首页 > 最新文献

2019 IEEE Global Communications Conference (GLOBECOM)最新文献

英文 中文
Optimal Offloading for Dynamic Compute-Intensive Applications in Wireless Networks 无线网络中动态计算密集型应用的最佳卸载
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013327
Bin Li
With the rapid growth of wireless compute-intensive services (such as image recognition, real-time language translation, or other artificial intelligence applications), efficient wireless algorithm design should not only address when and which users should transmit at each time instance (referred to as wireless scheduling) but also determine where the computation should be executed (referred to as offloading decision) with the goal of minimizing both computing latency and energy consumption. Despite the presence of a variety of earlier works on the efficient offloading design in wireless networks, to the best of our knowledge, there does not exist a work on the realistic user- level dynamic model, where each incoming user demands a heavy computation and leaves the system once its computing request is completed. To this end, we formulate a problem of an optimal offloading design in the presence of dynamic compute-intensive applications in wireless networks. Then, we show that there exists a fundamental logarithmic energy- workload tradeoff for any feasible offloading algorithm, and develop an optimal threshold-based offloading algorithm that achieves this fundamental logarithmic bound.
随着无线计算密集型服务(如图像识别、实时语言翻译或其他人工智能应用)的快速增长,高效的无线算法设计不仅应该解决用户在每个时间实例中应该何时以及哪些传输(称为无线调度),还应该确定应该在哪里执行计算(称为卸载决策),目标是最小化计算延迟和能耗。尽管在无线网络中存在各种各样的高效卸载设计的早期工作,但据我们所知,还没有一个现实的用户级动态模型的工作,其中每个进入的用户需要大量的计算,并在其计算请求完成后离开系统。为此,我们提出了无线网络中动态计算密集型应用的最优卸载设计问题。然后,我们证明了任何可行的卸载算法都存在基本对数能量-工作负载权衡,并开发了一个基于阈值的最优卸载算法来实现这个基本对数界限。
{"title":"Optimal Offloading for Dynamic Compute-Intensive Applications in Wireless Networks","authors":"Bin Li","doi":"10.1109/GLOBECOM38437.2019.9013327","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013327","url":null,"abstract":"With the rapid growth of wireless compute-intensive services (such as image recognition, real-time language translation, or other artificial intelligence applications), efficient wireless algorithm design should not only address when and which users should transmit at each time instance (referred to as wireless scheduling) but also determine where the computation should be executed (referred to as offloading decision) with the goal of minimizing both computing latency and energy consumption. Despite the presence of a variety of earlier works on the efficient offloading design in wireless networks, to the best of our knowledge, there does not exist a work on the realistic user- level dynamic model, where each incoming user demands a heavy computation and leaves the system once its computing request is completed. To this end, we formulate a problem of an optimal offloading design in the presence of dynamic compute-intensive applications in wireless networks. Then, we show that there exists a fundamental logarithmic energy- workload tradeoff for any feasible offloading algorithm, and develop an optimal threshold-based offloading algorithm that achieves this fundamental logarithmic bound.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73537551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Privacy Preserving Computation of Multiset Intersection Cardinality 一种高效的多集相交基数隐私保护计算方法
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013167
Harmanjeet Kaur, Neeraj Kumar, J. Rodrigues
The multi-set intersection cardinality operation is used for calculation of similarity between two sets which has various applications such as cluster analysis, image segmentation, social network analysis, etc. The need of Privacy Preserving Computation of Multi-set Intersection Cardinality (PPCMIC) operation is raised when two parties want to compute similarities between their datasets without disclosing their data to each other. Existing methods for PPCMIC are either insecure or inefficient. In our work, to address this gap, PPCMIC protocol based on lightweight randomization protocol is proposed which is secure and efficient in terms of computation cost. The experimental work has been done on simulated and real datasets to show that proposed protocols are more efficient then the existing techniques.
