首页 > 最新文献

2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)最新文献

英文 中文
On the Analysis of AI-Optimized Aerial Cell-Free Massive MIMO 关于人工智能优化的空中无蜂窝大规模多输入多输出分析
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454699
M. Alamgir, Brian Kelley
This study examines a cell-free massive MIMO architecture for unmanned aerial vehicles (UAVs), It evaluates aerial access points (APs) coverage, performance, and data rate of the aerial cell-free network. It proposes deploying an aerial cell-free massive MIMO architecture to mitigate the effects of path loss and interference in aerial cellular networks. The analysis includes a 2-dimensional multi-armed bandit (MAB) model for beam selection optimized with machine learning and using millimeter-wave technology to analyze an aerial cell-free network that connects a HAPS (CPU/data network) with ground vehicles through UAV-based APs. The multi-armed bandit model incorporates 3GPP blockage stochastics, water-filling power allocation, and optimization of multi-user capacity. The results include the aerial cell-free model's comprehensive geometric and radio link simulation analysis. The simulation outcomes demonstrate that the suggested cell-free network outperforms aerial cellular networks and NLOS terrestrial cell-free networks. Finally, we present a comparative study between our MAB model-based AI technique and a conventional non-AI technique, highlighting the significant performance improvements achieved by our approach.
本研究探讨了无人机(UAV)的无蜂窝大规模 MIMO 架构,评估了空中无蜂窝网络的空中接入点(AP)覆盖范围、性能和数据传输率。它建议部署空中无蜂窝大规模 MIMO 架构,以减轻空中蜂窝网络的路径损耗和干扰影响。分析包括利用机器学习和毫米波技术优化波束选择的二维多臂盗贼(MAB)模型,以分析通过基于无人机的接入点连接 HAPS(CPU/数据网络)和地面车辆的空中无蜂窝网络。多臂匪模型结合了 3GPP 阻塞随机性、充水功率分配和多用户容量优化。结果包括空中无蜂窝模型的综合几何和无线电链路仿真分析。仿真结果表明,建议的无蜂窝网络优于空中蜂窝网络和 NLOS 陆地无蜂窝网络。最后,我们介绍了基于 MAB 模型的人工智能技术与传统非人工智能技术之间的比较研究,强调了我们的方法所取得的显著性能改进。
{"title":"On the Analysis of AI-Optimized Aerial Cell-Free Massive MIMO","authors":"M. Alamgir, Brian Kelley","doi":"10.1109/CCNC51664.2024.10454699","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454699","url":null,"abstract":"This study examines a cell-free massive MIMO architecture for unmanned aerial vehicles (UAVs), It evaluates aerial access points (APs) coverage, performance, and data rate of the aerial cell-free network. It proposes deploying an aerial cell-free massive MIMO architecture to mitigate the effects of path loss and interference in aerial cellular networks. The analysis includes a 2-dimensional multi-armed bandit (MAB) model for beam selection optimized with machine learning and using millimeter-wave technology to analyze an aerial cell-free network that connects a HAPS (CPU/data network) with ground vehicles through UAV-based APs. The multi-armed bandit model incorporates 3GPP blockage stochastics, water-filling power allocation, and optimization of multi-user capacity. The results include the aerial cell-free model's comprehensive geometric and radio link simulation analysis. The simulation outcomes demonstrate that the suggested cell-free network outperforms aerial cellular networks and NLOS terrestrial cell-free networks. Finally, we present a comparative study between our MAB model-based AI technique and a conventional non-AI technique, highlighting the significant performance improvements achieved by our approach.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 11","pages":"784-791"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opportunistic Protocols for People Counting in Dynamic Networks 动态网络中人员计数的机会协议
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454785
Alexander Jung, Helge Parzyjegla, Peter Danielis
In the modern world, accurate crowd counting is integral to a multitude of applications, including urban planning, transportation management, and crowd control. The advent of opportunistic communication networks, which enable devices to sporadically exchange data in a decentralized fashion, has introduced a new set of challenges in crowd estimation. This paper delves into two opportunistic people counting protocols: UrbanCount and HeartBeatCount. UrbanCount, while a robust protocol in its own right, comes with certain limitations that hinder its real-world applicability. In response to these limitations, this paper introduces refinements to UrbanCount, making it more practical and effective. Additionally, a novel protocol called HeartBeatCount is presented, which significantly enhances crowd size estimation accuracy, particularly in sparse scenarios. Through an evaluation, we compare the performance of these protocols and conclude that HeartBeatCount offers a more resilient solution for opportunistic people counting in various real-world scenarios.
