首页 > 最新文献

2017 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Performance modeling of the middleware overlay infrastructure of mobile things 中间件的性能建模覆盖了移动设备的基础设施
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997451
Georgios Bouloukakis, I. Moscholios, N. Georgantas, V. Issarny
Internet of Things (IoT) applications consist of diverse Things (sensors and devices) in terms of hardware resources. Furthermore, such applications are characterized by the Things' mobility and multiple interaction types, such as synchronous, asynchronous, and streaming. Middleware IoT protocols consider the above limitations and support the development of effective applications by providing several Quality of Service (QoS) features. These features aim to enable application developers to tune an application by switching different levels of response times and delivery success rates. However, the profusion of the developed IoT protocols and the intermittent connectivity of mobile Things, result to a non-trivial application tuning. In this paper, we model the performance of the middleware overlay infrastructure using Queueing Network Models (QNMs). To represent the mobile Thing's connections/disconnections, we model and solve analytically an ON/OFF queueing center. We apply our approach to Streaming interactions with mobile peers. Finally, we validate our model using simulations. The deviations between the performance results foreseen by the analytical model and the ones provided by the simulator are shown to be less than 5%.
物联网(IoT)应用在硬件资源方面由各种各样的事物(传感器和设备)组成。此外,这些应用程序的特点是物的移动性和多种交互类型,如同步、异步和流。中间件物联网协议考虑了上述限制,并通过提供几个服务质量(QoS)特性来支持有效应用程序的开发。这些特性旨在使应用程序开发人员能够通过切换不同级别的响应时间和交付成功率来调优应用程序。然而,开发的物联网协议的丰富和移动物联网的间歇性连接,导致了一个重要的应用程序调优。在本文中,我们使用排队网络模型(QNMs)对中间件覆盖基础结构的性能进行建模。为了表示移动设备的连接/断开,我们对一个ON/OFF排队中心进行建模和解析求解。我们将我们的方法应用于与移动对等体的流媒体交互。最后,我们用仿真验证了我们的模型。分析模型预测的性能结果与模拟器提供的性能结果之间的偏差小于5%。
{"title":"Performance modeling of the middleware overlay infrastructure of mobile things","authors":"Georgios Bouloukakis, I. Moscholios, N. Georgantas, V. Issarny","doi":"10.1109/ICC.2017.7997451","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997451","url":null,"abstract":"Internet of Things (IoT) applications consist of diverse Things (sensors and devices) in terms of hardware resources. Furthermore, such applications are characterized by the Things' mobility and multiple interaction types, such as synchronous, asynchronous, and streaming. Middleware IoT protocols consider the above limitations and support the development of effective applications by providing several Quality of Service (QoS) features. These features aim to enable application developers to tune an application by switching different levels of response times and delivery success rates. However, the profusion of the developed IoT protocols and the intermittent connectivity of mobile Things, result to a non-trivial application tuning. In this paper, we model the performance of the middleware overlay infrastructure using Queueing Network Models (QNMs). To represent the mobile Thing's connections/disconnections, we model and solve analytically an ON/OFF queueing center. We apply our approach to Streaming interactions with mobile peers. Finally, we validate our model using simulations. The deviations between the performance results foreseen by the analytical model and the ones provided by the simulator are shown to be less than 5%.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87297933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Towards adaptive state consistency in distributed SDN control plane 分布式SDN控制平面自适应状态一致性研究
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997164
Ermin Sakic, Fragkiskos Sardis, Jochen W. Guck, W. Kellerer
State synchronisation in clustered Software Defined Networking controller deployments ensures that all instances of the controller have the same state information in order to provide redundancy. Current implementations of controllers use a strong consistency model, where configuration changes must be synchronised across a number of instances before they are applied on the network infrastructure. For large deployments, this blocking process increases the delay of state synchronisation across cluster members and consequently has a detrimental effect on network operations that require rapid response, such as fast failover and Quality of Service applications. In this paper, we introduce an adaptive consistency model for SDN Controllers that employs concepts of eventual consistency models along with a novel ‘cost-based’ approach where strict synchronisation is employed for critical operations that affect a large portion of the network resources while less critical changes are periodically propagated across cluster nodes. We use simulation to evaluate our model and demonstrate the potential gains in performance.
