首页 > 最新文献

2017 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Adaptation of a Conference Key Distribution System for the wireless ad hoc network 一种适用于无线自组网的会议密钥分配系统
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7996339
C. Tselikis, C. Douligeris, S. Mitropoulos, N. Komninos, G. Tselikis
In this paper we review previous works done with respect to Conference Key Distribution Systems (CKDS). We focus on the system proposed by Kim et al. and we propose improvements on that scheme a) from the perspective of security and anonymity, b) from the perspective of efficient calculation of the Lagrange polynomial coefficients, and c) from the perspective of adaptation into the dynamic wireless ad hoc network. The security of the proposed scheme is based on the difficulty of computing discrete logarithms over elliptic curves, the intractability of inverting a one-way hash function and the pseudo-randomness of user coordinates. We demonstrate the effectiveness of the proposed scheme through the analysis of characteristic attack scenarios.
在本文中,我们回顾了以往关于会议密钥分配系统(CKDS)的工作。我们关注Kim等人提出的系统,并对该方案提出改进:a)从安全性和匿名性的角度,b)从拉格朗日多项式系数的有效计算角度,c)从适应动态无线自组织网络的角度。该方案的安全性主要基于椭圆曲线上离散对数的计算难度、单向哈希函数逆的难解性和用户坐标的伪随机性。通过对特征攻击场景的分析,验证了该方案的有效性。
{"title":"Adaptation of a Conference Key Distribution System for the wireless ad hoc network","authors":"C. Tselikis, C. Douligeris, S. Mitropoulos, N. Komninos, G. Tselikis","doi":"10.1109/ICC.2017.7996339","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996339","url":null,"abstract":"In this paper we review previous works done with respect to Conference Key Distribution Systems (CKDS). We focus on the system proposed by Kim et al. and we propose improvements on that scheme a) from the perspective of security and anonymity, b) from the perspective of efficient calculation of the Lagrange polynomial coefficients, and c) from the perspective of adaptation into the dynamic wireless ad hoc network. The security of the proposed scheme is based on the difficulty of computing discrete logarithms over elliptic curves, the intractability of inverting a one-way hash function and the pseudo-randomness of user coordinates. We demonstrate the effectiveness of the proposed scheme through the analysis of characteristic attack scenarios.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81913198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed, multi-level network anomaly detection for datacentre networks 用于数据中心网络的分布式、多级网络异常检测
Pub Date : 2017-07-31 DOI: 10.1109/ICC.2017.7996569
M. Iordache, Simon Jouet, Angelos K. Marnerides, D. Pezaros
Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, high-speed datacentre networks. In this paper, we present a two-level solution for anomaly detection leveraging independent execution and message passing semantics. We employ these constructs within a network-wide distributed anomaly detection framework that allows for greater detection accuracy and bandwidth cost saving through attack path reconstruction. Experimental results using real operational traffic traces and known network attacks generated through the Pytbull IDS evaluation framework, show that our approach is capable of detecting anomalies in a timely manner while allowing reconstruction of the attack path, hence further enabling the composition of advanced mitigation strategies. The resulting system shows high detection accuracy when compared to similar techniques, at least 20% better at detecting anomalies, and enables full path reconstruction even at small-to-moderate attack traffic intensities (as a fraction of the total traffic), saving up to 75% of bandwidth due to early attack detection.