多集交集基数运算用于计算两集之间的相似度,在聚类分析、图像分割、社会网络分析等领域有广泛的应用。当双方希望在不向对方泄露数据的情况下计算数据集之间的相似度时,提出了多集相交基数运算的隐私保护计算需求。现有的PPCMIC方法要么不安全,要么效率低下。在我们的工作中,为了解决这一差距,提出了基于轻量级随机化协议的PPCMIC协议,该协议在计算成本方面安全高效。在模拟和实际数据集上进行了实验,结果表明所提出的协议比现有技术更有效。
{"title":"An Efficient Privacy Preserving Computation of Multiset Intersection Cardinality","authors":"Harmanjeet Kaur, Neeraj Kumar, J. Rodrigues","doi":"10.1109/GLOBECOM38437.2019.9013167","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013167","url":null,"abstract":"The multi-set intersection cardinality operation is used for calculation of similarity between two sets which has various applications such as cluster analysis, image segmentation, social network analysis, etc. The need of Privacy Preserving Computation of Multi-set Intersection Cardinality (PPCMIC) operation is raised when two parties want to compute similarities between their datasets without disclosing their data to each other. Existing methods for PPCMIC are either insecure or inefficient. In our work, to address this gap, PPCMIC protocol based on lightweight randomization protocol is proposed which is secure and efficient in terms of computation cost. The experimental work has been done on simulated and real datasets to show that proposed protocols are more efficient then the existing techniques.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"41 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73554229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Drone Assisted Mobile Access Network for Disaster Emergency Communications 协同无人机辅助灾害应急通信移动接入网
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013813
Di Wu, Xiang Sun, N. Ansari
Multiple drone-mounted base stations (DBSs) are used to be deployed over a disaster struck area to help mobile users (MUs) communicate with working BSs, which are located beyond the disaster-struck area. DBSs are considered as relay nodes between MUs and working BSs. In order to relax the bottleneck in wireless backhaul links, we propose a cooperative drone assisted mobile access network architecture by enabling DBSs (whose backhaul links are congested) to offload their traffic to other DBSs (whose backhaul links are not congested) via DBS-to-DBS communications. We formulate the DBS placement and channel allocation problem in the context of the cooperative drone assisted mobile access network architecture, and design a COoperative DBS plAcement and CHannel allocation (COACH) algorithm to solve the problem. The performance of COACH is demonstrated via extensive simulations.
在灾区上空部署多个无人机基站(drone-mounted base station, dbs),帮助移动用户(mu)与位于灾区以外的正常基站进行通信。DBSs被认为是mu和工作BSs之间的中继节点。为了缓解无线回程链路的瓶颈,我们提出了一种协作式无人机辅助移动接入网架构,使回程链路拥塞的dbs能够通过DBS-to-DBS通信将其流量分流给其他dbs(回程链路不拥塞)。在协同无人机辅助移动接入网架构背景下,提出了DBS布局与信道分配问题,并设计了一种协同DBS布局与信道分配(COACH)算法来解决该问题。通过大量的仿真验证了COACH的性能。
{"title":"A Cooperative Drone Assisted Mobile Access Network for Disaster Emergency Communications","authors":"Di Wu, Xiang Sun, N. Ansari","doi":"10.1109/GLOBECOM38437.2019.9013813","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013813","url":null,"abstract":"Multiple drone-mounted base stations (DBSs) are used to be deployed over a disaster struck area to help mobile users (MUs) communicate with working BSs, which are located beyond the disaster-struck area. DBSs are considered as relay nodes between MUs and working BSs. In order to relax the bottleneck in wireless backhaul links, we propose a cooperative drone assisted mobile access network architecture by enabling DBSs (whose backhaul links are congested) to offload their traffic to other DBSs (whose backhaul links are not congested) via DBS-to-DBS communications. We formulate the DBS placement and channel allocation problem in the context of the cooperative drone assisted mobile access network architecture, and design a COoperative DBS plAcement and CHannel allocation (COACH) algorithm to solve the problem. The performance of COACH is demonstrated via extensive simulations.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"10 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73903798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
SDN Security: Information Disclosure and Flow Table Overflow Attacks SDN安全:信息泄露和流表溢出攻击
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014048
Aditya Patwardhan, Deepthi Jayarama, Nitish Limaye, Shivaji Vidhale, Zarna Parekh, K. Harfoush
In this paper, we study some of the security pitfalls present in the OpenFlow protocol, which plays a central role in Software Defined Networks. Specifically, we introduce information disclosure attacks capable of identifying idle and hard timeout values, and the number of free entries in the flow tables at SDN switches. We then leverage this information to mount Denial of Service (DoS) attacks using a small number of packets and without flooding the SDN network, making it harder to detect. Experimental results indicate that mounting the proposed attack leads to delays and packet losses for legitimate flows. We further propose solutions to detect and mitigate similar attacks.
