首页 > 最新文献

2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

英文 中文
An Anycast Service with Cognitive DTN Routing 具有认知DTN路由的任播业务
R. Lent
The use of anycast routing in challenged networks, which include space networks, can help to alleviate the performance impact of the intermittent network connectivity and large communication delays that characterize such operational environments. With the anycast service, each data bundle can be delivered to any member of the anycast group and by establishing an adequate routing mechanism, bundles can be directed toward the member offering the lowest end-to-end delivery time. This possibility is explored in this study through a design extension to the Cognitive Space Gateway (CSG) approach to DTN routing. The advantage of the proposed method is that it adaptively determines the path for each bundle considering the estimated network congestion, which allows dynamically deciding the (near) optimal member as the destination node. The process allows for low bundle response times and high throughput. Testbed experiments are reported which confirm the performance advantages of the proposed method over unicast routing.
在包括空间网络在内的有挑战的网络中使用任意播路由可以帮助减轻此类操作环境所特有的间歇性网络连接和大通信延迟对性能的影响。使用anycast服务,可以将每个数据包传递给anycast组的任何成员,并且通过建立适当的路由机制,可以将数据包定向到提供最低端到端传递时间的成员。本研究通过对DTN路由的认知空间网关(CSG)方法的设计扩展来探索这种可能性。该方法的优点是考虑到估计的网络拥塞情况,自适应地确定每个数据包的路径,从而动态地确定(接近)最优成员作为目标节点。该流程允许低包响应时间和高吞吐量。实验结果证实了该方法相对于单播路由的性能优势。
{"title":"An Anycast Service with Cognitive DTN Routing","authors":"R. Lent","doi":"10.1109/ANTS50601.2020.9342841","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342841","url":null,"abstract":"The use of anycast routing in challenged networks, which include space networks, can help to alleviate the performance impact of the intermittent network connectivity and large communication delays that characterize such operational environments. With the anycast service, each data bundle can be delivered to any member of the anycast group and by establishing an adequate routing mechanism, bundles can be directed toward the member offering the lowest end-to-end delivery time. This possibility is explored in this study through a design extension to the Cognitive Space Gateway (CSG) approach to DTN routing. The advantage of the proposed method is that it adaptively determines the path for each bundle considering the estimated network congestion, which allows dynamically deciding the (near) optimal member as the destination node. The process allows for low bundle response times and high throughput. Testbed experiments are reported which confirm the performance advantages of the proposed method over unicast routing.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133743910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Virtual Network Function Embedding under Nodal Outage using Reinforcement Learning 节点中断下基于强化学习的虚拟网络功能嵌入
S. B. Chetty, H. Ahmadi, A. Nag
With the emergence of various types of applications such as delay-sensitive applications, future communication networks are expected to be increasingly complex and dynamic. Network Function Virtualization (NFV) provides the necessary support towards efficient management of such complex networks, by disintegrating the dependency on the hardware devices via virtualizing the network functions and placing them on shared data centres. However, one of the main challenges of the NFV paradigm is the resource allocation problem which is known as NFV-Resource Allocation (NFV-RA). NFV-RA is a method of deploying software-based network functions on the substrate nodes, subject to the constraints imposed by the underlying infrastructure and the agreed Service Level Agreement (SLA). This work investigates the potential of Reinforcement Learning (RL) as a fast yet accurate means (as compared to integer linear programming) for deploying the softwarized network functions onto substrate networks under several Quality of Service (QoS) constraints. In addition to the regular resource constraints and latency constraints, we introduced the concept of a complete outage of certain nodes in the network. This outage can be either due to a disaster or unavailability of network topology information due to proprietary and ownership issues. We have analyzed the network performance on different network topologies, different capacities of the nodes and the links, and different degrees of the nodal outage. The computational time escalated with the increase in the network density to achieve the optimal solutions; this is because Q-Learning is an iterative process which results in a slow exploration. Our results also show that for certain topologies and a certain combination of resources, we can achieve between 7090% service acceptance rate even with a 40% nodal outage.
