2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)最新文献

筛选
英文 中文
Creating value through blockchain powered resource configurations: Analysis of 5G network slice brokering case 通过区块链驱动的资源配置创造价值:5G网络切片代理案例分析
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8368983
Kristiina Valtanen, J. Backman, Seppo Yrjölä
{"title":"Creating value through blockchain powered resource configurations: Analysis of 5G network slice brokering case","authors":"Kristiina Valtanen, J. Backman, Seppo Yrjölä","doi":"10.1109/WCNCW.2018.8368983","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368983","url":null,"abstract":"The exponential growth of wireless services with diversity of devices and applications has inspired the research community to come up with novel concepts to improve the efficiency of resource use. It is cost efficient and practical to be able to evaluate and analyze expected value of use cases before actual implementation of the solution. This paper presents blockchain network slice brokering use case value analysis and results in the industrial automation application scenario. The use case value was assessed applying resource configuration framework against blockchain and smart contracts characteristics and capabilities. According to the findings, expected value of blockchain network slice brokering use case was proven and in general feasibility of blockchain technology for novel resource configurations use cases for various network functions was stated. The use case enables industrial automation processes and related manufacturing equipment to autonomously and dynamically acquire the slice needed for most efficient operations. The resource configuration framework provides a dynamic framework for analyzing and developing the blockchain enabled novel use cases and business models.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129720432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Fast list decoding of polar codes: Decoders for additional nodes 极性码的快速列表解码:附加节点的解码器
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8369002
M. Hanif, Maryam Haghighi Ardakani, M. Ardakani
{"title":"Fast list decoding of polar codes: Decoders for additional nodes","authors":"M. Hanif, Maryam Haghighi Ardakani, M. Ardakani","doi":"10.1109/WCNCW.2018.8369002","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8369002","url":null,"abstract":"This work focuses on fast successive-cancellation list decoding of polar codes. We propose list decoders for five newly-identified types of nodes in the decoding tree of a polar code. The proposed list decoders significantly improve the decoding speed by determining the best paths and calculating their corresponding path metrics without computing bit log-likelihood ratios.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A collision avoidance solution for UAVs following planned missions 无人机执行计划任务时的避碰解决方案
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8368977
Francisco Fabra, C. Calafate, Juan-Carlos Cano, P. Manzoni
{"title":"A collision avoidance solution for UAVs following planned missions","authors":"Francisco Fabra, C. Calafate, Juan-Carlos Cano, P. Manzoni","doi":"10.1109/WCNCW.2018.8368977","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368977","url":null,"abstract":"The number of Unmanned Aerial Vehicles (UAVs) flying around is increasing year after year due to their popularity. This new scenario considerably increases the risk of collision between UAVs, which makes the development of protocols to avoid this issue an emerging topic. This work focuses on the development of a collision avoidance protocol between UAVs performing planned missions. Our proposal is based on the periodic submission of state information, and future position estimates of the UAV, allowing the detection of collision risks. Collision avoidance is achieved by forcing UAVs to stop when they are flying critically near each other, and establishing the priority of the UAV passing by the critical area first; this decision is based on a per-UAV unique identifier. We prove that our solution is robust enough to avoid collisions in all the situations tested; in addition, the overhead introduced by our protocol in terms of additional UAV flight time is low.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"117 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126407008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Socially-aware content delivery for device-to-device communications underlay cellular networks 设备到设备通信的社会感知内容交付是蜂窝网络的基础
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8368982
Yun Hu, Zheng Chang, Zhenyu Zhou, Chen Xu, T. Ristaniemi
{"title":"Socially-aware content delivery for device-to-device communications underlay cellular networks","authors":"Yun Hu, Zheng Chang, Zhenyu Zhou, Chen Xu, T. Ristaniemi","doi":"10.1109/WCNCW.2018.8368982","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368982","url":null,"abstract":"The emerging Device-to-Device (D2D) communications paradigm has received increasing attentions from both research and industry communities. Most of the previous works on D2D communications, however, mainly concentrated on interference management and throughput optimization. Some recent works have observed that by properly caching the data at the device level, the Quality of Experience (QoE) can be enhanced. In this paper, we propose a novel socially-aware data content delivery scheme for D2D underlay wireless networks by taking social ties and common interests among users into consideration. In particular, we jointly consider the features of the D2D transmissions in the physical layer, social characteristics, and interest similarity impact to formulate the D2D content delivery problem. Accordingly, an accurate and efficient three-dimensional matching-based scheme is presented to address the formulated problem. The performance evaluations are conducted to show the potential gain of the proposed approach.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115651677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models 考虑思科和微软物联网参考模型的工业物联网安全威胁和担忧
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8368997
Z. Bakhshi, A. Balador, Jawad Mustafa
{"title":"Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models","authors":"Z. Bakhshi, A. Balador, Jawad Mustafa","doi":"10.1109/WCNCW.2018.8368997","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368997","url":null,"abstract":"This paper investigates security concerns and issues for Industrial Internet of Things (IIoT). The IIoT is an emerging transformation, bringing great values to every industry. Although this rapid alter in industries create values, but there are concerns about security issues, most of which would be still unknown due to the novelty of this platform. In order to provide a guideline for those who want to investigate IoT security and contribute to its improvement, this paper attempts to provide a list of security threats and issues on the cloud-side layer of IoT, which consists of data accumulation and abstraction levels. For this reason, we choose Cisco and Microsoft Azure IoT Architecture as reference models. Then, two layers of Cisco reference architecture model have been chosen to be investigated for their security issues. Finally, consideration of security issues has been briefly explained.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115712177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
