2018 IEEE Global Communications Conference (GLOBECOM)最新文献

筛选
英文 中文
A Realistic Coordinated Scheduling Scheme for the Next-Generation RAN 一种面向下一代无线局域网的协调调度方案
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647252
Alberto Martínez Alba, A. Basta, Jorge Humberto Gómez Velásquez, W. Kellerer
{"title":"A Realistic Coordinated Scheduling Scheme for the Next-Generation RAN","authors":"Alberto Martínez Alba, A. Basta, Jorge Humberto Gómez Velásquez, W. Kellerer","doi":"10.1109/GLOCOM.2018.8647252","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647252","url":null,"abstract":"The design of the 5G next-generation radio access network (NG-RAN) proposes the division of the next- generation eNodeB (gNB) into centralized and distributed units. Centralization should facilitate coordination of RAN functions between gNBs, but the actual benefits of it are still unclear. In this paper, we provide a study of the feasibility and benefits of coordinated downlink scheduling. We first analyze the time constraints that a coordinated scheduler has to face from a theoretical perspective, and we back them with an experimental proof-of-concept. Then, we present a lightweight scheme for coordinated link adaptation that matches the previous constraints. We show that coordination is indeed feasible with state- of-the-art technology, although very limited by time constraints. Finally, we show the results of our experimental testbed, which successfully implemented the described coordination scheme under the predicted constraints.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection Sema-ICN:支持智能异常访问检测的以语义信息为中心的网络
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647325
Meng Xi, Jun Wu, Jianhua Li, Gaolei Li
{"title":"Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection","authors":"Meng Xi, Jun Wu, Jianhua Li, Gaolei Li","doi":"10.1109/GLOCOM.2018.8647325","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647325","url":null,"abstract":"As a next-generation networking architecture, information-centric networks (ICN) has strengthened the focus on physical location-independent content sharing, which introduces abundant semantic features and novel access approach. However, the semantic modeling of ICN is an unresolved problem, thus current ICN lacks the capabilities of smart content analysis and understanding to support the knowledge decision for optimized user experience. To address this issue, we propose a semantic ICN model, Sema-ICN, that can provide logically related information depending on content-relevance-based relationships extraction and name-based weight setting. Moreover, besides the great benefits brought into ICN by semantic features, Sema- ICN will also contribute to security protection against anomalous access, which usually the basis of further threats. In this paper, we additionally design a smart anomalous access detection scheme supported by Sema- ICN, in which semantic communities are partitioned utilizing spectral clustering according to content name with semantic attributes. And a forecast model is introduced to predict access situation based on triple exponential smoothing algorithm using historical request data, access traffic that is beyond the forecast results will be considered as anomalous. The simulation results demonstrate the efficiency of the proposed scheme. To the best of our knowledge, this work is the first to propose a novel semantic model for ICN.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reinforcement Learning Policy for Adaptive Edge Caching in Heterogeneous Vehicular Network 异构车辆网络自适应边缘缓存的强化学习策略
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647483
Jiayin Chen, Wenchao Xu, Nan Cheng, Huaqing Wu, Shan Zhang, Xuemin Shen
{"title":"Reinforcement Learning Policy for Adaptive Edge Caching in Heterogeneous Vehicular Network","authors":"Jiayin Chen, Wenchao Xu, Nan Cheng, Huaqing Wu, Shan Zhang, Xuemin Shen","doi":"10.1109/GLOCOM.2018.8647483","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647483","url":null,"abstract":"The flourishing vehicular applications require vehicles to download huge amount of Internet data, which consumes significant backhaul bandwidth and considerable time for data content delivery. Caching the popular data at network edge station can alleviate the congestion at backhaul network and reduce the data delivery delay. In this paper, we propose a dynamic edge caching policy for Heterogeneous Vehicular Network via Reinforcement Learning on adaptive traffic intensity and hot content popularity. We aim to enhance the download rate of vehicles adapting to dynamic vehicle velocity and hot file pool by caching the popular content on heterogeneous network edge stations. The proposed policy makes use of real time information and jointly considers download rate for each file and utility for edge stations to improve overall download performance. Simulation results show that our proposed policy can achieve better download rate than random and fixed caching policies.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124878011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Achieving Adaptive Linkability for Cellular V2X Group Communications in 5G 实现5G蜂窝V2X群通信的自适应连接能力
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647610
Dongxiao Liu, Jianbing Ni, Hongwei Li, Xuemin Shen
