{"title":"Analyzing a 5G Dataset and Modeling Metrics of Interest","authors":"Fidan Mehmeti, T. L. Porta","doi":"10.1109/MSN53354.2021.00027","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00027","url":null,"abstract":"The level of deployment of 5G networks is increasing every day, making this cellular technology become ubiquitous soon. Therefore, characterizing the channel quality and signal characteristics of 5G networks is of paramount importance as a first step in understanding the achievable performance of cellular users. Then, it can also serve for other important processes, such as resource planning and admission control. In this paper, we use the results of a publicly available measurement campaign of 5G users conducted by a third party and analyze various figures of merit. The analysis shows that the downlink and uplink rates for static and mobile users can be captured either by a lognormal or a Generalized Pareto distribution. Also, the time spent in the same cell by a mobile (driving) user can be captured to the best extent by a Generalized Pareto distribution. We also show some potential practical applications, among which is the prediction of the number of active users in the cell.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127221998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Location-Aware Cross-Layer MAC Protocol for Vehicular Visible Light Communications","authors":"Agon Memedi, F. Dressler","doi":"10.1109/MSN53354.2021.00084","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00084","url":null,"abstract":"Vehicular Visible Light Communications (V-VLC) has emerged as a technology complementing RF-based Vehicle-toVehicle (V2V) communication. Indeed, such RF-based protocols have certain disadvantages due to the limited radio resources and the, in general, omnidirectional interference characteristics. Making use of LED head- and taillights, V-VLC can readily be used in vehicular scenarios. One of the challenging problems in this field is medium access; most approaches fall back to ALOHA or CSMA-based concepts. Thanks to modern matrix lights, VVLC can now also make use of Space Division Multiple Access (SDMA) features. In this paper, we present a novel approach for medium access in V-VLC systems. We follow a location-aware cross-layer concept, in which dedicated light sectors of matrix lights are used to avoid interference and thus collisions. We assess the performance of our protocol in an extensive simulation study using both a simple static scenario as well as a realistic urban downtown configuration. Our results clearly indicate the advantages of our location-aware protocol that exploits the space-division features of the matrix lights.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Felix O. Olowononi, Ahmed H. Anwar, D. Rawat, Jaime C. Acosta, C. Kamhoua
{"title":"Deep Learning for Cyber Deception in Wireless Networks","authors":"Felix O. Olowononi, Ahmed H. Anwar, D. Rawat, Jaime C. Acosta, C. Kamhoua","doi":"10.1109/MSN53354.2021.00086","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00086","url":null,"abstract":"Wireless communications networks are an integral part of intelligent systems that enhance the automation of various activities and operations embarked by humans. For example, the development of intelligent devices imbued with sensors leverages emerging technologies such as machine learning (ML) and artificial intelligence (AI), which have proven to enhance military operations through communication, control, intelligence gathering, and situational awareness. However, growing concerns in cybersecurity imply that attackers are always seeking to take advantage of the widened attack surface to launch adversarial attacks which compromise the activities of legitimate users. To address this challenge, we leverage on deep learning (DL) and the principle of cyber-deception to propose a method for defending wireless networks from the activities of jammers. Specifically, we use DL to regulate the power allocated to users and the channel they use to communicate, thereby luring jammers into attacking designated channels that are considered to guarantee maximum damage when attacked. Furthermore, by directing its energy towards the attack on a specific channel, other channels are freed up for actual transmission, ensuring secure communication. Through simulations and experiments carried out, we conclude that this approach enhances security in wireless communication systems.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128267368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Algorithm of Multi-source to Multi-sink Traffic scheduling","authors":"Yang Liu, Lei Liu, Zhongmin Yan, Jian-Qiang Hu","doi":"10.1109/MSN53354.2021.00097","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00097","url":null,"abstract":"With the development of internet technology, the proliferation of network-based applications leads to large number of multi-source multi-sink traffic transmission. Such as wireless sensor network (WSN), to deal with actuator nodes or support high-level programming abstractions, it naturally calls for a many-to-many communication. But the existing algorithms or solutions are not able to solve the scenarios effectively, they face many difficulties and challenges when dealing with multi-source multi-sink network problems. In this paper, we develop a new traffic scheduling algorithm suitable for multi-source and multi-sink networks. According to traffic transmission rate and network structure information, it selects the optimal path to transmit traffic and achieve load balance. When the traffic or source nodes change in the network, the paths and traffic are adjusted as needed to ensure the overall optimum. To evaluate the performance on efficiency, we perform a series of simulations and the results indicate the advantages of the proposed algorithm.