首页 > 最新文献

2017 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Network slicing in 5G: An auction-based model 5G网络切片:基于拍卖的模型
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7996490
Menglan Jiang, M. Condoluci, Toktam Mahmoodi
The 5G mobile network is expected to meet the diverse demands from multiple types of business services. At the same time, some of the 5G use cases come with hard, and often expensive to meet, requirements in terms of latency and bandwidth. It is a common understanding that one system can not fit all and there is a need for customizing network according to the requirements of specific business use cases. Network slicing is introduced to partition the physical network to different slices to be configured for providing different quality of service as requested by the slice' operator and required by the slice' users. Since these slices will be used by the businesses, e.g. verticals, allocating physical resources to the network slices, is not anymore only a matter of performance but also a matter of revenue and business model. In this paper, we address a joint resource and revenue optimization a novel auction based model. Through extensive simulation study, we demonstrate our proposed auction model can allocate network resources to network slices for providing (i) higher satisfaction of requirements per network slice, and (ii) increased network revenue1.
5G移动网络有望满足多种业务类型的多样化需求。与此同时,一些5G用例在延迟和带宽方面的要求很难满足,而且往往成本高昂。人们普遍认为,一个系统不可能适合所有系统,需要根据特定业务用例的需求定制网络。网络切片是将物理网络划分为不同的切片,根据切片运营商的要求和切片用户的要求进行配置,以提供不同质量的服务。由于这些切片将由业务(例如垂直业务)使用,因此将物理资源分配给网络切片不再仅仅是性能问题,而是收入和业务模式的问题。本文提出了一种基于拍卖的资源与收益联合优化模型。通过广泛的仿真研究,我们证明了我们提出的拍卖模型可以将网络资源分配给网络切片,以提供(i)每个网络切片更高的需求满意度,以及(ii)增加网络收入1。
{"title":"Network slicing in 5G: An auction-based model","authors":"Menglan Jiang, M. Condoluci, Toktam Mahmoodi","doi":"10.1109/ICC.2017.7996490","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996490","url":null,"abstract":"The 5G mobile network is expected to meet the diverse demands from multiple types of business services. At the same time, some of the 5G use cases come with hard, and often expensive to meet, requirements in terms of latency and bandwidth. It is a common understanding that one system can not fit all and there is a need for customizing network according to the requirements of specific business use cases. Network slicing is introduced to partition the physical network to different slices to be configured for providing different quality of service as requested by the slice' operator and required by the slice' users. Since these slices will be used by the businesses, e.g. verticals, allocating physical resources to the network slices, is not anymore only a matter of performance but also a matter of revenue and business model. In this paper, we address a joint resource and revenue optimization a novel auction based model. Through extensive simulation study, we demonstrate our proposed auction model can allocate network resources to network slices for providing (i) higher satisfaction of requirements per network slice, and (ii) increased network revenue1.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"55 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90976294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
On the two time scale characteristics of wireless high speed railway networks 无线高速铁路网的两个时间尺度特性研究
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7997095
Chengxiao Yu, Wei Quan, Shui Yu, Hongke Zhang
Due to the severe environment along the High-Speed Railway (HSR), it is essential to research an efficient HSR communication system. In our previous work, we collected and analyzed an amount of the first hand dataset of signal intensity in HSR networks. We first observed that the link status variation presented an obvious Two-Time-Scale characteristics. However, that work did not analyze the cause of the Two-Time-Scale characteristics clearly. In this work, we focus on the fundamental cause of the periodic Two-Time-Scale characteristics, and make a lot of in-depth studies on this interesting phenomenon. Furthermore, we rebuild Two-Time-Scale characteristics by leveraging the relationship between the link state variation and the geographical position along HSR lines. In particular, considering the distribution of urban areas and rural ones along the HSR, a periodic distance based small time-scale model and a path-loss based large time-scale model are proposed respectively. Simulation results show the proposed models can perfectly explain the Two-Time-Scale characteristics and predict HSR link quality.
