首页 > 最新文献

2017 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Towards trustworthy and private keyword search in encrypted decentralized storage 在去中心化加密存储中实现可信和私有关键字搜索
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996810
Chengjun Cai, Xingliang Yuan, Cong Wang
Emerging decentralized storage services such as Storj and Filecoin show promise as a new paradigm for data outsourcing. These services tie cryptocurrency to personal storage resources and leverage blockchain technology to ensure data integrity in distributed networks. Compared to current cloud storage, they are expected to be more scalable, cost effective, and secure. In addition to the features above, strong guarantees of data privacy are seriously desired due to today's prevalent data leak and abuse incidents. However, simply using end-to-end encryption limits the search capability and thus will degrade the user experience. In this paper, we propose an encrypted decentralized storage architecture that can support trustworthy and private keyword search functions. We start from searchable encryption to achieve search on encrypted data. Yet, only adopting this primitive is not sufficient to address particular threats in our target decentralized service model. Service peers would maliciously return incorrect results, while user peers would fraudulently refuse to pay service fees. To resolve those threats, we devise specific secure data addition and keyword search protocols to enable client-side verifiability and blockchain based fair judgments on the search results. For practical considerations, we integrate an efficient dynamic searchable encryption scheme to our protocols as an instantiation to lower the blockchain overhead. Our security and performance analysis indicates the advance of the proposed architecture.
新兴的去中心化存储服务,如Storj和Filecoin,有望成为数据外包的新范式。这些服务将加密货币与个人存储资源联系起来,并利用区块链技术确保分布式网络中的数据完整性。与当前的云存储相比,它们有望具有更高的可扩展性、成本效益和安全性。除了上述功能之外,由于当今普遍存在的数据泄露和滥用事件,我们迫切需要对数据隐私进行强有力的保证。然而,简单地使用端到端加密限制了搜索功能,从而降低了用户体验。在本文中,我们提出了一种加密的分散存储架构,可以支持可信和私有关键字搜索功能。我们从可搜索加密开始,实现对加密数据的搜索。然而,仅采用此原语不足以解决我们的目标分散服务模型中的特定威胁。服务节点会恶意返回错误的结果,而用户节点会欺诈性地拒绝支付服务费。为了解决这些威胁,我们设计了特定的安全数据添加和关键字搜索协议,以实现客户端可验证性和基于区块链的对搜索结果的公平判断。出于实际考虑,我们将一个高效的动态可搜索加密方案集成到我们的协议中,作为实例来降低区块链开销。我们的安全性和性能分析表明了所建议架构的先进性。
{"title":"Towards trustworthy and private keyword search in encrypted decentralized storage","authors":"Chengjun Cai, Xingliang Yuan, Cong Wang","doi":"10.1109/ICC.2017.7996810","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996810","url":null,"abstract":"Emerging decentralized storage services such as Storj and Filecoin show promise as a new paradigm for data outsourcing. These services tie cryptocurrency to personal storage resources and leverage blockchain technology to ensure data integrity in distributed networks. Compared to current cloud storage, they are expected to be more scalable, cost effective, and secure. In addition to the features above, strong guarantees of data privacy are seriously desired due to today's prevalent data leak and abuse incidents. However, simply using end-to-end encryption limits the search capability and thus will degrade the user experience. In this paper, we propose an encrypted decentralized storage architecture that can support trustworthy and private keyword search functions. We start from searchable encryption to achieve search on encrypted data. Yet, only adopting this primitive is not sufficient to address particular threats in our target decentralized service model. Service peers would maliciously return incorrect results, while user peers would fraudulently refuse to pay service fees. To resolve those threats, we devise specific secure data addition and keyword search protocols to enable client-side verifiability and blockchain based fair judgments on the search results. For practical considerations, we integrate an efficient dynamic searchable encryption scheme to our protocols as an instantiation to lower the blockchain overhead. Our security and performance analysis indicates the advance of the proposed architecture.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"145 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86020921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A measurement study on Amazon wishlist and its privacy exposure 亚马逊愿望清单及其隐私暴露的测量研究
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996684
Yue Li, Nan Zheng, Haining Wang, Kun Sun, Hui Fang
User preference plays an important factor in E-commerce websites for advertising and marketing, and the disclosure of user preference could also raise privacy concerns. As one of the largest E-commerce platform, Amazon features a wishlist that allows users to keep track of their desired products. In this paper, we investigate Amazon wishlist, and its possible privacy exposure. To this end, we collect complete wishlists of over 30,000 users, by analyzing which we are able to make interesting observations based on user online shopping preference in multiple dimensions. Specifically, we show user preference variation from different demographical groups, including gender and geo-locations. Taking timing factors into consideration, we also observe that unlike traditional walk-in-shop type of shopping, there is no significant difference in the dynamics of Amazon wishlists between weekdays and weekend. In the investigation of user information exposure in Amazon wishlists, we parse and analyze list-descriptions, illustrating which and to what extent user personal information is exposed to the public. Finally, we demonstrate that the information in wishlists has potential to leak a user's private personal information. Based on the collected user data, we can predict user gender with over 80% accuracy by just exploiting items present in Amazon wishlists.
