2020 2nd International Conference on Computer Communication and the Internet (ICCCI)最新文献

筛选
英文 中文
Handover Management for D2D Communication in 5G Networks 5G网络中D2D通信的切换管理
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145969
W. Lai, Chin-Shiuh Shieh, Fu-Sheng Chou, Chia-Yu Hsu, Meng-Han Shen
{"title":"Handover Management for D2D Communication in 5G Networks","authors":"W. Lai, Chin-Shiuh Shieh, Fu-Sheng Chou, Chia-Yu Hsu, Meng-Han Shen","doi":"10.1109/ICCCI49374.2020.9145969","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145969","url":null,"abstract":"This study addresses the handover management issue for Device-to-Device communication in 5G networks. The 3rd Generation Partnership Project (3GPP) drafted a standard for Proximity Services (ProSe), also named Device-to-Device (D2D) communication, which is a promising technology in offering higher throughput and lower latency services to end-users. Handover is an essential issue in wireless mobile networks due to the mobility of user equipment (UE). Currently, the handover mechanism for D2D pairs is not standardized yet. LTE-A only considers the handover procedure of a single user. Therefore, when a D2D pair moves across cell boundaries, the control channels of the two UEs may connect to different base stations and result in increased latency. Hence, we propose a handover management scheme for D2D communication to encourage both parties of a D2D pair to handover to the same destination eNB at the same time. By doing so, the number of unnecessary handovers, as well as the handover latency, can be reduced. In the proposed method, we predict the destination eNB of D2D users based on their movements and the received signal characteristics. Subsequently, we make a handover decision for each D2D pair by jointly factoring in the signal quality and connection stability. Expected improvement can be attained, as revealed in the simulation.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trait Extraction Method for Digital Equipment Using Clock Drifts Based on Comparison of Criterion Server 基于标准服务器比较的时钟漂移数字设备特征提取方法
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145998
Naoto Hoshikawa, T. Shimobaba, T. Ito
{"title":"Trait Extraction Method for Digital Equipment Using Clock Drifts Based on Comparison of Criterion Server","authors":"Naoto Hoshikawa, T. Shimobaba, T. Ito","doi":"10.1109/ICCCI49374.2020.9145998","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145998","url":null,"abstract":"Open connectivity is required to expand the IoT services, but such environments are prone to the risk of information leakage and illegal operation by spoofing. In this paper, we present clock fingerprints concept based on clock frequency trait, and propose a method for extracting trait using clock drifts and criterion server. This trait can be available in identifying digital equipment to increase security in the future open IoT services. In our two experiments, we demonstrate the extraction of traits from some computers. First one show that unique characteristics can be extracted from two kinds of clock signals. Second show that different characteristics can be extracted from the same model number and the same software settings. We conclude with the challenges that we plan to address in our future work to improve this method.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Analysis of Symmetric Block Cipher Kuznyechik 库兹涅奇克对称块密码的功率分析
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145964
E. Maro, Vadim Girichev
{"title":"Power Analysis of Symmetric Block Cipher Kuznyechik","authors":"E. Maro, Vadim Girichev","doi":"10.1109/ICCCI49374.2020.9145964","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145964","url":null,"abstract":"Paper presents an overview of power analysis attack and experimental results of the first main stage of simple power analysis (SPA) and differential power analysis (DPA) attacks-a practical correlation of power consumption measurement charts to each of encryption operations for standard Kuznyechik cipher (GOST R 34.12-2015 (n = 128)). As part of experiments we construct lightweight hardware implementation of Kuznyechik cipher on Arduino electric board (namely Arduino Nano) and compile measurements of power consumption by LECROY WavePro 7100A oscilloscope (with a 1 GHz bandwidth and 10 GHz / 4 channel sampling frequency). Our experiments led to finding signature (fixed structure and power consumption value) for encryption operations of Kuznyechik cipher: additions with round key, nonlinear transformation and linear transformation.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126353548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficiency Comparison for Full-Duplex DF and AF Relaying Protocols 全双工DF和AF中继协议的能效比较
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145975
Zhongxia Gao, Runhe Qiu, Caixia Cai, Jiai Xue, Chen Wang, Sijing Chen
