首页 > 最新文献

2021 International Conference on Information Networking (ICOIN)最新文献

英文 中文
Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events 基于非缓存硬件事件的缓存侧信道攻击实时检测
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333883
Hodong Kim, Changhee Hahn, Junbeom Hur
Cache side-channel attack is a class of attacks to retrieve sensitive information from a system by exploiting shared resource in CPUs. As the attacks are delivered to wide range of environments from mobile systems to cloud recently, many detection strategies have been proposed. Since the conventional cache side-channel are likely to incur tremendous number of cache events, most of the previous detection mechanisms were designed to carefully monitor cache events. However, recently proposed attacks tend to incur less cache events during the attack. PRIME+ABORT attack, for example, leverages the Intel TSX instead of accessing cache to measure access time. Because of the characteristic, cache event based detection mechanisms may hardly distinguish the attack. In this paper, we conduct an in-depth analysis of the PRIME+ABORT attack to identify the other useful hardware events for detection rather than cache events. Based on our finding, we present a novel mechanism called PRIME+ABORT Detector to detect the PRIME+ABORT attack and demonstrate that the detection mechanism can achieve 99.5% success rates with 0.3% performance overhead.
缓存侧通道攻击是一种利用cpu共享资源从系统中获取敏感信息的攻击。近年来,随着网络攻击的传播范围越来越广,从移动系统到云计算,人们提出了许多检测策略。由于传统的缓存侧通道可能会产生大量的缓存事件,因此大多数以前的检测机制都被设计为仔细监视缓存事件。然而,最近提出的攻击倾向于在攻击期间引发较少的缓存事件。例如,PRIME+ABORT攻击利用英特尔TSX而不是访问缓存来测量访问时间。由于缓存事件的特性,基于缓存事件的检测机制很难区分攻击。在本文中,我们对PRIME+ABORT攻击进行了深入分析,以确定用于检测的其他有用硬件事件,而不是缓存事件。基于我们的发现,我们提出了一种名为PRIME+ABORT检测器的新机制来检测PRIME+ABORT攻击,并证明该检测机制可以在0.3%的性能开销下实现99.5%的成功率。
{"title":"Real-time Detection of Cache Side-channel Attack Using Non-cache Hardware Events","authors":"Hodong Kim, Changhee Hahn, Junbeom Hur","doi":"10.1109/ICOIN50884.2021.9333883","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333883","url":null,"abstract":"Cache side-channel attack is a class of attacks to retrieve sensitive information from a system by exploiting shared resource in CPUs. As the attacks are delivered to wide range of environments from mobile systems to cloud recently, many detection strategies have been proposed. Since the conventional cache side-channel are likely to incur tremendous number of cache events, most of the previous detection mechanisms were designed to carefully monitor cache events. However, recently proposed attacks tend to incur less cache events during the attack. PRIME+ABORT attack, for example, leverages the Intel TSX instead of accessing cache to measure access time. Because of the characteristic, cache event based detection mechanisms may hardly distinguish the attack. In this paper, we conduct an in-depth analysis of the PRIME+ABORT attack to identify the other useful hardware events for detection rather than cache events. Based on our finding, we present a novel mechanism called PRIME+ABORT Detector to detect the PRIME+ABORT attack and demonstrate that the detection mechanism can achieve 99.5% success rates with 0.3% performance overhead.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"14 1","pages":"28-31"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87389574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Motion Estimation via Scale-Space in Unsupervised Deep Learning 基于尺度空间的无监督深度学习运动估计
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334004
Jaehwan Kim, B. Derbel, Byung-Woo Hong
We present a potential application of the conventional scale-space theory to the estimation of optical flow in the deep learning framework. An unsupervised learning scheme for the computation of optical flow is integrated with a Gaussian scale space. The hierarchical propagation of intermediate estimations via a consecutive scales demonstrates a potential in the course of optimization leading to a better local minimum. The landscape of loss function associated with an optical flow problem in a neural network framework is highly complex and non-convex, which requires to guild the optimization path in such a way that a solution at a plateau region. The qualitative comparison of the optical flow solutions via a Gaussian scale-space provides the characteristics of solutions at different scales, thus provides a way to take into consideration of scales in further improving accuracy.