集群软件定义网络控制器部署中的状态同步确保控制器的所有实例具有相同的状态信息,以提供冗余。当前控制器的实现使用了强一致性模型,在此模型中,配置更改必须在多个实例之间同步,然后才能应用到网络基础设施上。对于大型部署,这种阻塞过程会增加跨集群成员的状态同步延迟,从而对需要快速响应的网络操作(例如快速故障转移和服务质量应用程序)产生不利影响。在本文中,我们为SDN控制器引入了一种自适应一致性模型,该模型采用了最终一致性模型的概念以及一种新颖的“基于成本”的方法,其中对影响大部分网络资源的关键操作采用严格的同步,而不太关键的更改在集群节点间定期传播。我们使用仿真来评估我们的模型并演示性能方面的潜在收益。
{"title":"Towards adaptive state consistency in distributed SDN control plane","authors":"Ermin Sakic, Fragkiskos Sardis, Jochen W. Guck, W. Kellerer","doi":"10.1109/ICC.2017.7997164","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997164","url":null,"abstract":"State synchronisation in clustered Software Defined Networking controller deployments ensures that all instances of the controller have the same state information in order to provide redundancy. Current implementations of controllers use a strong consistency model, where configuration changes must be synchronised across a number of instances before they are applied on the network infrastructure. For large deployments, this blocking process increases the delay of state synchronisation across cluster members and consequently has a detrimental effect on network operations that require rapid response, such as fast failover and Quality of Service applications. In this paper, we introduce an adaptive consistency model for SDN Controllers that employs concepts of eventual consistency models along with a novel ‘cost-based’ approach where strict synchronisation is employed for critical operations that affect a large portion of the network resources while less critical changes are periodically propagated across cluster nodes. We use simulation to evaluate our model and demonstrate the potential gains in performance.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86928671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Power saving model for mobile device and virtual base station in the 5G era 5G时代移动设备和虚拟基站的节能模型
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997473
M. Mushtaq, S. Fowler, A. Mellouk
It is a critical requirement of the future 5G communication networks to provide high speed and significantly reduce the network energy consumption. Energy efficient networks along with an energy saving strategy in mobile devices play a vital role in the mobile revolution. The new strategies should not only focus on wireless base stations, which consumes most of the power, but also considers the other power consumption elements for future mobile communication networks, including User Equipment (UE). In this paper, we have proposed a method that calculates the power consumption of a 5G network by considering its main elements based on current vision of 5G network infrastructure. Our proposed model uses the component based methodology that simplifies the process by taking into account the different high power consuming elements. The proposed method is evaluated by considering the three UE's DRX models and Virtual Base Station (VBS) with respect to different DRX timer in terms of Power Saving (PS) and delay as performance parameters.
提供高速、大幅降低网络能耗是未来5G通信网络的关键要求。节能网络以及移动设备的节能策略在移动革命中发挥着至关重要的作用。新的战略不仅要关注消耗大部分电力的无线基站,还要考虑未来移动通信网络的其他电力消耗要素,包括用户设备(UE)。在本文中,我们提出了一种基于当前5G网络基础设施的愿景,通过考虑其主要元素来计算5G网络功耗的方法。我们提出的模型使用基于组件的方法,通过考虑不同的高功耗元素来简化过程。考虑三种终端的DRX模型和虚拟基站(VBS)相对于不同的DRX定时器,以省电(PS)和延迟作为性能参数,对所提出的方法进行了评估。
{"title":"Power saving model for mobile device and virtual base station in the 5G era","authors":"M. Mushtaq, S. Fowler, A. Mellouk","doi":"10.1109/ICC.2017.7997473","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997473","url":null,"abstract":"It is a critical requirement of the future 5G communication networks to provide high speed and significantly reduce the network energy consumption. Energy efficient networks along with an energy saving strategy in mobile devices play a vital role in the mobile revolution. The new strategies should not only focus on wireless base stations, which consumes most of the power, but also considers the other power consumption elements for future mobile communication networks, including User Equipment (UE). In this paper, we have proposed a method that calculates the power consumption of a 5G network by considering its main elements based on current vision of 5G network infrastructure. Our proposed model uses the component based methodology that simplifies the process by taking into account the different high power consuming elements. The proposed method is evaluated by considering the three UE's DRX models and Virtual Base Station (VBS) with respect to different DRX timer in terms of Power Saving (PS) and delay as performance parameters.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90457028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