在过去的十年中,已经提出了许多系统来检测并随后预防或减轻安全漏洞。然而,由于可扩展性问题,许多现有的入侵或异常检测解决方案仅限于流量的一个子集,因此无法在大型高速数据中心网络上以线速运行。在本文中,我们提出了一个利用独立执行和消息传递语义的两级异常检测解决方案。我们在网络范围内的分布式异常检测框架中使用这些结构,通过攻击路径重建可以提高检测精度并节省带宽成本。使用Pytbull IDS评估框架生成的真实操作流量痕迹和已知网络攻击的实验结果表明,我们的方法能够及时检测异常,同时允许重建攻击路径,从而进一步实现高级缓解策略的组成。与类似的技术相比,所得到的系统显示出很高的检测精度,在检测异常方面至少提高了20%,并且即使在小到中等攻击流量强度(占总流量的一小部分)下也能实现全路径重建,由于早期攻击检测,可节省高达75%的带宽。
{"title":"Distributed, multi-level network anomaly detection for datacentre networks","authors":"M. Iordache, Simon Jouet, Angelos K. Marnerides, D. Pezaros","doi":"10.1109/ICC.2017.7996569","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996569","url":null,"abstract":"Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, high-speed datacentre networks. In this paper, we present a two-level solution for anomaly detection leveraging independent execution and message passing semantics. We employ these constructs within a network-wide distributed anomaly detection framework that allows for greater detection accuracy and bandwidth cost saving through attack path reconstruction. Experimental results using real operational traffic traces and known network attacks generated through the Pytbull IDS evaluation framework, show that our approach is capable of detecting anomalies in a timely manner while allowing reconstruction of the attack path, hence further enabling the composition of advanced mitigation strategies. The resulting system shows high detection accuracy when compared to similar techniques, at least 20% better at detecting anomalies, and enables full path reconstruction even at small-to-moderate attack traffic intensities (as a fraction of the total traffic), saving up to 75% of bandwidth due to early attack detection.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"63 1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85385485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assuring virtual network function image integrity and host sealing in Telco cloue 确保电信云中的虚拟网络功能、图像完整性和主机密封性
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997299
Shankar Lal, Sowmya Ravidas, Ian Oliver, T. Taleb
In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above-mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.
在Telco云环境中,虚拟网络功能(VNFs)可以以虚拟机映像的形式发布,并托管在商品硬件上。这些VNF图像很可能包含高度敏感的数据和关键任务网络操作。由于这个原因,这些VNF映像在运输过程中,甚至在上载到云映像数据库之后,都容易受到恶意篡改。此外,由于各种应用,移动网络运营商要求在满足某些硬件和软件配置的特定平台上密封VNFs。这就要求云服务提供商在实例化VNF之前引入一些机制来验证VNF映像的完整性和主机密封。在本文中,我们提出了一个概念证明,并借助实验装置来解决上述问题。我们还评估了所设想的设置的性能,并对其可用性提出了一些见解。
{"title":"Assuring virtual network function image integrity and host sealing in Telco cloue","authors":"Shankar Lal, Sowmya Ravidas, Ian Oliver, T. Taleb","doi":"10.1109/ICC.2017.7997299","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997299","url":null,"abstract":"In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above-mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89232487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
QoS-oriented capacity planning for edge computing 面向qos的边缘计算容量规划
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997387
Yu Xiao, Marius Noreikis, Antti Ylä-Jääski
An increasing number of online services are hosted on public clouds. However, since a centralized cloud architecture imposes high network latency, researchers suggested moving latency sensitive applications, such as virtual and augmented reality ones, to the edge of the network. Nevertheless, little has been done for edge layer capacity estimation resulting in a great need towards practical tools and techniques for initial capacity planning. In this work we provide a novel capacity planning solution for hierarchical edge cloud that considers QoS requirements in terms of response delay, and diverse demands for CPU, GPU and network resources. Our solution improves edge utilization by combining complementary resource demands while satisfying QoS requirements. We prove effectiveness of our solution through a case study where we plan edge capacity for deploying an AR navigation and information system.
