{"title":"Interference Mitigation for Device-to-Device based Cellular Communications","authors":"S. Acar, Berna Özbek","doi":"10.1109/ITNAC55475.2022.9998405","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998405","url":null,"abstract":"Device-to-device (D2D) communication underlaying cellular networks can improve the performance of cellular systems and it provides an effective way to meet growing mobile traffic and capacity demand. When user equipments are located in close proximity, they can communicate through direct links. In this case, D2D links can increase both energy and spectrum efficiency by reusing uplink (UL) cellular resources while satisfying the users' quality-of-service requirements. However, integrating D2D links into the cellular infrastructure causes an interference since D2D communication can increase co-channel interference and degrade cellular users' transmission link quality. In this paper, the interference mitigation techniques including power control, multiple antenna and resource allocation based on graph coloring are proposed for D2D communications underlaying cellular systems to increase the data rate of both the cellular users and D2D pairs. Compared to the prior works, in the proposed algorithm, D2D and cellular users have same priority for resource allocation. Finally, the proposed algorithm improves the overall system capacity significantly.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122488730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unmanned Aerial Vehicle Assisted Healthcare Resource Allocation in Disasters","authors":"L. Diao, Yue Liu, William Liu, L. Chiaraviglio","doi":"10.1109/ITNAC55475.2022.9998359","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998359","url":null,"abstract":"The fast response to a disaster is a key factor in rescuing victims who are trapped in the affected areas. The high amount of casualties as well as life and medical resource allocation cause the complexity of disaster rescuing. This paper concentrates on developing a multi-objective (MO) optimization model and adopts an algorithm named Probabilistic Solution Discovery Algorithm (PSDA) to generate a set of Pareto solutions on account of (i) the affected location, (ii) the number of victims in the affected location, (iii) the amount of resource, including food, water, and medicine, (iv) the location of the resource, (v) the deployment of UAVs. PSDA is used to solve the MO model, each of the Pareto solutions is an emergency rescuing strategy. A study case is provided to validate the perspectives. The results of resource allocation generated with the five aforementioned factors have confirmed the effectiveness of the proposed solution.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"445 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130586680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zaloa Fernández, Álvaro Gabilondo, Álvaro Vázquez-Rodríguez, Carlos Giraldo Rodriguez, J. J. E. Garzás, Sergio Gimenez, Andrés Cárdenas, Carlos Herranz
{"title":"Solutions for Traffic Isolation in 5G Infrastructures Using Network Slicing Techniques","authors":"Zaloa Fernández, Álvaro Gabilondo, Álvaro Vázquez-Rodríguez, Carlos Giraldo Rodriguez, J. J. E. Garzás, Sergio Gimenez, Andrés Cárdenas, Carlos Herranz","doi":"10.1109/ITNAC55475.2022.9998422","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998422","url":null,"abstract":"Network slicing techniques are paramount for the operation of commercial networks, as the 5G networks community widely accepts them. These techniques allow the creation of multiple virtual networks on top of a physical network to isolate the traffic and guarantee the applications' requirements. These will allow the deployment of more tailored use cases, such as disaggregated services and specific highly consuming multimedia services. Therefore, several network slicing techniques are proposed in this paper to obtain traffic isolation in a 5G infrastructure. Specifically, edge and cloud architectures and alternatives to traditional network stack protocols are considered in the proposed solutions when slicing their virtual networks. Moreover, this paper describes which use cases are the most suitable for each proposed network slicing technique.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134018020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imran Moez Khan, Shuai Sun, Wayne S. T. Rowe, Andrew Thompson, A. Al-Hourani, K. Sithamparanathan
{"title":"Comparison of classifiers for use case detection using onboard smartphone sensors","authors":"Imran Moez Khan, Shuai Sun, Wayne S. T. Rowe, Andrew Thompson, A. Al-Hourani, K. Sithamparanathan","doi":"10.1109/ITNAC55475.2022.9998423","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998423","url":null,"abstract":"Onboard smartphone sensors provide ample data modalities which can be used to determine the way a phone is being used. However, in order for use case detection systems to be unobtrusive to users, the classification algorithms and the number of sensors should be kept simple and at a minimum. In this paper light, accelerometer and orientation sensor measurements are recorded for 4 different phone use cases and results from 3 different classifiers (K-means, Naive-Bayes, Neural Network) are compared to identify the sensor modality and classification algorithm that provides the highest accuracy for use case detection. The onboard accelerometer is found to be the sensor modality with highest accuracy across all the classifiers, and the neural network is identified as being the best performing classifier. A discussion of the results linking back to theoretical aspects of the classifiers is also given.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Neural Network (ANN)-Aided Signal Demodulation in a SiPM-Based VLC System","authors":"Cuiwei He, Y. Lim","doi":"10.1109/ITNAC55475.2022.9998328","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998328","url":null,"abstract":"This paper describes a new type of data-driven signal demodulation technique using an artificial neural network (ANN) in a silicon photomultiplier (SiPM) based visible light communication (VLC) system. SiPMs can potentially be used to create the most sensitive optical receiver in VLC since it contains a large array of microcells and each microcell is capable of detecting individual photons. However, after each photon is detected, the associated microcell needs a period to recover. This means that the photon counting rate is not linearly related to the intensity of the light received by the SiPM and this effect causes a unique form of signal distortion when the transmission data rate becomes high. In this paper, an ANN aided data detection method is studied when the received signal is influenced by the SiPM nonlinearity. Both a single neuron based linear classifier and an ANN based non-linear classifier are introduced and explained in detail. The bit error rate (BER) results suggest that the ANN based receiver can significantly reduce the negative impacts caused by the SiPM nonlinearity for a wide range of irradiance levels.