2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)最新文献

筛选
英文 中文
An Analytical Model for a Class of Receiver-Initiated MAC Protocols for Energy Harvesting Wireless Sensor Networks 能量采集无线传感器网络中一类接收机发起的MAC协议的解析模型
C. Blondia
{"title":"An Analytical Model for a Class of Receiver-Initiated MAC Protocols for Energy Harvesting Wireless Sensor Networks","authors":"C. Blondia","doi":"10.23919/PEMWN53042.2021.9664679","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664679","url":null,"abstract":"In this paper we propose an analytical model for a general class of receiver-initiated MAC protocols for energy-harvesting wireless sensor networks. The aim is to evaluate the system occupancy of a sensor node and the average delay a packet in a node experiences, taking into account the energy that is consumed by the radio using the stored energy in a capacitor. Packets are generated by the node itself but may also arrive from neighbor nodes using a receiver-initiated MAC protocol. The radio switches between Transmit, Receive and Sleep states. During the Sleep state, energy is harvested and stored in a capacitor. The sensor node is modeled by means of a finite capacity queue with repeated server vacations of different types and the available energy is modeled by means of an extra variable. The system occupancy and the available energy are observed at inspection instants (i.e., the end of a service or the end of a vacation), resulting in a discrete-time Markov Chain. Closed form formulas for the system occupancy distribution at at arbitrary time instants together with the mean response time are derived. The model is applied to evaluate the sensor node’s performance for various parameter values.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123840716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward 异常检测的多属性监测:一种基于无监督奖励的强化学习方法
Mohamed Said Frikha, S. Gammar, Abdelkader Lahmadi
{"title":"Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward","authors":"Mohamed Said Frikha, S. Gammar, Abdelkader Lahmadi","doi":"10.23919/PEMWN53042.2021.9664667","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664667","url":null,"abstract":"This paper proposes a new method to solve the monitoring and anomaly detection problems of Low-power Internet of Things (IoT) devices. However, their performances are constrained by limited processing, memory, and communication, usually using battery-powered energy. Polling driven mechanisms for monitoring the security, performance, and quality of service of these networks should be efficient and with low overhead, which makes it particularly challenging. The present work proposes the design of a novel method based on a Deep Reinforcement Learning (DRL) algorithm coupled with an Unsupervised Learning reward technique to build a pooling monitoring of IoT networks. This combination makes the network more secure and optimizes predictions of the DRL agent in adaptive environments.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131527717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain based OAuth for IoT
Imen Riabi, Hella Kaffel Ben Ayed, Bilel Zaghdoudi, L. George
{"title":"Blockchain based OAuth for IoT","authors":"Imen Riabi, Hella Kaffel Ben Ayed, Bilel Zaghdoudi, L. George","doi":"10.23919/PEMWN53042.2021.9664701","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664701","url":null,"abstract":"We propose the integration of blockchain with the OAuth standard. Two blockchains are considered for the implementation: Ethereum where ACL and token processing is performed on-chain and MultiChain where the processing is performed off-chain. The experiments show that the on-chain token generation provides an additional overhead compared to the off-chain one. However, it provides a secure token management and access traceability. The main advantage of our contribution is to propose a decentralized authorization system while relying on a standard specification.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Hierarchical Neural Network Offloading in IoT Edge Networks 物联网边缘网络中的动态分层神经网络卸载
Wassim Seifeddine, C. Adjih, N. Achir
{"title":"Dynamic Hierarchical Neural Network Offloading in IoT Edge Networks","authors":"Wassim Seifeddine, C. Adjih, N. Achir","doi":"10.23919/PEMWN53042.2021.9664700","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664700","url":null,"abstract":"In recent developments in machine learning, a trend has emerged where larger models achieve better performance. At the same time, deploying these models in real-life scenarios is difficult due to the parallel trend of pushing them on end-users or IoT devices with strong resource limitations. In this work, we develop a novel technique for executing parts of a single model successively through multiple devices (IoT, edge, cloud) while respecting each device’s resource limitations. For that, we introduce a new offloading mechanism where, during computation, a decision can be made to offload work, together with the ability to exit early in the computation with intermediate results. The decision itself is tuned through Deep Q-Learning.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks 贪婪行为攻击对车载自组织网络的影响分析
Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, P. Muhlethaler, S. Bouzefrane, L. Saïdane
{"title":"Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks","authors":"Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, P. Muhlethaler, S. Bouzefrane, L. Saïdane","doi":"10.23919/PEMWN53042.2021.9664702","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664702","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs), while promising new approaches to improving road safety, must be protected from a variety of threats. Greedy behavior attacks at the level of the Medium Access (MAC) Layer can have devastating effects on the performance of a VANET. This kind of attack has been extensively studied in contention-based MAC protocols. Hence, in this work, we focus on studying the impact of such an attack on a contention-free MAC protocol called Distributed TDMA-based MAC Protocol DTMAC. We identify new vulnerabilities related to the MAC slot scheduling process that can affect the slot reservation process on the DTMAC protocol and we use simulations to evaluate their impact on network performance. Exploitation of these vulnerabilities would result in a severe waste of channel capacity where up to a third of the free slots could not be reserved in the presence of an attacker. Moreover, multiple attackers could cripple the channel and none could acquire a time slot.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131819414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep-IRSA: A Deep Reinforcement Learning Approach to Irregular Repetition Slotted ALOHA Deep- irsa:不规则重复开槽ALOHA的深度强化学习方法
Ibrahim Ayoub, Iman Hmedoush, C. Adjih, K. Khawam, S. Lahoud
{"title":"Deep-IRSA: A Deep Reinforcement Learning Approach to Irregular Repetition Slotted ALOHA","authors":"Ibrahim Ayoub, Iman Hmedoush, C. Adjih, K. Khawam, S. Lahoud","doi":"10.23919/PEMWN53042.2021.9664720","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664720","url":null,"abstract":"The Internet of Things (IoT) aims to connect billions of devices, most of which are power and memory-constrained. Such constraints require efficient network access. “Irregular Repetition Slotted Aloha” (IRSA) meets such requirements. In this paper, we optimize IRSA using Deep Reinforcement Learning to obtain Deep-IRSA, and introduce variants that allow retransmission and user priority classes. We observe the learned degree distribution and throughput, showing that Deep-IRSA performs excellently, is generic, and could well replace known approaches for smaller frame sizes and IRSA variants.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Surveying and Analyzing Privacy Issues in Contact tracing apps 调查和分析联系人追踪应用中的隐私问题
Rihab Boussada, Balkis Hamdane, F. Kamoun, L. Saïdane
{"title":"Surveying and Analyzing Privacy Issues in Contact tracing apps","authors":"Rihab Boussada, Balkis Hamdane, F. Kamoun, L. Saïdane","doi":"10.23919/PEMWN53042.2021.9664725","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664725","url":null,"abstract":"The coronavirus pandemic continues to represent widespread panic, and global initiatives are focused on treating and limiting its spread. Contact tracing promises to help fight this pandemic through early detection of possible contagion events. In this context, several mobile applications have been proposed to try to identify the contact cases of a person who tested positive for COVID-19. In total, 32 countries have developed such applications and are using them as a strategy that may flatten the pandemic curve. These applications can also be adopted to combat future communicable diseases among humans. However, most of these applications do not fully respect the preservation of the privacy of users. That’s why, the adoption of these applications is being held back in many countries. Motivated by the need to protect user privacy, we analyze some of these applications. We demonstrate that they collect sensitive data which represents a violation of user privacy. At the end, we present several major recommendations that can serve as a reference, contributing to the development of privacy-preserving contact tracing applications.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121616358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new Taxonomy of Physical-Layer Network Coding techniques in Two Way Relay Channel model with single antenna 单天线双向中继信道模型中物理层网络编码技术的新分类