在现代社会中,精确的人群计数是城市规划、交通管理和人群控制等众多应用不可或缺的一部分。机会主义通信网络的出现,使设备能够以分散的方式零星交换数据,为人群估计带来了一系列新的挑战。本文深入探讨了两种机会主义人群计数协议:UrbanCount 和 HeartBeatCount。UrbanCount 虽然本身是一个强大的协议,但也有一些局限性,阻碍了它在现实世界中的应用。针对这些局限性,本文对 UrbanCount 进行了改进,使其更加实用和有效。此外,本文还介绍了一种名为 HeartBeatCount 的新型协议,它能显著提高人群规模估计的准确性,尤其是在稀疏场景中。通过评估,我们比较了这些协议的性能,并得出结论:HeartBeatCount 为各种真实世界场景中的机会性人数统计提供了更具弹性的解决方案。
{"title":"Opportunistic Protocols for People Counting in Dynamic Networks","authors":"Alexander Jung, Helge Parzyjegla, Peter Danielis","doi":"10.1109/CCNC51664.2024.10454785","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454785","url":null,"abstract":"In the modern world, accurate crowd counting is integral to a multitude of applications, including urban planning, transportation management, and crowd control. The advent of opportunistic communication networks, which enable devices to sporadically exchange data in a decentralized fashion, has introduced a new set of challenges in crowd estimation. This paper delves into two opportunistic people counting protocols: UrbanCount and HeartBeatCount. UrbanCount, while a robust protocol in its own right, comes with certain limitations that hinder its real-world applicability. In response to these limitations, this paper introduces refinements to UrbanCount, making it more practical and effective. Additionally, a novel protocol called HeartBeatCount is presented, which significantly enhances crowd size estimation accuracy, particularly in sparse scenarios. Through an evaluation, we compare the performance of these protocols and conclude that HeartBeatCount offers a more resilient solution for opportunistic people counting in various real-world scenarios.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"66 9","pages":"198-201"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of RoCE Protocol in Backhaul Systems for Ultra-High-Speed THz Wireless LAN 评估超高速太赫兹无线局域网回程系统中的 RoCE 协议
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454796
Norimasa Yafune, Kazuto Yano, Keiichiro Mori, Toshikazu Sakano
In advancing society, large-capacity and high-speed communication network, to handle rich contents like ultra-high-definition video and large-capacity sensing information, is becoming important. Accomplishing these demands needs an ultrawide bandwidth wireless Local Area Network (LAN). Improvements in wireless transmission speeds are expected with the development of ultra-high-speed wireless technology such as terahertz (THz) communication. However, the rapid growth of ultra-high-speed wireless network technology places a considerable strain on the backhaul network. Therefore, improvements in wired network technology are indispensable to achieve higher speeds. We investigated RDMA technology used in data centers to speed up in THz wireless LAN. This paper presents the construction of a backhaul system to connect a network coordinator and interconnected access points. It also reports evaluation results of the proposed system, including a comparative analysis concerning RoCE, TCP, and UDP. Furthermore, the effect of switching processing on the overall throughput.