随着各种类型的应用,如延迟敏感应用的出现,未来的通信网络将越来越复杂和动态。网络功能虚拟化(Network Function Virtualization, NFV)通过虚拟化网络功能并将其放置在共享数据中心上,从而瓦解对硬件设备的依赖,从而为有效管理此类复杂网络提供了必要的支持。然而,NFV模式的主要挑战之一是资源分配问题,即NFV-资源分配(NFV- ra)。NFV-RA是一种在底层节点上部署基于软件的网络功能的方法,受底层基础设施和商定的服务水平协议(SLA)的约束。这项工作研究了强化学习(RL)作为一种快速而准确的方法(与整数线性规划相比)的潜力,用于在几种服务质量(QoS)约束下将软件网络功能部署到基板网络上。除了常规的资源约束和延迟约束之外,我们还引入了网络中某些节点完全中断的概念。这种中断可能是由于灾难或由于专有和所有权问题导致的网络拓扑信息不可用。我们分析了不同网络拓扑结构下的网络性能、不同节点和链路的容量以及不同程度的节点中断。计算时间随着网络密度的增加而增加,以达到最优解;这是因为Q-Learning是一个迭代的过程,导致缓慢的探索。我们的结果还表明,对于某些拓扑和某些资源组合,即使在40%的节点中断情况下,我们也可以实现7090%之间的服务接受率。
{"title":"Virtual Network Function Embedding under Nodal Outage using Reinforcement Learning","authors":"S. B. Chetty, H. Ahmadi, A. Nag","doi":"10.1109/ANTS50601.2020.9342803","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342803","url":null,"abstract":"With the emergence of various types of applications such as delay-sensitive applications, future communication networks are expected to be increasingly complex and dynamic. Network Function Virtualization (NFV) provides the necessary support towards efficient management of such complex networks, by disintegrating the dependency on the hardware devices via virtualizing the network functions and placing them on shared data centres. However, one of the main challenges of the NFV paradigm is the resource allocation problem which is known as NFV-Resource Allocation (NFV-RA). NFV-RA is a method of deploying software-based network functions on the substrate nodes, subject to the constraints imposed by the underlying infrastructure and the agreed Service Level Agreement (SLA). This work investigates the potential of Reinforcement Learning (RL) as a fast yet accurate means (as compared to integer linear programming) for deploying the softwarized network functions onto substrate networks under several Quality of Service (QoS) constraints. In addition to the regular resource constraints and latency constraints, we introduced the concept of a complete outage of certain nodes in the network. This outage can be either due to a disaster or unavailability of network topology information due to proprietary and ownership issues. We have analyzed the network performance on different network topologies, different capacities of the nodes and the links, and different degrees of the nodal outage. The computational time escalated with the increase in the network density to achieve the optimal solutions; this is because Q-Learning is an iterative process which results in a slow exploration. Our results also show that for certain topologies and a certain combination of resources, we can achieve between 7090% service acceptance rate even with a 40% nodal outage.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Priority Order-Based Key Distribution in QKD-Secured Optical Networks qkd安全光网络中基于优先顺序的密钥分配
Purva Sharma, V. Bhatia, S. Prakash
In quantum key distribution (QKD)-secured optical networks, blocking increases with the number of QKD lightpath requests as well as with the number of times modification required to improve the security level of QKD lightpath requests. The blocking is severe problem in such networks because of the limited number of resources (wavelengths and time-slots) in each fiber link. In this paper, we propose a priority order-based routing wavelength and time-slot allocation (POB-RWTA) scheme to reduce the blocking of QKD lightpath requests. In the proposed POB-RWTA scheme, the QKD lightpath requests are served according to their priority order. The priority order of each QKD lightpath request is based on the security level. The blocking of high priority lightpath requests (HPLRs) and total incoming QKD lightpath requests due to limited resources can be reduced using the above criterion of priority order. The performance analysis of the proposed POB-RWTA scheme is made in terms of the success probability of QKD lightpath requests considering different wavelengths for QSCh and the probability of secret key update failure. We compared the proposed POB-RWTA scheme with a non-priority order-based routing wavelength and time-slot allocation (NPOB-RWTA) scheme. Simulations performed on NSFNET topology show that by using the POB-RWTA scheme, the success probability of HPLRs and total incoming QKD lightpath requests are significantly improved as compared to NPOB-RWTA.
