber links are utilized to place a new fiber link. We introduce two-stage cable-conduit sharing to maximize sharing of cable-conduits for last-mile fiber and distribution fiber so as to further tune down the cost. We compare the performance of our proposed RCA scheme with the existing benchmark studies, viz., BS clustering technique and random-cut sectoring approach. The simulation result confirms that our scheme substantially reduces the backhauling cost compared with the existing studies.
时分波分多路无源光网络(twdm - pon)是目前公认的具有发展前景的移动回程传输网络技术。TWDM-PON是一种多波长PON技术,具有可靠性高、维护成本低、容量大、传输距离长等优点。在本文中,我们提出递归聚类算法(RCA)来设计具有成本效益的TWDM-PON架构,为宏蜂窝基站(BSs)提供回程连接。RCA根据BSs的地理位置,探索BSs集群的最佳数量、每个集群的大小、远程节点放置无源设备的最合适位置,以及从运营商中心办公室到BSs位置的最佳光纤路由。主要目标是通过最小化部署光纤的总长度来降低总成本。我们还采用电缆导管共享,即利用为现有光纤链路部署的电缆导管来铺设新的光纤链路。为了最大限度地实现最后一英里光缆和配线光缆的光缆共享,进一步降低成本,我们引入了两级光缆共享。我们将我们提出的RCA方案的性能与现有的基准研究,即BS聚类技术和随机分割方法进行了比较。仿真结果表明,与已有的研究相比,我们的方案大大降低了回运成本。
{"title":"Cost-efficient Mobile Backhaul Network Design over TWDM-PON","authors":"Md Shahbaz Akhtar, Pramit Biswas, Aneek Adhya, S. Majhi","doi":"10.1109/ANTS50601.2020.9342831","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342831","url":null,"abstract":"In recent times, time and wavelength division multiplexed passive optical networks (TWDM-PONs) are recognized as promising transport network technology for mobile backhaul design. TWDM-PON is a multi-wavelength PON technology that offers high reliability, low maintenance cost, high capacity, and long transmission reach. In this paper, we propose a recursive clustering algorithm (RCA) to design cost-efficient TWDM-PON architecture for providing backhaul connectivity to the macro-cell base stations (BSs). Based on the geographical locations of BSs, RCA explores the optimal number of BS clusters, the size of each cluster, the most suitable location of remote nodes for passive device placement, and the best fiber route from operator’s central office to the BS’s locations. The primary objective is to reduce the total cost by minimizing the total length of deployed fibers. We also employ cable-conduit sharing, where the cable-conduits deployed for existing fiber links are utilized to place a new fiber link. We introduce two-stage cable-conduit sharing to maximize sharing of cable-conduits for last-mile fiber and distribution fiber so as to further tune down the cost. We compare the performance of our proposed RCA scheme with the existing benchmark studies, viz., BS clustering technique and random-cut sectoring approach. The simulation result confirms that our scheme substantially reduces the backhauling cost compared with the existing studies.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-time Spatio-Temporal based Outlier Detection Framework for Wireless Body Sensor Networks 基于实时时空的无线身体传感器网络离群点检测框架
Ali Hassan, Carol Habib, Jad Nassar
Wireless body sensor networks (WBSNs) are threatened by many issues like anomalies in collected data and failure in their hardware components. An outlier detection approach applied on online monitoring of vital signs can both prevent collection of outlier data and detect emergent health degradation. In this paper, we propose an outlier detection framework for real time sensed data by WBSNs. Our proposed solution is twofold: Robust z score algorithm is executed at first step on the sensor nodes level to detect abnormal values and send them to the coordinator. After that, Isolation Forest is executed at the coordinator to distinguish between a faulty measurement and a critical health state. Correlation among vital signs are exploited to differentiate between an emergent healthy event and an anomaly in the measured data. Experiments conducted on real physiological datasets show that our proposed method is able to achieve a good detection accuracy with a low false alarm rate. Complexity and energy efficiency studies demonstrate the low complexity and lightness of our proposed solution.