我们提出了传统尺度空间理论在深度学习框架下对光流估计的潜在应用。将一种用于光流计算的无监督学习方案与高斯尺度空间相结合。通过连续尺度的中间估计的分层传播表明在优化过程中有可能导致更好的局部最小值。在神经网络框架中,与光流问题相关的损失函数景观是高度复杂的非凸问题,这就要求优化路径在平台区域具有解。通过高斯尺度空间对光流解进行定性比较,提供了不同尺度解的特征,从而为进一步提高精度提供了考虑尺度的途径。
{"title":"Motion Estimation via Scale-Space in Unsupervised Deep Learning","authors":"Jaehwan Kim, B. Derbel, Byung-Woo Hong","doi":"10.1109/ICOIN50884.2021.9334004","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334004","url":null,"abstract":"We present a potential application of the conventional scale-space theory to the estimation of optical flow in the deep learning framework. An unsupervised learning scheme for the computation of optical flow is integrated with a Gaussian scale space. The hierarchical propagation of intermediate estimations via a consecutive scales demonstrates a potential in the course of optimization leading to a better local minimum. The landscape of loss function associated with an optical flow problem in a neural network framework is highly complex and non-convex, which requires to guild the optimization path in such a way that a solution at a plateau region. The qualitative comparison of the optical flow solutions via a Gaussian scale-space provides the characteristics of solutions at different scales, thus provides a way to take into consideration of scales in further improving accuracy.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"4 1","pages":"730-731"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87525646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel Monitoring Architecture for 100 Gbps and Beyond Optical Ethernet 100gbps及以上光以太网并行监控架构
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333941
H. Otsuki, Eiji Kawai, Katsuyoshi Setoyama, H. Kimiyama, Katsuhiro Sebayashi, M. Maruyama
In this study, we propose an architecture for monitoring packets coming from a high-speed optical Ethernet network. Moreover, we implement a packet monitoring system adopting our proposed architecture using general PC-based equipment with a field-programmable gate array (FPGA)based network interface card (NIC). We also experimentally achieve a full line-rate processing capability for 100-Gbps Ethernet and examine its feasibility on 400-Gbps Ethernet.
在这项研究中,我们提出了一种用于监控来自高速光以太网的数据包的架构。此外,我们使用基于pc的通用设备和基于现场可编程门阵列(FPGA)的网络接口卡(NIC)实现了采用我们提出的架构的数据包监控系统。我们还通过实验实现了100gbps以太网的全线率处理能力,并研究了其在400gbps以太网上的可行性。
{"title":"Parallel Monitoring Architecture for 100 Gbps and Beyond Optical Ethernet","authors":"H. Otsuki, Eiji Kawai, Katsuyoshi Setoyama, H. Kimiyama, Katsuhiro Sebayashi, M. Maruyama","doi":"10.1109/ICOIN50884.2021.9333941","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333941","url":null,"abstract":"In this study, we propose an architecture for monitoring packets coming from a high-speed optical Ethernet network. Moreover, we implement a packet monitoring system adopting our proposed architecture using general PC-based equipment with a field-programmable gate array (FPGA)based network interface card (NIC). We also experimentally achieve a full line-rate processing capability for 100-Gbps Ethernet and examine its feasibility on 400-Gbps Ethernet.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"18 1","pages":"358-360"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83593616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Face Recognition on the Edge Computing using Neuromorphic Technology 基于神经形态技术的边缘计算智能人脸识别
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333967
Jae-Woo Kim, C. I. Nwakanma, Dong-Seong Kim, Jae-Min Lee
This paper discusses intelligent edge computing technology using neuromorphic technology. Neuromorphic is a technology that uses pure hardware to implement intelligent systems, unlike traditional methods of implementing intelligent systems in a software manner using CPU or GPU hardware. In this paper, intelligent edge computing technology was introduced using NeuroEdge, one of the devices using Neurologic technology, and the performance was verified through a face recognition test. Results showed that using neuromorphic technology such as the NM500 chip saves the time needed for training systems and does not impose the burden of requiring many datasets for effective training.