在量子密钥分发(QKD)安全的光网络中,阻塞随着QKD光路请求的数量以及为提高QKD光路请求的安全级别所需的修改次数的增加而增加。由于每条光纤链路的资源(波长和时隙)数量有限,阻塞是这种网络中的一个严重问题。在本文中,我们提出了一种基于优先顺序的路由波长和时隙分配(POB-RWTA)方案来减少QKD光路请求的阻塞。在提出的POB-RWTA方案中,QKD光路请求根据其优先级顺序进行服务。每个QKD光路请求的优先顺序是基于安全级别的。由于资源有限,高优先级光路请求(HPLRs)和总传入QKD光路请求的阻塞可以使用上述优先级顺序标准来减少。从考虑不同波长QSCh的QKD光路请求成功概率和密钥更新失败概率两方面对所提出的POB-RWTA方案进行了性能分析。我们将提出的POB-RWTA方案与非优先顺序路由波长和时隙分配(NPOB-RWTA)方案进行了比较。在NSFNET拓扑上进行的仿真表明,与NPOB-RWTA相比,采用POB-RWTA方案,hplr的成功概率和总传入QKD光路请求的成功率显著提高。
{"title":"Priority Order-Based Key Distribution in QKD-Secured Optical Networks","authors":"Purva Sharma, V. Bhatia, S. Prakash","doi":"10.1109/ANTS50601.2020.9342761","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342761","url":null,"abstract":"In quantum key distribution (QKD)-secured optical networks, blocking increases with the number of QKD lightpath requests as well as with the number of times modification required to improve the security level of QKD lightpath requests. The blocking is severe problem in such networks because of the limited number of resources (wavelengths and time-slots) in each fiber link. In this paper, we propose a priority order-based routing wavelength and time-slot allocation (POB-RWTA) scheme to reduce the blocking of QKD lightpath requests. In the proposed POB-RWTA scheme, the QKD lightpath requests are served according to their priority order. The priority order of each QKD lightpath request is based on the security level. The blocking of high priority lightpath requests (HPLRs) and total incoming QKD lightpath requests due to limited resources can be reduced using the above criterion of priority order. The performance analysis of the proposed POB-RWTA scheme is made in terms of the success probability of QKD lightpath requests considering different wavelengths for QSCh and the probability of secret key update failure. We compared the proposed POB-RWTA scheme with a non-priority order-based routing wavelength and time-slot allocation (NPOB-RWTA) scheme. Simulations performed on NSFNET topology show that by using the POB-RWTA scheme, the success probability of HPLRs and total incoming QKD lightpath requests are significantly improved as compared to NPOB-RWTA.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection and Verification of Decreased Rank Attack using Round-Trip Times in RPL-Based 6LoWPAN Networks 基于rpl的6LoWPAN网络中基于往返时间的降秩攻击检测与验证
Abhay Deep Seth, S. Biswas, Amit Kumar Dhar
The IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) supports IP over Lossy networks. RPL (Routing Protocol for Low-power and Lossy Networks) routing protocol has been developed for 6LoWPAN routing. RPL is vulnerable to various types of attacks namely external and internal. One of the internal attacks for the RPL-based IoT Network is Rank Attack. A spiteful node advertises false decreased rank information to disturb the topology of the network. This attack creates network disruption, loop formation, and degrades network performance in terms of packet delivery ratio, packet delay, and throughput. This paper proposes a novel mechanism to detect and verify the decreased rank attack and exclude the spiteful node from the network using the round trip time (RTT).
