Dongchao Ma, Guangxing Han, Ailing Xiao, Yuekun Hu, Syed Hassan Ahmed, G. Aujla, Haotong Cao
{"title":"FAT-WSN: A Non Destructive and Secure Aggregation Strategy for Energy Saving in WSN","authors":"Dongchao Ma, Guangxing Han, Ailing Xiao, Yuekun Hu, Syed Hassan Ahmed, G. Aujla, Haotong Cao","doi":"10.1109/GCWkshps45667.2019.9024492","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024492","url":null,"abstract":"Data compression is one main method for energy-saving optimization of the Internet of Things (IOT). However, the operational capability and the battery of nodes are relatively weak, and the continuous data compression brings potential data security and reliability risks. In this paper, a fragment aggregation strategy for transmission in wireless sensor network (FAT-WSN) is proposed to minimize the number of data fragments and energy consumption with secure sensing. The FATWSN is regarded as a problem of Mixed Integer Programming (MIP), which is then solved in an iterative way with considerable elasticity and low complexity. In addition, by adjusting the routing planning and traffic distribution, the FAT-WSN optimizes the number of data transfers without destructing any data or introducing a compression calculation burden. Experimental results show that the proposed FAT-WSN can effectively reduce the number of data transfers, cut down the energy consumption, and attains standout performance on network life without extra time overhead, when compared with existing data aggregation methods of the same kind.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SBA-Based Mobile Edge Computing","authors":"Ting Li, Liqiang Zhao, Ran Duan, Hongxin Tian","doi":"10.1109/GCWkshps45667.2019.9024621","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024621","url":null,"abstract":"5G is becoming open, service-oriented, and software- oriented by introducing Service Based Architecture (SBA) into its core network. In consequence, we propose SBA-based mobile edge computing (MEC) in this paper. Firstly, we present a service-based MEC platform architecture, composed of network functions (NFs) and service based interface. We design several specific NFs that are different from SBA in 5G core network. Secondly, MEC platform architecture is enhanced by introducing templates for dedicated MEC services. Thirdly, we present a MEC orchestration scheme, which contains parameter configuration and instantiation. We establish a testbed based on an open source software, and experiment results demonstrate that our proposed SBA-based MEC can provide users with customized services, e.g., low latency computing and high speed caching.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133162071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical QoS Provisioning for UAV-Enabled Emergency Communication Networks","authors":"Shishi Zhang, Wenchi Cheng","doi":"10.1109/GCWkshps45667.2019.9024517","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024517","url":null,"abstract":"Efficient disaster recovery can rely on unmanned aerial vehicles (UAVs)-assisted emergency communication networks. Due to the rapid growing of the real-time multimedia traffics in the post-disaster situations, the UAV-enabled emergency network is expected to satisfy different levels of delay requirements. In addition to UAVs, the underlying spectrum sharing transmission links are typically applied to deploy device-to-device (D2D) communications in the emergency scenarios. Therefore, the interference management is critical to UAVs-assisted networks with D2D communications. In this paper, we propose the statistical delay-bounded quality of service (QoS) provisioning framework to support diverse traffics in the UAV-enabled emergency network, where the UAVs are deployed as base stations for downlink transmissions with underlying spectrum sharing device-to-device (D2D) users engaged. In particular, we formulate the optimization problem, which subjects to the average power and peak rate constraints, to maximize the effective capacity under various QoS requirements. Simulation results verify the impact of interference related parameters and delay exponents on the effective capacity and show that our developed optimal power allocation scheme can achieve the maximum effective capacity under diverse delay-bounded QoS requirements than other existing schemes.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131698138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal Modulation Classification Based on Deep Belief Network","authors":"Wenwen Li, Z. Dou, Can Wang, Yu Zhang","doi":"10.1109/GCWkshps45667.2019.9024651","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024651","url":null,"abstract":"Modulation classification plays an important role in civil and military fields such as software defined radio, electronic countermeasure and intelligent demodulator. Due to the difficulty of feature extraction in traditional signal modulation classification algorithm, this paper proposes a signal modulation classification algorithm based on deep belief network. The proposed algorithm does not need to extract the signal features, and uses the I/Q data to classify signal directly. The simulation results show that the classification performance of the proposed algorithm is better than traditional machine learning algorithm, when the simulation condition is same.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133904585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Physical Layer Spoofing Attack in Spatial Modulation","authors":"Xiaohui Wang, N. Li, M. Li, Xiaofeng Tao","doi":"10.1109/GCWkshps45667.2019.9024395","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024395","url":null,"abstract":"Spoofing is a general attack in wireless communication and can cause further attacks like denial of service, node hijack and so on. Extensive studies have focused on the performance analysis under specific spoofing attack, or the countermeasures to detect and remove the spoofing attacks. Modulation based spoofing has proven to be an effective attack at the physical layer. Meanwhile, spatial modulation (SM) has high spectral efficiency and low complexity capabilities. And relay cooperation was introduced to further enhance the security of SM, under a basic assumption that all relays are trusted and fully cooperative. However, malicious relay may destroy the advantage of SM. This is the first time that the spoofing problem is studied for SM. We first model the modulation based spoofing attack particular to SM, and then derive the average spoofing- symbol-success-rate (SSSR) to describe the spoofer successfully modify the symbol. Numerical results show that the spoofing attack can badly destroy the communication.