越来越多的在线服务托管在公共云上。然而,由于集中式云架构带来了很高的网络延迟,研究人员建议将延迟敏感应用程序(如虚拟现实和增强现实应用程序)移动到网络边缘。然而,对于边缘层容量估计所做的工作很少,因此非常需要实用的工具和技术来进行初始容量规划。在这项工作中,我们为分层边缘云提供了一种新的容量规划解决方案,该解决方案考虑了响应延迟方面的QoS要求,以及对CPU, GPU和网络资源的不同需求。我们的解决方案通过结合互补的资源需求来提高边缘利用率,同时满足QoS要求。我们通过一个案例研究证明了我们的解决方案的有效性,我们计划部署AR导航和信息系统的边缘容量。
{"title":"QoS-oriented capacity planning for edge computing","authors":"Yu Xiao, Marius Noreikis, Antti Ylä-Jääski","doi":"10.1109/ICC.2017.7997387","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997387","url":null,"abstract":"An increasing number of online services are hosted on public clouds. However, since a centralized cloud architecture imposes high network latency, researchers suggested moving latency sensitive applications, such as virtual and augmented reality ones, to the edge of the network. Nevertheless, little has been done for edge layer capacity estimation resulting in a great need towards practical tools and techniques for initial capacity planning. In this work we provide a novel capacity planning solution for hierarchical edge cloud that considers QoS requirements in terms of response delay, and diverse demands for CPU, GPU and network resources. Our solution improves edge utilization by combining complementary resource demands while satisfying QoS requirements. We prove effectiveness of our solution through a case study where we plan edge capacity for deploying an AR navigation and information system.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"130 1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81130177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Q-learning based superposed band detection in multicarrier transmission 多载波传输中基于q学习的叠加带检测
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997432
A. Shaikh, Fereidoun H. Panahi, T. Ohtsuki, Kouhei Suzaki, Hirofumi Sasaki, Hideya So, T. Nakagawa
Superposed multicarrier transmission is a known method to improve frequency utilization efficiency when several wireless systems share the same spectrum. Obviously, an enhanced spectral efficiency comes at the expense of interference. To suppress the effect of interference, forward error correction (FEC) metric masking can be applied. In FEC, the corresponding log-likelihood (LLR) of the superposed band is set to zero or to other proper values determined by the other parameters such as the desired to undesired power ratio (DUR). To be able to apply the FEC metric masking, the information on the superposed band sub-carriers is required at the receiver side. Therefore, in this paper, we propose a novel method for detecting the superposed bands of multicarrier transmissions using Q-learning. We present the simulation results that show a higher rate of superposed band detection accuracy in lower DUR over the conventional method, as well as similar accuracy over other DUR.
当多个无线系统共享同一频谱时,叠加多载波传输是一种已知的提高频率利用效率的方法。显然,频谱效率的提高是以干扰为代价的。为了抑制干扰的影响,可以采用前向误差校正(FEC)度量掩蔽。在FEC中,叠加带对应的对数似然(LLR)被设置为零或由其他参数(如期望与不希望的功率比(DUR))确定的其他适当值。为了能够应用FEC度量掩模,在接收端需要叠加频带子载波上的信息。因此,本文提出了一种利用q -学习检测多载波传输叠加带的新方法。我们给出的仿真结果表明,在较低的DUR下,与传统方法相比,叠加带检测精度更高,并且与其他DUR相比具有相似的精度。
{"title":"Q-learning based superposed band detection in multicarrier transmission","authors":"A. Shaikh, Fereidoun H. Panahi, T. Ohtsuki, Kouhei Suzaki, Hirofumi Sasaki, Hideya So, T. Nakagawa","doi":"10.1109/ICC.2017.7997432","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997432","url":null,"abstract":"Superposed multicarrier transmission is a known method to improve frequency utilization efficiency when several wireless systems share the same spectrum. Obviously, an enhanced spectral efficiency comes at the expense of interference. To suppress the effect of interference, forward error correction (FEC) metric masking can be applied. In FEC, the corresponding log-likelihood (LLR) of the superposed band is set to zero or to other proper values determined by the other parameters such as the desired to undesired power ratio (DUR). To be able to apply the FEC metric masking, the information on the superposed band sub-carriers is required at the receiver side. Therefore, in this paper, we propose a novel method for detecting the superposed bands of multicarrier transmissions using Q-learning. We present the simulation results that show a higher rate of superposed band detection accuracy in lower DUR over the conventional method, as well as similar accuracy over other DUR.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76129893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Profit maximization in wireless powered communications with improved non-linear energy conversion and storage efficiencies 利用改进的非线性能量转换和存储效率实现无线供电通信的利润最大化
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997317
Liqin Shi, Liqiang Zhao, Kai Liang, Xiaoli Chu, Gang Wu, Hsiao-Hwa Chen
In this paper, we investigate profit maximization problem in wireless powered communication (WPC) systems, where the profit is defined as the difference between the revenue earned from uplink data transmission and total energy cost of the system. Since the efficiencies of energy harvesting (EH) circuits and battery storage are both non-linear, conventional linear models will lead to suboptimal resource allocation. In this paper, we propose to maximize the profit of a WPC system under nonlinear energy harvesting and storage models. In order to solve the non-convex optimization problem, we develop a piecewise linear EH model, which is more accurate than conventional linear EH models and existing non-linear EH models. Numerical results show that the power and time allocation design based on the non-linear energy harvesting and storage models outperforms that based on existing linear models in terms of the profit.