由于高铁沿线环境恶劣,研究高效的高铁通信系统势在必行。在我们之前的工作中,我们收集并分析了大量高铁网络信号强度的第一手数据集。我们首先观察到链路状态变化具有明显的双时间尺度特征。然而,该工作没有明确分析双时间尺度特征的原因。在这项工作中,我们着眼于周期双时间尺度特征的根本原因,并对这一有趣的现象进行了大量深入的研究。此外,我们利用高铁线路状态变化与地理位置之间的关系,重建了高铁线路的双时间尺度特征。特别考虑高铁沿线城乡区域的分布,分别提出了基于周期距离的小时间尺度模型和基于路径损失的大时间尺度模型。仿真结果表明,该模型能较好地解释高铁的双时间尺度特征,并能预测高铁线路质量。
{"title":"On the two time scale characteristics of wireless high speed railway networks","authors":"Chengxiao Yu, Wei Quan, Shui Yu, Hongke Zhang","doi":"10.1109/ICC.2017.7997095","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997095","url":null,"abstract":"Due to the severe environment along the High-Speed Railway (HSR), it is essential to research an efficient HSR communication system. In our previous work, we collected and analyzed an amount of the first hand dataset of signal intensity in HSR networks. We first observed that the link status variation presented an obvious Two-Time-Scale characteristics. However, that work did not analyze the cause of the Two-Time-Scale characteristics clearly. In this work, we focus on the fundamental cause of the periodic Two-Time-Scale characteristics, and make a lot of in-depth studies on this interesting phenomenon. Furthermore, we rebuild Two-Time-Scale characteristics by leveraging the relationship between the link state variation and the geographical position along HSR lines. In particular, considering the distribution of urban areas and rural ones along the HSR, a periodic distance based small time-scale model and a path-loss based large time-scale model are proposed respectively. Simulation results show the proposed models can perfectly explain the Two-Time-Scale characteristics and predict HSR link quality.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79717972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems 利用网络生命模式提高入侵检测系统的有效性
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7997374
Francisco J. Aparicio-Navarro, J. Chambers, K. Kyriakopoulos, Yu Gong, D. Parish
As the complexity of cyber-attacks keeps increasing, new and more robust detection mechanisms need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be able to adapt their detection characteristics based not only on the measureable network traffic, but also on the available highlevel information related to the protected network to improve their detection results. We make use of the Pattern-of-Life (PoL) of a network as the main source of high-level information, which is correlated with the time of the day and the usage of the network resources. We propose the use of a Fuzzy Cognitive Map (FCM) to incorporate the PoL into the detection process. The main aim of this work is to evidence the improved the detection performance of an IDS using an FCM to leverage on network related contextual information. The results that we present verify that the proposed method improves the effectiveness of our IDS by reducing the total number of false alarms; providing an improvement of 9.68% when all the considered metrics are combined and a peak improvement of up to 35.64%, depending on particular metric combination.
随着网络攻击的复杂性不断增加,需要开发新的、更强大的检测机制。下一代入侵检测系统(ids)不仅要能够根据可测量的网络流量,而且要能够根据与被保护网络相关的可用高层信息来调整其检测特性,以提高检测结果。我们利用网络的生活模式(Pattern-of-Life, PoL)作为高级信息的主要来源,这些信息与一天中的时间和网络资源的使用情况相关。我们建议使用模糊认知图(FCM)将PoL纳入检测过程。这项工作的主要目的是证明使用FCM利用网络相关上下文信息提高了IDS的检测性能。我们提出的结果验证了所提出的方法通过减少误报总数来提高IDS的有效性;当所有考虑的指标组合在一起时,提供9.68%的改进,峰值改进高达35.64%,具体取决于特定的指标组合。
{"title":"Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems","authors":"Francisco J. Aparicio-Navarro, J. Chambers, K. Kyriakopoulos, Yu Gong, D. Parish","doi":"10.1109/ICC.2017.7997374","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997374","url":null,"abstract":"As the complexity of cyber-attacks keeps increasing, new and more robust detection mechanisms need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be able to adapt their detection characteristics based not only on the measureable network traffic, but also on the available highlevel information related to the protected network to improve their detection results. We make use of the Pattern-of-Life (PoL) of a network as the main source of high-level information, which is correlated with the time of the day and the usage of the network resources. We propose the use of a Fuzzy Cognitive Map (FCM) to incorporate the PoL into the detection process. The main aim of this work is to evidence the improved the detection performance of an IDS using an FCM to leverage on network related contextual information. The results that we present verify that the proposed method improves the effectiveness of our IDS by reducing the total number of false alarms; providing an improvement of 9.68% when all the considered metrics are combined and a peak improvement of up to 35.64%, depending on particular metric combination.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"68 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77725769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Resource allocation between service computing and communication computing for mobile operator 移动运营商业务计算与通信计算之间的资源分配
