Johannes Kässinger, D. Rosin, Frank Dürr, Niklas Hornischer, O. Röhrle, K. Rothermel
{"title":"Persival: Simulating Complex 3D Meshes on Resource-Constrained Mobile AR Devices Using Interpolation","authors":"Johannes Kässinger, D. Rosin, Frank Dürr, Niklas Hornischer, O. Röhrle, K. Rothermel","doi":"10.1109/ICDCS54860.2022.00097","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00097","url":null,"abstract":"Simulations are an important part of analyzing and understanding systems, including not only technical but also bio-mechanical subjects such as the musculoskeletal apparatus of the human body. Detailed, biophysical simulations are complex and require a substantial amount of computational resources. With the advent of mobile AR devices such as the Microsoft HoloLens, new challenges arise to run or represent the results of such complex simulations on resource-constrained devices. In this paper we propose a deep-learning-based mobile simulation approach for the contraction of a human muscle model on an AR device (MS HoloLens 2). To elaborate, we present a two-step workflow consisting of simulating the deformation of the 3D geometry of the biceps, of which a subset of points can be interpolated back to full resolution. This allows to either offload the full simulation, just communicating the subset of nodal points, or to use a lower-quality local simulation restricted to the subset. Interpolation is done locally in both cases. The interpolation model consists of a dense, single hidden layer neural network. A mesh simplification method is combined with a genetic algorithm to determine the optimal subset of mesh nodes to interpolate from. In purely local execution, our simulation and interpolation model is able to accurately predict the position of 2809 nodal points based on as few as 30, while using 97.78 % less energy and evaluating up to 1.23 times faster compared to the local reference model. In an ideal distributed scenario energy consumption decreases by 99 % and evaluation time is up to 32.42 times faster. For the latter, it also reduces communication-data to 1.2 % of the full resolution mesh.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight and Secure Vehicular Edge Computing Framework for V2X Services","authors":"Ramneek, Sangheon Pack","doi":"10.1109/ICDCS54860.2022.00146","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00146","url":null,"abstract":"Vehicle-to-everything (V2X) communications over cellular networks have a great potential for enabling intelligent transportation systems (ITSs), and supporting advanced services such as autonomous driving. However, such services have stringent QoS and security/privacy requirements. Even though the use of blockchain can ensure security and privacy for V2X services, blockchain-based solutions suffer from the issues of high latency, low scalability, and high computation power for mining. To overcome these challenges, we propose a lightweight and secure vehicular edge computing framework. The LS-VEC framework leverages directed acyclic graphs (DAGs) for recording transactions for edge resource allocation and micro-transactions for pricing VEC resources. In addition, an auction theory-based game-theoretic approach is proposed for allocation and pricing of edge resources used for supporting computation offloading.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Optimization of Energy Consumption and Completion Time in Federated Learning","authors":"Xinyu Zhou, Jun Zhao, Huimei Han, C. Guet","doi":"10.1109/ICDCS54860.2022.00101","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00101","url":null,"abstract":"Federated Learning (FL) is an intriguing distributed machine learning approach due to its privacy-preserving characteristics. To balance the trade-off between energy and execution latency, and thus accommodate different demands and application scenarios, we formulate an optimization problem to minimize a weighted sum of total energy consumption and completion time through two weight parameters. The optimization variables include bandwidth, transmission power and CPU frequency of each device in the FL system, where all devices are linked to a base station and train a global model collaboratively. Through decomposing the non-convex optimization problem into two subproblems, we devise a resource allocation algorithm to determine the bandwidth allocation, transmission power, and CPU frequency for each participating device. We further present the convergence analysis and computational complexity of the proposed algorithm. Numerical results show that our proposed algorithm not only has better performance at different weight parameters (i.e., different demands) but also outperforms the state of the art.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132617936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huanqi Yang, Hongzhi Liu, Chengwen Luo, Yuezhong Wu, Wei Li, Albert Y. Zomaya, Linqi Song, Weitao Xu
