2021 17th International Conference on Mobility, Sensing and Networking (MSN)最新文献

筛选
英文 中文
Analyzing a 5G Dataset and Modeling Metrics of Interest 分析5G数据集和建模感兴趣的指标
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/MSN53354.2021.00027
Fidan Mehmeti, T. L. Porta
{"title":"Analyzing a 5G Dataset and Modeling Metrics of Interest","authors":"Fidan Mehmeti, T. L. Porta","doi":"10.1109/MSN53354.2021.00027","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00027","url":null,"abstract":"The level of deployment of 5G networks is increasing every day, making this cellular technology become ubiquitous soon. Therefore, characterizing the channel quality and signal characteristics of 5G networks is of paramount importance as a first step in understanding the achievable performance of cellular users. Then, it can also serve for other important processes, such as resource planning and admission control. In this paper, we use the results of a publicly available measurement campaign of 5G users conducted by a third party and analyze various figures of merit. The analysis shows that the downlink and uplink rates for static and mobile users can be captured either by a lognormal or a Generalized Pareto distribution. Also, the time spent in the same cell by a mobile (driving) user can be captured to the best extent by a Generalized Pareto distribution. We also show some potential practical applications, among which is the prediction of the number of active users in the cell.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127221998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Location-Aware Cross-Layer MAC Protocol for Vehicular Visible Light Communications 车辆可见光通信的位置感知跨层MAC协议
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/MSN53354.2021.00084
Agon Memedi, F. Dressler
{"title":"A Location-Aware Cross-Layer MAC Protocol for Vehicular Visible Light Communications","authors":"Agon Memedi, F. Dressler","doi":"10.1109/MSN53354.2021.00084","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00084","url":null,"abstract":"Vehicular Visible Light Communications (V-VLC) has emerged as a technology complementing RF-based Vehicle-toVehicle (V2V) communication. Indeed, such RF-based protocols have certain disadvantages due to the limited radio resources and the, in general, omnidirectional interference characteristics. Making use of LED head- and taillights, V-VLC can readily be used in vehicular scenarios. One of the challenging problems in this field is medium access; most approaches fall back to ALOHA or CSMA-based concepts. Thanks to modern matrix lights, VVLC can now also make use of Space Division Multiple Access (SDMA) features. In this paper, we present a novel approach for medium access in V-VLC systems. We follow a location-aware cross-layer concept, in which dedicated light sectors of matrix lights are used to avoid interference and thus collisions. We assess the performance of our protocol in an extensive simulation study using both a simple static scenario as well as a realistic urban downtown configuration. Our results clearly indicate the advantages of our location-aware protocol that exploits the space-division features of the matrix lights.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep Learning for Cyber Deception in Wireless Networks 无线网络中网络欺骗的深度学习
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/MSN53354.2021.00086
Felix O. Olowononi, Ahmed H. Anwar, D. Rawat, Jaime C. Acosta, C. Kamhoua
{"title":"Deep Learning for Cyber Deception in Wireless Networks","authors":"Felix O. Olowononi, Ahmed H. Anwar, D. Rawat, Jaime C. Acosta, C. Kamhoua","doi":"10.1109/MSN53354.2021.00086","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00086","url":null,"abstract":"Wireless communications networks are an integral part of intelligent systems that enhance the automation of various activities and operations embarked by humans. For example, the development of intelligent devices imbued with sensors leverages emerging technologies such as machine learning (ML) and artificial intelligence (AI), which have proven to enhance military operations through communication, control, intelligence gathering, and situational awareness. However, growing concerns in cybersecurity imply that attackers are always seeking to take advantage of the widened attack surface to launch adversarial attacks which compromise the activities of legitimate users. To address this challenge, we leverage on deep learning (DL) and the principle of cyber-deception to propose a method for defending wireless networks from the activities of jammers. Specifically, we use DL to regulate the power allocated to users and the channel they use to communicate, thereby luring jammers into attacking designated channels that are considered to guarantee maximum damage when attacked. Furthermore, by directing its energy towards the attack on a specific channel, other channels are freed up for actual transmission, ensuring secure communication. Through simulations and experiments carried out, we conclude that this approach enhances security in wireless communication systems.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128267368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Algorithm of Multi-source to Multi-sink Traffic scheduling 多源到多汇聚流量调度算法