在不断进步的社会中,大容量和高速通信网络对于处理超高清视频和大容量传感信息等丰富内容变得越来越重要。要满足这些需求,就需要超宽带无线局域网(LAN)。随着太赫兹(THz)通信等超高速无线技术的发展,无线传输速度有望得到提高。然而,超高速无线网络技术的快速发展对回程网络造成了相当大的压力。因此,要实现更高速度,有线网络技术的改进必不可少。我们研究了数据中心使用的 RDMA 技术,以加快太赫兹无线局域网的速度。本文介绍了连接网络协调器和互连接入点的回程系统的构建。本文还报告了对所提系统的评估结果,包括对 RoCE、TCP 和 UDP 的比较分析。此外,还介绍了交换处理对总体吞吐量的影响。
{"title":"Evaluation of RoCE Protocol in Backhaul Systems for Ultra-High-Speed THz Wireless LAN","authors":"Norimasa Yafune, Kazuto Yano, Keiichiro Mori, Toshikazu Sakano","doi":"10.1109/CCNC51664.2024.10454796","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454796","url":null,"abstract":"In advancing society, large-capacity and high-speed communication network, to handle rich contents like ultra-high-definition video and large-capacity sensing information, is becoming important. Accomplishing these demands needs an ultrawide bandwidth wireless Local Area Network (LAN). Improvements in wireless transmission speeds are expected with the development of ultra-high-speed wireless technology such as terahertz (THz) communication. However, the rapid growth of ultra-high-speed wireless network technology places a considerable strain on the backhaul network. Therefore, improvements in wired network technology are indispensable to achieve higher speeds. We investigated RDMA technology used in data centers to speed up in THz wireless LAN. This paper presents the construction of a backhaul system to connect a network coordinator and interconnected access points. It also reports evaluation results of the proposed system, including a comparative analysis concerning RoCE, TCP, and UDP. Furthermore, the effect of switching processing on the overall throughput.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"26 1","pages":"811-814"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Processing Communication Scheme for Real-Time Applications over Wide-Area Networks 广域网上实时应用的分布式处理通信方案
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454684
Sanetora Hiragi, Bijoy Chand Chatterjee, Eiji Oki, Akio Kawabata
Low-delay networking and edge computing will enable mission-critical applications to be delivered over wide-area networks. We consider this trend to be the realization that all users can share an application space without feeling any distance difference. We propose a distributed processing scheme that keeps the order of event occurrence regardless of the distance between users and an application server. The proposed scheme can be applied to both optimistic synchronization algorithms (OSA) and conservative synchronization algorithms (CSA). In the proposed scheme, arrival events with a delay within a predefined set time (correction time) are sorted in order of occurrence before application processing. We formulate the proposed scheme as an integer linear programming (ILP) problem. The objective function of ILP consists of the number of users excluded from the delay quality, the amount of memory consumed for a rollback in OSA, and the maximum end-to-end delay. The three parts of the objective function are set weight and the sum of parts with weight is minimized. We evaluate the proposed scheme for 1000 users distributed in two types of network models. Numerical results indicate that the proposed scheme reduces memory consumption compared to that of the conventional OSA scheme. The proposed scheme works as CSA in which all events are sorted in the occurrence order if the correction time is set above the delay for the slowest event to arrive at the server.
低延迟网络和边缘计算将使关键任务应用能够通过广域网交付。我们认为这一趋势是实现所有用户都能共享一个应用空间,而不会感觉到任何距离上的差异。我们提出了一种分布式处理方案,无论用户与应用服务器之间的距离有多远,都能保持事件发生的顺序。我们提出的方案既适用于乐观同步算法(OSA),也适用于保守同步算法(CSA)。在所提出的方案中,延迟时间在预定义时间(校正时间)内的到达事件会在应用处理前按发生顺序排序。我们将拟议方案表述为一个整数线性规划(ILP)问题。ILP 的目标函数包括从延迟质量中排除的用户数量、OSA 回滚所消耗的内存量和最大端到端延迟。目标函数的三个部分都设定了权重,各部分权重之和最小。我们以分布在两种网络模型中的 1000 个用户为对象,对所提出的方案进行了评估。数值结果表明,与传统的 OSA 方案相比,拟议方案减少了内存消耗。如果校正时间设置为高于最慢事件到达服务器的延迟时间,则提议的方案就会像 CSA 那样工作,所有事件都会按发生顺序排序。
{"title":"A Distributed Processing Communication Scheme for Real-Time Applications over Wide-Area Networks","authors":"Sanetora Hiragi, Bijoy Chand Chatterjee, Eiji Oki, Akio Kawabata","doi":"10.1109/CCNC51664.2024.10454684","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454684","url":null,"abstract":"Low-delay networking and edge computing will enable mission-critical applications to be delivered over wide-area networks. We consider this trend to be the realization that all users can share an application space without feeling any distance difference. We propose a distributed processing scheme that keeps the order of event occurrence regardless of the distance between users and an application server. The proposed scheme can be applied to both optimistic synchronization algorithms (OSA) and conservative synchronization algorithms (CSA). In the proposed scheme, arrival events with a delay within a predefined set time (correction