本文研究无线供电通信(WPC)系统中的利润最大化问题,其中利润被定义为从上行数据传输中获得的收益与系统总能源成本之差。由于能量收集(EH)电路和电池存储的效率都是非线性的,传统的线性模型将导致次优资源分配。在本文中,我们提出了在非线性能量收集和储存模型下WPC系统的利润最大化。为了解决非凸优化问题,我们建立了一种分段线性EH模型,该模型比传统的线性EH模型和现有的非线性EH模型更精确。数值结果表明,基于非线性能量收集和存储模型的功率和时间分配设计在利润方面优于基于现有线性模型的设计。
{"title":"Profit maximization in wireless powered communications with improved non-linear energy conversion and storage efficiencies","authors":"Liqin Shi, Liqiang Zhao, Kai Liang, Xiaoli Chu, Gang Wu, Hsiao-Hwa Chen","doi":"10.1109/ICC.2017.7997317","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997317","url":null,"abstract":"In this paper, we investigate profit maximization problem in wireless powered communication (WPC) systems, where the profit is defined as the difference between the revenue earned from uplink data transmission and total energy cost of the system. Since the efficiencies of energy harvesting (EH) circuits and battery storage are both non-linear, conventional linear models will lead to suboptimal resource allocation. In this paper, we propose to maximize the profit of a WPC system under nonlinear energy harvesting and storage models. In order to solve the non-convex optimization problem, we develop a piecewise linear EH model, which is more accurate than conventional linear EH models and existing non-linear EH models. Numerical results show that the power and time allocation design based on the non-linear energy harvesting and storage models outperforms that based on existing linear models in terms of the profit.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88211073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Unequal steganography with unequal error protection for wireless physiological signal transmission 无线生理信号传输中的不等差错保护的不等隐写
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996377
Neerja Sahu, D. Peng, H. Sharif
In this paper, an innovative idea of secure and energy efficient electrocardiogram steganography based on Discrete Wavelet Transform (DWT) is proposed, in which different important ECG data are steganographed with variable embedding strengths so that the reconstructed ECG signal quality is preserved. Incorporating the proposed Unequal Steganography Embedding (USE) with Unequal Error Protection (UEP), the proposed scheme further improves transmission performance in terms of ECG signal quality, ensures the confidentiality as well as reliability of a user's data, and makes the transmission more energy efficient. Simulation results demonstrate that USE attains very low distortion (WWPRD less than 0.45 %). Furthermore, high correlation between host and stego ECG and ECG data remains diagnosable after steganography. Based on our literature reviews, the reliability, robustness, and energy efficiency of this proposed method are unmatched in comparison with any other published methods.