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"746 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123866143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocols to Reduce CPS Sensor Traffic Using Smart Indexing and Edge Computing Support","authors":"N. Yazdani, D. Lucani","doi":"10.1109/GCWkshps45667.2019.9024686","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024686","url":null,"abstract":"We propose a new approach for lossless data compression to reduce the amount of data transmitted by Cyber-Physical Systems (CPS) by several-fold. Our approach uses an indexing technique inspired in the concept of generalized deduplication to compress data by a) finding matches of similar (not necessarily equal) data chunks, and b) exploiting data chunks previously stored in the Edge (or Cloud) by the same or even other CPS devices. We propose a mathematical model to predict the gains based on the number of previously received chunks and validate it using simulations. We show that compression factors of 23-fold are possible even with a limited number of previously stored chunks in the Edge. Gains of 2.8-fold over DEFLATE compression on differential samples are possible even for small data chunks (16 B) for synthetic data. Using real-world CPS data sets, we show that our technique can provide gains of up to 2.9. We also show our solution's processing speed in a Raspberry Pi 3 can be as high as 163 MB/s.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Face Super-Resolution via Patch Network of Global Context Prior","authors":"Liang Chen, Yi Wu, Zheng Yang, Wen-Kang Jia","doi":"10.1109/GCWkshps45667.2019.9024453","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024453","url":null,"abstract":"The face image captured in real-world scene is the vital object in visual tasks due to its importance in person identity confirmation. However, the face structures is inherently missing due to the degradations in the imaging process, leading to the severe interference in the face enhancement and subsequent face recognition procedure. To remove the degradations and recover a recognizable face, we propose a novel global facial context prior as the guidance to face super-resolution problem. The global facial context prior expands the local structure prior, which is represented as the local patches, into global-face range by modeling the whole facial patch positions into network scheme empirically according to position distributions. The local structure in neighbored positions provides better guidance for reconstruction than the local structure itself, especially when the size of local distortion is larger than the local patch size in input image, leading to the fact that the local input image patch unable to give informative details. Therefore, the global facial context prior improves the robustness of algorithm in dealing with large-range uneven image distortion, e.g. the occlusion. The quantitative and qualitative evaluation on public database demonstrates the superiority of our algorithm.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121364897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takamasa Higuchi, Reuben Vince Rabsatt, M. Gerla, O. Altintas, F. Dressler
{"title":"Cooperative Downloading in Vehicular Heterogeneous Networks at the Edge","authors":"Takamasa Higuchi, Reuben Vince Rabsatt, M. Gerla, O. Altintas, F. Dressler","doi":"10.1109/GCWkshps45667.2019.9024655","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024655","url":null,"abstract":"Connected and automated driving vehicles are expected to generate an increasing amount of data traffic, possibly overloading vehicle-to- network (V2N) communication infrastructure in the long run. In this paper, we investigate the potential of local collaboration among vehicles to mitigate the load on V2N (e.g., cellular) communication networks. Vehicles in the vicinity use vehicle-to-vehicle (V2V) communications to form a group, called vehicular micro cloud, and each of them downloads a subset of data segments that comprise an original data content. The downloaded data segments are cached and shared with other group members by way of V2V networks. This enables the group of vehicles to collectively serve as a virtual content delivery server, which complements cloud / edge computing infrastructure. In order to maximize the benefit of cooperation, we design a light-weight local coordination mechanism for vehicles to agree on non-overlapping subsets of data segments that they request from a remote server. Our simulation results show that coordination among vehicles improves the efficiency of cooperative download, reducing the data traffic on cellular networks.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128926322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masashi Hirabe, R. Zenkyu, Hiroaki Miyamoto, K. Ikuta, E. Sasaki
{"title":"40 M Transmission of OAM Mode and Polarization Multiplexing in E-Band","authors":"Masashi Hirabe, R. Zenkyu, Hiroaki Miyamoto, K. Ikuta, E. Sasaki","doi":"10.1109/GCWkshps45667.2019.9024495","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024495","url":null,"abstract":"This paper presents the development of prototype radio equipment for orbital angular momentum (OAM) mode and polarization multiplexing transmission in E-band, as well as the results of a field trial using the prototype. The equipment consists of a radio frequency unit (RF UNIT) and a base-band unit (BB UNIT). The RF UNIT has a uniform circular array with eight elements and E-band frequency converters for each element. The BB UNIT for the transmitter has OAM mode multiplexers and digital modulators, and one of the receivers has an adaptive OAM mode de-multiplexer and digital demodulators which can operate in real-time. Sixteen multiplexing transmissions (eight OAM modes and two polarizations) over a link distance of 40 m with 256 QAM and spectral efficiency of 85.7 bps/Hz have been achieved.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129393693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Indoor Coverage Measurement Scheme Based on FRFT and Gaussian Process Regression","authors":"Shaochuan Wu, Xiaokang Zhou, Yulong Gao","doi":"10.1109/GCWkshps45667.2019.9024373","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024373","url":null,"abstract":"Techniques like femtocells are widely used to extend service coverage in indoors and other areas that are unreachable for traditional radio access technologies. In this paper, we consider the indoor coverage measurement problem. We formulate this problem into two parts: the sampling and the reconstruction of received signal strength (RSS) field. Traditional methods cannot solve the RSS fluctuation problem efficiently and require a large number of sensor nodes. To this end, we propose a novel indoor coverage measurement scheme to tackle these problems. First, a fractional Fourier transform (FRFT) based method is proposed to mitigate RSS fluctuation during the sampling process. Then, Gaussian process regression (GPR) is used to reduce the number of sensor nodes being deployed. And a new kernel for GPR is designed to better accomplish the RSS reconstruction task. Simulation analysis shows the proposed scheme can achieve greater advantages in terms of accuracy and flexibility compared with other baselines.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}