Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9334028
N. Saqib, K. Cheon, Seungkeun Park, Sang-Woon Jeon
We consider a single-cell network in which a base station (BS) serves a set of users. We assume 2D planar antenna systems at the BS in which the BS applies 3D hybrid beamforming to serve a set of scheduled users. Unlike the previous 3D hybrid beamforming, we consider a joint optimization of elevation beamforming and user scheduling to maximize the overall throughput. Extensive numerical evaluation is performed to demonstrate the performance of the proposed scheme. Specifically, simulations have been carried out by utilizing 3D channel models based on ray-tracing methodologies as describes by the 3rd generation project partnership (3GPP) TR36.873 document. Simulation results show that the proposed scheme provides an improved throughput compared to the conventional elevation beamforming schemes.
{"title":"Joint Optimization of 3D Hybrid Beamforming and User Scheduling for 2D Planar Antenna Systems","authors":"N. Saqib, K. Cheon, Seungkeun Park, Sang-Woon Jeon","doi":"10.1109/ICOIN50884.2021.9334028","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334028","url":null,"abstract":"We consider a single-cell network in which a base station (BS) serves a set of users. We assume 2D planar antenna systems at the BS in which the BS applies 3D hybrid beamforming to serve a set of scheduled users. Unlike the previous 3D hybrid beamforming, we consider a joint optimization of elevation beamforming and user scheduling to maximize the overall throughput. Extensive numerical evaluation is performed to demonstrate the performance of the proposed scheme. Specifically, simulations have been carried out by utilizing 3D channel models based on ray-tracing methodologies as describes by the 3rd generation project partnership (3GPP) TR36.873 document. Simulation results show that the proposed scheme provides an improved throughput compared to the conventional elevation beamforming schemes.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"156 1","pages":"703-707"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82912232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9333995
Rojeena Bajracharya, Haejoon Jung
Ultra dense heterogeneous network of new radio in unlicensed band (NR-U) is a key technology for potentially accomplishing the capacity and seamless connection goal of next-generation wireless communication systems in Industry 4.0 network. Such deployment results in the cell proliferation with diverse cell size in overlapping condition, which leverage various channel connectivity option for the NR-U user. Nevertheless, coexistence of several other NR-U and/or legacy unlicensed band users in the common channel is a major technical challenge to be resolved, which severely degrades the user’s quality of service (QoS). Hence, this paper is based on the channel selection functionality for mobile NR-U users to select the best channel to use for uplink transmission in the unlicensed band. We model this problem using contextual bandits as the set of context information is provided to the user. We use Thompson’s sampling algorithm to solve the problem. The simulation result has been presented to show the effect of noise on the performance of our proposed approach.
{"title":"Contextual Bandits Approach for Selecting the Best Channel in Industry 4.0 Network","authors":"Rojeena Bajracharya, Haejoon Jung","doi":"10.1109/ICOIN50884.2021.9333995","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333995","url":null,"abstract":"Ultra dense heterogeneous network of new radio in unlicensed band (NR-U) is a key technology for potentially accomplishing the capacity and seamless connection goal of next-generation wireless communication systems in Industry 4.0 network. Such deployment results in the cell proliferation with diverse cell size in overlapping condition, which leverage various channel connectivity option for the NR-U user. Nevertheless, coexistence of several other NR-U and/or legacy unlicensed band users in the common channel is a major technical challenge to be resolved, which severely degrades the user’s quality of service (QoS). Hence, this paper is based on the channel selection functionality for mobile NR-U users to select the best channel to use for uplink transmission in the unlicensed band. We model this problem using contextual bandits as the set of context information is provided to the user. We use Thompson’s sampling algorithm to solve the problem. The simulation result has been presented to show the effect of noise on the performance of our proposed approach.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"13 1","pages":"13-16"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86636116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increasing number of malicious software spread through the Internet has become a serious threat. Malware authors use obfuscation and deformation techniques to generate new types of malware to evade the detection of traditional detection methods so that it is widely expected for machine learning methods that classify malware and cleanware based on the characteristics of the samples. The current research trend is to use machine learning technology, especially decision tree technology, to identify new malicious software quickly and accurately. The purpose of this paper is to investigate malware classification accuracy based on the latest decision tree-based algorithms with a custom log loss function. Therefore, we use the FFRI Dataset 2019 to construct baseline malware detection models from surface analysis logs and PE header dumps. Then, we customize a classification log loss function, makes an 82% reduction of false positives with sacrificing twice false negatives. To keep malware detection covering and quick countermeasure to true positive results, we propose a hybrid usage of normal log loss function model and custom log loss function model to give additional priority to positive results.