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7997240
Kezhi Wang, Kun Yang
With the fast development of the cloud computing and virtualization techniques, computation resources can be allocated more dynamically and scalably on demand. This paper aims to study two types of computing, i.e., service computing and communication computing. We have proposed to have both computing resource in mobile operator's mobile cloud and investigated how to jointly allocate them with the objective of reducing mobile operator's power consumption and meanwhile, improving mobile users' experience. In this paper, we have introduced the computing power minimization problem, which is NP-hard. By applying several transformations and estimations, the problem can be solved by the branch and bound solution. Also, admission control is considered in this paper. Simulation results have shown that the proposed joint resource allocation solution has a very good performance and outperforms the traditional fixed data rate guarantee algorithm.
随着云计算和虚拟化技术的快速发展,计算资源可以更加动态和可扩展地按需分配。本文主要研究两种类型的计算,即服务计算和通信计算。我们提出在移动运营商的移动云中同时拥有两种计算资源,并研究如何共同分配,以降低移动运营商的功耗,同时改善移动用户的体验。本文介绍了计算能力最小化问题,这是一个np困难问题。通过变换和估计,可以得到分支定界解。此外,本文还考虑了准入控制问题。仿真结果表明,提出的联合资源分配方案具有很好的性能,优于传统的固定数据速率保证算法。
{"title":"Resource allocation between service computing and communication computing for mobile operator","authors":"Kezhi Wang, Kun Yang","doi":"10.1109/ICC.2017.7997240","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997240","url":null,"abstract":"With the fast development of the cloud computing and virtualization techniques, computation resources can be allocated more dynamically and scalably on demand. This paper aims to study two types of computing, i.e., service computing and communication computing. We have proposed to have both computing resource in mobile operator's mobile cloud and investigated how to jointly allocate them with the objective of reducing mobile operator's power consumption and meanwhile, improving mobile users' experience. In this paper, we have introduced the computing power minimization problem, which is NP-hard. By applying several transformations and estimations, the problem can be solved by the branch and bound solution. Also, admission control is considered in this paper. Simulation results have shown that the proposed joint resource allocation solution has a very good performance and outperforms the traditional fixed data rate guarantee algorithm.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88643221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-antenna based one-bit spatio-temporal wideband sensing for cognitive radio networks 基于多天线的认知无线电网络位时空宽带传感
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7996737
J. M. Duncan, S. Sharma, S. Chatzinotas, B. Ottersten, Xianbin Wang
Cognitive Radio (CR) communication has been considered as one of the promising technologies to enable dynamic spectrum sharing in the next generation of wireless networks. Among several possible enabling techniques, Spectrum Sensing (SS) is one of the key aspects for enabling opportunistic spectrum access in CR Networks (CRN). From practical perspectives, it is important to design low-complexity wideband CR receiver having low resolution Analog to Digital Converter (ADC) working at a reasonable sampling rate. In this context, this paper proposes a novel spatio-temporal wideband SS technique by employing multiple antennas and one-bit quantization at the CR node, which subsequently enables the use of a reasonable sampling rate. In our analysis, we show that for the same sensing performance requirements, the proposed wideband receiver can have lower power consumption than the conventional CR receiver equipped with a single-antenna and a high-resolution ADC. Furthermore, the proposed technique exploits the spatial dimension by estimating the direction of arrival of Primary User (PU) signals, which is not possible by the conventional SS methods and can be of a significant benefit in a CRN. Moreover, we evaluate the performance of the proposed technique and analyze the effects of one-bit quantization with the help of numerical results.