New era in shared C-RAN and core network: A case study for efficient RRH usage 共享C-RAN和核心网的新时代:高效RRH使用的案例研究
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997428
Omer Narmanlioglu, E. Zeydan
Radio Access Network (RAN) sharing and Cloud-RAN (C-RAN) are two major candidates for next generation mobile networks. RAN sharing ensures efficient usage of network equipments among multiple mobile network operators (MNOs) and C-RAN benefits installation, evolution, management and performance improvements. Similarly, Software-Defined Networking (SDN) concept provides many features including hardware abstraction, programmable networking and centralized policy control. One of the main benefits that can be used along with these features is virtualization of RAN and core/backhaul networks to ensure network sharing among MNOs and efficient usage of the network equipments. In this work, we propose SDN-based C-RAN architecture including RAN controller integrated to virtualization controller that is crucial for core/backhaul network sharing towards next generation cellular network. In proposed architecture, eNodeB functions are shifted to the top of C-RAN controller as a consequence of separating baseband units from remote radio heads (RRHs). We further provide RRH assignment based load balancing algorithm that is executed at the top of the controller and allows sharing of RRHs among multiple MNOs. We evaluate its performance using traditional RRH distribution as benchmark and simulation results reveal that our proposed algorithm outperforms traditional distribution in terms of average number of connected user equipments to RRHs.
无线接入网(RAN)共享和云-RAN (C-RAN)是下一代移动网络的两个主要候选者。RAN共享确保了多个移动网络运营商(mno)之间网络设备的有效使用,C-RAN有利于安装、演进、管理和性能改进。类似地,软件定义网络(SDN)概念提供了许多特性,包括硬件抽象、可编程网络和集中策略控制。与这些特性一起使用的主要好处之一是RAN和核心/回程网络的虚拟化,以确保移动网络运营商之间的网络共享和网络设备的有效使用。在这项工作中,我们提出了基于sdn的C-RAN架构,包括将RAN控制器集成到虚拟化控制器中,这对于下一代蜂窝网络的核心/回程网络共享至关重要。在提议的架构中,eNodeB功能被转移到C-RAN控制器的顶部,因为基带单元与远程无线电头(RRHs)分离。我们进一步提供了基于RRH分配的负载平衡算法,该算法在控制器的顶部执行,并允许在多个mno之间共享RRH。以传统RRH分布为基准对其性能进行了评价,仿真结果表明,在RRH连接用户设备的平均数量方面,本文提出的算法优于传统分布。
{"title":"New era in shared C-RAN and core network: A case study for efficient RRH usage","authors":"Omer Narmanlioglu, E. Zeydan","doi":"10.1109/ICC.2017.7997428","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997428","url":null,"abstract":"Radio Access Network (RAN) sharing and Cloud-RAN (C-RAN) are two major candidates for next generation mobile networks. RAN sharing ensures efficient usage of network equipments among multiple mobile network operators (MNOs) and C-RAN benefits installation, evolution, management and performance improvements. Similarly, Software-Defined Networking (SDN) concept provides many features including hardware abstraction, programmable networking and centralized policy control. One of the main benefits that can be used along with these features is virtualization of RAN and core/backhaul networks to ensure network sharing among MNOs and efficient usage of the network equipments. In this work, we propose SDN-based C-RAN architecture including RAN controller integrated to virtualization controller that is crucial for core/backhaul network sharing towards next generation cellular network. In proposed architecture, eNodeB functions are shifted to the top of C-RAN controller as a consequence of separating baseband units from remote radio heads (RRHs). We further provide RRH assignment based load balancing algorithm that is executed at the top of the controller and allows sharing of RRHs among multiple MNOs. We evaluate its performance using traditional RRH distribution as benchmark and simulation results reveal that our proposed algorithm outperforms traditional distribution in terms of average number of connected user equipments to RRHs.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89794376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimization of primary exclusive region in spatial grid-based spectrum database using stochastic Geometry 基于随机几何的空间网格谱数据库主专属区优化
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997000
S. Yamashita, Koji Yamamoto, T. Nishio, M. Morikura