在本文中,我们研究了OpenFlow协议中存在的一些安全缺陷,它在软件定义网络中起着核心作用。具体来说,我们介绍了能够识别空闲和硬超时值的信息泄露攻击,以及SDN交换机流表中的空闲条目数。然后,我们利用这些信息使用少量数据包进行拒绝服务(DoS)攻击,而不会淹没SDN网络,使其更难被检测到。实验结果表明,提出的攻击会导致合法流的延迟和丢包。我们进一步提出了检测和减轻类似攻击的解决方案。
{"title":"SDN Security: Information Disclosure and Flow Table Overflow Attacks","authors":"Aditya Patwardhan, Deepthi Jayarama, Nitish Limaye, Shivaji Vidhale, Zarna Parekh, K. Harfoush","doi":"10.1109/GLOBECOM38437.2019.9014048","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014048","url":null,"abstract":"In this paper, we study some of the security pitfalls present in the OpenFlow protocol, which plays a central role in Software Defined Networks. Specifically, we introduce information disclosure attacks capable of identifying idle and hard timeout values, and the number of free entries in the flow tables at SDN switches. We then leverage this information to mount Denial of Service (DoS) attacks using a small number of packets and without flooding the SDN network, making it harder to detect. Experimental results indicate that mounting the proposed attack leads to delays and packet losses for legitimate flows. We further propose solutions to detect and mitigate similar attacks.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"18 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75625429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Efficient Freeway Driving Assistance Protocol in Vehicular Networks 一种高效的高速公路车辆网络驾驶辅助协议
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014104
Maram Bani Younes, A. Boukerche, Rodolfo W. L. Coutinho
Freeways have been known over decades as high-speed multi-lane roads, where the opposite traffic directions are completely separated. No intersections, pedestrians, or bicycles are expected on these road scenarios, besides specific ramps are designed to facilitate the entrance and exit of vehicles. Although freeway driving is considered safer and faster for experienced drivers, it can be more demanding and difficult for fresh or exhausted ones. Entering and existing the freeway road are considered the most critical situations where the driver needs to achieve high synchronizations with the surrounding traffic there. In this work, we introduce a freeway driving assistance protocol for drivers aiming to reduce the difficulties for fresh drivers and enhance the safety and efficiency conditions over the freeway road scenarios. This proposed protocol can also be used by the autonomous vehicles where no drivers control the vehicle. We evaluate the performance of the proposed protocol using several simulated driving scenarios. It shows a good performance in terms of increasing the safety of traffic and smoothing the traffic speed of vehicles.
几十年来,高速公路一直被称为高速多车道道路,相反的交通方向完全分开。在这些道路场景中,预计不会有十字路口、行人或自行车,除了专门设计的坡道,以方便车辆进出。尽管对于经验丰富的司机来说,高速公路驾驶被认为更安全、更快,但对于新手或精疲力竭的司机来说,要求更高、更困难。进入和驶出高速公路被认为是驾驶员需要与周围交通高度同步的最关键的情况。在本工作中,我们引入了一种高速公路驾驶辅助协议,旨在减少新手驾驶的困难,提高高速公路道路场景下的安全和效率条件。该协议也可用于无人驾驶的自动驾驶汽车。我们使用几个模拟驾驶场景来评估所提出协议的性能。它在提高交通安全性和平滑车辆通行速度方面表现出良好的性能。
{"title":"An Efficient Freeway Driving Assistance Protocol in Vehicular Networks","authors":"Maram Bani Younes, A. Boukerche, Rodolfo W. L. Coutinho","doi":"10.1109/GLOBECOM38437.2019.9014104","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014104","url":null,"abstract":"Freeways have been known over decades as high-speed multi-lane roads, where the opposite traffic directions are completely separated. No intersections, pedestrians, or bicycles are expected on these road scenarios, besides specific ramps are designed to facilitate the entrance and exit of vehicles. Although freeway driving is considered safer and faster for experienced drivers, it can be more demanding and difficult for fresh or exhausted ones. Entering and existing the freeway road are considered the most critical situations where the driver needs to achieve high synchronizations with the surrounding traffic there. In this work, we introduce a freeway driving assistance protocol for drivers aiming to reduce the difficulties for fresh drivers and enhance the safety and efficiency conditions over the freeway road scenarios. This proposed protocol can also be used by the autonomous vehicles where no drivers control the vehicle. We evaluate the performance of the proposed protocol using several simulated driving scenarios. It shows a good performance in terms of increasing the safety of traffic and smoothing the traffic speed of vehicles.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"102 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75795523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mc-Track: A Cloud Based Data Oriented Vehicular Tracking System with Adaptive Security Mc-Track:一种基于云的自适应安全数据导向车辆跟踪系统