认知无线电通信被认为是实现下一代无线网络动态频谱共享的有前途的技术之一。在几种可能的使能技术中,频谱感知(SS)是实现CR网络(CRN)中机会频谱接入的关键技术之一。从实际应用的角度来看,设计具有合理采样率的低分辨率模数转换器(ADC)的低复杂度宽带CR接收机非常重要。在此背景下,本文提出了一种新的时空宽带SS技术,该技术通过在CR节点采用多天线和1位量化,从而能够使用合理的采样率。在我们的分析中,我们表明,对于相同的传感性能要求,所提出的宽带接收器可以比配备单天线和高分辨率ADC的传统CR接收器具有更低的功耗。此外,所提出的技术通过估计主用户(PU)信号的到达方向来利用空间维度,这是传统SS方法无法实现的,并且在CRN中具有显著的优势。此外,我们还评估了该技术的性能,并借助数值结果分析了比特量化的效果。
{"title":"Multi-antenna based one-bit spatio-temporal wideband sensing for cognitive radio networks","authors":"J. M. Duncan, S. Sharma, S. Chatzinotas, B. Ottersten, Xianbin Wang","doi":"10.1109/ICC.2017.7996737","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996737","url":null,"abstract":"Cognitive Radio (CR) communication has been considered as one of the promising technologies to enable dynamic spectrum sharing in the next generation of wireless networks. Among several possible enabling techniques, Spectrum Sensing (SS) is one of the key aspects for enabling opportunistic spectrum access in CR Networks (CRN). From practical perspectives, it is important to design low-complexity wideband CR receiver having low resolution Analog to Digital Converter (ADC) working at a reasonable sampling rate. In this context, this paper proposes a novel spatio-temporal wideband SS technique by employing multiple antennas and one-bit quantization at the CR node, which subsequently enables the use of a reasonable sampling rate. In our analysis, we show that for the same sensing performance requirements, the proposed wideband receiver can have lower power consumption than the conventional CR receiver equipped with a single-antenna and a high-resolution ADC. Furthermore, the proposed technique exploits the spatial dimension by estimating the direction of arrival of Primary User (PU) signals, which is not possible by the conventional SS methods and can be of a significant benefit in a CRN. Moreover, we evaluate the performance of the proposed technique and analyze the effects of one-bit quantization with the help of numerical results.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84183578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Opportunistic secure transmission for wireless relay networks with modify-and-forward protocol 具有修改转发协议的无线中继网络的机会安全传输
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7996655
Quoc-Tuan Vien, T. Le, T. Duong
This paper investigates the security at the physical layer in cooperative wireless networks (CWNs) where the data transmission between nodes can be realised via either direct transmission (DT) or relaying transmission (RT) schemes. Inspired by the concept of physical-layer network coding (PNC), a secure PNC-based modify-and-forward (SPMF) is developed to cope with the imperfect shared knowledge of the message modification between relay and destination in the conventional modify-and-forward (MF). In this paper, we first derive the secrecy outage probability (SOP) of the SPMF scheme, which is shown to be a general expression for deriving the SOP of any MF schemes. By comparing the SOPs of various schemes, the usage of the relay is shown to be not always necessary and even causes a poorer performance depending on target secrecy rate and quality of channel links. To this extent, we then propose an opportunistic secure transmission protocol to minimise the SOP of the CWNs. In particular, an optimisation problem is developed in which secrecy rate thresholds (SRTs) are determined to find an optimal scheme among various DT and RT schemes for achieving the lowest SOP. Furthermore, the conditions for the existence of SRTs are derived with respect to various channel conditions to determine if the relay could be relied on in practice.