本文讨论了基于神经形态技术的智能边缘计算技术。Neuromorphic是一种使用纯硬件实现智能系统的技术,与传统的使用CPU或GPU硬件以软件方式实现智能系统的方法不同。本文利用Neurologic技术的设备之一NeuroEdge介绍了智能边缘计算技术,并通过人脸识别测试对其性能进行了验证。结果表明,使用NM500芯片等神经形态技术可以节省训练系统所需的时间,并且不会增加需要大量数据集进行有效训练的负担。
{"title":"Intelligent Face Recognition on the Edge Computing using Neuromorphic Technology","authors":"Jae-Woo Kim, C. I. Nwakanma, Dong-Seong Kim, Jae-Min Lee","doi":"10.1109/ICOIN50884.2021.9333967","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333967","url":null,"abstract":"This paper discusses intelligent edge computing technology using neuromorphic technology. Neuromorphic is a technology that uses pure hardware to implement intelligent systems, unlike traditional methods of implementing intelligent systems in a software manner using CPU or GPU hardware. In this paper, intelligent edge computing technology was introduced using NeuroEdge, one of the devices using Neurologic technology, and the performance was verified through a face recognition test. Results showed that using neuromorphic technology such as the NM500 chip saves the time needed for training systems and does not impose the burden of requiring many datasets for effective training.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"35 1","pages":"514-516"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76443873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Machine Learning Based Fault Detection for Cloud Infrastructure 基于机器学习的云基础设施故障检测性能分析
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333875
Hojoon Won, Younghan Kim
As the cloud infrastructure becomes more complex, the importance of fault detection technology is increasing. A machine learning-based fault detection technology is being used to overcome the limitations of the existing fault detection method through log analysis and threshold-based fault detection method. Machine learning-based fault detection methods are greatly influenced by features. In this paper, we introduce feature engineering techniques that can affect accuracy, and propose a method to improve the performance of fault detection models in cloud infrastructure through comparative analysis and verification of various feature analysis models.
随着云基础设施的日益复杂,故障检测技术的重要性与日俱增。基于机器学习的故障检测技术通过日志分析和基于阈值的故障检测方法来克服现有故障检测方法的局限性。基于机器学习的故障检测方法受特征的影响很大。本文介绍了影响准确率的特征工程技术,并通过对各种特征分析模型的对比分析和验证,提出了一种提高云基础设施中故障检测模型性能的方法。
{"title":"Performance Analysis of Machine Learning Based Fault Detection for Cloud Infrastructure","authors":"Hojoon Won, Younghan Kim","doi":"10.1109/ICOIN50884.2021.9333875","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333875","url":null,"abstract":"As the cloud infrastructure becomes more complex, the importance of fault detection technology is increasing. A machine learning-based fault detection technology is being used to overcome the limitations of the existing fault detection method through log analysis and threshold-based fault detection method. Machine learning-based fault detection methods are greatly influenced by features. In this paper, we introduce feature engineering techniques that can affect accuracy, and propose a method to improve the performance of fault detection models in cloud infrastructure through comparative analysis and verification of various feature analysis models.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"877-880"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83521698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Relative Cost Routing, Modulation and Spectrum Allocation in Elastic Optical Networks 弹性光网络中的相对成本路由、调制和频谱分配
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333874
Anwar Alyatama
This work extends the adaptive RSA algorithm that is based on the relative cost for solving the routing, modulation level and spectrum assignment (RMSA) for elastic optical network (EON). In planning and execution of EONs, RMSA is a viral aspect. Our proposed RMSA is rooted in the relative cost concept and evaluates the average effect upon the admission of a connection request at a given network state on a given set of resources. Besides, only if the minimal relative cost is less than the request’s value, a connection request is admitted. Simulation has been used to display the effectiveness of using relative cost RMSA for attaining higher fairness in EONs and lower lost revenue.