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/MSN53354.2021.00097
Yang Liu, Lei Liu, Zhongmin Yan, Jian-Qiang Hu
{"title":"The Algorithm of Multi-source to Multi-sink Traffic scheduling","authors":"Yang Liu, Lei Liu, Zhongmin Yan, Jian-Qiang Hu","doi":"10.1109/MSN53354.2021.00097","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00097","url":null,"abstract":"With the development of internet technology, the proliferation of network-based applications leads to large number of multi-source multi-sink traffic transmission. Such as wireless sensor network (WSN), to deal with actuator nodes or support high-level programming abstractions, it naturally calls for a many-to-many communication. But the existing algorithms or solutions are not able to solve the scenarios effectively, they face many difficulties and challenges when dealing with multi-source multi-sink network problems. In this paper, we develop a new traffic scheduling algorithm suitable for multi-source and multi-sink networks. According to traffic transmission rate and network structure information, it selects the optimal path to transmit traffic and achieve load balance. When the traffic or source nodes change in the network, the paths and traffic are adjusted as needed to ensure the overall optimum. To evaluate the performance on efficiency, we perform a series of simulations and the results indicate the advantages of the proposed algorithm.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130308641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
One-Class Support Vector Machine with Particle Swarm Optimization for Geo-Acoustic Anomaly Detection 基于粒子群优化的一类支持向量机地声异常检测
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/MSN53354.2021.00066
Dan Zhang, Yiwen Liang, Zhihong Sun, M. Mukherjee
{"title":"One-Class Support Vector Machine with Particle Swarm Optimization for Geo-Acoustic Anomaly Detection","authors":"Dan Zhang, Yiwen Liang, Zhihong Sun, M. Mukherjee","doi":"10.1109/MSN53354.2021.00066","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00066","url":null,"abstract":"Without prediction and prior warning, earthquakes can cause massive damage to human society. The earthquake research has been exploring, and researchers discover that earthquakes happen with many natural phenomena, earthquake precursors. Geo-acoustic signals may contain a good precursor signal to a seismic event. The Acoustic Electromagnetic to AI (AETA) system, a high-density multi-component seismic monitoring system, is deployed to record geo-acoustic signals across 0.1Hz 10kHz. This paper aims to detect the anomalies of geoacoustic signals that may contain earthquake precursors. This study employs the One-Class Support Vector Machine(OCSVM) to detect the anomalies and applies Particle Swarm Optimization (PSO) to optimize the parameters of OCSVM. The experimental results show that the proposed method obtains promising results concerning the abnormal detection in geo-acoustic signals of the AETA system.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Third International Workshop on Edge Computing and Artificial Intelligence based Sensor-Cloud System (ECAISS 2021) 第三届基于边缘计算和人工智能的传感器云系统国际研讨会(ECAISS 2021)
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/msn53354.2021.00013
{"title":"Third International Workshop on Edge Computing and Artificial Intelligence based Sensor-Cloud System (ECAISS 2021)","authors":"","doi":"10.1109/msn53354.2021.00013","DOIUrl":"https://doi.org/10.1109/msn53354.2021.00013","url":null,"abstract":"","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Title Page i 第1页
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/msn53354.2021.00001
{"title":"Title Page i","authors":"","doi":"10.1109/msn53354.2021.00001","DOIUrl":"https://doi.org/10.1109/msn53354.2021.00001","url":null,"abstract":"","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance 基于Levenshtein距离的加密视频流量聚类方法
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/MSN53354.2021.00017
L. Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao
{"title":"A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance","authors":"L. Yang, Shaojing Fu, Yuchuan Luo, Yongjun Wang, Wentao Zhao","doi":"10.1109/MSN53354.2021.00017","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00017","url":null,"abstract":"In order to detect the playback of illegal videos, it is necessary for supervisors to monitor the network by analyzing traffic from devices. However, many popular video sites, such as YouTube, have applied encryption to protect users’ privacy, which makes it difficult to analyze network traffic at the same time. Many researches suggest that DASH (Dynamic Adaptive Streaming over HTTP) will leak the information of video segmentation, which is related to the video content. Consequently, it is possible to analyze the content of encrypted video traffic without decryption. At present, most of the encrypted video traffic analysis adopts supervised learning methods, and there is little research on its unsupervised methods. Analysts are usually faced with unlabeled data, in reality, so the existing approaches will not work. The encrypted video traffic analysis methods based on unsupervised learning are required. In this paper, we proposed a clustering method based on Levenshtein distance for title analysis of encrypted video traffic. We also run a thorough set of experiments that verify the robustness and practicability of the method. As far as I am concerned, it is the first work to apply cluster analysis for encrypted video traffic analysis.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"41 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133049719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network FIDS: 5G智能计量网络的联邦入侵检测系统
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/MSN53354.2021.00044
Parya Haji Mirzaee, M. Shojafar, Zahra Pooranian, Pedram Asef, H. Cruickshank, R. Tafazolli
{"title":"FIDS: A Federated Intrusion Detection System for 5G Smart Metering Network","authors":"Parya Haji Mirzaee, M. Shojafar, Zahra Pooranian, Pedram Asef, H. Cruickshank, R. Tafazolli","doi":"10.1109/MSN53354.2021.00044","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00044","url":null,"abstract":"In a critical infrastructure such as Smart Grid (SG), providing security of the system and privacy of consumers are significant challenges to be considered. The SG developers adopt Machine Learning (ML) algorithms within the Intrusion Detection System (IDS) to monitor traffic data and network performance. This visibility safeguards the SG from possible intrusions or attacks that may trigger the system. However, it requires access to residents’ consumption information which is a severe threat to their privacy. In this paper, we present a novel method to detect abnormalities on a large scale SG while preserving the privacy of users. We design a Federated IDS (FIDS) architecture using Federated Learning (FL) in a 5G environment for the SG metering network. In this way, we design Federated Deep Neural Network (FDNN) model that protects customers’ information and provides supervisory management for the whole energy distribution network. Simulation results for a real-time dataset demonstrate the reasonable improvement of the proposed FDNN model compared with the state-of-the-art algorithms. The FDNN achieves approximately 99.5% accuracy, 99.5% precision/recall, and 99.5% f1-score when comparing with classification algorithms.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133585340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV Trajectory 考虑无人机轨迹的MEC网络联合任务卸载与资源分配
2021 17th International Conference on Mobility, Sensing and Networking (MSN) Pub Date : 2021-12-01 DOI: 10.1109/MSN53354.2021.00054
Xiyu Chen, Yangzhe Liao, Qingsong Ai, Ke Zhang
{"title":"Joint Task Offloading and Resource Allocation for MEC Networks Considering UAV Trajectory","authors":"Xiyu Chen, Yangzhe Liao, Qingsong Ai, Ke Zhang","doi":"10.1109/MSN53354.2021.00054","DOIUrl":"https://doi.org/10.1109/MSN53354.2021.00054","url":null,"abstract":"Owing to the high flexibility and mobility, unmanned aerial vehicles (UAVs) have attracted significant attention from both academia and industry communities, especially in the UAVempowered mobile edge computing (MEC) networks. However, the repetitiveness of tasks generated by user equipments (UEs) has not been fully analyzed. In this paper, a UAV-empowered MEC network architecture is proposed. Computation tasks are divided into two categories, i.e., private tasks and public tasks, which can be executed locally or offloaded to UAVs utilized as flying MEC servers for task execution. The aim of this paper is to optimize task execution latency and network energy consumption by jointly considering UEs’ offloading decisions and UAVs’ route planning. To solve the challenging formulated optimization problem, an enhanced block coordinate descent algorithm is proposed, which is utilized in conjunction with the differential evolution and penalty function method. The simulation results demonstrate that the proposed scheme outperforms the random offloading strategy and fixed route strategy regarding the cumulative cost and time cost.","PeriodicalId":215772,"journal":{"name":"2021 17th International Conference on Mobility, Sensing and Networking (MSN)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信