本文研究了协作式无线网络(CWNs)中节点间数据传输可采用直接传输(DT)或中继传输(RT)两种方式实现的物理层安全问题。受物理层网络编码(PNC)概念的启发,提出了一种基于物理层网络编码(PNC)的安全修改转发(SPMF)方法,以解决传统的修改转发(MF)方法中中继和目的地之间消息修改信息共享知识不完全的问题。本文首先导出了SPMF方案的保密中断概率(SOP),并证明了它是导出任何MF方案的保密中断概率的一般表达式。通过比较各种方案的sop,可以看出中继的使用并不总是必要的,甚至会导致性能的下降,这取决于目标保密率和信道链路的质量。在这种程度上,我们提出了一种机会安全传输协议来最小化cwn的SOP。特别是,开发了一个优化问题,其中确定保密率阈值(srt)以在各种DT和RT方案中找到实现最低SOP的最优方案。此外,根据各种信道条件推导了srt存在的条件,以确定在实践中是否可以依赖该继电器。
{"title":"Opportunistic secure transmission for wireless relay networks with modify-and-forward protocol","authors":"Quoc-Tuan Vien, T. Le, T. Duong","doi":"10.1109/ICC.2017.7996655","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996655","url":null,"abstract":"This paper investigates the security at the physical layer in cooperative wireless networks (CWNs) where the data transmission between nodes can be realised via either direct transmission (DT) or relaying transmission (RT) schemes. Inspired by the concept of physical-layer network coding (PNC), a secure PNC-based modify-and-forward (SPMF) is developed to cope with the imperfect shared knowledge of the message modification between relay and destination in the conventional modify-and-forward (MF). In this paper, we first derive the secrecy outage probability (SOP) of the SPMF scheme, which is shown to be a general expression for deriving the SOP of any MF schemes. By comparing the SOPs of various schemes, the usage of the relay is shown to be not always necessary and even causes a poorer performance depending on target secrecy rate and quality of channel links. To this extent, we then propose an opportunistic secure transmission protocol to minimise the SOP of the CWNs. In particular, an optimisation problem is developed in which secrecy rate thresholds (SRTs) are determined to find an optimal scheme among various DT and RT schemes for achieving the lowest SOP. Furthermore, the conditions for the existence of SRTs are derived with respect to various channel conditions to determine if the relay could be relied on in practice.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89043468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic control of NFV forwarding graphs with end-to-end deadline constraints 端到端截止日期约束下NFV转发图的动态控制
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7996596
Victor Millnert, J. Eker, Enrico Bini
There is a strong industrial drive to use cloud computing technologies and concepts for providing timing sensitive services in the networking domain since it would provide the means to share the physical resources among multiple users and thus increase the elasticity and reduce the costs. In this work, we develop a mathematical model for user-stateless virtual network functions forming a forwarding graph. The model captures uncertainties of the performance of these virtual resources as well as the time-overhead needed to instantiate them. The model is used to derive a service controller for horizontal scaling of the virtual resources as well as an admission controller that guarantees that packets exiting the forwarding graph meet their end-to-end deadline. The Automatic Service and Admission Controller (AutoSAC) developed in this work uses feedback and feedforward making it robust against uncertainties of the underlying infrastructure. Also, it has a fast reaction time to changes in the input.
