{"title":"Distributed Mechanism for Computation Offloading Task Routing in Mobile Edge Cloud Network","authors":"Lijun Dong, Richard Li","doi":"10.1109/ICCNC.2019.8685537","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685537","url":null,"abstract":"The paper proposes a distributed mechanism for computation offloading task routing and dispatching in Mobile Edge Cloud (MEC) networks, based on an evolutional Internet framework named Big IP (BPP). The necessary information for computation offloading requests and server status updates is proposed in the paper, which can be carried in the Instructions and Metadata blocks as the extensions to the current IP packet. The numerical results are given to show the performance efficiency of the proposed BPP based mechanism in providing the high precision latency guarantee and reducing the control overhead for computation offloading.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124873942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lanlin Li, Yinglei Teng, Mei Yan, Mei Song, Lihong Song
{"title":"A Two-phase Transmission Protocol Design for Ultra-reliable Communications","authors":"Lanlin Li, Yinglei Teng, Mei Yan, Mei Song, Lihong Song","doi":"10.1109/ICCNC.2019.8685522","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685522","url":null,"abstract":"The emergence of the fifth generation (5G) wireless communications promotes the development of machine-type communication (MTC), which emphasizes on the ultra-reliable and low latency communications. In order to meet such requirements and considering the hierarchical network architecture in industrial scene, in this paper, we propose a novel two-phase transmission protocol based on the clustered device-to-device (D2D) networks, so that in industrial automation, the downlink transmissions of control information could reach the reliability as high as possible within 1ms. Employing the diversity gain through multi-user beam forming in Phase I and the time-division multiple-access (TDMA) fashion in Phase II, both the power consumption and reliability metrics are targeted. Simulation results show that the proposed transmission protocol realizes the ultra-reliable communications within the delay requirement, and advances comparing with the existing schemes to some extent.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"47 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114089453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huan-Bang Li, K. Takizawa, Toshinori Kagawa, F. Kojima, R. Miura
{"title":"Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner Transceiver","authors":"Huan-Bang Li, K. Takizawa, Toshinori Kagawa, F. Kojima, R. Miura","doi":"10.1109/ICCNC.2019.8685621","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685621","url":null,"abstract":"Impulse radio UWB (IR-UWB) is widely known for its potentials of providing high precision on localization. To fully take advantage of IR-UWB, errors introduced by circuits or signal processing need to be reduced as small as possible. In this paper, we focus on the IR-UWB transceiver. We revisit our previously implemented IR-UWB transceiver, where a fixed time bias was adopted to compensate the time difference between the time that an IR-UWB pulse is physically detected and the time that the detection of pulse is noticed inner transceiver. We find that the ranging error varies with distance, which can’t be well reflected by a fixed time bias. By replacing the fixed time bias with an adaptive time bias, we show that the ranging error is reduced approximately 58%. We further examine the effect of the adaptive time bias on localization and confirm that localization accuracy can be improved accordingly.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Asfaw, Xueqin Jiang, Meixiang Zhang, J. Hou, Wei Duan
{"title":"Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution","authors":"M. Asfaw, Xueqin Jiang, Meixiang Zhang, J. Hou, Wei Duan","doi":"10.1109/ICCNC.2019.8685662","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685662","url":null,"abstract":"In information theory and communication, quantum communication and technologies have brought about huge changes. It has been proved that secret key communication over a quantum channel is possible using quantum key distribution and different types of codes has been used to research if they could yield the desired results for information reconciliation in continuous variable quantum key distribution. Raptor codes are the first rateless codes with linear time encoding and decoding with vast application in information communication. Its versatile use and behavior inspired to analysis of their performance for information reconciliation. In this paper, we use a special pre-coding scheme based on the Digital Video Broadcasting-Satellite Standard (DVB-S2) and a special code length relationship between the intermediate symbols and the encoded symbols. Simulation results show that this raptor codes’ frame error rate performance can be manipulated easily over different ranges of signal to noise ratio.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121074080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Tang, Yu Yu, D. So, Gaojie Chen, Xiuyin Zhang, Mo Huang
{"title":"Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems","authors":"Jie Tang, Yu Yu, D. So, Gaojie Chen, Xiuyin Zhang, Mo Huang","doi":"10.1109/ICCNC.2019.8685620","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685620","url":null,"abstract":"In this paper, we investigate joint power allocation and splitting control in a SWIPT-enabled NOMA Systems applied with power splitting technique, with an aim to optimize the transmission rate and the total harvested energy simultaneously whilst satisfying the minimum transmission rate and minimum harvested energy of each user. These two conflicting objectives make the formulated optimization problem a constrained multi-objective optimization (MOO) problem, which is difficult to solve. To deal with this, we define a new objective function by summing the weighted values of the transmission rate achieved by information decoding (ID) and the transformed throughput from energy harvesting (EH) and transform the original MOO problem into a single-objective optimization problem. To tackle the formulated nonconvex problem, we decouple the optimization problem into two convex subproblems and solve them iteratively. Numerical results demonstrate that significant performance gain can be achieved by adopting the proposed algorithm.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125438989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, N. Baykal