time) are sorted in order of occurrence before application processing. We formulate the proposed scheme as an integer linear programming (ILP) problem. The objective function of ILP consists of the number of users excluded from the delay quality, the amount of memory consumed for a rollback in OSA, and the maximum end-to-end delay. The three parts of the objective function are set weight and the sum of parts with weight is minimized. We evaluate the proposed scheme for 1000 users distributed in two types of network models. Numerical results indicate that the proposed scheme reduces memory consumption compared to that of the conventional OSA scheme. The proposed scheme works as CSA in which all events are sorted in the occurrence order if the correction time is set above the delay for the slowest event to arrive at the server.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"108 5","pages":"25-30"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Open-Loop Transmit Power Control for Scalable Cell-Free Networks 可扩展无蜂窝网络的开环发射功率控制研究
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454839
Keita Fukushima, Keiichi Mizutani, H. Harada
Toward 6G, cell-free networks (CFN) are attracting attention as a solution to the problem of poor communication quality at the cell edge. In CFN, many access points are densely deployed and cooperatively operated as distributed MIMO systems. In uplink communication in CFN, transmit power control (TPC) is required to mitigate interference and ensure fairness between users. In this paper, we propose an open-loop TPC algorithm for CFN and evaluate its performance by computer simulation. As a result, an improvement of 55.0% in the fifth percentile spectral efficiency is achieved compared to the case without TPC while maintaining a higher average spectral efficiency.
在迈向 6G 的过程中,无蜂窝网络(CFN)作为解决蜂窝边缘通信质量差问题的一种解决方案备受关注。在 CFN 中,许多接入点密集部署,并作为分布式 MIMO 系统协同运行。在 CFN 的上行链路通信中,需要进行发射功率控制(TPC)以减轻干扰并确保用户之间的公平性。本文提出了一种适用于 CFN 的开环 TPC 算法,并通过计算机仿真对其性能进行了评估。结果表明,与没有 TPC 的情况相比,第五百分位数频谱效率提高了 55.0%,同时保持了较高的平均频谱效率。
{"title":"A Study on Open-Loop Transmit Power Control for Scalable Cell-Free Networks","authors":"Keita Fukushima, Keiichi Mizutani, H. Harada","doi":"10.1109/CCNC51664.2024.10454839","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454839","url":null,"abstract":"Toward 6G, cell-free networks (CFN) are attracting attention as a solution to the problem of poor communication quality at the cell edge. In CFN, many access points are densely deployed and cooperatively operated as distributed MIMO systems. In uplink communication in CFN, transmit power control (TPC) is required to mitigate interference and ensure fairness between users. In this paper, we propose an open-loop TPC algorithm for CFN and evaluate its performance by computer simulation. As a result, an improvement of 55.0% in the fifth percentile spectral efficiency is achieved compared to the case without TPC while maintaining a higher average spectral efficiency.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"87 2","pages":"1074-1075"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACADEME: Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network ACADEME: 6G 无线网络中的空中蜂窝辅助设备边缘硬币选取模式(Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454698
T. Vrind, Chandar Kumar, Debabrata Das
In the 6G wireless network, there may be a communication architecture with three levels of systems: user equipment (UE), non-terrestrial aerial low altitude platform (LAP), and terrestrial base station with mobile edge computing (MEC). Co-inference is the intelligent sharing of the multiple computing layers in the AI/ML model amongst the UE, LAP, and MEC. Computing, storage, and power shared between the above systems for co-inference will bring several system-level advantages. Furthermore, it optimizes the required data traffic bandwidth, energy consumption, and end-to-end latency. The available literature has analyzed the optimal split point of the AI/ML model between UE and MEC (one wireless link). However, to the best of our knowledge, there is no study on the AI/ML split model in the case of UE, LAP, and MEC architectures with two wireless links (UE to LAP and LAP to MEC). In this paper, for the first time, we propose a novel device-edge co-inference with a LAP-based aerial cell having computing power. We present a novel Aerial Cell-Assisted Device-Edge co-inference ModEl (ACADEME) algorithm that optimally assigns layers to compute to UE, LAP, and MEC according to two wireless link characteristics to minimize power consumption and latency of inference. Through mathematical modelling and simulations, we show that the proposed coinference substantially reduces latency, i.e., by 47% through the selection of the two optimal split points of the AI/ML model, one each at the UE and the LAP-based aerial cell, respectively.