本文提出了一种基于离散小波变换(DWT)的安全节能的心电图隐写方法,该方法利用不同的嵌入强度对不同的重要心电数据进行隐写,从而保证了重构心电信号的质量。该方案结合提出的不均匀隐写嵌入(USE)和不均匀错误保护(UEP),在心电信号质量方面进一步提高了传输性能,保证了用户数据的保密性和可靠性,并使传输更加节能。仿真结果表明,该方法获得了非常低的失真(WWPRD小于0.45%)。此外,宿主和隐写心电图之间的高度相关性和隐写后的心电图数据仍然是可诊断的。根据我们的文献综述,与任何其他已发表的方法相比,该方法的可靠性,稳健性和能源效率是无与伦比的。
{"title":"Unequal steganography with unequal error protection for wireless physiological signal transmission","authors":"Neerja Sahu, D. Peng, H. Sharif","doi":"10.1109/ICC.2017.7996377","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996377","url":null,"abstract":"In this paper, an innovative idea of secure and energy efficient electrocardiogram steganography based on Discrete Wavelet Transform (DWT) is proposed, in which different important ECG data are steganographed with variable embedding strengths so that the reconstructed ECG signal quality is preserved. Incorporating the proposed Unequal Steganography Embedding (USE) with Unequal Error Protection (UEP), the proposed scheme further improves transmission performance in terms of ECG signal quality, ensures the confidentiality as well as reliability of a user's data, and makes the transmission more energy efficient. Simulation results demonstrate that USE attains very low distortion (WWPRD less than 0.45 %). Furthermore, high correlation between host and stego ECG and ECG data remains diagnosable after steganography. Based on our literature reviews, the reliability, robustness, and energy efficiency of this proposed method are unmatched in comparison with any other published methods.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"68 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85731216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient offloading mechanism for UAVs-based value added services 基于无人机的增值服务高效卸载机制
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997362
Sihem Ouahouah, T. Taleb, Jaeseung Song, Chafika Benzaid
Unmanned Aerial Vehicles (UAVs) are expected to be used everywhere to provision different services and applications, impacting different aspects of our daily lives. Basically, UAVs are characterized by their high mobility. Some may remain motionless for a specific time to perform pre-programmed missions. Whilst UAVs would be used for specific applications, they could additionally offer numerous IoT (Internet of Things) value-added services (VAS) when they are equipped with suitable IoT devices. Many IoT VAS applications require high amount of resources and/or diverse IoT devices that cannot be offered by a single UAV. In order to overcome this limitation, this paper aims to explore, i) the diversity of IoT devices on-board UAVs, and ii) the mobility of UAVs for offering UAVs-based IoT VAS. Two solutions are proposed for carrying out different IoT VAS. Both solutions are modeled using linear integer programming. While the first solution aims to reduce the energy consumption, the second one aims to shorten the response time. The simulation results demonstrate the efficiency of both solutions in achieving their design goals.
无人驾驶飞行器(uav)预计将用于任何地方,提供不同的服务和应用,影响我们日常生活的各个方面。基本上,无人机的特点是机动性高。有些可能会在特定时间内静止不动,以执行预先设定的任务。虽然无人机将用于特定应用,但当它们配备合适的物联网设备时,它们还可以提供许多物联网增值服务(VAS)。许多物联网VAS应用需要大量的资源和/或不同的物联网设备,这是单个无人机无法提供的。为了克服这一限制,本文旨在探索,i)机载无人机上物联网设备的多样性,以及ii)无人机的移动性,以提供基于无人机的物联网VAS。针对不同的物联网VAS,提出了两种解决方案。这两种解决方案都使用线性整数规划建模。第一个解决方案旨在降低能耗,第二个解决方案旨在缩短响应时间。仿真结果证明了两种方案在实现设计目标方面的有效性。
{"title":"Efficient offloading mechanism for UAVs-based value added services","authors":"Sihem Ouahouah, T. Taleb, Jaeseung Song, Chafika Benzaid","doi":"10.1109/ICC.2017.7997362","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997362","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are expected to be used everywhere to provision different services and applications, impacting different aspects of our daily lives. Basically, UAVs are characterized by their high mobility. Some may remain motionless for a specific time to perform pre-programmed missions. Whilst UAVs would be used for specific applications, they could additionally offer numerous IoT (Internet of