无线身体传感器网络(WBSNs)受到数据采集异常和硬件故障等诸多问题的威胁。一种应用于生命体征在线监测的异常值检测方法,既可以防止异常值数据的收集,又可以检测出紧急的健康退化。在本文中,我们提出了一个由wbsn实时感知数据的异常点检测框架。我们提出的解决方案是双重的:第一步在传感器节点级别执行鲁棒z评分算法,以检测异常值并将其发送给协调器。之后,将在协调器上执行隔离林,以区分错误度量和关键运行状况状态。利用生命体征之间的相关性来区分紧急健康事件和测量数据中的异常。在真实生理数据集上进行的实验表明,该方法具有较好的检测精度和较低的虚警率。复杂性和能源效率研究证明了我们提出的解决方案的低复杂性和轻量级。
{"title":"Real-time Spatio-Temporal based Outlier Detection Framework for Wireless Body Sensor Networks","authors":"Ali Hassan, Carol Habib, Jad Nassar","doi":"10.1109/ANTS50601.2020.9342827","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342827","url":null,"abstract":"Wireless body sensor networks (WBSNs) are threatened by many issues like anomalies in collected data and failure in their hardware components. An outlier detection approach applied on online monitoring of vital signs can both prevent collection of outlier data and detect emergent health degradation. In this paper, we propose an outlier detection framework for real time sensed data by WBSNs. Our proposed solution is twofold: Robust z score algorithm is executed at first step on the sensor nodes level to detect abnormal values and send them to the coordinator. After that, Isolation Forest is executed at the coordinator to distinguish between a faulty measurement and a critical health state. Correlation among vital signs are exploited to differentiate between an emergent healthy event and an anomaly in the measured data. Experiments conducted on real physiological datasets show that our proposed method is able to achieve a good detection accuracy with a low false alarm rate. Complexity and energy efficiency studies demonstrate the low complexity and lightness of our proposed solution.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":" November","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113946966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two Laser Selection Scheme for FSO Communication FSO通信的双激光选择方案
Pranav Sharda, Anshul Jaiswal, M. Bhatnagar, A. Garg
In order to send the information bits, a conventional transmit laser selection (CTLS) scheme selects the best transmit aperture. Due to the optimal transmit aperture selection, CTLS offers the best possible error performance in a free-space optical (FSO) communication system. Moreover, this optimal error performance is observed under the perfect feedback link scenario. However, a slight error in the feedback information can cause a significant loss in the diversity order. This deteriorates the error performance. To overcome this problem, we propose and analyze a novel grouping-based TLS scheme, called two TLS (TTLS) scheme. In the proposed TTLS scheme, the transmit apertures are divided into two groups and the best aperture in each group is used for transmission of the data. Furthermore, it is observed by the intensive analysis that the proposed TTLS scheme offers a lesser loss in the diversity order as compared to CTLS under the erroneous/imperfect feedback link. Therefore, a significant amount of performance gain can be achieved by the proposed TTLS scheme as compared to the CTLS scheme under a practical (erroneous feedback) scenario.
为了发送信息位,传统的发射激光选择(CTLS)方案选择最佳发射孔径。由于最佳的发射孔径选择,CTLS在自由空间光学(FSO)通信系统中提供了最佳的误差性能。此外,在完美反馈链路场景下,可以观察到这种最优误差性能。然而,反馈信息中的微小错误可能会导致分集顺序的重大损失。这会降低错误性能。为了克服这个问题,我们提出并分析了一种新的基于分组的TLS方案,称为两个TLS (TTLS)方案。在所提出的TTLS方案中,将传输孔径分为两组,并使用每组中最佳的孔径进行数据传输。此外,通过深入分析可以发现,与错误/不完全反馈链路下的CTLS相比,所提出的TTLS方案在分集顺序上的损失更小。因此,与实际(错误反馈)场景下的CTLS方案相比,所提出的TTLS方案可以实现大量的性能增益。
{"title":"Two Laser Selection Scheme for FSO Communication","authors":"Pranav Sharda, Anshul Jaiswal, M. Bhatnagar, A. Garg","doi":"10.1109/ANTS50601.2020.9342770","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342770","url":null,"abstract":"In order to send the information bits, a conventional transmit laser selection (CTLS) scheme selects the best transmit aperture. Due to the optimal transmit aperture selection, CTLS offers the best possible error performance in a free-space optical (FSO) communication system. Moreover, this optimal error performance is observed under the perfect feedback link scenario. However, a slight error in the feedback information can cause a significant loss in the diversity order. This deteriorates the error performance. To overcome this problem, we propose and analyze a novel grouping-based TLS scheme, called two TLS (TTLS) scheme. In the proposed TTLS scheme, the transmit apertures are divided into two groups and the best aperture in each group is used for transmission of the data. Furthermore, it is observed by the intensive analysis that the proposed TTLS scheme offers a lesser loss in the diversity order as compared to CTLS under the erroneous/imperfect feedback link. Therefore, a significant amount of performance gain can be achieved by the proposed TTLS scheme as compared to the CTLS scheme under a practical (erroneous feedback) scenario.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127556630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Millimeter Wave Wireless System Modeling with Best Channel Selection Policy 基于最佳信道选择策略的毫米波无线系统建模
Tooba Mukarram, K. Shrivastava, B. Sainath
Millimeter-wave (mmWave) technology is one of the most popular enabling technologies in the fifth-generation and beyond wireless systems. MmWave technology provides substantial extra bandwidth to address high data rate requirements for various terrestrial mobile systems. High propagation attenuation and channel fading are the main challenges of mmWave communication. In this paper, we consider mmWave non-cooperative and cooperative system models and propose the best mmWave channel selection policy (BMCSP). For these two systems, we study the performance of the proposed BMCSP. Specifically, we present useful mathematical analysis for the average spectral efficiency (SE) of both non-cooperative and cooperative mmWave systems in the Nakagami fading scenario. To quantify the gains delivered by BMSCP, we compare its average SE performance with that of the randomly selected channel. We find that the proposed policy provides superior performance in terms of average spectral efficiency.