使用云计算技术和概念在网络领域提供对时间敏感的服务具有强大的工业驱动力,因为它将提供在多个用户之间共享物理资源的方法,从而增加弹性并降低成本。在这项工作中,我们建立了一个用户无状态虚拟网络函数形成转发图的数学模型。该模型捕获了这些虚拟资源性能的不确定性以及实例化它们所需的时间开销。该模型用于导出用于水平扩展虚拟资源的服务控制器,以及保证退出转发图的数据包满足端到端截止日期的许可控制器。在这项工作中开发的自动服务和准入控制器(AutoSAC)使用反馈和前馈,使其对底层基础设施的不确定性具有鲁棒性。此外,它对输入的变化有快速的反应时间。
{"title":"Dynamic control of NFV forwarding graphs with end-to-end deadline constraints","authors":"Victor Millnert, J. Eker, Enrico Bini","doi":"10.1109/ICC.2017.7996596","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996596","url":null,"abstract":"There is a strong industrial drive to use cloud computing technologies and concepts for providing timing sensitive services in the networking domain since it would provide the means to share the physical resources among multiple users and thus increase the elasticity and reduce the costs. In this work, we develop a mathematical model for user-stateless virtual network functions forming a forwarding graph. The model captures uncertainties of the performance of these virtual resources as well as the time-overhead needed to instantiate them. The model is used to derive a service controller for horizontal scaling of the virtual resources as well as an admission controller that guarantees that packets exiting the forwarding graph meet their end-to-end deadline. The Automatic Service and Admission Controller (AutoSAC) developed in this work uses feedback and feedforward making it robust against uncertainties of the underlying infrastructure. Also, it has a fast reaction time to changes in the input.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"6 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73528576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSI 无窃听者CSI的缓冲辅助多天线中继系统保密中断分析
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7997206
Xuanxuan Tang, Yueming Cai, Wendong Yang, Yu-zhen Huang, T. Duong, Weiwei Yang
This work studies the secrecy outage performance of buffer-aided dual-hop multi-antenna relay systems without eavesdropper's channel state information (CSI). By modeling the dynamic buffer state transitions with the Markov chain, the secrecy outage probability at each state is investigated and the stationary distribution probabilities of all states are subsequently derived. Using the total probability theorem, the closed-form expression of the secrecy outage probability of the system is finally obtained. It demonstrates that due to the fully exploitation of the available channels, the buffer-aided relay selection yields to better performance than Best Relay Selection (BRS), even when less relays and antennas are utilized. It is also shown that the buffer-aided relaying only results in a small performance degradation when the buffers are constrained to finite size, thus can be well applied to practical relaying cooperative networks. Simulation results are given to verify the theoretical analysis.
本文研究了无窃听者信道状态信息(CSI)的缓冲辅助双跳多天线中继系统的保密中断性能。利用马尔可夫链对动态缓冲状态转换进行建模,研究了各状态下的保密中断概率,并推导了各状态的平稳分布概率。利用全概率定理,得到了系统的保密中断概率的封闭表达式。结果表明,由于充分利用了可用信道,即使使用较少的中继和天线,缓冲辅助中继选择也比最佳中继选择(BRS)产生更好的性能。研究还表明,在缓冲区有限的情况下,缓冲辅助中继只会导致较小的性能下降,因此可以很好地应用于实际的中继合作网络。仿真结果验证了理论分析的正确性。
{"title":"Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSI","authors":"Xuanxuan Tang, Yueming Cai, Wendong Yang, Yu-zhen Huang, T. Duong, Weiwei Yang","doi":"10.1109/ICC.2017.7997206","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997206","url":null,"abstract":"This work studies the secrecy outage performance of buffer-aided dual-hop multi-antenna relay systems without eavesdropper's channel state information (CSI). By modeling the dynamic buffer state transitions with the Markov chain, the secrecy outage probability at each state is investigated and the stationary distribution probabilities of all states are subsequently derived. Using the total probability theorem, the closed-form expression of the secrecy outage probability of the system is finally obtained. It demonstrates that due to the fully exploitation of the available channels, the buffer-aided relay selection yields to better performance than Best Relay Selection (BRS), even when less relays and antennas are utilized. It is also shown that the buffer-aided relaying only results in a small performance degradation when the buffers are constrained to finite size, thus can be well applied to practical relaying cooperative networks. Simulation results are given to verify the theoretical analysis.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"43 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80316013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Content offloading via D2D communications based on user interests and sharing willingness 基于用户兴趣和分享意愿,通过D2D通信进行内容卸载
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7996627
Yijin Pan, Cunhua Pan, Huiling Zhu, Q. Ahmed, Ming Chen, Jiangzhou Wang
As a promising solution to offload cellular traffic, device-to-device (D2D) communication has been adopted to help disseminate contents. In this paper, the D2D offloading utility is maximized by proposing an optimal content pushing strategy based on the user interests and sharing willingness. Specifically, users are classified into groups by their interest probabilities and carry out D2D communications according to their sharing willingness. Although the formulated optimization problem is nonconvex, the optimal solution is obtained in closed-form by applying Karush-Kuhn-Tucker conditions. The theoretical and simulation results show that more contents should be pushed to the user group that is most willing to share, instead of the group that has the largest number of interested users.