本文扩展了基于相对成本的自适应RSA算法,用于解决弹性光网络(EON)的路由、调制水平和频谱分配(RMSA)问题。在EONs的规划和执行中,RMSA是一个病毒式传播的方面。我们提出的RMSA植根于相对成本概念,并评估在给定网络状态下对给定资源集接受连接请求时的平均效果。此外,只有当最小相对成本小于请求的值时,连接请求才会被接受。仿真结果表明,使用相对成本均方根法可以获得更高的公平性和更低的收入损失。
{"title":"Relative Cost Routing, Modulation and Spectrum Allocation in Elastic Optical Networks","authors":"Anwar Alyatama","doi":"10.1109/ICOIN50884.2021.9333874","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333874","url":null,"abstract":"This work extends the adaptive RSA algorithm that is based on the relative cost for solving the routing, modulation level and spectrum assignment (RMSA) for elastic optical network (EON). In planning and execution of EONs, RMSA is a viral aspect. Our proposed RMSA is rooted in the relative cost concept and evaluates the average effect upon the admission of a connection request at a given network state on a given set of resources. Besides, only if the minimal relative cost is less than the request’s value, a connection request is admitted. Simulation has been used to display the effectiveness of using relative cost RMSA for attaining higher fairness in EONs and lower lost revenue.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"127-131"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91153716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hit Ratio and Latency Optimization for Caching Systems: A Survey 缓存系统的命中率和延迟优化:综述
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9334019
Anh-Tien Tran, D. Lakew, The-Vi Nguyen, Van-Dat Tuong, Thanh Phung Truong, Nhu-Ngoc Dao, Sungrae Cho
The rise of fifth-generation (5G) communication systems allows the super high-quality services to be implemented in real-life; however, it requires a massive amount of mobile data traffic to be simultaneously transmitted and processed. Fortunately, a significant percentage of mobile data traffic is indeed reusable and should be cached properly in somewhere, and then be delivered back to users’ equipment (UEs) in the future requests. To proactively utilize this nature of content distribution, the caching techniques have attracted significant attention from the research community by alleviating unnecessary duplicated data transmission of popular content in mobile edge caching enabled networks. As a result, numerous scientific approaches under different perspectives have been published and hence should be categorized through specific criteria. In this study, we systematically and extensively survey the most recent caching techniques that were published. For each caching policy, we critically analyze its target in detail by performance metrics, including hit ratio, latency, and storage efficiency. Besides, we display the current trend by sorting them into common technical classes such as machine learning, deep learning, game theory, optimization techniques, etc. To visualize and predict the application of caching algorithms, in reality, we summarize their typical use cases.
第五代(5G)通信系统的兴起使超高质量的服务能够在现实生活中实现;但是,它需要同时传输和处理大量的移动数据流量。幸运的是,相当大比例的移动数据流量确实是可重用的,应该在某个地方适当地缓存,然后在未来的请求中传递回用户的设备(ue)。为了主动利用内容分发的这种性质,缓存技术通过减少移动边缘缓存网络中流行内容的不必要的重复数据传输而引起了研究界的极大关注。因此,已经发表了许多不同视角下的科学方法,因此应该通过特定的标准进行分类。在本研究中,我们系统而广泛地调查了最新发布的缓存技术。对于每个缓存策略,我们通过性能指标(包括命中率、延迟和存储效率)详细分析其目标。此外,我们通过将它们分类为常见的技术类,如机器学习,深度学习,博弈论,优化技术等,来展示当前的趋势。为了可视化和预测缓存算法在现实中的应用,我们总结了它们的典型用例。
{"title":"Hit Ratio and Latency Optimization for Caching Systems: A Survey","authors":"Anh-Tien Tran, D. Lakew, The-Vi Nguyen, Van-Dat Tuong, Thanh Phung Truong, Nhu-Ngoc Dao, Sungrae Cho","doi":"10.1109/ICOIN50884.2021.9334019","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9334019","url":null,"abstract":"The rise of fifth-generation (5G) communication systems allows the super high-quality services to be implemented in real-life; however, it requires a massive amount of mobile data traffic to be simultaneously transmitted and processed. Fortunately, a significant percentage of mobile data traffic is indeed reusable and should be cached properly in somewhere, and then be delivered back to users’ equipment (UEs) in the future requests. To proactively utilize this nature of content distribution, the caching techniques have attracted significant attention from the research community by alleviating unnecessary duplicated data transmission of popular content in mobile edge