IPv6 over Low-power Wireless Personal Area Network (6LoWPAN)支持IP over Lossy网络。RPL (Routing Protocol for Low-power and Lossy Networks)路由协议是为6LoWPAN路由而开发的。RPL容易受到各种类型的攻击,包括外部攻击和内部攻击。基于rpl的物联网网络的内部攻击之一是秩攻击。恶意节点发布虚假的降级信息来扰乱网络的拓扑结构。这种攻击会造成网络中断、形成环路,并降低网络性能,包括数据包传送率、数据包延迟和吞吐量。本文提出了一种利用往返时间(RTT)检测和验证降秩攻击的新机制,并将恶意节点排除在网络之外。
{"title":"Detection and Verification of Decreased Rank Attack using Round-Trip Times in RPL-Based 6LoWPAN Networks","authors":"Abhay Deep Seth, S. Biswas, Amit Kumar Dhar","doi":"10.1109/ANTS50601.2020.9342754","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342754","url":null,"abstract":"The IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) supports IP over Lossy networks. RPL (Routing Protocol for Low-power and Lossy Networks) routing protocol has been developed for 6LoWPAN routing. RPL is vulnerable to various types of attacks namely external and internal. One of the internal attacks for the RPL-based IoT Network is Rank Attack. A spiteful node advertises false decreased rank information to disturb the topology of the network. This attack creates network disruption, loop formation, and degrades network performance in terms of packet delivery ratio, packet delay, and throughput. This paper proposes a novel mechanism to detect and verify the decreased rank attack and exclude the spiteful node from the network using the round trip time (RTT).","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125321521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Network Security Systems Log Analysis for Trends and Insights: A Case Study 网络安全系统日志分析的趋势和见解:案例研究
A. Meena, N. Hubballi, Yogendra Singh, V. Bhatia, K. Franke
Network perimeter security appliances like firewalls, intrusion detection systems mediate communications and log details pertaining to various events. Logs generated by these systems are used to identify security compromises, vulnerable systems, mis-configurations, etc and serve as a valuable asset for a network administrator. In this paper, we report on a study conducted using logs generated by production level security appliances deployed in our university network. In particular, we process the logs generated by firewall, intrusion detection/prevention system and domain name system service to identify trends and gain insights. We process 71 million network connection records which includes 95.7 thousand alerts generated by an open source intrusion detection system collected over a period of 31 days and derive statistics to understand end host level behavioral trends. In our analysis we compare hosts which are known to be infected with malware or running Peer-to-Peer applications and remaining using a set of relevant parameters and identify clearly differentiated behavioral trends.
网络外围安全设备,如防火墙、入侵检测系统,调解与各种事件相关的通信和日志细节。这些系统生成的日志用于识别安全隐患、易受攻击的系统、错误配置等,并作为网络管理员的宝贵资产。在本文中,我们报告了一项使用部署在我们大学网络中的生产级安全设备生成的日志进行的研究。特别是,我们对防火墙、入侵检测/防御系统和域名系统服务产生的日志进行处理,以识别趋势并获得见解。我们处理了7100万个网络连接记录,其中包括一个开源入侵检测系统在31天内收集的957000个警报,并得出统计数据,以了解终端主机级别的行为趋势。在我们的分析中,我们比较了已知被恶意软件感染或运行点对点应用程序的主机,并使用一组相关参数,并确定了明显不同的行为趋势。
{"title":"Network Security Systems Log Analysis for Trends and Insights: A Case Study","authors":"A. Meena, N. Hubballi, Yogendra Singh, V. Bhatia, K. Franke","doi":"10.1109/ANTS50601.2020.9342776","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342776","url":null,"abstract":"Network perimeter security appliances like firewalls, intrusion detection systems mediate communications and log details pertaining to various events. Logs generated by these systems are used to identify security compromises, vulnerable systems, mis-configurations, etc and serve as a valuable asset for a network administrator. In this paper, we report on a study conducted using logs generated by production level security appliances deployed in our university network. In particular, we process the logs generated by firewall, intrusion detection/prevention system and domain name system service to identify trends and gain insights. We process 71 million network connection records which includes 95.7 thousand alerts generated by an open source intrusion detection system collected over a period of 31 days and derive statistics to understand end host level behavioral trends. In our analysis we compare hosts which are known to be infected with malware or running Peer-to-Peer applications and remaining using a set of relevant parameters and identify clearly differentiated behavioral trends.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126445143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Governance: A Tendering Framework Using Blockchain With Active Participation of Citizens 电子政务:公民积极参与的区块链招标框架