Things) value-added services (VAS) when they are equipped with suitable IoT devices. Many IoT VAS applications require high amount of resources and/or diverse IoT devices that cannot be offered by a single UAV. In order to overcome this limitation, this paper aims to explore, i) the diversity of IoT devices on-board UAVs, and ii) the mobility of UAVs for offering UAVs-based IoT VAS. Two solutions are proposed for carrying out different IoT VAS. Both solutions are modeled using linear integer programming. While the first solution aims to reduce the energy consumption, the second one aims to shorten the response time. The simulation results demonstrate the efficiency of both solutions in achieving their design goals.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"29 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73883559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Multi-graph Zero-knowledge-based authentication system in Internet of Things 物联网多图零知识认证系统
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7996820
I. Chuang, Bing-Jie Guo, Jen-Sheng Tsai, Y. Kuo
Internet of Things (IoT) is an emerging network technology applied to provide various services in our daily life. Generally, IoT environments are composed of numerous heterogeneous devices with constrained resource. The limited capability of IoT devices makes it impractical to perform traditional security mechanisms, and thus IoT services are usually vulnerable to all kinds of security threats, such as impersonation and forgery attacks. Moreover, the inflexible protection provided by these security mechanisms leads to inefficiency because different services haves diverse requirements. To provide IoT services suitable security protection, Multi-graph Zero-knowledge-based Authentication System (M-ZAS), which is not only light-weight but also high-adaptive, is proposed. Compared to traditional authentication mechanisms as well as other Zero-knowledge-proof (ZKP) methods such as GMW-ZKP, M-ZAS provides higher performance and better security protection. In addition, M-ZAS has lower transmission overheads than GMW-ZKP does. Considering relevant contexts as parameters, M-ZAS provides adaptive protection to fulfill what users actually need. Experiment results show that M-ZAS is 3 times faster than GMW-ZKP and even 7 times than traditional authentication mechanisms in IoT devices. Also, M-ZAS reduces 3 times network traffic than GMW-ZKP. Thus, the proposed M-ZAS is the most practical authentication system in IoT environments.
物联网(Internet of Things, IoT)是一种新兴的网络技术,用于为我们的日常生活提供各种服务。通常,物联网环境由众多异构设备组成,资源受限。物联网设备的有限能力使得执行传统的安全机制变得不切实际,因此物联网服务通常容易受到各种安全威胁,例如冒充和伪造攻击。此外,这些安全机制提供的不灵活的保护导致效率低下,因为不同的服务有不同的需求。为了给物联网服务提供合适的安全保护,提出了轻量化、高自适应的多图零知识认证系统(M-ZAS)。与传统的认证机制以及GMW-ZKP等其他零知识证明(zero -knowledge proof)方法相比,M-ZAS提供了更高的性能和更好的安全保护。此外,M-ZAS的传动开销比GMW-ZKP要低。考虑到相关上下文作为参数,M-ZAS提供自适应保护,以满足用户的实际需要。实验结果表明,在物联网设备中,M-ZAS比GMW-ZKP快3倍,甚至比传统认证机制快7倍。此外,M-ZAS比GMW-ZKP减少了3倍的网络流量。因此,所提出的M-ZAS是物联网环境中最实用的认证系统。
{"title":"Multi-graph Zero-knowledge-based authentication system in Internet of Things","authors":"I. Chuang, Bing-Jie Guo, Jen-Sheng Tsai, Y. Kuo","doi":"10.1109/ICC.2017.7996820","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996820","url":null,"abstract":"Internet of Things (IoT) is an emerging network technology applied to provide various services in our daily life. Generally, IoT environments are composed of numerous heterogeneous devices with constrained resource. The limited capability of IoT devices makes it impractical to perform traditional security mechanisms, and thus IoT services are usually vulnerable to all kinds of security threats, such as impersonation and forgery attacks. Moreover, the inflexible protection provided by these security mechanisms leads to inefficiency because different services haves diverse requirements. To provide IoT services suitable security protection, Multi-graph Zero-knowledge-based Authentication System (M-ZAS), which is not only light-weight but also high-adaptive, is proposed. Compared to traditional