caching enabled networks. As a result, numerous scientific approaches under different perspectives have been published and hence should be categorized through specific criteria. In this study, we systematically and extensively survey the most recent caching techniques that were published. For each caching policy, we critically analyze its target in detail by performance metrics, including hit ratio, latency, and storage efficiency. Besides, we display the current trend by sorting them into common technical classes such as machine learning, deep learning, game theory, optimization techniques, etc. To visualize and predict the application of caching algorithms, in reality, we summarize their typical use cases.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"38 1","pages":"577-581"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89034279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive Beacon Transmission for Reducing Inter-Reception Time in Vehicle Platooning 减少车辆队列间接收时间的自适应信标传输
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333954
Minok Kim, Joonwoo Kim, Sangheon Pack
In vehicle platooning applications, vehicles keep track of the real-time states of other vehicles through beacons for the platoon’s stability and safety. However, under harsh wireless channel conditions, high packet loss incurs delays in updating other vehicles’ states and it makes vehicles not be able to react to dynamic situations in time. In this paper, we propose an adaptive beacon transmission scheme (A-BTS), which monitors packet loss events and controls the beacon transmission timing for reducing increased inter-reception time (IRT) of beacons caused by packet losses. Evaluation results demonstrate that A-BTS can reduce maximum IRT by 10.4% compared with the fixed beacon interval scheme.
在车辆队列应用中,车辆通过信标跟踪其他车辆的实时状态,以保证队列的稳定性和安全性。然而,在恶劣的无线信道条件下,高丢包率会导致其他车辆更新状态的延迟,使得车辆无法及时对动态情况做出反应。在本文中,我们提出了一种自适应信标传输方案(A-BTS),该方案监测丢包事件并控制信标传输时间,以减少因丢包而增加的信标接收间时间(IRT)。评估结果表明,与固定信标间隔方案相比,A-BTS可将最大IRT降低10.4%。
{"title":"Adaptive Beacon Transmission for Reducing Inter-Reception Time in Vehicle Platooning","authors":"Minok Kim, Joonwoo Kim, Sangheon Pack","doi":"10.1109/ICOIN50884.2021.9333954","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333954","url":null,"abstract":"In vehicle platooning applications, vehicles keep track of the real-time states of other vehicles through beacons for the platoon’s stability and safety. However, under harsh wireless channel conditions, high packet loss incurs delays in updating other vehicles’ states and it makes vehicles not be able to react to dynamic situations in time. In this paper, we propose an adaptive beacon transmission scheme (A-BTS), which monitors packet loss events and controls the beacon transmission timing for reducing increased inter-reception time (IRT) of beacons caused by packet losses. Evaluation results demonstrate that A-BTS can reduce maximum IRT by 10.4% compared with the fixed beacon interval scheme.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"26 1","pages":"69-71"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89557898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Priority-Based Dynamic Resource Allocation Scheme in Network Slicing 基于优先级的网络切片动态资源分配方案
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333944
Haneul Ko, Jaewook Lee, Sangheon Pack
In the network slicing environment, if insufficient resource is allocated to a resource-hungry slice (e.g., ultrareliable low latency communication (URLLC)), its quality of service (QoS) can be significantly degraded. In this paper, we propose a priority-based dynamic resource allocation scheme (PDRAS) where the resource management agent maintains some information such as priorities and demand profiles of slices. Based on these information, the agent dynamically allocates resources to slices. To maximize QoS of slices while maintaining the total amount of allocated resources below a certain level, a constrained Markov decision process (CMDP) problem is formulated and the optimal allocation policy is achieved by linear programming (LP). Extensive evaluation results are given to demonstrate the effectiveness of PDRAS with the optimal policy compared to that of other schemes in terms of QoS and the efficiency of the resource usage.