Yashita Goswami, Ankit Agrawal, Ashutosh Bhatia
E-governance, i.e., the use of information technology for government activities to provide services, exchange information, etc. are becoming increasingly popular. One such area of e-governance is e-tendering. While e-tendering makes the tendering process more efficient, a trust deficit remains between the citizens and the government, due to the centralized management of the whole tendering process. Several research works provide a decentralized solution to make the process of e-tendering more secure, transparent, and fair. However, in the present time, the government posts the problems/issues currently they are dealing with; and seems interested in taking the suggestions from the citizens to make the better solution for the problem. Thus, in this paper, a permissioned blockchain-based approach to provide a transparent and fair tendering system with citizens’ active participation and tracking of funds is presented. In the proposed scheme, the citizens can see the tendering activities transparently and give ideas and suggestions to solve the government’s posted problems and receive a due credit of that contribution is a fair manner.
电子政务,即利用资讯科技为政府活动提供服务、交换资讯等,正日益普及。电子政务的其中一个领域就是电子投标。虽然电子招标使招标过程更有效率,但由于整个招标过程的集中管理,公民与政府之间仍然存在信任赤字。一些研究工作提供了一种分散的解决方案,使电子投标过程更加安全、透明和公平。然而,在目前,政府发布了他们目前正在处理的问题;他似乎有兴趣听取市民的建议,为这个问题制定更好的解决方案。因此,在本文中,提出了一种基于区块链的许可方法,以提供一个透明和公平的招标系统,公民积极参与和跟踪资金。在提议方案中,市民可以透明地看到招标活动,并为解决政府公布的问题提出意见和建议,并获得应有的功劳,这是一种公平的方式。
{"title":"E-Governance: A Tendering Framework Using Blockchain With Active Participation of Citizens","authors":"Yashita Goswami, Ankit Agrawal, Ashutosh Bhatia","doi":"10.1109/ANTS50601.2020.9342816","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342816","url":null,"abstract":"E-governance, i.e., the use of information technology for government activities to provide services, exchange information, etc. are becoming increasingly popular. One such area of e-governance is e-tendering. While e-tendering makes the tendering process more efficient, a trust deficit remains between the citizens and the government, due to the centralized management of the whole tendering process. Several research works provide a decentralized solution to make the process of e-tendering more secure, transparent, and fair. However, in the present time, the government posts the problems/issues currently they are dealing with; and seems interested in taking the suggestions from the citizens to make the better solution for the problem. Thus, in this paper, a permissioned blockchain-based approach to provide a transparent and fair tendering system with citizens’ active participation and tracking of funds is presented. In the proposed scheme, the citizens can see the tendering activities transparently and give ideas and suggestions to solve the government’s posted problems and receive a due credit of that contribution is a fair manner.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121517190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dynamic Relay Selection using a Greedy Cluster Strategy 基于贪婪集群策略的动态中继选择
R. Mukhopadhyay, S. Neogy, Samiran Chattopadhyay
One of the primary challenges of relay assisted communications in ad hoc network and device-to-device (D2D) communications in cellular network is sustenance of QoS requirements of mobile users. This paper proposes a relay selection technique based on a greedy clustering scheme that takes relay load and willingness into consideration during relay selection. With a dynamic selection imperative in a mobile environment this technique aims at optimizing the number of selected relays of a node by monitoring the current status of the relays. We compare our proposed technique with the relay selection technique of optimized Link State Routing (RFC 7181) over two scenarios: the first in an ad hoc scenario with a collection of mobile nodes and the second in D2D communication over cellular scenario. Simulation results show an overall improvement in performance in terms of average network throughput, packet loss rate and end-to-end delay for our proposed technique.
