Nesrine Zaghdoud, A. B. Mnaouer, H. Boujemaa, F. Touati
{"title":"Secrecy Performance of Cooperative NOMA System with Multiple Full-Duplex Relays against Non-Colluding/Colluding Eavesdroppers","authors":"Nesrine Zaghdoud, A. B. Mnaouer, H. Boujemaa, F. Touati","doi":"10.1109/LCNSymposium50271.2020.9363270","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363270","url":null,"abstract":"In 5G and beyond wireless communication net-works, non-orthogonal multiple access (NOMA) and Full-Duplex (FD) techniques are considered as promising key techniques. However, the secrecy in NOMA systems has proven to be quite challenging, especially in the presence of multiple eavesdroppers. For this purpose and using the potential of cooperative and FD communication, we investigate the secrecy performance of dual-hop FD Amplify-and-Forward NOMA system. Based on the channel state information of the first hop, partial relay selection (PRS) is performed to determine the best relay. The secrecy outage behaviour of the considered system is studied through deriving closed-form expressions of the secrecy outage probability (SOP) metric for both strong and weak NOMA users under the presence of multiple eavesdroppers in colluding and non-colluding wiretapping scenarios. Numerical results are also provided to verify the derived analytical results.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125993642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Impact of Burst Loss for QoE-Based Performance Evaluations for Video Streaming","authors":"Dominic Laniewski, Bertram Schütz, N. Aschenbruck","doi":"10.1109/LCNSymposium50271.2020.9363272","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363272","url":null,"abstract":"In the broad area of performance evaluation of multimedia networking mechanisms, quality of experience (QoE) assessments are often used as a performance metric. Even though intensive efforts have been made to understand the impact of packet loss on QoE for different application scenarios, there is no consensus about how specific packet loss patterns impact the QoE for RTP video streaming. In this paper, we conduct an extensive study on the impact of uniformly distributed random and burst loss on the QoE-metrics Peak-Signal-to-Noise-Ratio (PSNR), Structural Similarity (SSIM), and Video Multi-Method Assessment Fusion (VMAF). Overall, our study indicates that for QoE-based performance evaluations, it is in most cases sufficient to only consider easier to understand and easier to model uniformly distributed random loss.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127025345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GAA-GAA Coexistence in the CBRS Band: Performance Evaluation of Approach 3","authors":"Weichao Gao, A. Sahoo, E. Bradford","doi":"10.1109/LCNSymposium50271.2020.9363267","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363267","url":null,"abstract":"The General Authorized Access (GAA) users operate at the lowest priority in the Citizens Broadband Radio Service (CBRS) band. So, they must not cause harmful interference to the higher priority users and must cooperate with each other to minimize mutual interference and increase spectrum utilization. Towards this goal, the Wireless Innovation Forum (WInnForum), a standards body, has recommended three schemes. We study performance of one of the schemes, called Approach 3. To the best of our knowledge, there is no performance study available for Approach 3. WInnForum does not specify any performance metrics to evaluate the schemes. We define few performance metrics for Approach 3 that will be useful for the operators in deciding their operating parameters. We choose two actual locations and use real terrain and land cover data of continental USA in our simulation study. Hence, we expect our results to be similar to practical implementations.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116654031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amira Rayane Benamer, N. Hadj-Alouane, K. Boussetta
{"title":"Online Games Servers Placement in Fog Computing: an Hybrid Bio-inspired Approach","authors":"Amira Rayane Benamer, N. Hadj-Alouane, K. Boussetta","doi":"10.1109/LCNSymposium50271.2020.9363254","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363254","url":null,"abstract":"Fog computing is a promising paradigm to enable online games at the rim of the network, especially for First Person Shooter games with a restrict deadline. In this context, server placement is a fundamental issue. The latter concerns where game services providers should place their servers in order to meet players expectations in terms of quality of experience while maximizing their profit. In this paper, we investigate the server placement problem, at the fog landscape, to minimize the allocation cost and the potential penalty in terms of resources due to the limited fog capacity and deadline violation. We formulate this problem as an integer nonlinear programming. As the latter is time consuming, we propose an hybrid bio-inspired heuristic composed of Grouping Genetic Algorithm and Particle Swarm Optimization. Performance results demonstrate that our proposal can generate solutions at reduced time with a gap to optimal less than 5%.