用户偏好在电子商务网站的广告和营销中起着重要的作用,用户偏好的披露也可能引起隐私问题。作为最大的电子商务平台之一,亚马逊有一个愿望清单,允许用户跟踪他们想要的产品。在本文中,我们调查了亚马逊的愿望清单,以及它可能的隐私暴露。为此,我们收集了超过30,000个用户的完整愿望清单,通过分析这些清单,我们可以在多个维度上对用户的在线购物偏好进行有趣的观察。具体来说,我们展示了不同人口统计群体的用户偏好差异,包括性别和地理位置。考虑到时间因素,我们还观察到,与传统的走进店式购物不同,亚马逊愿望清单的动态在工作日和周末之间没有显著差异。在对亚马逊愿望清单中用户信息暴露的调查中,我们对清单描述进行了解析和分析,说明了哪些用户个人信息向公众暴露,在多大程度上向公众暴露。最后,我们证明了愿望列表中的信息有可能泄露用户的私人信息。根据收集到的用户数据,我们可以通过利用亚马逊愿望清单中的商品来预测用户性别,准确率超过80%。
{"title":"A measurement study on Amazon wishlist and its privacy exposure","authors":"Yue Li, Nan Zheng, Haining Wang, Kun Sun, Hui Fang","doi":"10.1109/ICC.2017.7996684","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996684","url":null,"abstract":"User preference plays an important factor in E-commerce websites for advertising and marketing, and the disclosure of user preference could also raise privacy concerns. As one of the largest E-commerce platform, Amazon features a wishlist that allows users to keep track of their desired products. In this paper, we investigate Amazon wishlist, and its possible privacy exposure. To this end, we collect complete wishlists of over 30,000 users, by analyzing which we are able to make interesting observations based on user online shopping preference in multiple dimensions. Specifically, we show user preference variation from different demographical groups, including gender and geo-locations. Taking timing factors into consideration, we also observe that unlike traditional walk-in-shop type of shopping, there is no significant difference in the dynamics of Amazon wishlists between weekdays and weekend. In the investigation of user information exposure in Amazon wishlists, we parse and analyze list-descriptions, illustrating which and to what extent user personal information is exposed to the public. Finally, we demonstrate that the information in wishlists has potential to leak a user's private personal information. Based on the collected user data, we can predict user gender with over 80% accuracy by just exploiting items present in Amazon wishlists.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"60 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84151426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Is local blacklisting relevant in slow channel hopping low-power wireless networks? 本地黑名单是否适用于慢频跳低功耗无线网络?