自组网中继辅助通信和蜂窝网络D2D通信面临的主要挑战之一是满足移动用户的QoS需求。本文提出了一种基于贪婪聚类方案的中继选择技术,该方案在中继选择过程中考虑了中继负载和中继意愿。在移动环境中动态选择势在必行,该技术旨在通过监测继电器的当前状态来优化节点所选继电器的数量。我们将我们提出的技术与优化链路状态路由(RFC 7181)的中继选择技术在两种情况下进行了比较:第一种是在具有移动节点集合的临时场景中,第二种是在蜂窝场景中的D2D通信中。仿真结果表明,我们提出的技术在平均网络吞吐量、丢包率和端到端延迟方面的性能有了全面的提高。
{"title":"Dynamic Relay Selection using a Greedy Cluster Strategy","authors":"R. Mukhopadhyay, S. Neogy, Samiran Chattopadhyay","doi":"10.1109/ANTS50601.2020.9342757","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342757","url":null,"abstract":"One of the primary challenges of relay assisted communications in ad hoc network and device-to-device (D2D) communications in cellular network is sustenance of QoS requirements of mobile users. This paper proposes a relay selection technique based on a greedy clustering scheme that takes relay load and willingness into consideration during relay selection. With a dynamic selection imperative in a mobile environment this technique aims at optimizing the number of selected relays of a node by monitoring the current status of the relays. We compare our proposed technique with the relay selection technique of optimized Link State Routing (RFC 7181) over two scenarios: the first in an ad hoc scenario with a collection of mobile nodes and the second in D2D communication over cellular scenario. Simulation results show an overall improvement in performance in terms of average network throughput, packet loss rate and end-to-end delay for our proposed technique.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126262030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Geometric Representation of Lane-Change Decision for Autonomous Vehicles Using Dynamic Optimization Algorithm 基于动态优化算法的自动驾驶汽车变道决策实时几何表示
A. Ibrahim, M. Darweesh, T. Ismail
This paper develops a lane-change geometric representation that can be used in an on-road vehicle. The design of the proposed system uses the data collected from active a host vehicle and measures the relative speed between host vehicle and obstacle vehicles in real-time. The available distance to the target lanes measures the separated distance between the host and obstacle vehicles in real-time. These data are generated automatically using a dynamic environment and updated using time and object dynamics laws. The main algorithm uses the data to test the availability of using lane-change while checking if there is a slight break applied not to waste the testing time of the testing, then the smart searching algorithm applies to find the most suitable solution to change the lane safely as fast as possible. The desired system has been achieved with accepted real-time results that exceed the standard driver response time. Also, full accepted safety results allow the vehicle to get out of the lane with particular speed and steering angles to avoid collisions and avoid crashes in the host vehicle.