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Agriculture IoT Network Communications Security Improvement","authors":"B. Cusack, Paula Raymond Lutui","doi":"10.1109/ITNAC55475.2022.9998425","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998425","url":null,"abstract":"the technologies for low powered wide area networks (LPWAN) are readily available and utilized for performance advantages in a range of industries. The challenge for research is to identify capable radio signals that propagate over the required geographic regions and physical obstacles. Also, to design and standardize protocols with sufficient load and performance capability. The Internet of Things (IoT) is motivating the search for capable network solutions as industries, such as agriculture, seek working control solutions for their supply chain and production requirements. Critical for network performances are security features that protect communications and assure the intended message. In this research we evaluated the security features of one common LPWAN protocol for performance against alternative cryptographic security mechanisms. Performance differences are found between the default algorithm and others suggesting model design trade-offs and areas for further research. The contribution of this paper is awareness of the potential scope for improvements to IoT LPWAN communications security, and the cost trade-offs between different wireless network cryptographic solutions.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126314753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity of a Fact Certification Network","authors":"Kaled Aljebur, Mostfa Albdair, R. Addie","doi":"10.1109/ITNAC55475.2022.9998426","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998426","url":null,"abstract":"A system of protocols is defined which enables suitably equipped systems or devices to record validated “facts” in a network of servers in such a way that only facts which are genuinely true can be validated by the network. The servers or devices using this network make use of remote attestation to provide this secure and integrated network, which is called, hence-forth, Certnet (Certification Network). Certnet of this paper can be envisaged, for example, as providing rigorous fact-checking for a news service. Currently any individual trying to capture media evidence (photo or video) has no way to certify their evidence. Certnet will provide this missing certification of evidence, for suitable equipment.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121726476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A proposal of DoH-based domain name resolution architecture including authoritative DNS servers","authors":"Satoru Sunahara, Yong Jin, K. Iida","doi":"10.1109/ITNAC55475.2022.9998349","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998349","url":null,"abstract":"In addition to cache poisoning attacks, the privacy leakage has become a critical issue in DNS nowadays. Especially, the communication between the DNS full-service resolver and the authoritative DNS servers may go through multiple ISP networks. Thus, if the communication path contains areas with different privacy policies, the security and privacy in DNS domain name resolution cannot be guaranteed. To mitigate cache poisoning attacks and protect the privacy of the Internet users, we propose a novel architecture that encrypts all DNS communications with DoH. In the proposed architecture, in addition to the communication between the end clients and the DNS full-service resolvers, that between the DNS full-service resolvers and the authoritative DNS servers is also covered by DoH. As a result, not only the risk of cache poisoning attacks can be dramatically mitigated on DNS full-service resolver but also the risk of eavesdropping on DNS traffic can be reduced. Moreover, the proposed architecture is the first approach to pure DoH-based domain name resolution including DNS authoritative DNS servers.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134619470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Client Model Update with Reinforcement Learning in Synchronous Federated Learning","authors":"Zirou Pan, Huan Geng, Linna Wei, Wei Zhao","doi":"10.1109/ITNAC55475.2022.9998360","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998360","url":null,"abstract":"Federated learning is widely applied in green wireless communication, mobile technologies and daily life. It allows multiple parties to jointly train a model on their combined data without revealing any of their local data to a centralized server. However, in practical applications, federated learning requires frequent communication between clients and servers, which brings a considerable burden. In this work, we propose a Federated Learning Deep Q-Learning (FL-DQL) method to reduce the communication frequency between clients and servers in federated learning. FL-DQL selects the local-self-update times of a client adaptively and finds the best trade-off between local update and global parameter aggregation. The performance of FL-DQL is evaluated via extensive experiments with real datasets on a networked prototype system. Results show that FL-DQL effectively reduces the communication overhead among the nodes in our experiments which conforms to the green initiative.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125208151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinchun Zhang, Weihua Li, Quan-wei Bai, William Liu, Hua Wang
{"title":"A Novel Story Plots Extraction Based Rapid Reading Comprehension System to Assist the Education for Low-income Families","authors":"Xinchun Zhang, Weihua Li, Quan-wei Bai, William Liu, Hua Wang","doi":"10.1109/ITNAC55475.2022.9998397","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998397","url":null,"abstract":"Poverty has posed many threats to the children's education. Children in low-income families tend to have uneducated and/or very busy parents, and their reading after school is less being instructed and supported by their parents even they want to support but without the capacity and/or sufficient time to read and understand the huge volume of stories and novels. In this paper, we aim to tackle the above challenges and develop a rapid reading comprehension system to assist those parents rapidly understanding the story content by proposing a novel system that is capable of generating and visualising story plots from the massive literature narratives. Meanwhile, the visualised story plots are represented as a sequenced knowledge graph, helping those uneducated or busy parents grasp the story's linguistic meanings and flow. Furthermore, a well-known fiction book, i.e., “Alice in Wonderland” is utilised as case studies to validate the proposed system. The primary experimental results reveal that story plot extraction can effectively provide explicit information for presenting storylines chapter by chapter at the early stage of this research initiative.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121832873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}