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013977
Abdellah Kaci, A. Rachedi
In this paper, we propose Mc-Track, a new secure data oriented Cloud based vehicular tracking system. We introduced in Mc-Track an adaptive approach which consists in selection of security level according to data kinds. The architecture of the Mc-Track is composed of three levels: the vehicular network, the Cloud service, and proxies called Tracking Authorities, in charge of performing Attribute Based Encryption (ABE). We provided selective encryption and adaptive security in the Tracking Authority (TA), using the machine learning classifier k-Nearest Neighbours (k-NN). We conducted experimental study to evaluate the efficiency of the proposed k-NN classifier in selective encryption and adaptive security. So we compared the accuracy of the predictions of k-NN classifier to the accuracy of predictions using Support Vector Machine (SVM) classifier. Experimental results, has shown that the k-NN classifier is more accurate than SVM classifier.
在本文中,我们提出了Mc-Track,一种新的基于云的安全数据的车辆跟踪系统。我们在Mc-Track中引入了一种根据数据类型选择安全级别的自适应方法。Mc-Track的架构由三个层次组成:车辆网络、云服务和称为跟踪机构的代理,负责执行基于属性的加密(ABE)。我们使用机器学习分类器k-最近邻(k-NN)在跟踪权威(TA)中提供了选择性加密和自适应安全性。我们进行了实验研究,以评估所提出的k-NN分类器在选择性加密和自适应安全方面的效率。因此,我们将k-NN分类器的预测精度与支持向量机分类器的预测精度进行了比较。实验结果表明,k-NN分类器比SVM分类器更准确。
{"title":"Mc-Track: A Cloud Based Data Oriented Vehicular Tracking System with Adaptive Security","authors":"Abdellah Kaci, A. Rachedi","doi":"10.1109/GLOBECOM38437.2019.9013977","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013977","url":null,"abstract":"In this paper, we propose Mc-Track, a new secure data oriented Cloud based vehicular tracking system. We introduced in Mc-Track an adaptive approach which consists in selection of security level according to data kinds. The architecture of the Mc-Track is composed of three levels: the vehicular network, the Cloud service, and proxies called Tracking Authorities, in charge of performing Attribute Based Encryption (ABE). We provided selective encryption and adaptive security in the Tracking Authority (TA), using the machine learning classifier k-Nearest Neighbours (k-NN). We conducted experimental study to evaluate the efficiency of the proposed k-NN classifier in selective encryption and adaptive security. So we compared the accuracy of the predictions of k-NN classifier to the accuracy of predictions using Support Vector Machine (SVM) classifier. Experimental results, has shown that the k-NN classifier is more accurate than SVM classifier.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"248 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75830811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
AP-Assisted Online Task Assignment for Mobile Crowdsensing 移动众测的ap辅助在线任务分配
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013513
Shuo Peng, Wei Gong, Baoxian Zhang, Cheng Li
With the widespread of smart devices, mobile crowdsensing has become an attractive way to perceive and collect sensing data. In this paper, we focus on studying AP-assisted task assignment in mobile crowdsensing. The objective is to effectively reduce the average or worst-case makespan of tasks. We focus on a scenario that a task requester needs the assistance of mobile users for task accomplishment while they can meet directly or via APs in an opportunistic manner. We model the crowdsensing system and then formulate the problems under study. We then propose an AP-assisted average makespan sensitive online task assignment (AP-AOTA) algorithm and an AP-assisted largest makespan sensitive online task assignment (AP-LOTA) algorithm. In the proposed algorithms, task assignment at each step considers both the inter-encountering time between requester and each user and that between them while going through APs. We present design details of the proposed algorithms. We derive their computational complexities to be $O(mn^2)$, where $m$ is the number of tasks and $n$ is the number of users. Finally, trace-driven simulation results show that the proposed algorithms outperform existing work.