本文提出了一种适用于公路车辆的变道几何表示方法。该系统的设计利用从主战车辆收集的数据,实时测量主战车辆与障碍车辆之间的相对速度。到目标车道的可用距离实时测量宿主与障碍车辆之间的分离距离。这些数据使用动态环境自动生成,并使用时间和对象动态规律进行更新。主算法使用数据来测试变道的可用性,同时检查是否有轻微的中断,以免浪费测试的测试时间,然后应用智能搜索算法来找到最合适的解决方案,以尽可能快地安全变道。期望的系统已经实现了可接受的实时结果,超过了标准的驾驶员响应时间。此外,完全可接受的安全结果允许车辆以特定的速度和转向角度驶出车道,以避免碰撞并避免与主车辆相撞。
{"title":"Real-Time Geometric Representation of Lane-Change Decision for Autonomous Vehicles Using Dynamic Optimization Algorithm","authors":"A. Ibrahim, M. Darweesh, T. Ismail","doi":"10.1109/ANTS50601.2020.9342809","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342809","url":null,"abstract":"This paper develops a lane-change geometric representation that can be used in an on-road vehicle. The design of the proposed system uses the data collected from active a host vehicle and measures the relative speed between host vehicle and obstacle vehicles in real-time. The available distance to the target lanes measures the separated distance between the host and obstacle vehicles in real-time. These data are generated automatically using a dynamic environment and updated using time and object dynamics laws. The main algorithm uses the data to test the availability of using lane-change while checking if there is a slight break applied not to waste the testing time of the testing, then the smart searching algorithm applies to find the most suitable solution to change the lane safely as fast as possible. The desired system has been achieved with accepted real-time results that exceed the standard driver response time. Also, full accepted safety results allow the vehicle to get out of the lane with particular speed and steering angles to avoid collisions and avoid crashes in the host vehicle.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"76 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121217683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-Node Correlation Based Data Reduction in WSN for Smart Agriculture 面向智能农业的基于节点相关的WSN数据约简
Christian Salim, N. Mitton
Nowadays, climate change is one of the numerous factors affecting the agricultural sector. Optimizing the usage of natural resources is one of the challenges this sector faces. For this reason, it could be necessary to locally monitor weather data and soil conditions to make faster and better decisions locally adapted to the crop. Wireless sensor networks (WSNs) can serve as a monitoring system for these types of parameters. However, in WSNs, sensor nodes suffer from limited energy resources. The process of sending a large amount of data from the nodes to the sink results in high energy consumption at the sensor node and significant use of network bandwidth, which reduces the lifetime of the overall network. In this paper, for data reduction, a data correlation and prediction technique is proposed both at the sensor node level and at the sink level. The aim of this approach is to reduce the amount of transmitted data to the sink, depending on the degree of correlation between different parameters. In this work we propose the Pearson Data Correlation and Prediction (PDCP) algorithm to detect this correlation. This data reduction maintains the accuracy of the information while reducing the amount of data sent from the nodes to the sink. This approach is validated through simulations on MATLAB using real meteorological data-sets from Weather-Underground sensor network. The results show the validity of our approach by reducing the amount of data by a percentage up to 69% while maintaining the accuracy of the information. The humidity values prediction based on the temperature parameter is accurate and the deviation from the real value does not surpass 7% of humidity.
如今,气候变化是影响农业部门的众多因素之一。优化自然资源的利用是该行业面临的挑战之一。出于这个原因,可能有必要在当地监测天气数据和土壤条件,以便更快更好地做出适合当地作物的决策。无线传感器网络(wsn)可以作为这些类型参数的监测系统。然而,在无线传感器网络中,传感器节点的能量有限。从节点向sink发送大量数据的过程会导致传感器节点能耗高,占用大量网络带宽,从而降低整个网络的生命周期。在数据约简方面,本文提出了一种传感器节点级和汇聚级的数据关联和预测技术。这种方法的目的是减少传输到接收器的数据量,这取决于不同参数之间的相关程度。在这项工作中,我们提出了皮尔逊数据相关和预测(PDCP)算法来检测这种相关性。这种数据缩减保持了信息的准确性,同时减少了从节点发送到接收器的数据量。利用Weather-Underground传感器网络的真实气象数据集,通过MATLAB仿真验证了该方法的有效性。结果显示了我们的方法的有效性,在保持信息准确性的同时,将数据量减少了69%。根据温度参数预测的湿度值准确,与实际值的偏差不超过7%。