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996980
Vasileios Kotsiou, Georgios Z. Papadopoulos, P. Chatzimisios, Fabrice Théoleyre
With the large growth of the Internet of Things (IoT), a strong focus has been put on designing and developing energy efficient and high performance protocols. Industrial-type wireless networks require strict and on-time delivery guarantees, such as close to 100% network reliability and ultra low delay. To this aim, standards such as IEEE 802.15.4-TSCH or Wireless HART, aim to guarantee high-level network reliability by keeping nodes time-synchronized and by employing a slow channel hopping pattern to combat noisy environments and external interference. In wireless networks, since all the radio channels are not impacted in a similar manner, blacklisting bad channels may improve performance of the whole wireless infrastructure. In this paper, we perform a thorough experimental study to characterize the radio (for all IEEE 802.15.4 channels) and connectivity among the nodes of an indoor testbed. More precisely, we investigate the locality of these blacklisting techniques and we highlighted: the fact that some channels perform poorly only in a small set of locations, for certain radio links. Our study tends to justify the need for local blacklisting techniques, demanding more control packets, but dealing more efficiently with spectral re-use.
随着物联网(IoT)的快速发展,设计和开发高效节能和高性能协议成为人们关注的焦点。工业型无线网络需要严格的准时交付保证,例如接近100%的网络可靠性和超低延迟。为此,IEEE 802.15.4-TSCH或Wireless HART等标准旨在通过保持节点时间同步和采用慢速信道跳频模式来对抗噪声环境和外部干扰,从而保证高水平的网络可靠性。在无线网络中,由于所有的无线电信道不会以类似的方式受到影响,因此将不良信道列入黑名单可能会提高整个无线基础设施的性能。在本文中,我们进行了彻底的实验研究,以表征无线电(所有IEEE 802.15.4信道)和室内试验台节点之间的连通性。更准确地说,我们调查了这些黑名单技术的位置,并强调了这样一个事实:对于某些无线电链路,某些频道仅在一小部分位置表现不佳。我们的研究倾向于证明需要本地黑名单技术,需要更多的控制数据包,但更有效地处理频谱重用。
{"title":"Is local blacklisting relevant in slow channel hopping low-power wireless networks?","authors":"Vasileios Kotsiou, Georgios Z. Papadopoulos, P. Chatzimisios, Fabrice Théoleyre","doi":"10.1109/ICC.2017.7996980","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996980","url":null,"abstract":"With the large growth of the Internet of Things (IoT), a strong focus has been put on designing and developing energy efficient and high performance protocols. Industrial-type wireless networks require strict and on-time delivery guarantees, such as close to 100% network reliability and ultra low delay. To this aim, standards such as IEEE 802.15.4-TSCH or Wireless HART, aim to guarantee high-level network reliability by keeping nodes time-synchronized and by employing a slow channel hopping pattern to combat noisy environments and external interference. In wireless networks, since all the radio channels are not impacted in a similar manner, blacklisting bad channels may improve performance of the whole wireless infrastructure. In this paper, we perform a thorough experimental study to characterize the radio (for all IEEE 802.15.4 channels) and connectivity among the nodes of an indoor testbed. More precisely, we investigate the locality of these blacklisting techniques and we highlighted: the fact that some channels perform poorly only in a small set of locations, for certain radio links. Our study tends to justify the need for local blacklisting techniques, demanding more control packets, but dealing more efficiently with spectral re-use.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"34 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81472362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
An indirect reciprocity based incentive framework for cooperative spectrum sensing 基于间接互易的协同频谱感知激励框架
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996606
Bin Chen, Biling Zhang, Jung-Lang Yu, Yan Chen, Zhu Han
To overcome the hidden terminal problem a secondary user (SU) may encounter, cooperative spectrum sensing (CSS) is proposed and gained much attention in the last decades. However, due to the selfish nature, SUs may not cooperate unconditionally as most previous works have assumed. Therefore, how to stimulate SUs to play cooperatively is an important issue. In this paper, we propose a reputation-based CSS incentive framework, where the cooperation stimulation problem is modeled as an indirect reciprocity game. In the proposed game, SUs choose how to report their sensing results to the fusion center (FC) and gain reputations, based on which they can access a certain amount of vacant licensed channels in the future. For the proposed game, we derive theoretically the optimal action rule, according to which the SU will truthfully report its result when the estimated average energy is equal to or higher than the given threshold and vice versa. The decision accuracy of the FC thereby can be greatly improved. Moreover, we derive the condition under which the optimal action rule is evolutionarily stable. Finally, simulation results are shown to verify the effectiveness of the proposed scheme.