在 6G 无线网络中,通信架构可能包含三个层次的系统:用户设备(UE)、非地面空中低空平台(LAP)和带有移动边缘计算(MEC)的地面基站。协同干涉是指 UE、LAP 和 MEC 之间智能共享 AI/ML 模型中的多个计算层。上述系统之间共享计算、存储和电源以进行协同干涉将带来多个系统级优势。此外,它还能优化所需的数据流量带宽、能耗和端到端延迟。现有文献分析了 AI/ML 模型在 UE 和 MEC(一条无线链路)之间的最佳分割点。然而,据我们所知,目前还没有关于 UE、LAP 和 MEC 架构中两个无线链路(UE 至 LAP 和 LAP 至 MEC)的 AI/ML 分离模型的研究。在本文中,我们首次提出了一种新型的设备边缘协同干扰,它基于具有计算能力的 LAP 空中小区。我们提出了一种新型的空中小区辅助设备边缘协同干扰模式(ACADEME)算法,该算法可根据两种无线链路特性为 UE、LAP 和 MEC 分配最佳计算层,以最大限度地降低功耗和推理延迟。通过数学建模和仿真,我们发现所提出的协同推理通过选择 AI/ML 模型的两个最佳分割点(分别位于 UE 和基于 LAP 的空中小区),大大减少了延迟,即减少了 47%。
{"title":"ACADEME: Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network","authors":"T. Vrind, Chandar Kumar, Debabrata Das","doi":"10.1109/CCNC51664.2024.10454698","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454698","url":null,"abstract":"In the 6G wireless network, there may be a communication architecture with three levels of systems: user equipment (UE), non-terrestrial aerial low altitude platform (LAP), and terrestrial base station with mobile edge computing (MEC). Co-inference is the intelligent sharing of the multiple computing layers in the AI/ML model amongst the UE, LAP, and MEC. Computing, storage, and power shared between the above systems for co-inference will bring several system-level advantages. Furthermore, it optimizes the required data traffic bandwidth, energy consumption, and end-to-end latency. The available literature has analyzed the optimal split point of the AI/ML model between UE and MEC (one wireless link). However, to the best of our knowledge, there is no study on the AI/ML split model in the case of UE, LAP, and MEC architectures with two wireless links (UE to LAP and LAP to MEC). In this paper, for the first time, we propose a novel device-edge co-inference with a LAP-based aerial cell having computing power. We present a novel Aerial Cell-Assisted Device-Edge co-inference ModEl (ACADEME) algorithm that optimally assigns layers to compute to UE, LAP, and MEC according to two wireless link characteristics to minimize power consumption and latency of inference. Through mathematical modelling and simulations, we show that the proposed coinference substantially reduces latency, i.e., by 47% through the selection of the two optimal split points of the AI/ML model, one each at the UE and the LAP-based aerial cell, respectively.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 3","pages":"1006-1009"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection 通过动态链接检测 OT 网络中异常入侵的图自动编码器
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454841
Alex Howe, Dale Peasley, Mauricio Papa
This paper evaluates the use of graph neural network (GNN) based autoencoders for detecting network intrusions or anomalous traffic in Operational Technology (OT) networks. Traditional intrusion detection methods often struggle to capture the complex relationships and interdependencies found in OT network communications. These spatial relationships can provide information vital for identifying harder to detect attacks (i.e. Advanced Persistent Threats). GNNs are a machine learning technique which operate on graph-structured data and can be used to identify underlying patterns and relationships between the nodes. Graph autoencoders (GAEs) are an unsupervised GNN-based learning technique that incorporates an encoder-decoder architecture and can be used for anomaly detection in graph structured data. This work evaluates the use of graph autoencoders for detecting anomalous edges (extracted from packets) in OT network data. Additionally, we introduce a method for encoding raw network traffic into discrete temporal graphs which can be used to apply GAEs for real-time intrusion detection. The proposed network traffic encoding scheme incorporates multi-dimensional edge attributes in order to capture information for determining the relevance of a given network packet. The approach is evaluated using two OT network datasets each containing labeled examples of commonly encountered malicious attack traffic. Results are compared against baseline anomaly detection methods including K-Nearest Neighbors, Deep Autoencoders, and Isolation Forest. The proposed graph autoencoder outperforms the baseline cases in terms of detection accuracy achieving a 31.05% and 8.64% improvement in F1 scores over the baseline models on the two OT network datasets.