Mohammed Aissaoui, Chiraz Houaidia, A. Bossche, T. Val, L. Saïdane
{"title":"A new Taxonomy of Physical-Layer Network Coding techniques in Two Way Relay Channel model with single antenna","authors":"Mohammed Aissaoui, Chiraz Houaidia, A. Bossche, T. Val, L. Saïdane","doi":"10.23919/PEMWN53042.2021.9664726","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664726","url":null,"abstract":"Physical-layer network coding (PNC) can effectively improve wireless networks by extracting superimposed signals and transforming collision’s dilemma into an advantage. The proposition of higher layer methods (such as Data Link and Network Layer) explicitly designed for PNC can better enhance wireless network performances. Since the field of PNC is very vast and has several applications, the researchers of the higher layers find it very difficult to propose a suitable PNC system for their research, which has led to the scarcity of research works of this type. This article proposes a new classification method designed to help researchers choose the optimal method that suits their system. This paper is a complete guide for researchers of higher layers to discover the PNC field and improve wireless network performances.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ANGELA: HTTP Adaptive Streaming and Edge Computing Simulator 安吉拉:HTTP自适应流和边缘计算模拟器
Jesús Aguilar Armijo, C. Timmerer, H. Hellwagner
{"title":"ANGELA: HTTP Adaptive Streaming and Edge Computing Simulator","authors":"Jesús Aguilar Armijo, C. Timmerer, H. Hellwagner","doi":"10.23919/PEMWN53042.2021.9664671","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664671","url":null,"abstract":"In this work, we present ANGELA, HTTP Adaptive Streaming (HAS) and Edge Computing Simulator. ANGELA was designed to test edge mechanisms that support HAS, as it offers: realistic radio layer simulation, different multimedia content configurations, access to radio and player metrics at the edge, and a wide variety of metrics to evaluate the video streaming session performance. The ANGELA architecture is flexible and can support adaptive bitrate (ABR) algorithms located at different points of the network. Moreover, we show the possibilities of ANGELA by evaluating different ABR algorithms.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128616431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental Performance Evaluation of Cellular IoT networks in Deep-Indoor Scenario 深层室内场景下蜂窝物联网网络的实验性能评估
Kalpit Dilip Ballal, L. Dittmann, S. Ruepp
{"title":"Experimental Performance Evaluation of Cellular IoT networks in Deep-Indoor Scenario","authors":"Kalpit Dilip Ballal, L. Dittmann, S. Ruepp","doi":"10.23919/PEMWN53042.2021.9664690","DOIUrl":"https://doi.org/10.23919/PEMWN53042.2021.9664690","url":null,"abstract":"Narrow-band Internet of Things (NB-IoT) and LTE-M are two emerging Low Power Wide Area Network (LPWAN) technologies in the IoT space. Both NB-IoT and LTE-M are based on the 3GPP LTE standard with added features specifically designed for Low Power, remote, and reliable IoT applications. Among other things, these Cellular-IoT (C-IoT) technologies promise improved deep-indoor performance (at least 20 dBm) over traditional LTE standards. In this paper, we have tried to evaluate the deep-indoor performance of NB-IoT and LTE-M. The technologies have been evaluated based on End-to-End delay, bitrate, received signal quality, and packet drop in uplink (UL) and downlink (DL) directions. The tests have been performed using the commercially deployed NB-IoT and LTE-M networks by operators in Denmark. These tests were conducted in the underground tunneling system of the Technical University of Denmark at levels L-1 and L-2 from the ground surface. The outcome of these tests was then compared with the outcome from the best-case scenario, where the base station is in the Line of Site (LOS) to the User Equipment(UE). In total, the tests were conducted at 18 different locations with a total of approx—two hundred eighty-eight thousand packets sent using both technologies, over two telecom operators with varying packet sizes. The goal behind experiments is to test the performance of C-IoT technologies in multi-technology deployment (in parallel with GSM, LTE, etc.) and gather real-world performance data from the networks. The idea is to determine whether C-IoT can be used for deep-indoor applications deployment. The results from these tests indicate that C-IoT networks had a degraded and unreliable performance in poor radio conditions.","PeriodicalId":196945,"journal":{"name":"2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132589143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信