authentication mechanisms as well as other Zero-knowledge-proof (ZKP) methods such as GMW-ZKP, M-ZAS provides higher performance and better security protection. In addition, M-ZAS has lower transmission overheads than GMW-ZKP does. Considering relevant contexts as parameters, M-ZAS provides adaptive protection to fulfill what users actually need. Experiment results show that M-ZAS is 3 times faster than GMW-ZKP and even 7 times than traditional authentication mechanisms in IoT devices. Also, M-ZAS reduces 3 times network traffic than GMW-ZKP. Thus, the proposed M-ZAS is the most practical authentication system in IoT environments.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90569662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
When brands fight over bands: Sociality in the cognitive radio ecosystem 当品牌争夺乐队:认知无线电生态系统中的社会性
Pub Date : 2017-07-28 DOI: 10.1109/ICC.2017.7997383
A. Wiśniewska, Bilal Khan, Ala Al-Fuqaha, K. Dombrowski, M. A. Shattal
As wireless devices continue to proliferate, spectrum management is essential to a healthy and functioning digital ecosystem. Here we present an evolutionary analysis of how interbrand relationships can be expected to evolve in the cognitive radio domain over long time scales. We find that a range of trajectories are possible, and that the eventual outcomes depend on a variety of system parameters including the number of users and transmission band switching costs. Starting from previous bio-socially inspired fair spectrum sharing protocols, we put forward an extended model of secondary user etiquette that allows for a range of inter-group dynamics to arise in the natural course of competition over and co-use of spectrum resources. We show that as populations grow, increases in transmission switching costs lead to evolutionary pressures toward increasing antagonism between brands, and that in such scenarios devices tend to segregate by brand across bands. Understanding the drivers behind emerging inter-brand dynamics from an evolutionary perspective is an important input to the long term view of the successful application of distributed spectrum access and cognitive radio.
随着无线设备的不断激增,频谱管理对于健康和正常运行的数字生态系统至关重要。在这里,我们提出了一个关于品牌间关系在认知无线电领域如何在长时间尺度上发展的进化分析。我们发现一系列轨迹是可能的,最终结果取决于各种系统参数,包括用户数量和传输频带切换成本。从以前的生物社会启发的公平频谱共享协议开始,我们提出了一个扩展的二级用户礼仪模型,该模型允许在频谱资源竞争和共同使用的自然过程中出现一系列组间动态。我们的研究表明,随着人口的增长,传输转换成本的增加导致了品牌间对抗的进化压力,在这种情况下,设备倾向于按品牌在不同频段隔离。从进化的角度理解新兴品牌间动态背后的驱动因素,对于分布式频谱接入和认知无线电的成功应用具有重要的长远意义。
{"title":"When brands fight over bands: Sociality in the cognitive radio ecosystem","authors":"A. Wiśniewska, Bilal Khan, Ala Al-Fuqaha, K. Dombrowski, M. A. Shattal","doi":"10.1109/ICC.2017.7997383","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997383","url":null,"abstract":"As wireless devices continue to proliferate, spectrum management is essential to a healthy and functioning digital ecosystem. Here we present an evolutionary analysis of how interbrand relationships can be expected to evolve in the cognitive radio domain over long time scales. We find that a range of trajectories are possible, and that the eventual outcomes depend on a variety of system parameters including the number of users and transmission band switching costs. Starting from previous bio-socially inspired fair spectrum sharing protocols, we put forward an extended model of secondary user etiquette that allows for a range of inter-group dynamics to arise in the natural course of competition over and co-use of spectrum resources. We show that as populations grow, increases in transmission switching costs lead to evolutionary pressures toward increasing antagonism between brands, and that in such scenarios devices tend to segregate by brand across bands. Understanding the drivers behind emerging inter-brand dynamics from an evolutionary perspective is an important input to the long term view of the successful application of distributed spectrum access and cognitive radio.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76807593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1