{"title":"Achieving Adaptive Linkability for Cellular V2X Group Communications in 5G","authors":"Dongxiao Liu, Jianbing Ni, Hongwei Li, Xuemin Shen","doi":"10.1109/GLOCOM.2018.8647610","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647610","url":null,"abstract":"Cellular vehicle-to-everything (C-V2X) in 5G enables device-to-device (D2D) group communications to support a variety of proximity-based services. While D2D group communication can improve mobile network spectrum efficiency and user experience by offloading local traffic and extending the coverage of cellular base stations, it has also raised new privacy challenges on balancing UE anonymity and message linkability. In this paper, we first identify the limitations of current standardization and literature on addressing this issue. Then, we design a Service-oriented Authentication Framework (SAF) that supports secure service delegation and anonymous message authentication. Specifically, a UE-controlled linking method is introduced to support adaptive linkability for different V2X use cases. Security analysis demonstrates the SAF is secure under cryptographic assumptions. Moreover, we conduct extensive simulations based on Vissim and NS3 to show that the SAF is more efficient compared with the state-or-art literature and is feasible for 3GPP standardized V2X group communications.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124882918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy Minimization and Offloading Number Maximization in Wireless Mobile Edge Computing 无线移动边缘计算中的能量最小化和卸载数最大化
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647904
Peifeng Li, Yuan-sheng Luo, Kezhi Wang, Kun Yang
{"title":"Energy Minimization and Offloading Number Maximization in Wireless Mobile Edge Computing","authors":"Peifeng Li, Yuan-sheng Luo, Kezhi Wang, Kun Yang","doi":"10.1109/GLOCOM.2018.8647904","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647904","url":null,"abstract":"With the fast development of mobile edge computing (MEC), user equipments (UEs) can enjoy much higher experience than before by offloading the tasks to its close edge cloud. In this paper, we assume there are several edge clouds, each of which has limited resource. We aim to maximize the number of offloaded tasks and minimize the energy consumption of all the UEs and edge clouds, by selecting the best edge cloud for each UE to offload. We formulate the problem as a mixed-integer non-convex optimization, which is difficult to solve in general. By transforming this problem into a minimum-cost maximum-flow (MCMF) problem, we can solve it efficiently. The simulation shows that our proposed algorithm has better performance and lower complexity than the conventional solutions.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124952784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal MAP Detection in Presence of Burst Interference for Low Power Wide Area Networks 低功率广域网突发干扰下MAP最优检测
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647991
S. Kisseleff, Jakob Kneissl, G. Kilian, W. Gerstacker
{"title":"Optimal MAP Detection in Presence of Burst Interference for Low Power Wide Area Networks","authors":"S. Kisseleff, Jakob Kneissl, G. Kilian, W. Gerstacker","doi":"10.1109/GLOCOM.2018.8647991","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647991","url":null,"abstract":"Low PowerWide Area (LPWA) networks are known to be very vulnerable to external in-band interference in terms of packet collisions, which may substantially degrade the system performance. In order to improve the performance under collisions, the so-called telegram splitting (TS) method has been proposed recently. This approach is based on the assumption of a bursty behavior of the interference, which can be efficiently accounted for by forward error correction. In this paper, we assume that all interferers have the same structure in terms of packet duration and signal variance, which are assumed to be known to the receiver. However, the number of simultaneously active interfering transmissions and their scheduling are unknown. Hence, the amount of interference observed in each symbol interval can vary which needs to be accounted for by the receiver in order to increase the reliability of transmission. For this scenario, we develop the optimal signal detection strategy. We also show that the proposed method substantially outperforms a baseline scheme in terms of packet error rate.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124985925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy and Delay Aware Physical Collision Avoidance in Unmanned Aerial Vehicles 无人机能量与延迟感知物理避碰
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647223
Sihem Ouahouah, Jonathan Prados-Garzon, T. Taleb, Chafika Benzaid
{"title":"Energy and Delay Aware Physical Collision Avoidance in Unmanned Aerial Vehicles","authors":"Sihem Ouahouah, Jonathan Prados-Garzon, T. Taleb, Chafika Benzaid","doi":"10.1109/GLOCOM.2018.8647223","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647223","url":null,"abstract":"Several solutions have been proposed in the literature to address the Unmanned Aerial Vehicles (UAVs) collision avoidance problem. Most of these solutions consider that the ground controller system (GCS) determines the path of a UAV before starting a particular mission at hand. Furthermore, these solutions expect the occurrence of collisions based only on the GPS localization of UAVs as well as via object-detecting sensors placed on board UAVs. The sensors' sensitivity to environmental disturbances and the UAVs' influence on their accuracy impact negatively the efficiency of these solutions. In this vein, this paper proposes a new energy- and delay-aware physical collision avoidance solution for UAVs. The solution is dubbed EDCUAV. The primary goal of EDC-UAV is to build in-flight safe UAVs trajectories while minimizing the energy consumption and response time. We assume that each UAV is equipped with a global positioning system (GPS) sensor to identify its position. Moreover, we take into account the margin error of the GPS to provide the position of a given UAV. The location of each UAV is gathered by a cluster head, which is the UAV that has either the highest autonomy or the greatest computational capacity. The cluster head runs the EDC-UAV algorithm to control the rest of the UAVs, thus guaranteeing a collision free mission and minimizing the energy consumption to achieve different purposes. The proper operation of our solution is validated through simulations. The obtained results demonstrate the efficiency of EDC-UAV in achieving its design goals.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy Efficient Data Forwarding in Disconnected Networks Using Cooperative UAVs 协同无人机在非连接网络中的节能数据转发