本文评估了基于图神经网络(GNN)的自动编码器在检测操作技术(OT)网络中的网络入侵或异常流量方面的应用。传统的入侵检测方法往往难以捕捉到 OT 网络通信中的复杂关系和相互依存关系。这些空间关系可为识别难以检测的攻击(即高级持续性威胁)提供重要信息。GNN 是一种机器学习技术,可在图结构数据上运行,并可用于识别节点之间的基本模式和关系。图自动编码器(GAE)是一种基于 GNN 的无监督学习技术,它采用编码器-解码器架构,可用于图结构数据的异常检测。这项研究评估了如何使用图自编码器检测 OT 网络数据中的异常边缘(从数据包中提取)。此外,我们还介绍了一种将原始网络流量编码为离散时间图的方法,该方法可用于应用 GAE 进行实时入侵检测。所提出的网络流量编码方案包含多维边缘属性,以便捕捉用于确定给定网络数据包相关性的信息。我们使用两个 OT 网络数据集对该方法进行了评估,每个数据集都包含常见恶意攻击流量的标记示例。结果与基准异常检测方法(包括 K-近邻、深度自动编码器和隔离林)进行了比较。在两个 OT 网络数据集上,拟议的图自动编码器在检测准确性方面优于基线案例,F1 分数比基线模型分别提高了 31.05% 和 8.64%。
{"title":"Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection","authors":"Alex Howe, Dale Peasley, Mauricio Papa","doi":"10.1109/CCNC51664.2024.10454841","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454841","url":null,"abstract":"This paper evaluates the use of graph neural network (GNN) based autoencoders for detecting network intrusions or anomalous traffic in Operational Technology (OT) networks. Traditional intrusion detection methods often struggle to capture the complex relationships and interdependencies found in OT network communications. These spatial relationships can provide information vital for identifying harder to detect attacks (i.e. Advanced Persistent Threats). GNNs are a machine learning technique which operate on graph-structured data and can be used to identify underlying patterns and relationships between the nodes. Graph autoencoders (GAEs) are an unsupervised GNN-based learning technique that incorporates an encoder-decoder architecture and can be used for anomaly detection in graph structured data. This work evaluates the use of graph autoencoders for detecting anomalous edges (extracted from packets) in OT network data. Additionally, we introduce a method for encoding raw network traffic into discrete temporal graphs which can be used to apply GAEs for real-time intrusion detection. The proposed network traffic encoding scheme incorporates multi-dimensional edge attributes in order to capture information for determining the relevance of a given network packet. The approach is evaluated using two OT network datasets each containing labeled examples of commonly encountered malicious attack traffic. Results are compared against baseline anomaly detection methods including K-Nearest Neighbors, Deep Autoencoders, and Isolation Forest. The proposed graph autoencoder outperforms the baseline cases in terms of detection accuracy achieving a 31.05% and 8.64% improvement in F1 scores over the baseline models on the two OT network datasets.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intuitive Robot Control with Data Gloves for Industrial Use Cases 利用数据手套实现直观的机器人控制,适用于工业应用案例
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454653
Achim Schade, Vu Nguyen, Cansu Gencoglu, Giang T. Nguyen, F. Fitzek
Human-robot interaction is crucial in various industries and domains, such as manufacturing, healthcare, and entertainment. Natural and intuitive interactions between humans and robots are crucial. Legacy controllers were designed for two-dimensional visual display and, therefore, suboptimal for interaction in three-dimensional space. Hand gesture recognition with camera-based systems is often hindered by visual obstruction. We demonstrate a hand gesture system leveraging data gloves with inertial measurement units (IMU). This demonstration focuses on gesture recognition quality, enhancing robustness and responsiveness. Audiences can observe and directly participate using the data glove to maneuver a robotic dog remotely in real-time.