毫米波(mmWave)技术是第五代及以后无线系统中最流行的使能技术之一。毫米波技术提供大量额外带宽,以满足各种地面移动系统的高数据速率要求。高传播衰减和信道衰落是毫米波通信面临的主要挑战。本文考虑了毫米波非合作和合作系统模型,提出了最佳毫米波信道选择策略(BMCSP)。针对这两个系统,我们研究了所提出的BMCSP的性能。具体来说,我们给出了在Nakagami衰落场景下非合作和合作毫米波系统的平均频谱效率(SE)的有用数学分析。为了量化BMSCP提供的增益,我们将其平均SE性能与随机选择的信道进行比较。我们发现所提出的策略在平均频谱效率方面提供了优越的性能。
{"title":"Millimeter Wave Wireless System Modeling with Best Channel Selection Policy","authors":"Tooba Mukarram, K. Shrivastava, B. Sainath","doi":"10.1109/ANTS50601.2020.9342836","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342836","url":null,"abstract":"Millimeter-wave (mmWave) technology is one of the most popular enabling technologies in the fifth-generation and beyond wireless systems. MmWave technology provides substantial extra bandwidth to address high data rate requirements for various terrestrial mobile systems. High propagation attenuation and channel fading are the main challenges of mmWave communication. In this paper, we consider mmWave non-cooperative and cooperative system models and propose the best mmWave channel selection policy (BMCSP). For these two systems, we study the performance of the proposed BMCSP. Specifically, we present useful mathematical analysis for the average spectral efficiency (SE) of both non-cooperative and cooperative mmWave systems in the Nakagami fading scenario. To quantify the gains delivered by BMSCP, we compare its average SE performance with that of the randomly selected channel. We find that the proposed policy provides superior performance in terms of average spectral efficiency.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"55 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interference-Constrained Power Adaptive Decode-and-Forward Relaying Policy: Design and Performance Analysis 干扰约束功率自适应译码转发中继策略:设计与性能分析
Rahul Sharma, Sainath Bitragunta
Power adaptation is a feasible and promising solution to avoid interference at the primary, caused by transmissions of secondary underlay cooperative spectrum sharing systems. For it, we propose a novel interference-constrained power adaptive decode-and-forward (IC-PADnF) relaying policy jointly with a simple probabilistic relay selection (PRS) policy. The proposed IC-PADnF relaying policy, apart from acting as a regenerative relay, adaptively sets its transmit power and gain to optimize the underlay cooperative spectrum sharing system’s performance. Further, the relay selection policy is easy to implement due to less channel state information (CSI) requirements. To evaluate the proposed IC-PADnF policy’s performance, we derive analytical expressions for optimal fading averaged spectral efficiency and optimal fading averaged energy efficiency. We also obtain upperbound to these essential performance measures. We perform Monte-Carlo simulations to validate the derived analytical results. Furthermore, we compared the proposed policy with benchmark policies to explicitly show the performance improvements and its applicability for cooperative spectrum sharing systems and networks. Lastly, we find that IC-PADnF relaying policy jointly with PRS policy outperforms the benchmark policies.