{"title":"Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function","authors":"Yun Gao, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada","doi":"10.1109/ICOIN50884.2021.9333999","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333999","url":null,"abstract":"The increasing number of malicious software spread through the Internet has become a serious threat. Malware authors use obfuscation and deformation techniques to generate new types of malware to evade the detection of traditional detection methods so that it is widely expected for machine learning methods that classify malware and cleanware based on the characteristics of the samples. The current research trend is to use machine learning technology, especially decision tree technology, to identify new malicious software quickly and accurately. The purpose of this paper is to investigate malware classification accuracy based on the latest decision tree-based algorithms with a custom log loss function. Therefore, we use the FFRI Dataset 2019 to construct baseline malware detection models from surface analysis logs and PE header dumps. Then, we customize a classification log loss function, makes an 82% reduction of false positives with sacrificing twice false negatives. To keep malware detection covering and quick countermeasure to true positive results, we propose a hybrid usage of normal log loss function model and custom log loss function model to give additional priority to positive results.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"98 1","pages":"273-278"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89110470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9333951
Taeyoon Kim, Jun-Woo Cho, Jae-Hyun Kim
One of the most important things in the unmanned aerial systems (UAS) operation using drones is wireless communication. Ground control station (GCS), which is part of UAS, periodically receives a drone status or transmits the mission to a drone via a stable wireless communication system. For the connection between the GCS and the drone, wireless local access networks (WLANs) are commonly used based on Wi-Fi. However, since Wi-Fi uses the industrial-science-medical (ISM) band, WiFi-based UAS results in performance degradation due to signal interference. In this paper, we first analyze the performance of the IEEE 802.11 protocols such as 802.11 b/g/n for the wireless communication of UAS. Using the UAS model, we measure the video transmission time and the round trip time (RTT) using SockPerf to compare each 802.11 protocol’s performance. Besides, we analyze the effect of signal interference by changing the frequency band.
{"title":"Performance Evaluation of Wireless LAN for UAS Communication","authors":"Taeyoon Kim, Jun-Woo Cho, Jae-Hyun Kim","doi":"10.1109/ICOIN50884.2021.9333951","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333951","url":null,"abstract":"One of the most important things in the unmanned aerial systems (UAS) operation using drones is wireless communication. Ground control station (GCS), which is part of UAS, periodically receives a drone status or transmits the mission to a drone via a stable wireless communication system. For the connection between the GCS and the drone, wireless local access networks (WLANs) are commonly used based on Wi-Fi. However, since Wi-Fi uses the industrial-science-medical (ISM) band, WiFi-based UAS results in performance degradation due to signal interference. In this paper, we first analyze the performance of the IEEE 802.11 protocols such as 802.11 b/g/n for the wireless communication of UAS. Using the UAS model, we measure the video transmission time and the round trip time (RTT) using SockPerf to compare each 802.11 protocol’s performance. Besides, we analyze the effect of signal interference by changing the frequency band.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"2 4","pages":"742-744"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91442635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9334023
Ho-Ik Choi, Jongwun Seul, Hyun-Chool Shin
Frequency modulated continuous wave (FMCW) radar, which can obtain the range and displacement of the target, is used for the non-contact vital monitoring. To extract vital information using the FMCW radar, it is necessary to select the range bin. This paper proposes a novel method of selecting the range bin for the extraction of vital information. We mathematically and experimentally verified that the vital displacement is reflected in the both magnitude and phase of the range profile. We devised the magnitude-phase coherency (MPC) index and selected the range bin with vital information based on the MPC index. In experimental results, We examined the accuracy of the vital rates extracted from the range bin selected by the proposed range selection method.