人与机器人的交互在制造、医疗保健和娱乐等各个行业和领域都至关重要。人与机器人之间自然而直观的交互至关重要。传统的控制器是为二维视觉显示而设计的,因此在三维空间的交互中并不理想。基于摄像头的系统的手势识别通常会受到视觉障碍的阻碍。我们展示了一个利用带有惯性测量单元(IMU)的数据手套的手势系统。本次演示的重点是手势识别质量、增强鲁棒性和响应性。观众可以观察并直接参与使用数据手套实时远程操控机器狗。
{"title":"Intuitive Robot Control with Data Gloves for Industrial Use Cases","authors":"Achim Schade, Vu Nguyen, Cansu Gencoglu, Giang T. Nguyen, F. Fitzek","doi":"10.1109/CCNC51664.2024.10454653","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454653","url":null,"abstract":"Human-robot interaction is crucial in various industries and domains, such as manufacturing, healthcare, and entertainment. Natural and intuitive interactions between humans and robots are crucial. Legacy controllers were designed for two-dimensional visual display and, therefore, suboptimal for interaction in three-dimensional space. Hand gesture recognition with camera-based systems is often hindered by visual obstruction. We demonstrate a hand gesture system leveraging data gloves with inertial measurement units (IMU). This demonstration focuses on gesture recognition quality, enhancing robustness and responsiveness. Audiences can observe and directly participate using the data glove to maneuver a robotic dog remotely in real-time.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"95 11","pages":"1114-1115"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TIM-MARL: Information Sharing for Multi-Agent Reinforcement Learning in Smart Environments TIM-MARL:智能环境中多代理强化学习的信息共享
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454813
A. Siddiqua, Siming Liu, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink
Information sharing among agents to jointly solve problems is challenging for multi-agent reinforcement learning algorithms (MARL) in smart environments. In this paper, we present a novel information sharing approach for MARL, which introduces a Team Information Matrix (TIM) that integrates scenario-independent spatial and environmental information combined with the agent's local observations, augmenting both individual agent's performance and global awareness during the MARL learning. To evaluate this approach, we conducted experiments on three multi-agent scenarios of varying difficulty levels implemented in Unity ML-Agents Toolkit. Experimental results show that the agents utilizing our TIM-Shared variation outperformed those using decentralized MARL and achieved comparable performance to agents employing centralized MARL.