为了克服二次用户(SU)可能遇到的终端隐藏问题,合作频谱感知(CSS)在近几十年来得到了广泛的关注。然而,由于自私的本质,su可能不会像之前大多数作品所假设的那样无条件地合作。因此,如何激发个体的协作性是一个重要的问题。本文提出了一个基于声誉的CSS激励框架,将合作激励问题建模为一个间接互惠博弈。在该游戏中,智能单元选择如何向融合中心(FC)报告其感知结果并获得声誉,以此为基础,它们可以在未来访问一定数量的空闲许可频道。对于所提出的博弈,我们从理论上推导出最优行动规则,根据该规则,当估计的平均能量等于或高于给定阈值时,SU将如实报告其结果,反之亦然。从而可以大大提高FC的决策精度。此外,我们还导出了最优行动规则进化稳定的条件。最后,仿真结果验证了所提方案的有效性。
{"title":"An indirect reciprocity based incentive framework for cooperative spectrum sensing","authors":"Bin Chen, Biling Zhang, Jung-Lang Yu, Yan Chen, Zhu Han","doi":"10.1109/ICC.2017.7996606","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996606","url":null,"abstract":"To overcome the hidden terminal problem a secondary user (SU) may encounter, cooperative spectrum sensing (CSS) is proposed and gained much attention in the last decades. However, due to the selfish nature, SUs may not cooperate unconditionally as most previous works have assumed. Therefore, how to stimulate SUs to play cooperatively is an important issue. In this paper, we propose a reputation-based CSS incentive framework, where the cooperation stimulation problem is modeled as an indirect reciprocity game. In the proposed game, SUs choose how to report their sensing results to the fusion center (FC) and gain reputations, based on which they can access a certain amount of vacant licensed channels in the future. For the proposed game, we derive theoretically the optimal action rule, according to which the SU will truthfully report its result when the estimated average energy is equal to or higher than the given threshold and vice versa. The decision accuracy of the FC thereby can be greatly improved. Moreover, we derive the condition under which the optimal action rule is evolutionarily stable. Finally, simulation results are shown to verify the effectiveness of the proposed scheme.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"54 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87020514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy-efficient resource scheduling for NOMA systems with imperfect channel state information 信道状态信息不完全的NOMA系统的节能资源调度
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996360
Fang Fang, Haijun Zhang, Julian Cheng, Victor C. M. Leung
Non-orthogonal multiple access (NOMA) is considered as a promising technology for the fifth generation mobile communications. Energy-efficient resource allocation scheme is studied for a downlink NOMA wireless network, where multiple users can be multiplexed on the same subchannel by applying successive interference cancellation technique at the receivers. Most previous works focus on resource allocation for sum rate maximization with perfect channel state information (CSI) in NOMA systems. We formulate the energy-efficient resource allocation as a probabilistic mixed non-convex optimization problem by considering imperfect CSI. To solve this problem, we decouple it into user scheduling and power allocation sub-problems. We propose a low-complexity suboptimal user scheduling algorithm and a power allocation scheme to maximize the system energy efficiency under the maximum transmitted power limit, imperfect CSI and the outage probability constraints. Simulation results are provided to show that the proposed algorithms yield much improved energy efficiency performance over the conventional orthogonal frequency division multiple access scheme.