In database-driven spectrum sharing for 5G mobile networks, a primary user (PU) may experience harmful interference caused by unpredictable propagation paths, even when secondary users (SUs) follow a spectrum sharing policy established on the basis of a database. A framework for determining the optimal radius of a circular primary exclusive region (PER) on the basis of SU's information has been proposed. However, a practical PER can be complex-shaped and should be designed on the basis of the directivity of the PU antenna, and the SU information in each region. In this paper, we present a stochastic geometry analysis in a spatial grid-based spectrum database, and propose a design for an optimal complex-shaped PER. The database determines the transmission probability of the SUs on each divided annular sector. By regarding the SU's locations on each annular sector as an inhomogeneous Poisson point process, we analytically derive a PU's outage probability (OP), where the PU's OP is defined as the probability that the aggregate interference power at a PU from the SUs exceeds a threshold. Using the derived expression, we formulate an optimization problem to maximize the number of transmitting SUs, which optimizes the SU's transmission probability on each annular sector. Then, we numerically evaluate the solution of the optimization problem in various scenarios. The results show that the accuracy of the PER improves as the grid size decreases. In addition, we successfully design a complex-shaped PER with holes in which the SUs are permitted to transmit.
在数据库驱动的5G移动网络频谱共享中,即使从用户遵循基于数据库的频谱共享策略,主用户也可能会受到不可预测的传播路径造成的有害干扰。提出了一种基于SU信息确定圆形主独占区域(PER)最优半径的框架。然而,实际的PER可以是复杂的形状,并且应该根据PU天线的方向性和每个区域的SU信息来设计。本文对基于空间网格的频谱数据库进行了随机几何分析,并提出了一种最优复杂形状PER的设计方法。数据库确定每个划分的环形扇区上单元的传输概率。通过将SU在每个环形扇区上的位置视为非均匀泊松点过程,我们分析得出PU的中断概率(OP),其中PU的OP被定义为来自SU的PU的总干扰功率超过阈值的概率。利用推导出的表达式,提出了以传输单元数量最大化为目标的优化问题,优化了每个环形扇区上传输单元的概率。然后,我们对各种情况下优化问题的解进行了数值评估。结果表明,随着网格尺寸的减小,PER的精度有所提高。此外,我们成功地设计了一个复杂形状的PER,其中有允许单元传输的孔。
{"title":"Optimization of primary exclusive region in spatial grid-based spectrum database using stochastic Geometry","authors":"S. Yamashita, Koji Yamamoto, T. Nishio, M. Morikura","doi":"10.1109/ICC.2017.7997000","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997000","url":null,"abstract":"In database-driven spectrum sharing for 5G mobile networks, a primary user (PU) may experience harmful interference caused by unpredictable propagation paths, even when secondary users (SUs) follow a spectrum sharing policy established on the basis of a database. A framework for determining the optimal radius of a circular primary exclusive region (PER) on the basis of SU's information has been proposed. However, a practical PER can be complex-shaped and should be designed on the basis of the directivity of the PU antenna, and the SU information in each region. In this paper, we present a stochastic geometry analysis in a spatial grid-based spectrum database, and propose a design for an optimal complex-shaped PER. The database determines the transmission probability of the SUs on each divided annular sector. By regarding the SU's locations on each annular sector as an inhomogeneous Poisson point process, we analytically derive a PU's outage probability (OP), where the PU's OP is defined as the probability that the aggregate interference power at a PU from the SUs exceeds a threshold. Using the derived expression, we formulate an optimization problem to maximize the number of transmitting SUs, which optimizes the SU's transmission probability on each annular sector. Then, we numerically evaluate the solution of the optimization problem in various scenarios. The results show that the accuracy of the PER improves as the grid size decreases. In addition, we successfully design a complex-shaped PER with holes in which the SUs are permitted to transmit.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89973471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Defense against advanced persistent threats: A Colonel Blotto game approach 防御先进的持续威胁:上校布洛托游戏方法
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7997103
Minghui Min, Liang Xiao, Caixia Xie, M. Hajimirsadeghi, N. Mandayam
An Advanced Persistent Threat (APT) attacker applies multiple sophisticated methods to continuously and stealthily attack targeted cyber systems. In this paper, the interactions between an APT attacker and a cloud system defender in their allocation of the Central Processing Units (CPUs) over multiple devices are formulated as a Colonel Blotto game (CBG), which models the competition of two players under given resource constraints over multiple battlefields. The Nash equilibria (NEs) of the CBG-based APT defense game are derived for the case with symmetric players and the case with asymmetric players each with different total number of CPUs. The expected data protection level and the utility of the defender are provided for each game at the NE. An APT defense strategy based on the policy hill-climbing (PHC) algorithm is proposed for the defender to achieve the optimal CPU allocation distribution over the devices in the dynamic defense game without being aware of the APT attack model. Simulation results have verified the efficacy of our proposed algorithm, showing that both the data protection level and the utility of the defender are improved compared with the benchmark greedy allocation algorithm.