对于智能环境中的多代理强化学习算法(MARL)来说,代理之间共享信息以共同解决问题是一项挑战。在本文中,我们为 MARL 提出了一种新颖的信息共享方法,即引入团队信息矩阵 (TIM),将与场景无关的空间和环境信息与代理的本地观察相结合,在 MARL 学习过程中增强单个代理的性能和全局意识。为了评估这种方法,我们在 Unity ML-Agents 工具包中实现的三个不同难度的多代理场景中进行了实验。实验结果表明,使用我们的 TIM 共享变体的代理性能优于使用分散式 MARL 的代理,与使用集中式 MARL 的代理性能相当。
{"title":"TIM-MARL: Information Sharing for Multi-Agent Reinforcement Learning in Smart Environments","authors":"A. Siddiqua, Siming Liu, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink","doi":"10.1109/CCNC51664.2024.10454813","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454813","url":null,"abstract":"Information sharing among agents to jointly solve problems is challenging for multi-agent reinforcement learning algorithms (MARL) in smart environments. In this paper, we present a novel information sharing approach for MARL, which introduces a Team Information Matrix (TIM) that integrates scenario-independent spatial and environmental information combined with the agent's local observations, augmenting both individual agent's performance and global awareness during the MARL learning. To evaluate this approach, we conducted experiments on three multi-agent scenarios of varying difficulty levels implemented in Unity ML-Agents Toolkit. Experimental results show that the agents utilizing our TIM-Shared variation outperformed those using decentralized MARL and achieved comparable performance to agents employing centralized MARL.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"107 4","pages":"1044-1045"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation 单个 GPS Spoofer 对多个接收器的影响:形式分析与实验评估
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454872
Wenxin Chen, Yingfei Dong, Zhenhai Duan
As many mobile devices use Global Navigation Satellite Systems (GNSSs) to determine their locations for control, compromising such systems can result in serious consequences, as shown by existing GPS spoofing attacks. However, most such spoofing attacks focus on the effect of a single spoofer attacking a single receiver. In this paper, we investigate the impacts of a single spoofer on multiple receivers, motivated by research on attacking drone swarms. Our analysis independently shows that, using a single spoofer, multiple receivers at different locations in a spoofing area will see the same location reading. We consider the base case of spoofing four satellites and also the generic case when more satellites are involved in the spoofing attack. More importantly, we conduct real-world experiments to validate our analysis and demonstrate the potential threats to many practical applications. We use off-the-shelf SDR cards for spoofing and consumer GPS receivers for obtaining spoofed location readings. While this method can enable various attacks on mobile devices depending on GPS, it is also applicable to all existing GNSSs, because they use similar principles to determine locations.
由于许多移动设备使用全球导航卫星系统(GNSS)来确定其控制位置,正如现有的全球定位系统欺骗攻击所显示的那样,破坏此类系统会导致严重后果。然而,大多数此类欺骗攻击都侧重于单个欺骗者攻击单个接收器的效果。本文受无人机群攻击研究的启发,研究了单个欺骗者对多个接收器的影响。我们的独立分析表明,使用单个欺骗者,位于欺骗区域不同位置的多个接收器将看到相同的位置读数。我们考虑了欺骗四颗卫星的基本情况,也考虑了更多卫星参与欺骗攻击的一般情况。更重要的是,我们进行了真实世界的实验,以验证我们的分析,并展示对许多实际应用的潜在威胁。我们使用现成的 SDR 卡进行欺骗,并使用消费者 GPS 接收器获取欺骗位置读数。虽然这种方法可以对依赖于 GPS 的移动设备实施各种攻击,但它也适用于所有现有的全球导航卫星系统,因为它们使用类似的原理来确定位置。
{"title":"Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation","authors":"Wenxin Chen, Yingfei Dong, Zhenhai Duan","doi":"10.1109/CCNC51664.2024.10454872","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454872","url":null,"abstract":"As many mobile devices use Global Navigation Satellite Systems (GNSSs) to determine their locations for control, compromising such systems can result in serious consequences, as shown by existing GPS spoofing attacks. However, most such spoofing attacks focus on the effect of a single spoofer attacking a single receiver. In this paper, we investigate the impacts of a single spoofer on multiple receivers, motivated by research on attacking drone swarms. Our analysis independently shows that, using a single spoofer, multiple receivers at different locations in a spoofing area will see the same location reading. We consider the base case of spoofing four satellites and also the generic case when more satellites are involved in the spoofing attack. More importantly, we conduct real-world experiments to validate our analysis and demonstrate the potential threats to many practical applications. We use off-the-shelf SDR cards for spoofing and consumer GPS receivers for obtaining spoofed location readings. While this method can enable various attacks on mobile devices depending on GPS, it is also applicable to all existing GNSSs, because they use similar principles to determine locations.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"106 2","pages":"127-134"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1