随着智能设备的普及,移动众测已经成为感知和采集传感数据的一种极具吸引力的方式。本文主要研究移动众测中的ap辅助任务分配。目标是有效地减少任务的平均或最坏情况下的完工时间。我们关注的场景是,任务请求者需要移动用户的帮助来完成任务,而他们可以直接或通过ap以机会主义的方式满足。我们对众感系统进行建模,然后制定所研究的问题。然后,我们提出了ap辅助平均最大完工时间敏感在线任务分配(AP-AOTA)算法和ap辅助最大完工时间敏感在线任务分配(AP-LOTA)算法。在本文提出的算法中,每一步的任务分配都考虑了请求者与每个用户之间的互遇时间,以及它们之间经过ap时的互遇时间。我们给出了所提出算法的设计细节。我们推导出它们的计算复杂度为$O(mn^2)$,其中$m$是任务数量,$n$是用户数量。最后,跟踪驱动的仿真结果表明,所提算法优于现有算法。
{"title":"AP-Assisted Online Task Assignment for Mobile Crowdsensing","authors":"Shuo Peng, Wei Gong, Baoxian Zhang, Cheng Li","doi":"10.1109/GLOBECOM38437.2019.9013513","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013513","url":null,"abstract":"With the widespread of smart devices, mobile crowdsensing has become an attractive way to perceive and collect sensing data. In this paper, we focus on studying AP-assisted task assignment in mobile crowdsensing. The objective is to effectively reduce the average or worst-case makespan of tasks. We focus on a scenario that a task requester needs the assistance of mobile users for task accomplishment while they can meet directly or via APs in an opportunistic manner. We model the crowdsensing system and then formulate the problems under study. We then propose an AP-assisted average makespan sensitive online task assignment (AP-AOTA) algorithm and an AP-assisted largest makespan sensitive online task assignment (AP-LOTA) algorithm. In the proposed algorithms, task assignment at each step considers both the inter-encountering time between requester and each user and that between them while going through APs. We present design details of the proposed algorithms. We derive their computational complexities to be $O(mn^2)$, where $m$ is the number of tasks and $n$ is the number of users. Finally, trace-driven simulation results show that the proposed algorithms outperform existing work.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"32 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74549493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification BSA:用分散规范增强云计算中基于属性的加密
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013832
Peiyao Li, Heyang Cao, Mingsheng Wang
Ciphertext-policy attribute-based encryption (CP- ABE) with verifiable outsourced decryption is a mechanism for secure fine-grained access control over encrypted data, and it is suitable for cloud computing applications. However, there exists a risk in CP-ABE with verifiable outsourced decryption that can lead to serious consequences and may limit its wide applications: the key generation center may have misbehavior. In this paper, we present BSA, the blockchain-based specification for ABE to mitigate this risk. We introduce the specification to regulate the data access control and a proof mechanism to supervise whether the key generation center has misbehavior. Also, we can provide decentralized and automated incentives with BSA by smart contracts and blockchain-based consensus.