APT (Advanced Persistent Threat)攻击者利用多种复杂的攻击手段,对目标网络系统进行持续、隐蔽的攻击。在本文中,APT攻击者和云系统防御者在多个设备上分配中央处理器(cpu)时的相互作用被表述为Colonel Blotto游戏(CBG),该游戏模拟了两个玩家在给定资源约束下在多个战场上的竞争。推导了基于cbg的APT防御博弈的纳什均衡(Nash equilibrium, NEs),分别针对具有不同cpu总数的对称参与人和非对称参与人。网元上的每个游戏都提供了预期的数据保护级别和防御器的效用。提出了一种基于PHC (policy hill-climb)算法的APT防御策略,使防御者在不知道APT攻击模型的情况下,在动态防御博弈中实现设备间CPU的最优分配。仿真结果验证了算法的有效性,表明与基准贪婪分配算法相比,数据保护水平和防御器的效用都得到了提高。
{"title":"Defense against advanced persistent threats: A Colonel Blotto game approach","authors":"Minghui Min, Liang Xiao, Caixia Xie, M. Hajimirsadeghi, N. Mandayam","doi":"10.1109/ICC.2017.7997103","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997103","url":null,"abstract":"An Advanced Persistent Threat (APT) attacker applies multiple sophisticated methods to continuously and stealthily attack targeted cyber systems. In this paper, the interactions between an APT attacker and a cloud system defender in their allocation of the Central Processing Units (CPUs) over multiple devices are formulated as a Colonel Blotto game (CBG), which models the competition of two players under given resource constraints over multiple battlefields. The Nash equilibria (NEs) of the CBG-based APT defense game are derived for the case with symmetric players and the case with asymmetric players each with different total number of CPUs. The expected data protection level and the utility of the defender are provided for each game at the NE. An APT defense strategy based on the policy hill-climbing (PHC) algorithm is proposed for the defender to achieve the optimal CPU allocation distribution over the devices in the dynamic defense game without being aware of the APT attack model. Simulation results have verified the efficacy of our proposed algorithm, showing that both the data protection level and the utility of the defender are improved compared with the benchmark greedy allocation algorithm.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90909757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Throughput maximization using cross-layer design in wireless sensor networks 无线传感器网络中使用跨层设计的吞吐量最大化
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996322
Anahid Attarkashani, W. Hamouda
In this paper, a cross-layer-based sensor node selection scheme in a cooperative network with equally spatially correlated channels is proposed. The equally correlated model can be used as a worst-case benchmark or as a rough approximation by assuming equal correlation coefficients for all channels. By considering the physical and link layer characteristics, one or multiple sensor nodes are selected to maximize the link layer throughput. Based on the channel characteristics, the best performance is achieved by using one cooperative sensor node in poor links and multiple relays/sensors in high quality links. The performance of the proposed scheme is compared with the capacity-based scheme and considerable improvement in performance is achieved in both correlated and uncorrelated channels. The proposed scheme is examined for both decode-and-forward (DF) and amplify-and-forward (AF) relaying, and also for relay selection and subcarrier allocation in an orthogonal-frequency-division multiplexing (OFDM)-based systems. In all cases, the cross-layer technique is shown to offer significant improvement relative to physical-layer optimization techniques.