{"title":"Energy Efficiency Comparison for Full-Duplex DF and AF Relaying Protocols","authors":"Zhongxia Gao, Runhe Qiu, Caixia Cai, Jiai Xue, Chen Wang, Sijing Chen","doi":"10.1109/ICCCI49374.2020.9145975","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145975","url":null,"abstract":"In this paper, the energy efficiency (EE) of full-duplex (FD) two-hop relay system with decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols is studied. The residual self-interference (RSI) is modeled as a linear function of relay transmit power first. Then, with the constant transmission rate, the EE maximization problem is transformed into transmit power minimization problem and the minimum transmit power consumptions of the DF and AF protocols are obtained. Furthermore, the EE comparison of the DF and AF protocols is given with the minimum transmit power consumption. The simulation results are given to verify the theoretical EE analysis and comparison.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bayesian Estimation Method of Transportation Frequency for Disaster Information Sharing System 灾害信息共享系统运输频率的贝叶斯估计方法
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145965
Kaito Shibutani, A. Kobayashi
{"title":"Bayesian Estimation Method of Transportation Frequency for Disaster Information Sharing System","authors":"Kaito Shibutani, A. Kobayashi","doi":"10.1109/ICCCI49374.2020.9145965","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145965","url":null,"abstract":"In large-scale disasters such as earthquakes, sharing of disaster information is required without relying on the existing communication infrastructure. In this paper, we propose a disaster information sharing system using passive portable storages such as a USB memory stick as for communication media. Our pro-posed system assumes a serious disaster that requires the physical transport of communication media. In this system, the portable storages are transported by local citizens. In such situations, each sending node cannot know both the destination node of each message and the receiver node of portable storages. Therefore, an efficiency content selection method is required for our proposed system. We also propose a content selection method based on priority. The proposed method calculates the content priority based on the transportation frequency information between nodes estimated from the transportation history of portable storages and the content diffusion information in the network. We have revealed the effectiveness of our proposed method by simulation using actual geographical points of evacuation centers.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Topology Planning for Wireless Mesh Networks Based on Deep Reinforcement Learning 基于深度强化学习的无线网状网络拓扑规划研究
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145985
Changsheng Yin, Ruopeng Yang, Xiaofei Zou, Wei Zhu
{"title":"Research on Topology Planning for Wireless Mesh Networks Based on Deep Reinforcement Learning","authors":"Changsheng Yin, Ruopeng Yang, Xiaofei Zou, Wei Zhu","doi":"10.1109/ICCCI49374.2020.9145985","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145985","url":null,"abstract":"Focus on the access point deployment and topology control problem in Wireless Mesh Networks (WMNs), a topology planning method based on deep reinforcement learning was proposed. Developing a method of sample data generation using monte-carlo tree search and self-game, then a policy and value network based on residual network was established. A model based on Tensorflow was developed to solve the training problem. Finally, simulation results show that the proposed method can provide efficient network planning solution with high performance on timeliness and validity.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126265417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Diagnostic Framework for Distributed Application Performance Anomaly Based on Adaptive Instrumentation 基于自适应检测的分布式应用程序性能异常诊断框架
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145997
Shudong Zhang, Dongxue Liu, Lijuan Zhou, Zhongshan Ren, Zipeng Wang
{"title":"Diagnostic Framework for Distributed Application Performance Anomaly Based on Adaptive Instrumentation","authors":"Shudong Zhang, Dongxue Liu, Lijuan Zhou, Zhongshan Ren, Zipeng Wang","doi":"10.1109/ICCCI49374.2020.9145997","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145997","url":null,"abstract":"Instrumentation technology can obtain the status information of the distributed system when it is running. It is the core part of software performance management tools. But the use of instrumentation technology is often accompanied by a waste of resources. In this paper, we designed an adaptive instrumentation mechanism to balance the monitoring needs and resource load. Using analytical models based on linear regression and K-Means based on density algorithm to analyze performance data, determine the actual operating conditions and monitoring requirements of the monitored system, dynamically change the insertion point, and reduce resource consumption. Experiments show that compared with traditional tools, using the method of this article for monitoring, when the user clicks a lot, the system throughput is lower, the resource load is smaller, the average response time of the tested web page is reduced by 3.37%, and the target program is Interference is smaller.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131288072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Optimization Based on Mimic Common Operating Environment for the Internet of Vehicles 基于模拟通用操作环境的车联网安全优化