{"title":"On-Node Correlation Based Data Reduction in WSN for Smart Agriculture","authors":"Christian Salim, N. Mitton","doi":"10.1109/ANTS50601.2020.9342775","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342775","url":null,"abstract":"Nowadays, climate change is one of the numerous factors affecting the agricultural sector. Optimizing the usage of natural resources is one of the challenges this sector faces. For this reason, it could be necessary to locally monitor weather data and soil conditions to make faster and better decisions locally adapted to the crop. Wireless sensor networks (WSNs) can serve as a monitoring system for these types of parameters. However, in WSNs, sensor nodes suffer from limited energy resources. The process of sending a large amount of data from the nodes to the sink results in high energy consumption at the sensor node and significant use of network bandwidth, which reduces the lifetime of the overall network. In this paper, for data reduction, a data correlation and prediction technique is proposed both at the sensor node level and at the sink level. The aim of this approach is to reduce the amount of transmitted data to the sink, depending on the degree of correlation between different parameters. In this work we propose the Pearson Data Correlation and Prediction (PDCP) algorithm to detect this correlation. This data reduction maintains the accuracy of the information while reducing the amount of data sent from the nodes to the sink. This approach is validated through simulations on MATLAB using real meteorological data-sets from Weather-Underground sensor network. The results show the validity of our approach by reducing the amount of data by a percentage up to 69% while maintaining the accuracy of the information. The humidity values prediction based on the temperature parameter is accurate and the deviation from the real value does not surpass 7% of humidity.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134328832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Group based Publisher-Subscriber Communication Primitives for ndnSIM nnsim的基于组的发布者-订阅者通信原语
S. Ananthakrishnan, M. Tahiliani, D. Tandur, H. Satheesh
Named Data Networking (NDN), an information centric network architecture, aims to provide an efficient and scalable alternative for content distribution. Modern Internet applications have more emphasis on data, and are less concerned about the location from where data is retrieved. NDN’s communication primitives being strictly pull based help in bringing this focus shift from location of data to the data itself. A concern for NDN is to enable the support of other popular communication primitives, such as the Publisher-Subscriber (Pub-Sub) model, seamlessly. The Pub-Sub model is well suited for applications that require periodic retrieval of data or event triggered data, such as in Industrial Automation Control Systems (IACS). This paper presents the design and development of a model to support the group based Pub-Sub communication primitives in ndnSIM, a popular ns-3 based network simulator for NDN. The functionality of the proposed model is tested by developing an end-to-end simulation environment in ndnSIM that is representative of the popular use cases of Pub-Sub communication primitives.
命名数据网络(NDN)是一种以信息为中心的网络架构,旨在为内容分发提供一种高效且可扩展的替代方案。现代Internet应用程序更加强调数据,而不太关心从何处检索数据。NDN的通信原语严格地基于拉,这有助于将焦点从数据的位置转移到数据本身。NDN的一个关注点是能够无缝地支持其他流行的通信原语,例如发布者-订阅者(Pub-Sub)模型。Pub-Sub模型非常适合需要定期检索数据或事件触发数据的应用程序,例如在工业自动化控制系统(IACS)中。本文设计和开发了一个模型,以支持nnsim(一种流行的基于ns-3的NDN网络模拟器)中基于分组的Pub-Sub通信原语。通过在ndnSIM中开发端到端模拟环境来测试所提议模型的功能,该环境代表了流行的Pub-Sub通信原语用例。
{"title":"Group based Publisher-Subscriber Communication Primitives for ndnSIM","authors":"S. Ananthakrishnan, M. Tahiliani, D. Tandur, H. Satheesh","doi":"10.1109/ANTS50601.2020.9342837","DOIUrl":"https://doi.org/10.1109/ANTS50601.2020.9342837","url":null,"abstract":"Named Data Networking (NDN), an information centric network architecture, aims to provide an efficient and scalable alternative for content distribution. Modern Internet applications have more emphasis on data, and are less concerned about the location from where data is retrieved. NDN’s communication primitives being strictly pull based help in bringing this focus shift from location of data to the data itself. A concern for NDN is to enable the support of other popular communication primitives, such as the Publisher-Subscriber (Pub-Sub) model, seamlessly. The Pub-Sub model is well suited for applications that require periodic retrieval of data or event triggered data, such as in Industrial Automation Control Systems (IACS). This paper presents the design and development of a model to support the group based Pub-Sub communication primitives in ndnSIM, a popular ns-3 based network simulator for NDN. The functionality of the proposed model is tested by developing an end-to-end simulation environment in ndnSIM that is representative of the popular use cases of Pub-Sub communication primitives.","PeriodicalId":426651,"journal":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115502296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1