{"title":"An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined","authors":"Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, N. Baykal","doi":"10.1109/ICCNC.2019.8685632","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685632","url":null,"abstract":"In the world of internet and communication technologies where our personal and business lives are inextricably tied to internet enabled services and applications, Distributed Denial of Service (DDoS) attacks continue to adversely affect the availability of these services and applications. Many frameworks have been presented in academia and industry to predict, detect and defend against DDoS attacks. The available solutions try to protect online services from DDoS attacks, but as yet there is no best-practice method that is widely-accepted in the community. Differentiating DDoS attacks from similar looking legitimate Flash Events (FE) wherein huge numbers of legitimate users try to access a specific internet based service or application, is another challenging issue in the field. This paper proposes a novel hybrid DDoS and FE detection scheme taking three isolated approaches including Kernel Online Anomaly Detection (KOAD), Support Vector Machine (SVM) and Information Theory. We applied our proposed approach on simulated DDoS attacks, real FEs and normal network traffic. The results indicate that information theory works well in combination with machine learning algorithms to detect and discriminate DDoS and FE traffic in terms of both false positive and detection rates.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125837590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefano Iannucci, Andrea Montemaggio, Byron Williams
{"title":"Towards Self-Defense of Non-Stationary Systems","authors":"Stefano Iannucci, Andrea Montemaggio, Byron Williams","doi":"10.1109/ICCNC.2019.8685487","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685487","url":null,"abstract":"One of the major trends in research on Intrusion Response Systems is to use a model of the system to be protected and/or a model of the attacker to predict the evolution of the system and of the strategy of the attacker. However, very often, modeled systems exhibit a non-stationary behavior due to changes in their configuration, in the software base and in the users behavior. If not properly captured by the system model, such a non-stationary behavior could lead to divergences between the expected and the actual behaviors, thus invalidating the model-based approach. In this paper, we introduce a model-free technique for self-defense of non-stationary systems based on Q-Learning. We experimentally show that the proposed approach is able to effectively capture the dynamics of the underlying system and quickly adapts to changes in the environment.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120964501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Interpolation for Deep Learning based Encrypted Data Packet Classification","authors":"Pan Wang, Yiqing Zhou, Feng Ye, Hao Yue","doi":"10.1109/ICCNC.2019.8685570","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685570","url":null,"abstract":"In this paper, we propose to apply deep learning for encrypted data packet classification. Due to the complexity of deep learning, it is inefficient to process the entire data packet, which is usually padded with many zeros. In order to reduce data size for classification, while maintaining high accuracy, we develop data interpolation schemes to process data packets with various lengths to a fixed size. In particular, three data interpolation schemes based on nearest value, bilinear and bicubic interpolation are proposed. Experiments are conducted using an open source dataset. The evaluation results demonstrate that our data interpolation schemes can be applied to process input data for higher computational efficiency without losing classification accuracy.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarthak Sharma, Hessam Mohammadmoradi, Milad Heydariaan, O. Gnawali
{"title":"Device-Free Activity Recognition Using Ultra-Wideband Radios","authors":"Sarthak Sharma, Hessam Mohammadmoradi, Milad Heydariaan, O. Gnawali","doi":"10.1109/ICCNC.2019.8685504","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685504","url":null,"abstract":"Human Activity Recognition (HAR) is a fundamental building block for the current trend of smart devices in Internet of Things (IoT). Ultra-Wideband RF technology has been used in localization research while Wi-Fi Channel State Information (CSI) has been widely investigated for non-obtrusive activity recognition in the literature. This paper investigates the feasibility of using UWB technology for Human Activity Recognition (HAR). The key idea is to use machine learning classification algorithms most suited to train models to classify different activities using the Channel Impulse Response (CIR) data of the UWB signals. Our experiments show that by using CIR data as features we can classify simple activities such as standing, sitting, lying with an accuracy of 95%. To compare this performance, we have also trained statistical models using Wi-Fi CSI. We found that, for all models UWB CIR significantly outperformed Wi-Fi CSI. Thus, we believe UWB to be a very effective technology in the context of device-free activity recognition.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124387285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kensei Saito, Y. Ogawa, T. Nishimura, T. Ohgane, J. Hagiwara
{"title":"Computational Complexity Reduction of Receive Weight Matrices in Massive MIMO SC-FDF†","authors":"Kensei Saito, Y. Ogawa, T. Nishimura, T. Ohgane, J. Hagiwara","doi":"10.1109/ICCNC.2019.8685600","DOIUrl":"https://doi.org/10.1109/ICCNC.2019.8685600","url":null,"abstract":"MIMO single-carrier frequency domain equalization (SC-FDE) can achieve high data-rate uplink transmission. We need, however, weight matrices for all the frequency points which separate spatially multiplexed signals and equalize channel distortion. In this paper, we deal with zero-forcing (ZF) matrices. To obtain them, we need matrix inverse calculations, and the computational complexity is heavy when the number of frequency points is large. It is possible to reduce the amount of calculations using an interpolation technique. We calculate ZF weight matrices for a part of frequency points, and for the remaining ones, we obtain the matrices by interpolation. This technique has been investigated for MIMO OFDM systems so far. In this paper, we consider computational complexity reduction for massive MIMO SC-FDE. We examine bit error rate (BER) performance of the linear and DFT interpolations. It is shown that the interpolation techniques achieve satisfactory BER with lower computational complexity. Also, we show that the ZF matrix is approximated by a maximum ratio combining (MRC) one in a massive MIMO case, and that the MRC matrix requires almost no computations and the degradation of the BER performance is small.","PeriodicalId":161815,"journal":{"name":"2019 International Conference on Computing, Networking and Communications (ICNC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}