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647594
A. Almasoud, Mohamed Y. Selim, Abdullah Mohammed Alqasir, T. Shabnam, Ala’eddin Masadeh, A. Kamal
{"title":"Energy Efficient Data Forwarding in Disconnected Networks Using Cooperative UAVs","authors":"A. Almasoud, Mohamed Y. Selim, Abdullah Mohammed Alqasir, T. Shabnam, Ala’eddin Masadeh, A. Kamal","doi":"10.1109/GLOCOM.2018.8647594","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647594","url":null,"abstract":"Data forwarding from a source to a sink node when they are not within the communication range is a challenging problem in wireless networking. With the increasing demand of wireless networks, several applications have emerged where a group of users are disconnected from their targeted destinations. Therefore, we consider in this paper a multi-Unmanned Aerial Vehicles (UAVs) system to convey collected data from isolated fields to the base station. In each field, a group of sensors or Internet of Things devices are distributed and send their data to one UAV. The UAVs collaborate in forwarding the collected data to the base station in order to maximize the minimum battery level for all UAVs by the end of the service time. Hence, a group of UAVs can meet at a waypoint along their path to the base station such that one UAV collects the data from all other UAVs and moves forward to another meeting point or the base station. All other UAVs that relayed their messages return back to their initial locations. All collected data from all fields reach to the base station within a certain maximum time to guarantee a certain quality of service. We formulate the problem as a Mixed Integer Nonlinear Program (MINLP), then we reformulated the problem as Mixed Integer Linear Program (MILP) after we linearize the mathematical model. Simulations results show the advantages of adopting the proposed model in using the UAVs' energy more efficiently.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126113360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Coexistence of WiFi and LTE in the Unlicensed Band Using Time-Domain Virtualization 利用时域虚拟化实现免授权频段WiFi和LTE共存
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8648057
Sara Zimmo, Abdallah Moubayed, A. Refaey, A. Shami
{"title":"Coexistence of WiFi and LTE in the Unlicensed Band Using Time-Domain Virtualization","authors":"Sara Zimmo, Abdallah Moubayed, A. Refaey, A. Shami","doi":"10.1109/GLOCOM.2018.8648057","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8648057","url":null,"abstract":"In recent years, there has been great interest in utilizing the unlicensed spectrum for mobile data traffic, as deployment of mobile systems are facing severe challenges due to licensed spectrum scarcity. Increasing the bandwidth is a possible solution to increasing the network capacity, however, the licensed spectrum is limited and can be very costly to obtain. Additionally, the lack of available licensed band limits the network capacity which may affect the user experience. Due to this limitation, the research focuses on the coexistence of the LTE and Wi-Fi in the unlicensed band. Currently, there is minimal to no sharing mechanism between the two technologies, which will cause significant interference for the users. This project focuses on using the time-domain virtualization, where the sharing mechanism is allocated in time slots rather than allocating frequency for each technology. The coexistence mechanism of the two technologies are discussed and evaluated using the simulation of a proposed scheduling algorithm.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security Performance of the Distributed Antenna IoT Network with Full-Duplex Wireless Power Transfer 全双工无线电力传输的分布式天线物联网安全性能研究
2018 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2018-12-01 DOI: 10.1109/GLOCOM.2018.8647276
Ming Liu, Y. Mao, S. Leng, Xiaosha Chen
{"title":"Security Performance of the Distributed Antenna IoT Network with Full-Duplex Wireless Power Transfer","authors":"Ming Liu, Y. Mao, S. Leng, Xiaosha Chen","doi":"10.1109/GLOCOM.2018.8647276","DOIUrl":"https://doi.org/10.1109/GLOCOM.2018.8647276","url":null,"abstract":"Conventional cryptographic method faces enormous issues in future internet of things (IoT) networks such as key distribution and computational complexity. Physical layer security has been concerned as a potential technology for IoT networks. In this paper, we investigate the secrecy performance of a distributed antenna IoT network with full-duplex (FD) wireless power transfer. Under the composite wireless channel assumption, we establish the model for receiving signal to interference plus noise ratio (SINR) of both hybrid distributed antennas and the eavesdropper. The closed-form expressions for secrecy capacity of the IoT network is derived with the consideration of impact from both jammers and the eavesdropper. Furthermore, the secrecy outage probability in terms of target secrecy data rate is derived. Simulation results show both secrecy capacity and secrecy outage probability under different network configurations, which evince the effect of the distributed antenna number, the self-interference cancellation factor, and the target secrecy rate on the secrecy performance.","PeriodicalId":201848,"journal":{"name":"2018 IEEE Global Communications Conference (GLOBECOM)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信