非正交多址(NOMA)被认为是第五代移动通信的一种很有前途的技术。研究了一种下行NOMA无线网络的节能资源分配方案,该网络在接收端采用逐次干扰消除技术,可实现多用户在同一子信道上复用。以往的研究大多集中在基于完美信道状态信息(CSI)的NOMA系统中,为使总速率最大化而进行的资源分配。在考虑不完全CSI的情况下,将节能资源分配问题表述为一个概率混合非凸优化问题。为了解决这一问题,我们将其解耦为用户调度和功率分配子问题。在最大传输功率限制、不完全CSI和停电概率约束下,提出了一种低复杂度的次优用户调度算法和一种最大系统能效的功率分配方案。仿真结果表明,与传统的正交频分多址方案相比,所提算法的能效性能有很大提高。
{"title":"Energy-efficient resource scheduling for NOMA systems with imperfect channel state information","authors":"Fang Fang, Haijun Zhang, Julian Cheng, Victor C. M. Leung","doi":"10.1109/ICC.2017.7996360","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996360","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is considered as a promising technology for the fifth generation mobile communications. Energy-efficient resource allocation scheme is studied for a downlink NOMA wireless network, where multiple users can be multiplexed on the same subchannel by applying successive interference cancellation technique at the receivers. Most previous works focus on resource allocation for sum rate maximization with perfect channel state information (CSI) in NOMA systems. We formulate the energy-efficient resource allocation as a probabilistic mixed non-convex optimization problem by considering imperfect CSI. To solve this problem, we decouple it into user scheduling and power allocation sub-problems. We propose a low-complexity suboptimal user scheduling algorithm and a power allocation scheme to maximize the system energy efficiency under the maximum transmitted power limit, imperfect CSI and the outage probability constraints. Simulation results are provided to show that the proposed algorithms yield much improved energy efficiency performance over the conventional orthogonal frequency division multiple access scheme.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"40 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86784415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Coexistence of DSRC and Wi-Fi: Impact on the performance of vehicular safety applications DSRC和Wi-Fi共存:对车辆安全应用性能的影响
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996758
Jinshan Liu, Gaurang Naik, J. Park
To adequately support high-throughput applications in next-generation WLANs, more spectrum will be needed to accommodate wider channels. To address this issue, spectrum regulators and stakeholders from the wireless industry and the intelligent transportation system communities are exploring possible band sharing approaches in the 5.9 GHz band. Such approaches include techniques that enable the harmonious coexistence of Dedicated Short Range Communications (DSRC) networks and IEEE 802.11ac networks. In this paper, we provide in-depth discussions on how the coexistence of DSRC and 802.11ac impacts the performance of DSRC applications, with a particular focus on vehicular safety applications. We propose an analytical model that provides valuable insights on DSRC network performance and its vulnerability to interference induced by other DSRC nodes as well as 802.11ac nodes. Using the analytical results derived from the model and extensive simulation results, we also propose a methodology for adjusting 802.11ac parameters that enables a DSRC network to meet the performance requirements of safety applications. Using simulations, we also analyze the throughput of the coexisting 802.11ac network.
为了充分支持下一代无线局域网的高吞吐量应用,将需要更多的频谱来适应更宽的信道。为了解决这个问题,频谱监管机构和无线行业的利益相关者以及智能交通系统社区正在探索5.9 GHz频段的可能的频段共享方法。这些方法包括使专用短距离通信(DSRC)网络和IEEE 802.11ac网络和谐共存的技术。在本文中,我们深入讨论了DSRC和802.11ac共存如何影响DSRC应用的性能,并特别关注车辆安全应用。我们提出了一个分析模型,为DSRC网络性能及其受其他DSRC节点和802.11ac节点干扰的脆弱性提供了有价值的见解。利用模型的分析结果和广泛的仿真结果,我们还提出了一种调整802.11ac参数的方法,使DSRC网络能够满足安全应用的性能要求。通过仿真,我们还分析了共存的802.11ac网络的吞吐量。
{"title":"Coexistence of DSRC and Wi-Fi: Impact on the performance of vehicular safety applications","authors":"Jinshan Liu, Gaurang Naik, J. Park","doi":"10.1109/ICC.2017.7996758","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996758","url":null,"abstract":"To adequately support high-throughput applications in next-generation WLANs, more spectrum will be needed to accommodate wider channels. To address this issue, spectrum regulators and stakeholders from the wireless industry and the intelligent transportation system communities are exploring possible band sharing approaches in the 5.9 GHz band. Such approaches include techniques that enable the harmonious coexistence of Dedicated Short Range Communications (DSRC) networks and IEEE 802.11ac networks. In this paper, we provide in-depth discussions on how the coexistence of DSRC and 802.11ac impacts the performance of DSRC applications, with a particular focus on vehicular safety applications. We propose an analytical model that provides valuable insights on DSRC network performance and its vulnerability to interference induced by other DSRC nodes as well as 802.11ac nodes. Using the analytical results derived from the model and extensive simulation results, we also propose a methodology for adjusting 802.11ac parameters that enables a DSRC network to meet the performance requirements of safety applications. Using simulations, we also analyze the throughput of the coexisting 802.11ac network.