提出了一种具有等空间相关信道的协同网络中基于跨层的传感器节点选择方案。等相关模型可以用作最坏情况基准,也可以通过假设所有通道的相关系数相等来作为粗略近似值。通过考虑物理和链路层特性,选择一个或多个传感器节点,以最大限度地提高链路层吞吐量。根据信道特性,在较差链路上使用一个传感器节点,在高质量链路上使用多个中继/传感器,可以获得最佳性能。将所提方案的性能与基于容量的方案进行了比较,在相关信道和不相关信道上都取得了相当大的性能改进。研究了该方案的译码转发(DF)和放大转发(AF)中继,以及基于正交频分复用(OFDM)系统中的中继选择和子载波分配。在所有情况下,跨层技术都显示出相对于物理层优化技术的显著改进。
{"title":"Throughput maximization using cross-layer design in wireless sensor networks","authors":"Anahid Attarkashani, W. Hamouda","doi":"10.1109/ICC.2017.7996322","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996322","url":null,"abstract":"In this paper, a cross-layer-based sensor node selection scheme in a cooperative network with equally spatially correlated channels is proposed. The equally correlated model can be used as a worst-case benchmark or as a rough approximation by assuming equal correlation coefficients for all channels. By considering the physical and link layer characteristics, one or multiple sensor nodes are selected to maximize the link layer throughput. Based on the channel characteristics, the best performance is achieved by using one cooperative sensor node in poor links and multiple relays/sensors in high quality links. The performance of the proposed scheme is compared with the capacity-based scheme and considerable improvement in performance is achieved in both correlated and uncorrelated channels. The proposed scheme is examined for both decode-and-forward (DF) and amplify-and-forward (AF) relaying, and also for relay selection and subcarrier allocation in an orthogonal-frequency-division multiplexing (OFDM)-based systems. In all cases, the cross-layer technique is shown to offer significant improvement relative to physical-layer optimization techniques.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"106 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75726524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy efficient 3D positioning of micro unmanned aerial vehicles for underlay cognitive radio systems 基于底层认知无线电系统的微型无人机节能三维定位
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996485
Hakim Ghazzai, Mahdi Ben Ghorbel, A. Kadri, Md. Jahangir Hossain
Micro unmanned aerial vehicles (MUAVs) have attracted much interest as flexible communication means for multiple applications due to their versatility. Most of the MUAV-based applications require a time-limited access to the spectrum to complete data transmission due to limited battery capacity of the flying units. These characteristics are the origin of two main challenges faced by MUAV-based communication: 1) efficient-energy management, and 2) opportunistic spectrum access. This paper proposes an energy-efficient solution, considering the hover and communication energy, to address these issues by integrating cognitive radio (CR) technology with MUAVs. A non-convex optimization problem exploiting the mobility of MUAVs is developed for the underlay CR technique. The objective is to determine an optimized three-dimension (3D) location, for a secondary MUAV, at which it can complete its data transfer with minimum energy consumption and without harming the data rate requirement of the primary spectrum owner. Two algorithms are proposed to solve these optimization problems: a meta-heuristic particle swarm optimization algorithm (PSO) and a deterministic algorithm based on Weber formulation. Selected numerical results show the behavior of the MUAV versus various system parameters and that the proposed solutions achieve very close results in spite of the different conceptional constructions.