{"title":"Vital information extraction using FMCW radar","authors":"Ho-Ik Choi, Jongwun Seul, Hyun-Chool Shin","doi":"10.1109/ICOIN50884.2021.9334023","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334023","url":null,"abstract":"Frequency modulated continuous wave (FMCW) radar, which can obtain the range and displacement of the target, is used for the non-contact vital monitoring. To extract vital information using the FMCW radar, it is necessary to select the range bin. This paper proposes a novel method of selecting the range bin for the extraction of vital information. We mathematically and experimentally verified that the vital displacement is reflected in the both magnitude and phase of the range profile. We devised the magnitude-phase coherency (MPC) index and selected the range bin with vital information based on the MPC index. In experimental results, We examined the accuracy of the vital rates extracted from the range bin selected by the proposed range selection method.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"106 1","pages":"636-639"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80777966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9333972
Chit Wutyee Zaw, C. Hong
Federated learning (FL) encourages users to train statistical models on their local devices. Since mobile devices have the limited power and computing capabilities, the users are rational in minimizing their energy consumption with the cost of the model’s accuracy. Multi-access Edge Computing (MEC) enabled FL is a prominent approach where users can offload a fraction of their dataset to the MEC server where the training of the statistical model is performed with the help of the powerful MEC server in parallel with the local training at the mobile users. With the size of dataset offloaded to the MEC server, both the performance of the model and the energy consumption of the system are varied. We analyze this tradeoff between the performance of the system and the energy consumption at the MEC server and mobile users. The time consumption can also be saved by managing the size of the dataset offloaded to the MEC server. Since the MEC server and mobile users have the conflicting interest in saving the energy consumption with the constraint on the time taken for one computing round where the performance of the model fluctuates across the size of offloaded dataset, we analyze the tradeoff by formulating the resource management problem as a penalized convex optimization problem. We propose a distributed resource management problem for MEC enabled FL system where the global model is responsible for radio resource management and each local model performs a dataset offloading decision. Then, we perform the simulation to show the tradeoff and performance of the proposed algorithm.
{"title":"Loss and Energy Tradeoff in Multi-access Edge Computing Enabled Federated Learning","authors":"Chit Wutyee Zaw, C. Hong","doi":"10.1109/ICOIN50884.2021.9333972","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333972","url":null,"abstract":"Federated learning (FL) encourages users to train statistical models on their local devices. Since mobile devices have the limited power and computing capabilities, the users are rational in minimizing their energy consumption with the cost of the model’s accuracy. Multi-access Edge Computing (MEC) enabled FL is a prominent approach where users can offload a fraction of their dataset to the MEC server where the training of the statistical model is performed with the help of the powerful MEC server in parallel with the local training at the mobile users. With the size of dataset offloaded to the MEC server, both the performance of the model and the energy consumption of the system are varied. We analyze this tradeoff between the performance of the system and the energy consumption at the MEC server and mobile users. The time consumption can also be saved by managing the size of the dataset offloaded to the MEC server. Since the MEC server and mobile users have the conflicting interest in saving the energy consumption with the constraint on the time taken for one computing round where the performance of the model fluctuates across the size of offloaded dataset, we analyze the tradeoff by formulating the resource management problem as a penalized convex optimization problem. We propose a distributed resource management problem for MEC enabled FL system where the global model is responsible for radio resource management and each local model performs a dataset offloading decision. Then, we perform the simulation to show the tradeoff and performance of the proposed algorithm.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"42 1","pages":"597-602"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80810823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9333916
Eun-Jin Choi, K. Kim, Tae-Jin Lee
In a wireless network consisting of Internet of Things (IoT) devices, they can harvest energy from radio frequency (RF) signals transmitted by Power Beacons (PBs) and consume energy by transmitting data to the Access Point (AP). As the number of devices increases in a network, an efficient Medium Access Control (MAC) protocol is required to enable devices to transmit data in an energy-efficient manner. In this paper, we propose an energy-efficient MAC protocol that operates with devices and backscatter tags that transmit data by reflecting the RF signal. In the proposed network, the AP manages the operation time of PBs after receiving data from devices according to the average amount of remaining energy. The proposed protocol can improve the network throughput and the energy efficiency of devices.