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130308641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-Class Support Vector Machine with Particle Swarm Optimization for Geo-Acoustic Anomaly Detection","authors":"Dan Zhang, Yiwen Liang, Zhihong Sun, M. Mukherjee","doi":"10.1109/MSN53354.2021.00066","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00066","url":null,"abstract":"Without prediction and prior warning, earthquakes can cause massive damage to human society. The earthquake research has been exploring, and researchers discover that earthquakes happen with many natural phenomena, earthquake precursors. Geo-acoustic signals may contain a good precursor signal to a seismic event. The Acoustic Electromagnetic to AI (AETA) system, a high-density multi-component seismic monitoring system, is deployed to record geo-acoustic signals across 0.1Hz 10kHz. This paper aims to detect the anomalies of geoacoustic signals that may contain earthquake precursors. This study employs the One-Class Support Vector Machine(OCSVM) to detect the anomalies and applies Particle Swarm Optimization (PSO) to optimize the parameters of OCSVM. The experimental results show that the proposed method obtains promising results concerning the abnormal detection in geo-acoustic signals of the AETA system.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Third International Workshop on Edge Computing and Artificial Intelligence based Sensor-Cloud System (ECAISS 2021)","authors":"","doi":"10.1109/msn53354.2021.00013","DOIUrl":"https://doi.org/10.1109/msn53354.2021.00013","url":null,"abstract":"","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Title Page i","authors":"","doi":"10.1109/msn53354.2021.00001","DOIUrl":"https://doi.org/10.1109/msn53354.2021.00001","url":null,"abstract":"","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao
{"title":"A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance","authors":"L. Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao","doi":"10.1109/MSN53354.2021.00017","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00017","url":null,"abstract":"In order to detect the playback of illegal videos, it is necessary for supervisors to monitor the network by analyzing traffic from devices. However, many popular video sites, such as YouTube, have applied encryption to protect users’ privacy, which makes it difficult to analyze network traffic at the same time. Many researches suggest that DASH (Dynamic Adaptive Streaming over HTTP) will leak the information of video segmentation, which is related to the video content. Consequently, it is possible to analyze the content of encrypted video traffic without decryption. At present, most of the encrypted video traffic analysis adopts supervised learning methods, and there is little research on its unsupervised methods. Analysts are usually faced with unlabeled data, in reality, so the existing approaches will not work. The encrypted video traffic analysis methods based on unsupervised learning are required. In this paper, we proposed a clustering method based on Levenshtein distance for title analysis of encrypted video traffic. We also run a thorough set of experiments that verify the robustness and practicability of the method. As far as I am concerned, it is the first work to apply cluster analysis for encrypted video traffic analysis.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"41 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133049719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parya Haji Mirzaee, M. Shojafar, Zahra Pooranian, Pedram Asef, H. Cruickshank, R. Tafazolli
{"title":"FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network","authors":"Parya Haji Mirzaee, M. Shojafar, Zahra Pooranian, Pedram Asef, H. Cruickshank, R. Tafazolli","doi":"10.1109/MSN53354.2021.00044","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00044","url":null,"abstract":"In a critical infrastructure such as Smart Grid (SG), providing security of the system and privacy of consumers are significant challenges to be considered. The SG developers adopt Machine Learning (ML) algorithms within the Intrusion Detection System (IDS) to monitor traffic data and network performance. This visibility safeguards the SG from possible intrusions or attacks that may trigger the system. However, it requires access to residents’ consumption information which is a severe threat to their privacy. In this paper, we present a novel method to detect abnormalities on a large scale SG while preserving the privacy of users. We design a Federated IDS (FIDS) architecture using Federated Learning (FL) in a 5G environment for the SG metering network. In this way, we design Federated Deep Neural Network (FDNN) model that protects customers’ information and provides supervisory management for the whole energy distribution network. Simulation results for a real-time dataset demonstrate the reasonable improvement of the proposed FDNN model compared with the state-of-the-art algorithms. The FDNN achieves approximately 99.5% accuracy, 99.5% precision/recall, and 99.5% f1-score when comparing with classification algorithms.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133585340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV Trajectory","authors":"Xiyu Chen, Yangzhe Liao, Qingsong Ai, Ke Zhang","doi":"10.1109/MSN53354.2021.00054","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00054","url":null,"abstract":"Owing to the high flexibility and mobility, unmanned aerial vehicles (UAVs) have attracted significant attention from both academia and industry communities, especially in the UAVempowered mobile edge computing (MEC) networks. However, the repetitiveness of tasks generated by user equipments (UEs) has not been fully analyzed. In this paper, a UAV-empowered MEC network architecture is proposed. Computation tasks are divided into two categories, i.e., private tasks and public tasks, which can be executed locally or offloaded to UAVs utilized as flying MEC servers for task execution. The aim of this paper is to optimize task execution latency and network energy consumption by jointly considering UEs’ offloading decisions and UAVs’ route planning. To solve the challenging formulated optimization problem, an enhanced block coordinate descent algorithm is proposed, which is utilized in conjunction with the differential evolution and penalty function method. The simulation results demonstrate that the proposed scheme outperforms the random offloading strategy and fixed route strategy regarding the cumulative cost and time cost.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}