微型无人机(MUAVs)由于其多功能性而成为多种应用的灵活通信手段,引起了人们的广泛关注。由于飞行单元的电池容量有限,大多数基于muav的应用需要在有限的时间内访问频谱以完成数据传输。这些特点是基于无人机的通信面临的两个主要挑战的根源:1)有效的能量管理,2)机会性频谱接入。为了解决这些问题,本文提出了一种将认知无线电技术与无人机相结合的节能解决方案,考虑了悬停和通信能量。针对底层CR技术,提出了一种利用无人机机动性的非凸优化问题。目标是为次级MUAV确定一个优化的三维(3D)位置,在此位置上,它可以以最小的能耗完成数据传输,并且不会损害主频谱所有者的数据速率要求。针对这些优化问题,提出了两种算法:元启发式粒子群优化算法(PSO)和基于Weber公式的确定性算法。所选择的数值结果显示了MUAV对不同系统参数的行为,并且尽管概念结构不同,所提出的解决方案获得了非常接近的结果。
{"title":"Energy efficient 3D positioning of micro unmanned aerial vehicles for underlay cognitive radio systems","authors":"Hakim Ghazzai, Mahdi Ben Ghorbel, A. Kadri, Md. Jahangir Hossain","doi":"10.1109/ICC.2017.7996485","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996485","url":null,"abstract":"Micro unmanned aerial vehicles (MUAVs) have attracted much interest as flexible communication means for multiple applications due to their versatility. Most of the MUAV-based applications require a time-limited access to the spectrum to complete data transmission due to limited battery capacity of the flying units. These characteristics are the origin of two main challenges faced by MUAV-based communication: 1) efficient-energy management, and 2) opportunistic spectrum access. This paper proposes an energy-efficient solution, considering the hover and communication energy, to address these issues by integrating cognitive radio (CR) technology with MUAVs. A non-convex optimization problem exploiting the mobility of MUAVs is developed for the underlay CR technique. The objective is to determine an optimized three-dimension (3D) location, for a secondary MUAV, at which it can complete its data transfer with minimum energy consumption and without harming the data rate requirement of the primary spectrum owner. Two algorithms are proposed to solve these optimization problems: a meta-heuristic particle swarm optimization algorithm (PSO) and a deterministic algorithm based on Weber formulation. Selected numerical results show the behavior of the MUAV versus various system parameters and that the proposed solutions achieve very close results in spite of the different conceptional constructions.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"17 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75890110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Double iterative waterfilling for sum rate maximization in multicarrier NOMA systems 多载波NOMA系统和速率最大化的双迭代注水
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996797
Yaru Fu, Lou Salaün, C. Sung, Chung Shue Chen, M. Coupechoux
This paper investigates the subcarrier and power allocation for the downlink of a multicarrier non-orthogonal multiple access (MC-NOMA) system. A three-step algorithm is proposed to deal with the sum rate maximization problem. In Step 1, we assume that each user can use all the subcarriers simultaneously and apply the synchronous iterative waterfilling algorithm (SIWA) to obtain a power vector for each user. In Step 2, subcarriers are assigned to users by a heuristic greedy method based on the achieved power allocation result of Step 1. In Step 3, SIWA is used once again to further improve the system performance with the obtained subcarrier assignment result of Step 2. The convergence of SIWA in Step 3 is proved when the number of multiplexed users is no more than two. Since SIWA is applied twice, we call our three-step method Double Iterative Waterfilling Algorithm (DIWA). Numerical results show that the proposed DIWA achieves comparable performance to an existing near-optimal solution but with much lower time complexity.
研究了多载波非正交多址(MC-NOMA)系统下行链路的子载波和功率分配问题。提出了一种处理和速率最大化问题的三步算法。在步骤1中,我们假设每个用户可以同时使用所有子载波,并应用同步迭代充水算法(SIWA)获得每个用户的功率向量。在步骤2中,基于步骤1的功率分配结果,采用启发式贪婪方法将子载波分配给用户。在步骤3中,再次使用SIWA,利用步骤2获得的子载波分配结果进一步提高系统性能。验证了步骤3中SIWA算法在复用用户数不大于2时的收敛性。由于SIWA被应用了两次,因此我们将该方法称为双迭代充水算法(DIWA)。数值结果表明,该方法的性能与现有的近似最优解相当,但时间复杂度大大降低。
{"title":"Double iterative waterfilling for sum rate maximization in multicarrier NOMA systems","authors":"Yaru Fu, Lou Salaün, C. Sung, Chung Shue Chen, M. Coupechoux","doi":"10.1109/ICC.2017.7996797","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996797","url":null,"abstract":"This paper investigates the subcarrier and power allocation for the downlink of a multicarrier non-orthogonal multiple access (MC-NOMA) system. A three-step algorithm is proposed to deal with the sum rate maximization problem. In Step 1, we assume that each user can use all the subcarriers simultaneously and apply the synchronous iterative waterfilling algorithm (SIWA) to obtain a power vector for each user. In Step 2, subcarriers are assigned to users by a heuristic greedy method based on the achieved power allocation result of Step 1. In Step 3, SIWA is used once again to further improve the system performance with the obtained subcarrier assignment result of Step 2. The convergence of SIWA in Step 3 is proved when the number of multiplexed users is no more than two. Since SIWA is applied twice, we call our three-step method Double Iterative Waterfilling Algorithm (DIWA). Numerical results show that the proposed DIWA achieves comparable performance to an existing near-optimal solution but with much lower time complexity.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"32 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82706719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Verifiable and Flexible Data Sharing mechanism for Information-Centric IoT 面向信息中心物联网的可验证、灵活的数据共享机制