具有可验证外包解密的基于密文策略属性的加密(CP- ABE)是一种对加密数据进行安全细粒度访问控制的机制,适用于云计算应用。然而,具有可验证外包解密的CP-ABE存在一个风险,可能导致严重后果,并可能限制其广泛应用:密钥生成中心可能存在不当行为。在本文中,我们提出了基于区块链的ABE规范BSA,以减轻这种风险。我们引入了规范数据访问控制的规范和监督密钥生成中心是否有不当行为的证明机制。此外,我们可以通过智能合约和基于区块链的共识,为BSA提供去中心化和自动化的激励。
{"title":"BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification","authors":"Peiyao Li, Heyang Cao, Mingsheng Wang","doi":"10.1109/GLOBECOM38437.2019.9013832","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013832","url":null,"abstract":"Ciphertext-policy attribute-based encryption (CP- ABE) with verifiable outsourced decryption is a mechanism for secure fine-grained access control over encrypted data, and it is suitable for cloud computing applications. However, there exists a risk in CP-ABE with verifiable outsourced decryption that can lead to serious consequences and may limit its wide applications: the key generation center may have misbehavior. In this paper, we present BSA, the blockchain-based specification for ABE to mitigate this risk. We introduce the specification to regulate the data access control and a proof mechanism to supervise whether the key generation center has misbehavior. Also, we can provide decentralized and automated incentives with BSA by smart contracts and blockchain-based consensus.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73031133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Grid Energy Management Using RNN-LSTM: A Deep Learning-Based Approach 基于RNN-LSTM的智能电网能源管理:基于深度学习的方法
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013850
D. Kaur, Rahul Kumar, Neeraj Kumar, M. Guizani
With the rapid increase in the energy demands from different sectors across the globe, there is lot of pressure on the power grid to maintain a balance between the demand and supply. In this context, smart grid (SG) may play a vital role as it provides the bidirectional energy flow between utilities and end users. Contrary to the traditional power grid, it has advanced switching and sensing devices (for example, sensors and actuators) for load balancing and peak shaving. In SG systems, various smart devices and electrical appliances which are placed in the smart buildings regularly generate data related to energy usage, occupancy patterns, or movements of the end users. By applying an efficient data pre-processing and data analytics technique, this data can be analyzed to extract important energy patterns which can be used in demand response management, load forecasting, and peak shaving. But, one of the main challenges in SG systems is to have an integrated approach to pre-process and analyze the data with minimum error rates and higher accuracy. To tackle the aforementioned challenges, an unified scheme based upon the deep learning and recurrent neural networks (RNN) is proposed in this paper. The data collected from smart homes is pre-processed and decomposed using high-order singular value decomposition (HOSVD) and then long short-term memory (LSTM) model is applied on it. As the data collected from SG is time series-based data so LSTM based regression model gives minimum root mean square (RMSE) and mean absolute percentage error (MAPE) values as compared to the other techniques reported in the literature. A case study of 112 smart homes with hourly basis data is considered for evaluation of the proposed scheme in which energy patterns are predicted with least RMSE and MAPE. The results obtained clearly show that the proposed scheme has superior performance in comparison to the other existing schemes
随着全球不同领域对能源需求的快速增长,电网面临着保持供需平衡的巨大压力。在这种情况下,智能电网(SG)可以发挥至关重要的作用,因为它提供了公用事业和最终用户之间的双向能量流。与传统电网相反,它具有先进的开关和传感设备(例如,传感器和执行器),用于负载平衡和调峰。在SG系统中,放置在智能建筑中的各种智能设备和电器定期生成与能源使用、占用模式或最终用户移动相关的数据。通过应用高效的数据预处理和数据分析技术,可以分析这些数据以提取重要的能量模式,这些模式可用于需求响应管理、负荷预测和调峰。但是,SG系统面临的主要挑战之一是采用集成的方法以最小的错误率和更高的精度对数据进行预处理和分析。为了解决上述问题,本文提出了一种基于深度学习和递归神经网络(RNN)的统一方案。采用高阶奇异值分解(HOSVD)对智能家居采集的数据进行预处理和分解,然后将其应用于长短期记忆(LSTM)模型。由于从SG收集的数据是基于时间序列的数据,因此与文献中报道的其他技术相比,基于LSTM的回归模型给出了最小的均方根(RMSE)和平均绝对百分比误差(MAPE)值。考虑对112个智能家庭进行每小时数据的案例研究,以评估建议的方案,其中以最小RMSE和MAPE预测能源模式。实验结果表明,该方案具有较好的性能