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maginot Lines and Tourniquets: On the Defendability of National Cyberspace","authors":"D. Gosain, Madhur Rawat, P. Sharma, H. B. Acharya","doi":"10.1109/LCNSymposium50271.2020.9363273","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363273","url":null,"abstract":"National governments know the Internet as both a blessing and a headache. On the one hand, it unlocks great economic and strategic opportunity. On the other hand, government, military, or emergency-services become vulnerable to scans (Shodan), attacks (DDoS from botnets like Mirai), etc., when made accessible on the Internet.How hard is it for a national government to effectively secure its entire cyberspace? We approach this problem from the view that a coordinated defense involves monitors and access control (firewalls etc.) to inspect traffic entering or leaving the country, as well as internal traffic. In several case studies, we consistently find a natural Line of Defense — a small number of Autonomous Systems (ASes) that intercept most (> 95%) network paths in the country. We conclude that in many countries, the structure of the Internet actually makes it practical to build a nation-scale cordon, to detect and filter cyber attacks.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Reinforcement Learning Based Energy-efficient Task Offloading for Secondary Mobile Edge Systems","authors":"Xiaojie Zhang, Amitangshu Pal, S. Debroy","doi":"10.1109/LCNSymposium50271.2020.9363256","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363256","url":null,"abstract":"In order to support last-mile wireless connectivity of computation-intensive applications, edge systems can benefit from secondary (i.e., opportunistic) utilization of licensed spectrum. However, spectrum sensing for such secondary utilization can end up causing considerable energy consumption for already energy-constrained mobile devices. In this paper, we propose an energy-aware task offloading strategy for secondary edge systems that aims to find trade-offs between channel sensing and task offloading for mobile device energy optimization. The proposed strategy employs a Deep Reinforcement Learning based approach that rewards secondary mobile devices for taking part in cooperative spectrum sensing by allowing them to offload their compute-intensive tasks to edge servers in order to conserve energy. Using simulations, we demonstrate how effectively the proposed strategy can capture dynamic channel states and enforce intelligent offloading decisions. Results show our strategy’s benefits over optimization-based approaches and demonstrate its practicality for real-world use-cases where devices are controlled by different stakeholders.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114467960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sum-Rate Optimization-based Access Mode Selection and Resource Allocation for IoT Devices in 5G","authors":"Tazeem Ahmad, Rong Chai, M. Adnan","doi":"10.1109/LCNSymposium50271.2020.9363260","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363260","url":null,"abstract":"In the future fifth-generation (5G) systems, a hybrid or coexisting non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA) schemes is a promising technology that can greatly enhance network capacity and reduce interference. In this paper, we study the access mode selection and resource allocation problem for machine-type communication devices (MTCDs) in 5G. The sum-rate of the MTCDs is computed and the joint access mode selection and resource allocation problem is formulated as a sum-rate maximization problem that maximizes system sum-rate. As the original optimization problem is a nonlinear fractional problem, which cannot be solved conveniently, we transform it into power allocation subproblem and access mode selection subproblem and solve these two sub-problems successively using Lagrange dual method and heuristic algorithm. Numerical results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126990754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Tahir Abbas, Johan Eklund, Karl-Johan Grinnemo, A. Brunström, Stefan Alfredsson, Özgü Alay, Sándor Katona, Gergely Seres, Bela Rathonyi
{"title":"Guidelines for an Energy Efficient Tuning of the NB-IoT Stack","authors":"Muhammad Tahir Abbas, Johan Eklund, Karl-Johan Grinnemo, A. Brunström, Stefan Alfredsson, Özgü Alay, Sándor Katona, Gergely Seres, Bela Rathonyi","doi":"10.1109/LCNSymposium50271.2020.9363265","DOIUrl":"https://doi.org/10.1109/LCNSymposium50271.2020.9363265","url":null,"abstract":"In this paper, we study the energy consumption of Narrowband IoT devices. The paper suggests that key to saving energy for NB-IoT devices is the usage of full Discontinuous Reception (DRX), including the use of connected-mode DRX (cDRX): In some cases, cDRX reduced the energy consumption over a 10-year period with as much as 50%. However, the paper also suggests that tunable parameters, such as the inactivity timer, do have a significant impact. On the basis of our findings, guidelines are provided on how to tune the NB-IoT device so that it meets the target of the 3GPP, i.e., a 5-Wh battery should last for at least 10 years. It is further evident from our results that the energy consumption is largely dependent on the intensity and burstiness of the traffic, and thus could be significantly reduced if data is sent in bursts with less intensity, irrespective of cDRX support.","PeriodicalId":194989,"journal":{"name":"2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}