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145966
Yue Xu, M. Ni, Fei Ying, Jingwen Zhang
{"title":"Security Optimization Based on Mimic Common Operating Environment for the Internet of Vehicles","authors":"Yue Xu, M. Ni, Fei Ying, Jingwen Zhang","doi":"10.1109/ICCCI49374.2020.9145966","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145966","url":null,"abstract":"The increasing vehicles have brought convenience to people as well as many traffic problems. The Internet of Vehicles (IoV) is an extension of the intelligent transportation system based on the Internet of Things (IoT), which is the omnibearing network connection among “Vehicles, Loads, Clouds”. However, IoV also faces threats from various known and unknown security vulnerabilities. Traditional security defense methods can only deal with known attacks, while there is no effective way to deal with unknown attacks. In this paper, we show an IoV system deployed on a Mimic Common Operating Environment (MCOE). At the sensing layer, we introduce a lightweight cryptographic algorithm, LBlock, to encrypt the data collected by the hardware. Thus, we can prevent malicious tampering of information such as vehicle conditions. At the application layer, we firstly put the IoV system platform into MCOE to make it dynamic, heterogeneous and redundant. Extensive experiments prove that the sensing layer can encrypt data reliably and energy-efficiently. And we prove the feasibility and security of the Internet of Vehicles system platform on MCOE.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Successive Artificial Noise Cancellation for Security Enhancing Spatial Modulation 增强空间调制安全性的连续人工降噪
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145986
Weicheng Yu, Xue-fen Wan, Xueqin Jiang, Jun Li, Miaowen Wen, J. Hou
{"title":"Successive Artificial Noise Cancellation for Security Enhancing Spatial Modulation","authors":"Weicheng Yu, Xue-fen Wan, Xueqin Jiang, Jun Li, Miaowen Wen, J. Hou","doi":"10.1109/ICCCI49374.2020.9145986","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145986","url":null,"abstract":"Spatial modulation (SM) as a new transmission technique has a wide application prospect in multiple-input multiple-output (MIMO) wireless communications. In this paper, a novel physical layer security enhancing scheme using artificial noise (AN)is proposed for SM systems. In the proposed scheme, the transmitted signals contain the useful information symbols and the AN that is designed by exploiting the knowledge of the channel state information (CSI) over the legitimate channel. A new detection scheme is also proposed, which detects the information symbols by using signals received across two successive time slots such that the AN can only be perfectly cancelled at the legitimate receiver while confusing the passive eavesdropper. Furthermore, the simulation results on secrecy rate verify that the proposed security enhancing scheme can achieve a satisfactory performance.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132912151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Robot Position Control Using Force Information in Remote Robot Systems with Force Feedback: Comparition between Human-Robot and Robot-Robot Cases 力反馈远程机器人系统中基于力信息的机器人位置控制效果:人-机器人与机器人-机器人案例比较
2020 2nd International Conference on Computer Communication and the Internet (ICCCI) Pub Date : 2020-06-01 DOI: 10.1109/ICCCI49374.2020.9145962
S. Ishikawa, Y. Ishibashi, Pingguo Huang, Y. Tateiwa
{"title":"Effects of Robot Position Control Using Force Information in Remote Robot Systems with Force Feedback: Comparition between Human-Robot and Robot-Robot Cases","authors":"S. Ishikawa, Y. Ishibashi, Pingguo Huang, Y. Tateiwa","doi":"10.1109/ICCCI49374.2020.9145962","DOIUrl":"https://doi.org/10.1109/ICCCI49374.2020.9145962","url":null,"abstract":"By experiment, this paper investigates effects of the robot position control using force information, which we previously proposed, for cooperative work between two remote robot systems with force feedback. As cooperative work, we deal with work in which a human and a robot arm in the system (i.e. human-robot) or two robot arms (robot-robot) carry an object together. Then, one robot arm which is operated automatically under the robot position control using force information follows a human or another robot arm. In our experiment, we compare force applied to the object between the human-robot and the robot-robot cases. In the robot-robot case, we also deal with the case in which the control is carried out in both systems, and the case in which the control is performed in only one system. Experimental results demonstrate that the human-robot case is the best among the three cases.","PeriodicalId":153290,"journal":{"name":"2020 2nd International Conference on Computer Communication and the Internet (ICCCI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122590585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信