{"title":"Devices and Backscatter Tag MAC Protocol for an Integrated Wireless Network","authors":"Eun-Jin Choi, K. Kim, Tae-Jin Lee","doi":"10.1109/ICOIN50884.2021.9333916","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333916","url":null,"abstract":"In a wireless network consisting of Internet of Things (IoT) devices, they can harvest energy from radio frequency (RF) signals transmitted by Power Beacons (PBs) and consume energy by transmitting data to the Access Point (AP). As the number of devices increases in a network, an efficient Medium Access Control (MAC) protocol is required to enable devices to transmit data in an energy-efficient manner. In this paper, we propose an energy-efficient MAC protocol that operates with devices and backscatter tags that transmit data by reflecting the RF signal. In the proposed network, the AP manages the operation time of PBs after receiving data from devices according to the average amount of remaining energy. The proposed protocol can improve the network throughput and the energy efficiency of devices.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"209-212"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86657453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9333971
Shota Nishiura, Hiroshi Yamamoto
In recent years, in order to improve crop production and quality of agricultural operations, an “agricultural remote monitoring system” have been attracting a lot of attention. The existing studies have proposed an agricultural remote monitoring systems using Wireless Sensor Network (WSN). In the existing system, the environmental information is collected from a large number of sensor nodes installed in the farm using a low-power wireless communications (e.g., ZigBee, LPWA). However, in these systems, even when the low-power wireless technology is utilized, it is difficult to run permanently on batteries because the battery capacity is not infinity. In addition, in the case of a large-scale field, a large number of intermediate nodes should be installed in the field, hence the installation and operation costs are high.On the other hand, a wireless power transfer technology is evolving and equipment which is capable of supplying power to places dozens of centimeters away has been available. In addition, Unmanned Aerial Vehicles (UAV) that can fly stably for a long time and has a large loading capacity has appeared.Therefore, in this study, we propose and develop a wide-area sensing system for large-scale farms using a UAV, a wireless power transfer technology, and an energy-saving short-range wireless communication system (i.e., Bluetooth Low Energy (BLE)). The UAV flies autonomously to the location of sensor nodes that are widely installed in the large farm for collecting the sensor data. Here, the UAV is designed to supply the power to the sensor node to measure and send the environmental information using the wireless power transfer technology. It eliminates the need for periodic battery replacement of the sensor node, which reduces the cost of operating the system.Through the experimental evaluation using the developed system, it has been confirmed that the UAV can accurately be controlled by the proposed feedback control to land near the sensor nodes, and that the sensor nodes can be operated by the wireless power transfer from the embedded system of the UAV.
{"title":"Large-term sensing system for agriculture utilizing UAV and wireless power transfer","authors":"Shota Nishiura, Hiroshi Yamamoto","doi":"10.1109/ICOIN50884.2021.9333971","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333971","url":null,"abstract":"In recent years, in order to improve crop production and quality of agricultural operations, an “agricultural remote monitoring system” have been attracting a lot of attention. The existing studies have proposed an agricultural remote monitoring systems using Wireless Sensor Network (WSN). In the existing system, the environmental information is collected from a large number of sensor nodes installed in the farm using a low-power wireless communications (e.g., ZigBee, LPWA). However, in these systems, even when the low-power wireless technology is utilized, it is difficult to run permanently on batteries because the battery capacity is not infinity. In addition, in the case of a large-scale field, a large number of intermediate nodes should be installed in the field, hence the installation and operation costs are high.On the other hand, a wireless power transfer technology is evolving and equipment which is capable of supplying power to places dozens of centimeters away has been available. In addition, Unmanned Aerial Vehicles (UAV) that can fly stably for a long time and has a large loading capacity has appeared.Therefore, in this study, we propose and develop a wide-area sensing system for large-scale farms using a UAV, a wireless power transfer technology, and an energy-saving short-range wireless communication system (i.e., Bluetooth Low Energy (BLE)). The UAV flies autonomously to the location of sensor nodes that are widely installed in the large farm for collecting the sensor data. Here, the UAV is designed to supply the power to the sensor node to measure and send the environmental information using the wireless power transfer technology. It eliminates the need for periodic battery replacement of the sensor node, which reduces the cost of operating the system.Through the experimental evaluation using the developed system, it has been confirmed that the UAV can accurately be controlled by the proposed feedback control to land near the sensor nodes, and that the sensor nodes can be operated by the wireless power transfer from the embedded system of the UAV.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"609-614"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89659348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9333901
L. Mutalemwa, Seokjoo Shin
It is important to ensure source location privacy (SLP) protection in safety-critical monitoring applications. Also, to achieve effective long-term monitoring, it is essential to design SLP protocols with high energy efficiency and energy balancing. Therefore, this study proposes a new phantom with angle (PwA) protocol. The PwA protocol employs dynamic routing paths which are designed to achieve SLP protection with energy efficiency and energy balancing. Analysis results reveal that the PwA protocol exhibits superior performance features to outperform existing protocols by achieving high levels of SLP protection for prolonged time periods. The results confirm that the PwA protocol is practical in long-term monitoring systems.