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"21 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89339910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Cooperative multiuser modulation classification in multipath channels via expectation-maximization 基于期望最大化的多径信道合作多用户调制分类
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996783
Jingwen Zhang, Fanggang Wang, Z. Zhong, D. Cabric
With the advent of cognitive radio (CR) and dynamic spectrum access techniques, where multiple signals may coexist within the same frequency band, multiuser modulation classification problem becomes a vital issue, which has not been sufficiently investigated. In this paper, we consider a cooperative multiuser modulation classification problem, in the presence of unknown multipath channels. A likelihood-based (LB) classifier using the expectation-maximization (EM) algorithm is proposed, which enables to find the maximum likelihood estimates (MLEs) iteratively. Numerical results show that the proposed algorithm achieves significant improvement on the classification performance with a small number of samples when compared to the conventional methods, which demonstrates its reliability and efficiency of identifying modulations of multiple users under the multipath scenarios.
随着认知无线电(CR)和动态频谱接入技术的出现,多个信号可能在同一频段内共存,多用户调制分类问题成为一个重要问题,但目前对该问题的研究还不够充分。本文研究了存在未知多径信道的协作多用户调制分类问题。提出了一种基于期望最大化算法的基于似然的分类器,该分类器能够迭代地找到最大似然估计。数值结果表明,与传统方法相比,该算法在少量样本下的分类性能有了显著提高,证明了该算法在多径场景下识别多用户调制的可靠性和效率。
{"title":"Cooperative multiuser modulation classification in multipath channels via expectation-maximization","authors":"Jingwen Zhang, Fanggang Wang, Z. Zhong, D. Cabric","doi":"10.1109/ICC.2017.7996783","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996783","url":null,"abstract":"With the advent of cognitive radio (CR) and dynamic spectrum access techniques, where multiple signals may coexist within the same frequency band, multiuser modulation classification problem becomes a vital issue, which has not been sufficiently investigated. In this paper, we consider a cooperative multiuser modulation classification problem, in the presence of unknown multipath channels. A likelihood-based (LB) classifier using the expectation-maximization (EM) algorithm is proposed, which enables to find the maximum likelihood estimates (MLEs) iteratively. Numerical results show that the proposed algorithm achieves significant improvement on the classification performance with a small number of samples when compared to the conventional methods, which demonstrates its reliability and efficiency of identifying modulations of multiple users under the multipath scenarios.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85251578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secret key generation in Rayleigh block fading AWGN channels under jamming attacks 干扰条件下瑞利块衰落AWGN信道密钥生成研究
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996660
A. Chorti, E. Belmega
Jamming attacks have been shown to disrupt secret key generation (SKG) in systems that exploit the reciprocity of the wireless medium to generate symmetric keys at two remote locations through public discussion. In this study, the use of frequency hopping/spreading in Rayleigh block fading additive white Gaussian noise (BF-AWGN) channels is investigated as a means to counteract such attacks. The competitive interaction between a pair of legitimate users and a jammer is formulated as a zero-sum game and the corresponding Nash equilibria (NE) are characterized analytically and in closed form. It is found that the jammer's optimal strategy is to spread its power across the entire spectrum. On the contrary, the pair of legitimate users should use frequency spreading only in favorable transmission conditions, and frequency hopping otherwise (e.g., low signal to jamming power ratio). Numerical results show that frequency hopping/spreading in BF-AWGN channels is an effective technique for combating jamming attacks in SKG systems; a modest increase of the system bandwidth can substantially increase the SKG rates.