功率自适应是一种可行的、有前途的解决方案,可以避免二次底层协同频谱共享系统传输时产生的主端干扰。为此,我们提出了一种新的干扰约束功率自适应译码转发(IC-PADnF)中继策略和一种简单的概率中继选择(PRS)策略。所提出的IC-PADnF中继策略除了作为再生中继外,还可自适应设置其发射功率和增益,以优化底层协同频谱共享系统的性能。此外,由于通道状态信息(CSI)需求较少,中继选择策略易于实现。为了评估所提出的IC-PADnF策略的性能,我们导出了最优衰落平均频谱效率和最优衰落平均能量效率的解析表达式。我们还得到了这些基本性能指标的上界。我们执行蒙特卡罗模拟来验证导出的分析结果。此外,我们将提出的策略与基准策略进行了比较,以明确显示性能改进及其在合作频谱共享系统和网络中的适用性。最后,我们发现IC-PADnF中继策略联合PRS策略优于基准策略。
{"title":"Interference-Constrained Power Adaptive Decode-and-Forward Relaying Policy: Design and Performance Analysis","authors":"Rahul Sharma, Sainath Bitragunta","doi":"10.1109/ANTS50601.2020.9342802","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342802","url":null,"abstract":"Power adaptation is a feasible and promising solution to avoid interference at the primary, caused by transmissions of secondary underlay cooperative spectrum sharing systems. For it, we propose a novel interference-constrained power adaptive decode-and-forward (IC-PADnF) relaying policy jointly with a simple probabilistic relay selection (PRS) policy. The proposed IC-PADnF relaying policy, apart from acting as a regenerative relay, adaptively sets its transmit power and gain to optimize the underlay cooperative spectrum sharing system’s performance. Further, the relay selection policy is easy to implement due to less channel state information (CSI) requirements. To evaluate the proposed IC-PADnF policy’s performance, we derive analytical expressions for optimal fading averaged spectral efficiency and optimal fading averaged energy efficiency. We also obtain upperbound to these essential performance measures. We perform Monte-Carlo simulations to validate the derived analytical results. Furthermore, we compared the proposed policy with benchmark policies to explicitly show the performance improvements and its applicability for cooperative spectrum sharing systems and networks. Lastly, we find that IC-PADnF relaying policy jointly with PRS policy outperforms the benchmark policies.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131534760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PPSE: Privacy Preservation and Security Efficient AKA Protocol for 5G Communication Networks PPSE: 5G通信网络的隐私保护和安全高效AKA协议
Balu L. Parne, Shubham Gupta, Kaneesha J. Gandhi, S. Meena
The authentication and key agreement (AKA) protocol strengthens the security of mobile communication networks. The 5G-AKA protocol is standardized by the 3rd generation partnership project (3GPP) for future mobile communication networks. However, it is observed that this protocol is vulnerable to numerous security weaknesses. Moreover, the protocol suffers from huge computation and communication overhead. To overcome these issues, several AKA protocols were introduced by the researchers. However, none of the protocols took care of the identity preservation and single key disclosure issue over the communication channel. In this article, we propose the Privacy Preservation and Security Efficient (PPSE-AKA) protocol that preserves the user’s identity and protects the shared secret key. The mutual authentication is formally verified by using the AVISPA tool. The security analysis demonstrates that the protocol fulfills all the privacy requirements and dodges the potential attacks. The performance of the protocol is evaluated for the previously established schemes and observed that the PPSE-AKA protocol exhibits a cutting edge competition to them.
认证与密钥协议(AKA)增强了移动通信网络的安全性。5G-AKA协议由面向未来移动通信网络的第三代合作伙伴计划(3GPP)进行标准化。然而,可以观察到,该协议容易受到许多安全漏洞的攻击。此外,该协议还存在巨大的计算和通信开销。为了克服这些问题,研究人员引入了几个AKA协议。然而,这些协议都没有考虑到通信通道上的身份保存和单密钥披露问题。在本文中,我们提出了隐私保护和安全效率(PPSE-AKA)协议,该协议保留了用户的身份并保护了共享密钥。使用AVISPA工具对相互认证进行正式验证。安全性分析表明,该协议满足了所有的隐私要求,并规避了潜在的攻击。对先前建立的协议的性能进行了评估,并观察到PPSE-AKA协议对它们表现出了最前沿的竞争。
{"title":"PPSE: Privacy Preservation and Security Efficient AKA Protocol for 5G Communication Networks","authors":"Balu L. Parne, Shubham Gupta, Kaneesha J. Gandhi, S. Meena","doi":"10.1109/ANTS50601.2020.9342780","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342780","url":null,"abstract":"The authentication and key agreement (AKA) protocol strengthens the security of mobile communication networks. The 5G-AKA protocol is standardized by the 3rd generation partnership project (3GPP) for future mobile communication networks. However, it is observed that this protocol is vulnerable to numerous security weaknesses. Moreover, the protocol suffers from huge computation and communication overhead. To overcome these issues, several AKA protocols were introduced by the researchers. However, none of the protocols took care of the identity preservation and single key disclosure issue over the communication channel. In this article, we propose the Privacy Preservation and Security Efficient (PPSE-AKA) protocol that preserves the user’s identity and protects the shared secret key. The mutual authentication is formally verified by using the AVISPA tool. The security analysis demonstrates that the protocol fulfills all the privacy requirements and dodges the potential attacks. The performance of the protocol is evaluated for the previously established schemes and observed that the PPSE-AKA protocol exhibits a cutting edge competition to them.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132914240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1