{"title":"Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks","authors":"L. Mutalemwa, Seokjoo Shin","doi":"10.1109/ICOIN50884.2021.9333901","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333901","url":null,"abstract":"It is important to ensure source location privacy (SLP) protection in safety-critical monitoring applications. Also, to achieve effective long-term monitoring, it is essential to design SLP protocols with high energy efficiency and energy balancing. Therefore, this study proposes a new phantom with angle (PwA) protocol. The PwA protocol employs dynamic routing paths which are designed to achieve SLP protection with energy efficiency and energy balancing. Analysis results reveal that the PwA protocol exhibits superior performance features to outperform existing protocols by achieving high levels of SLP protection for prolonged time periods. The results confirm that the PwA protocol is practical in long-term monitoring systems.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"42 1","pages":"792-797"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90311842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-13DOI: 10.1109/ICOIN50884.2021.9333942
Joe Diether Cabelin, P. V. Alpaño, J. Pedrasa
Vehicular Ad-Hoc Network (VANET) is a subcategory of Intelligent Transportation Systems (ITS) that allows vehicles to communicate with other vehicles and static roadside infrastructure. However, the integration of cyber and physical systems introduce many possible points of attack that make VANET vulnerable to cyber attacks. In this paper, we implemented a machine learning-based intrusion detection system that identifies False Data Injection (FDI) attacks on a vehicular network. A co-simulation framework between MATLAB and NS-3 is used to simulate the system. The intrusion detection system is installed in every vehicle and processes the information obtained from the packets sent by other vehicles. The packet is classified into either trusted or malicious using Support Vector Machines (SVM). The comparison of the performance of the system is evaluated in different scenarios using the following metrics: classification rate, attack detection rate, false positive rate, and detection speed. Simulation results show that the SVM-based IDS is able to provide high accuracy detection, low false positive rate, consequently improving the traffic congestion in the simulated highway.
{"title":"SVM-based Detection of False Data Injection in Intelligent Transportation System","authors":"Joe Diether Cabelin, P. V. Alpaño, J. Pedrasa","doi":"10.1109/ICOIN50884.2021.9333942","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333942","url":null,"abstract":"Vehicular Ad-Hoc Network (VANET) is a subcategory of Intelligent Transportation Systems (ITS) that allows vehicles to communicate with other vehicles and static roadside infrastructure. However, the integration of cyber and physical systems introduce many possible points of attack that make VANET vulnerable to cyber attacks. In this paper, we implemented a machine learning-based intrusion detection system that identifies False Data Injection (FDI) attacks on a vehicular network. A co-simulation framework between MATLAB and NS-3 is used to simulate the system. The intrusion detection system is installed in every vehicle and processes the information obtained from the packets sent by other vehicles. The packet is classified into either trusted or malicious using Support Vector Machines (SVM). The comparison of the performance of the system is evaluated in different scenarios using the following metrics: classification rate, attack detection rate, false positive rate, and detection speed. Simulation results show that the SVM-based IDS is able to provide high accuracy detection, low false positive rate, consequently improving the traffic congestion in the simulated highway.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"101 1","pages":"279-284"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73259467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}