干扰攻击已被证明会破坏系统中的密钥生成(SKG),该系统利用无线介质的互易性,通过公开讨论在两个远程位置生成对称密钥。在本研究中,研究了在瑞利块衰落加性高斯白噪声(BF-AWGN)信道中使用跳频/扩频作为对抗这种攻击的手段。一对合法用户和干扰者之间的竞争互动被表述为零和游戏,相应的纳什均衡(NE)被分析并以封闭形式表征。研究发现,干扰者的最佳策略是在整个频谱上分散其功率。相反,合法用户对只有在有利的传输条件下才应使用扩频,否则应使用跳频(如低信噪比)。数值结果表明,在BF-AWGN信道中,跳频/扩频是对抗SKG系统干扰攻击的有效技术;适度增加系统带宽可以大大提高SKG速率。
{"title":"Secret key generation in Rayleigh block fading AWGN channels under jamming attacks","authors":"A. Chorti, E. Belmega","doi":"10.1109/ICC.2017.7996660","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996660","url":null,"abstract":"Jamming attacks have been shown to disrupt secret key generation (SKG) in systems that exploit the reciprocity of the wireless medium to generate symmetric keys at two remote locations through public discussion. In this study, the use of frequency hopping/spreading in Rayleigh block fading additive white Gaussian noise (BF-AWGN) channels is investigated as a means to counteract such attacks. The competitive interaction between a pair of legitimate users and a jammer is formulated as a zero-sum game and the corresponding Nash equilibria (NE) are characterized analytically and in closed form. It is found that the jammer's optimal strategy is to spread its power across the entire spectrum. On the contrary, the pair of legitimate users should use frequency spreading only in favorable transmission conditions, and frequency hopping otherwise (e.g., low signal to jamming power ratio). Numerical results show that frequency hopping/spreading in BF-AWGN channels is an effective technique for combating jamming attacks in SKG systems; a modest increase of the system bandwidth can substantially increase the SKG rates.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85328076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Throughput vs. latency: QoS-centric resource allocation for multi-user millimeter wave systems 吞吐量与延迟:多用户毫米波系统的以qos为中心的资源分配
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996394
Miltiades Filippou, Danilo De Donno, Camila Priale, J. Palacios, D. Giustiniano, J. Widmer
Millimeter wave (mm-wave) communication is a topic of intensive recent study, as it allows to significantly boost data rates of future 5G networks. In this paper, we focus on a mm-wave system consisting of a single Access Point (AP) and two User Equipments (UEs), where one UE requires high throughput, while the other is characterized by a low latency demand. Given that setup, we aim at optimally allocating the available AP hardware resources for the beam training phase and data communication, in order to efficiently serve both UEs via hybrid analog-digital beamforming. We evaluate an optimization framework with the objective to maximize the expected rate of one UE, for a given latency constraint set by the other UE. The optimal data rates are illustrated for different latency constraints and for different strategies of exploiting the full RF chain set at the AP side. We observe that our proposed access schemes outperform the basic TDMA approach by up to 22 %.