{"title":"Smart Grid Energy Management Using RNN-LSTM: A Deep Learning-Based Approach","authors":"D. Kaur, Rahul Kumar, Neeraj Kumar, M. Guizani","doi":"10.1109/GLOBECOM38437.2019.9013850","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013850","url":null,"abstract":"With the rapid increase in the energy demands from different sectors across the globe, there is lot of pressure on the power grid to maintain a balance between the demand and supply. In this context, smart grid (SG) may play a vital role as it provides the bidirectional energy flow between utilities and end users. Contrary to the traditional power grid, it has advanced switching and sensing devices (for example, sensors and actuators) for load balancing and peak shaving. In SG systems, various smart devices and electrical appliances which are placed in the smart buildings regularly generate data related to energy usage, occupancy patterns, or movements of the end users. By applying an efficient data pre-processing and data analytics technique, this data can be analyzed to extract important energy patterns which can be used in demand response management, load forecasting, and peak shaving. But, one of the main challenges in SG systems is to have an integrated approach to pre-process and analyze the data with minimum error rates and higher accuracy. To tackle the aforementioned challenges, an unified scheme based upon the deep learning and recurrent neural networks (RNN) is proposed in this paper. The data collected from smart homes is pre-processed and decomposed using high-order singular value decomposition (HOSVD) and then long short-term memory (LSTM) model is applied on it. As the data collected from SG is time series-based data so LSTM based regression model gives minimum root mean square (RMSE) and mean absolute percentage error (MAPE) values as compared to the other techniques reported in the literature. A case study of 112 smart homes with hourly basis data is considered for evaluation of the proposed scheme in which energy patterns are predicted with least RMSE and MAPE. The results obtained clearly show that the proposed scheme has superior performance in comparison to the other existing schemes","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"3 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73262008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Slice Scheduling with QoS-Guarantee Towards 5G 面向5G的qos保证分片调度
Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013258
Robert Schmidt, Chia-Yu Chang, N. Nikaein
Future mobile networks are supposed to handle a variety of services with different requirements. Network slicing is considered to be a key enabler to cope with the increasing complexity of these networks. This includes slicing of the radio resources in order to use them efficiently. In this paper, we propose a radio resource slicing system for three types of slices with specific radio resource/quality of service (QoS) requirements. It enables co-existence of (1) rate-based/efficiency-oriented and (2) low-latency slices, as well as (3) slices with fixed allocations. Slice scheduling is based on utility functions with a priority-based resource allocation. Using simulations, we validate the applicability of the proposed system, and demonstrate that both a guaranteed throughput and low delay for different slices at the same time is possible. Our system outperforms existing slicing solutions in terms of delay requirement satisfaction and efficient resource utilization.
未来的移动网络应该能够处理各种不同需求的业务。网络切片被认为是一个关键的使能器,以应付这些网络日益增加的复杂性。这包括对无线电资源进行切片,以便有效地利用它们。在本文中,我们提出了一种针对三种类型的切片的无线电资源切片系统,这些切片具有特定的无线电资源/服务质量(QoS)要求。它支持(1)基于速率/面向效率的片和(2)低延迟片的共存,以及(3)具有固定分配的片。片调度基于基于优先级的资源分配的实用程序函数。通过仿真,我们验证了所提出系统的适用性,并证明了同时保证不同切片的吞吐量和低延迟是可能的。我们的系统在满足延迟需求和有效的资源利用方面优于现有的切片解决方案。
{"title":"Slice Scheduling with QoS-Guarantee Towards 5G","authors":"Robert Schmidt, Chia-Yu Chang, N. Nikaein","doi":"10.1109/GLOBECOM38437.2019.9013258","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013258","url":null,"abstract":"Future mobile networks are supposed to handle a variety of services with different requirements. Network slicing is considered to be a key enabler to cope with the increasing complexity of these networks. This includes slicing of the radio resources in order to use them efficiently. In this paper, we propose a radio resource slicing system for three types of slices with specific radio resource/quality of service (QoS) requirements. It enables co-existence of (1) rate-based/efficiency-oriented and (2) low-latency slices, as well as (3) slices with fixed allocations. Slice scheduling is based on utility functions with a priority-based resource allocation. Using simulations, we validate the applicability of the proposed system, and demonstrate that both a guaranteed throughput and low delay for different slices at the same time is possible. Our system outperforms existing slicing solutions in terms of delay requirement satisfaction and efficient resource utilization.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"80 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74053730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2019 IEEE Global Communications Conference (GLOBECOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1