在网络切片环境中,如果没有足够的资源分配给资源饥渴片(例如,超可靠低延迟通信(URLLC)),其服务质量(QoS)可能会显著降低。在本文中,我们提出了一种基于优先级的动态资源分配方案(PDRAS),其中资源管理代理维护诸如片的优先级和需求概况等信息。基于这些信息,代理动态地为片分配资源。为了使切片的QoS最大化,同时使分配的资源总量保持在一定水平以下,提出了约束马尔可夫决策过程问题,并通过线性规划(LP)实现了最优分配策略。广泛的评估结果表明,与其他方案相比,具有最优策略的PDRAS在QoS和资源使用效率方面是有效的。
{"title":"Priority-Based Dynamic Resource Allocation Scheme in Network Slicing","authors":"Haneul Ko, Jaewook Lee, Sangheon Pack","doi":"10.1109/ICOIN50884.2021.9333944","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333944","url":null,"abstract":"In the network slicing environment, if insufficient resource is allocated to a resource-hungry slice (e.g., ultrareliable low latency communication (URLLC)), its quality of service (QoS) can be significantly degraded. In this paper, we propose a priority-based dynamic resource allocation scheme (PDRAS) where the resource management agent maintains some information such as priorities and demand profiles of slices. Based on these information, the agent dynamically allocates resources to slices. To maximize QoS of slices while maintaining the total amount of allocated resources below a certain level, a constrained Markov decision process (CMDP) problem is formulated and the optimal allocation policy is achieved by linear programming (LP). Extensive evaluation results are given to demonstrate the effectiveness of PDRAS with the optimal policy compared to that of other schemes in terms of QoS and the efficiency of the resource usage.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"3 1","pages":"62-64"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87602346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems 基于区块链的审计系统共识协议的性能评估
Pub Date : 2021-01-13 DOI: 10.1109/ICOIN50884.2021.9333867
Ashar Ahmad, Muhammad Saad, Joongheon Kim, Daehun Nyang, David A. Mohaisen
Blockchain-based audit systems use “Practical Byzantine Fault Tolerance” (PBFT) consensus protocol which suffers from a high message complexity and low scalability. Alternatives to PBFT have not been tested in blockchain-based audit systems since no blockchain testbed supports the execution and benchmarking of different consensus protocols in a unified testing environment. In this paper, we address this gap by developing a blockchain testbed capable of executing and testing five consensus protocols in a blockchain network; namely PBFT, Proof-of-Work (PoW), Proof-of-Stake (PoS), Proof-of-Elapsed Time (PoET), and Clique. We carry out performance evaluation of those consensus algorithms using data from a real-world audit system. Our results show that the Clique protocol is best suited for blockchain-based audit systems, based on scalability features.
基于区块链的审计系统使用“实用拜占庭容错”(PBFT)共识协议,该协议具有高消息复杂性和低可扩展性。PBFT的替代方案尚未在基于区块链的审计系统中进行测试,因为没有区块链测试平台支持在统一测试环境中执行和对不同共识协议进行基准测试。在本文中,我们通过开发能够在区块链网络中执行和测试五种共识协议的区块链测试平台来解决这一差距;即PBFT、工作量证明(PoW)、权益证明(PoS)、运行时间证明(PoET)和Clique。我们使用来自真实世界审计系统的数据对这些共识算法进行性能评估。我们的研究结果表明,基于可扩展性特性,Clique协议最适合基于区块链的审计系统。
{"title":"Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems","authors":"Ashar Ahmad, Muhammad Saad, Joongheon Kim, Daehun Nyang, David A. Mohaisen","doi":"10.1109/ICOIN50884.2021.9333867","DOIUrl":"https://doi.org/10.1109/ICOIN50884.2021.9333867","url":null,"abstract":"Blockchain-based audit systems use “Practical Byzantine Fault Tolerance” (PBFT) consensus protocol which suffers from a high message complexity and low scalability. Alternatives to PBFT have not been tested in blockchain-based audit systems since no blockchain testbed supports the execution and benchmarking of different consensus protocols in a unified testing environment. In this paper, we address this gap by developing a blockchain testbed capable of executing and testing five consensus protocols in a blockchain network; namely PBFT, Proof-of-Work (PoW), Proof-of-Stake (PoS), Proof-of-Elapsed Time (PoET), and Clique. We carry out performance evaluation of those consensus algorithms using data from a real-world audit system. Our results show that the Clique protocol is best suited for blockchain-based audit systems, based on scalability features.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"49 1","pages":"654-656"},"PeriodicalIF":0.0,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87612612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2021 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1