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996804
Ruidong Li, H. Asaeda, Jie Li, Xiaoming Fu
In an Information-Centric Internet of Things (ICIoT) environment for big data sharing, IoT data can be cached throughout the network. Such distributed data caching poses a challenge on flexible authorization and identity verification. For fine-grained data access authorization in a distributed manner, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been identified as a promising approach. However in the existing CP-ABE based scheme, each publisher would need to retrieve the attributes from the centralized server for encrypting data, resulting in high communication overhead. Moreover, valid authorization period and distributed authentication are still not addressed and seamlessly incorporated. In this paper, we propose a Verifiable and Flexible Data Sharing (VFDS) mechanism for ICIoT, which exploits CP-ABE for authorization and Identity-Based Signature (IBS) for the distributed verification of the identities. In VFDS, publishers retrieve the attributes from the nearby cache holders. In addition, the Attribute Manifest (AM) and the Automatic Attribute Update (AAU) realize efficient attribute updates within the distributed caches to achieve valid authorization period. Meanwhile, VFDS provides the public parameters of IBS in local domain, which enables the efficient identity verifications. Our system evaluations show that the VFDS can achieve lower bandwidth cost compared to the existing schemes for both authentication and flexible authorization.
在以信息为中心的大数据共享环境中,物联网数据可以在整个网络中缓存。这种分布式数据缓存对灵活的授权和身份验证提出了挑战。对于分布式方式的细粒度数据访问授权,基于密文策略属性的加密(cipher - policy Attribute-Based Encryption, CP-ABE)被认为是一种很有前途的方法。然而,在现有的基于CP-ABE的方案中,每个发布者都需要从集中式服务器检索属性以加密数据,这导致了很高的通信开销。此外,有效的授权期限和分布式身份验证仍然没有得到解决,也没有无缝地结合起来。本文提出了一种可验证和灵活的数据共享(VFDS)机制,该机制利用CP-ABE进行授权,利用基于身份的签名(IBS)进行身份的分布式验证。在VFDS中,发布者从附近的缓存持有者检索属性。另外,AM (Attribute Manifest)和AAU (Automatic Attribute Update)可以在分布式缓存中实现高效的属性更新,保证授权有效。同时,VFDS在本地域提供了IBS的公共参数,实现了高效的身份验证。我们的系统评估表明,与现有的认证和灵活授权方案相比,VFDS可以实现更低的带宽成本。
{"title":"A Verifiable and Flexible Data Sharing mechanism for Information-Centric IoT","authors":"Ruidong Li, H. Asaeda, Jie Li, Xiaoming Fu","doi":"10.1109/ICC.2017.7996804","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996804","url":null,"abstract":"In an Information-Centric Internet of Things (ICIoT) environment for big data sharing, IoT data can be cached throughout the network. Such distributed data caching poses a challenge on flexible authorization and identity verification. For fine-grained data access authorization in a distributed manner, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been identified as a promising approach. However in the existing CP-ABE based scheme, each publisher would need to retrieve the attributes from the centralized server for encrypting data, resulting in high communication overhead. Moreover, valid authorization period and distributed authentication are still not addressed and seamlessly incorporated. In this paper, we propose a Verifiable and Flexible Data Sharing (VFDS) mechanism for ICIoT, which exploits CP-ABE for authorization and Identity-Based Signature (IBS) for the distributed verification of the identities. In VFDS, publishers retrieve the attributes from the nearby cache holders. In addition, the Attribute Manifest (AM) and the Automatic Attribute Update (AAU) realize efficient attribute updates within the distributed caches to achieve valid authorization period. Meanwhile, VFDS provides the public parameters of IBS in local domain, which enables the efficient identity verifications. Our system evaluations show that the VFDS can achieve lower bandwidth cost compared to the existing schemes for both authentication and flexible authorization.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"55 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84795468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2017 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1