毫米波通信是最近深入研究的主题,因为它可以显着提高未来5G网络的数据速率。在本文中,我们重点研究了一个由单个接入点(AP)和两个用户设备(UE)组成的毫米波系统,其中一个UE要求高吞吐量,而另一个则要求低延迟。鉴于这种设置,我们的目标是优化分配可用的AP硬件资源,用于波束训练阶段和数据通信,以便通过混合模拟-数字波束形成有效地服务于两个ue。对于另一个UE设置的给定延迟约束,我们评估了一个优化框架,其目标是最大化一个UE的期望速率。对于不同的延迟约束和利用AP侧完整RF链集的不同策略,说明了最佳数据速率。我们观察到,我们提出的接入方案比基本TDMA方法的性能高出22%。
{"title":"Throughput vs. latency: QoS-centric resource allocation for multi-user millimeter wave systems","authors":"Miltiades Filippou, Danilo De Donno, Camila Priale, J. Palacios, D. Giustiniano, J. Widmer","doi":"10.1109/ICC.2017.7996394","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996394","url":null,"abstract":"Millimeter wave (mm-wave) communication is a topic of intensive recent study, as it allows to significantly boost data rates of future 5G networks. In this paper, we focus on a mm-wave system consisting of a single Access Point (AP) and two User Equipments (UEs), where one UE requires high throughput, while the other is characterized by a low latency demand. Given that setup, we aim at optimally allocating the available AP hardware resources for the beam training phase and data communication, in order to efficiently serve both UEs via hybrid analog-digital beamforming. We evaluate an optimization framework with the objective to maximize the expected rate of one UE, for a given latency constraint set by the other UE. The optimal data rates are illustrated for different latency constraints and for different strategies of exploiting the full RF chain set at the AP side. We observe that our proposed access schemes outperform the basic TDMA approach by up to 22 %.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"223 1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76670871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Delay-aware massive random access for machine-type communications via hierarchical stochastic learning 基于分层随机学习的机器通信延迟感知海量随机访问
Pub Date : 2017-05-21 DOI: 10.1109/ICC.2017.7996795
Yannan Ruan, Wei Wang, Zhaoyang Zhang, V. Lau
In this paper, we study the delay-aware access control of massive random access for machine-type communications (MTC). We model this stochastic optimization problem as an infinite horizon average cost Markov decision process. To deal with the distributive requirement and the exponential computational complexity, we first exploit the property of successful access probability to transform the coupling to the constraint on the number of MTC devices attempting to access. As a result, we decompose the Bellman equation into multiple fixed point equations for each MTC device by primal-dual decomposition. Based on the equivalent per-MTC fixed point equations, we propose the online hierarchical stochastic learning algorithm to estimate the local Q-factors and determine the access decision at the MTC devices separately with the assistance of the base station which broadcasts common control information only. Finally, the simulation result shows that the proposed hierarchical stochastic learning algorithm has significant performance gain over the baseline algorithm.
本文研究了面向机器型通信(MTC)的海量随机访问的延迟感知访问控制。我们将这个随机优化问题建模为一个无限视界平均成本马尔可夫决策过程。为了处理分布要求和指数级的计算复杂度,我们首先利用成功访问概率的性质将耦合转换为试图访问MTC设备数量的约束。因此,我们将Bellman方程分解为每个MTC设备的多个不动点方程。基于等效的每MTC不动点方程,我们提出了在线分层随机学习算法,在仅广播公共控制信息的基站的帮助下,分别估计局部q因子和确定MTC设备的访问决策。最后,仿真结果表明,所提出的分层随机学习算法比基线算法有显著的性能提升。
{"title":"Delay-aware massive random access for machine-type communications via hierarchical stochastic learning","authors":"Yannan Ruan, Wei Wang, Zhaoyang Zhang, V. Lau","doi":"10.1109/ICC.2017.7996795","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996795","url":null,"abstract":"In this paper, we study the delay-aware access control of massive random access for machine-type communications (MTC). We model this stochastic optimization problem as an infinite horizon average cost Markov decision process. To deal with the distributive requirement and the exponential computational complexity, we first exploit the property of successful access probability to transform the coupling to the constraint on the number of MTC devices attempting to access. As a result, we decompose the Bellman equation into multiple fixed point equations for each MTC device by primal-dual decomposition. Based on the equivalent per-MTC fixed point equations, we propose the online hierarchical stochastic learning algorithm to estimate the local Q-factors and determine the access decision at the MTC devices separately with the assistance of the base station which broadcasts common control information only. Finally, the simulation result shows that the proposed hierarchical stochastic learning algorithm has significant performance gain over the baseline algorithm.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73093196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2017 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1