On the impact of communication delays on UAVs flocking behavior 通信延迟对无人机群集行为的影响
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-01 DOI: 10.1109/WCNCW.2018.8368996
Victor Casas, A. Mitschele-Thiel
{"title":"On the impact of communication delays on UAVs flocking behavior","authors":"Victor Casas, A. Mitschele-Thiel","doi":"10.1109/WCNCW.2018.8368996","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368996","url":null,"abstract":"Communication delay plays an important role for the safety in a Cyber Physical System (CPS). Self-organized flocks of UAVs (Unmanned Aerial Vehicle) are a particularly highly dynamic and complex example of a CPS. Since flocking algorithms rely on the exchange of position and velocity information, high communication delays may lead the flock to an oscillatory behavior. This behavior increases the probability of collisions. In the literature, some conceptual methodologies for verifying safety in CPS have been discussed. They mainly proposed to identify states or actions, that may affect the safety. In this paper we analyze the impact of communication delays on the safety of a flock of UAVs. We introduce an architecture for an UAV, that simulates the asynchronous behavior of different components. We used our self-organized flocking algorithm to evaluate this architecture using different communication delays. Thus, we estimate the communication delay constraints for 2, 3 and 5 UAVs for the safe operation of the given flocking algorithm.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117071010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Randomized chained polar subcodes 随机链极性子码
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-01 DOI: 10.1109/WCNCW.2018.8369001
P. Trifonov
{"title":"Randomized chained polar subcodes","authors":"P. Trifonov","doi":"10.1109/WCNCW.2018.8369001","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8369001","url":null,"abstract":"A generalization of polar subcodes is proposed, which enables a simple construction of codes of arbitrary length. The obtained codes are shown to outperform punctured and shortened polar codes under list/sequential decoding. Furthermore, a simplified Gaussian approximation for polar codes is presented.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129229596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Mobile social media networks caching with convolutional neural network 移动社交媒体网络卷积神经网络缓存
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-01 DOI: 10.1109/WCNCW.2018.8368988
Kuo Chun Tsai, Li Wang, Zhu Han
{"title":"Mobile social media networks caching with convolutional neural network","authors":"Kuo Chun Tsai, Li Wang, Zhu Han","doi":"10.1109/WCNCW.2018.8368988","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368988","url":null,"abstract":"Nowadays, people use mobile social media networks such as Twitter and Facebook to connect with others. In this work, we discuss the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to reduce the service delay for the end users. In the data-caching model, there are three types of cache entities, which are edge caching elements (CAEs), small cell base stations (SBSs), and macro cell base stations (MBS). We propose a deep learning model using the convolutional neural network (CNN) to apply sentence analysis on the data and extract information content in the data from end users. We can predict the data that will most likely to be requested by the end users to reduce service latency by caching the data close to the end users by the interest of the end users. We shows the effectiveness of our proposed algorithm by comparing with other approaches in our simulation.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Threat modeling for mobile health systems 移动卫生系统的威胁建模
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-01 DOI: 10.1109/WCNCW.2018.8369033
M. Cagnazzo, Markus Hertlein, Thorsten Holz, N. Pohlmann
{"title":"Threat modeling for mobile health systems","authors":"M. Cagnazzo, Markus Hertlein, Thorsten Holz, N. Pohlmann","doi":"10.1109/WCNCW.2018.8369033","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8369033","url":null,"abstract":"Mobile Health (mHealth) is on the rise and it is likely to reduce costs and improve the quality of healthcare. It tightly intersects with the Internet of Things (IoT) and comes with special challenges in terms of interoperability and security. This paper focuses on security challenges and offers a mitigation solution especially with a focus on authentication and encryption for resource constrained devices. It identifies assets in a prototyped mHealth ecosystem and classifies threats with the STRIDE methodology. Furthermore the paper identifies associated risk levels using DREAD and outlines possible mitigation strategies to provide a reasonable trustworthy environment.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Challenges for enabling virtual reality broadcast using 5G small cell network 利用5G小型蜂窝网络实现虚拟现实广播的挑战
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) Pub Date : 2018-04-01 DOI: 10.1109/WCNCW.2018.8368976
A. Prasad, M. Uusitalo, David Navratil, Mikko Säily
{"title":"Challenges for enabling virtual reality broadcast using 5G small cell network","authors":"A. Prasad, M. Uusitalo, David Navratil, Mikko Säily","doi":"10.1109/WCNCW.2018.8368976","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368976","url":null,"abstract":"In the recent past, with the ubiquitous adoption of smartphones and tablets, there has been an exponential increase in data rate demands which has become increasingly challenging for network operators to support. This trend is expected to continue in future, with the advent of high-performance gaming and increasing appetite for immersive applications and social media experiences. Such factors have contributed to the development of the fifth generation (5G) of mobile networks, which would be supporting significantly higher data rates with improved reliability and latency. 5G has also enabled the deployment of wireless virtual reality applications, with wide-ranging use cases. In this work, we consider the key challenges for broadcasting such content to a large number of audience thereby enabling new disruptions in mass media consumption. The technology potential and practical constraints for such deployments were also evaluated using realistic network settings. Based on the performance evaluations, it was shown that with slightly higher system bandwidth requirements, VR broadcast can be supported under ideal conditions, using 5G millimeter wave small cell networks. Potential areas for future work in order to make VR broadcast a reality is also discussed.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132789843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信