设备到设备(D2D)通信作为一种很有前途的蜂窝流量卸载解决方案,已被用于帮助传播内容。本文提出了一种基于用户兴趣和分享意愿的最优内容推送策略,使D2D卸载效用最大化。具体而言,根据用户的兴趣概率将其分组,并根据用户的分享意愿进行D2D通信。虽然所建立的优化问题是非凸的,但通过应用Karush-Kuhn-Tucker条件,得到了闭型的最优解。理论和仿真结果表明,更多的内容应该推送到最愿意分享的用户群,而不是兴趣用户数量最多的用户群。
{"title":"Content offloading via D2D communications based on user interests and sharing willingness","authors":"Yijin Pan, Cunhua Pan, Huiling Zhu, Q. Ahmed, Ming Chen, Jiangzhou Wang","doi":"10.1109/ICC.2017.7996627","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996627","url":null,"abstract":"As a promising solution to offload cellular traffic, device-to-device (D2D) communication has been adopted to help disseminate contents. In this paper, the D2D offloading utility is maximized by proposing an optimal content pushing strategy based on the user interests and sharing willingness. Specifically, users are classified into groups by their interest probabilities and carry out D2D communications according to their sharing willingness. Although the formulated optimization problem is nonconvex, the optimal solution is obtained in closed-form by applying Karush-Kuhn-Tucker conditions. The theoretical and simulation results show that more contents should be pushed to the user group that is most willing to share, instead of the group that has the largest number of interested users.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"17 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84167537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
New sensing technique for detecting application layer DDoS attacks targeting back-end database resources 针对后端数据库资源的应用层DDoS攻击检测新技术
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7997376
D. Beckett, S. Sezer, J. McCanny
Distributed Denial of Service (DDoS) attacks targeting the application layer are becoming more prevalent due to a lack of suitable defence solutions. Existing research treats the web server environment as a black box, by only monitoring the edge network traffic; however, we believe that this approach limits the accuracy of the detection system as it does not protect the back-end database servers. In this paper we propose a new sensor located within the back-end system, which can produce additional database features. This allows for real-time insight into the actual database workload caused by each user enabling the detection of DDoS attacks targeting high database consumption resources. These resource metrics are analysed in real-time on a live website, using a decision tree classification engine. Our preliminary results show that a low rate asymmetric attack as low as 1 request every 10 seconds can be detected using these proposed features.
由于缺乏合适的防御解决方案,针对应用层的分布式拒绝服务(DDoS)攻击变得越来越普遍。现有的研究将web服务器环境视为一个黑箱,只监控边缘网络流量;然而,我们认为这种方法限制了检测系统的准确性,因为它不保护后端数据库服务器。在本文中,我们提出了一个新的传感器位于后端系统,它可以产生额外的数据库特征。这允许实时了解由每个用户引起的实际数据库工作负载,从而检测针对高数据库消耗资源的DDoS攻击。使用决策树分类引擎,这些资源指标在实时网站上进行分析。我们的初步结果表明,使用这些建议的特征可以检测到低至每10秒1个请求的低速率非对称攻击。
{"title":"New sensing technique for detecting application layer DDoS attacks targeting back-end database resources","authors":"D. Beckett, S. Sezer, J. McCanny","doi":"10.1109/ICC.2017.7997376","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997376","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks targeting the application layer are becoming more prevalent due to a lack of suitable defence solutions. Existing research treats the web server environment as a black box, by only monitoring the edge network traffic; however, we believe that this approach limits the accuracy of the detection system as it does not protect the back-end database servers. In this paper we propose a new sensor located within the back-end system, which can produce additional database features. This allows for real-time insight into the actual database workload caused by each user enabling the detection of DDoS attacks targeting high database consumption resources. These resource metrics are analysed in real-time on a live website, using a decision tree classification engine. Our preliminary results show that a low rate asymmetric attack as low as 1 request every 10 seconds can be detected using these proposed features.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"255 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76885000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2017 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1