{"title":"Vehicle-Key: A Secret Key Establishment Scheme for LoRa-enabled IoV Communications","authors":"Huanqi Yang, Hongzhi Liu, Chengwen Luo, Yuezhong Wu, Wei Li, Albert Y. Zomaya, Linqi Song, Weitao Xu","doi":"10.1109/ICDCS54860.2022.00081","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00081","url":null,"abstract":"Recent years have witnessed the remarkable growth of the Internet of Vehicles (IoV). Due to the high dynamics and ad-hoc nature of IoV communication, the lack of effective secret key establishment in IoV remains a security bottleneck. Physical layer key generation has emerged as a promising technology to establish a pair of cryptographic keys in a lightweight and information-theoretic secure way. However, prior works mainly focus on legacy communication technologies such as Wi-Fi, ZigBee, and 5G which can only achieve short range IoV communications. The emergence of Long-range (LoRa) communication technology that features long-range, low power, and extremely low data rate, brings new challenges for key generation in long range IoV scenarios. In this paper, we present Vehicle-Key, which is a secret key generation system to secure LoRa-enabled IoV communications. In Vehicle-Key, we design a novel deep learning model that can achieve channel prediction and quantization simultaneously. Additionally, we propose an autoencoder-based reconciliation method that improves the key agreement rate significantly. Extensive real-world experiments show that Vehicle-Key improves the key agreement rate by 15.10%–49.81% and key generation rate by 9–14× compared with the state-of-the-art. Security analysis demonstrates that Vehicle-Key is secure against several common attacks. Moreover, we implement Vehicle-Key on a Raspberry Pi and show that it can be executed in 3.4 ms.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster: A Dynamic Task Scheduling using Multi-Platoon Architecture in Vehicular Networks","authors":"Tingting Xiao, Chen Chen, Qingqi Pei, Shaohua Wan","doi":"10.1109/ICDCS54860.2022.00135","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00135","url":null,"abstract":"The autonomous vehicle platoon has the potential to cope with the stress caused by the resource-constrained vehicles‘ demand for processing power and the spread-out deployment of MEC-BS. In this poster, we focus on a multi-platoons scenario for task scheduling. Our objective is to minimize the overall energy consumption subject to the long-term latency constraint. To characterize stochastic properties and deal with coupling between variables, we propose a dynamic task scheduling algorithm based on Lyapunov optimization (LDTS). We theoretically and empirically evaluate the performance of the proposed algorithm, which is illustrated to be significantly better than state-of-the-art and other benchmark approaches in terms of execution latency and energy consumption.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133477552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FileInsurer: A Scalable and Reliable Protocol for Decentralized File Storage in Blockchain","authors":"Hongyin Chen, Yu‐Ju Lu, Yukun Cheng","doi":"10.1109/ICDCS54860.2022.00025","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00025","url":null,"abstract":"With the development of blockchain applications, the requirements for file storage in blockchain are increasing rapidly. Many protocols, including Filecoin, Arweave, and Sia, have been proposed to provide scalable decentralized file storage for blockchain applications. However, the reliability is not well promised by existing protocols. Inspired by the idea of insurance, we innovatively propose a decentralized file storage protocol in blockchain, named as FileInsurer, to achieve both scalability and reliability. While ensuring scalability by distributed storage, FileInsurer guarantees reliability by enhancing robustness and fully compensating for the file loss. Specifically, under mild conditions, we prove that no more than 0.1% value of all files should be compensated even if half of the storage collapses. Therefore, only a relatively small deposit needs to be pledged by storage providers to cover the potential file loss. Because of lower burdens of deposit, storage providers have more incentives to participate in the storage network. FileInsurer can run in the top layer of the InterPlanetary File System (IPFS), and thus it can be directly applied in Web 3.0, Non-Fungible Tokens, and Metaverse.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114699411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoDSCF: A Store-Carry-Forward Routing Protocol for joint Bus Networks and Internet of Drones","authors":"L. M. Bine, A. Boukerche, L. B. Ruiz, A. Loureiro","doi":"10.1109/ICDCS54860.2022.00096","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00096","url":null,"abstract":"Internet of Drones (IoD) is an architecture that aims to enable different drones to share the same airspace. This architecture can help coordinate drone access to airspace in urban environments. Considering that the IoD is a dynamic network, it is possible to have scenarios in which drone traffic is sparse when, for instance, the network has isolated drones. In this case, the drones’ communication range does not reach any other drone. Thus, store-carry-forward protocols may be suitable for maintaining network communication. Moreover, different networks can collaborate to fill these communication gaps. In this study, we explore the collaboration between IoD and Bus Networks. Our analysis shows that maintaining a hybrid communication between drones and buses can fill the gaps in the communication between drones. The main goal of this work is to present the IoDSCF – a store-carry-forward routing protocol for joint Bus Networks and the Internet of Drones (IoD). IoDSCF takes advantage of both networks to extend the communication reachability. Our results reveal that IoDSCF presents better results in the number of delivered packets and end-to-end delay than a solution based only on communication between drones. This is a promising strategy for data communication, mainly in smart cities.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114531930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster: INSANE – A Uniform Middleware API for Differentiated Quality using Heterogeneous Acceleration Techniques at the Network Edge","authors":"Lorenzo Rosa, Andrea Garbugli","doi":"10.1109/ICDCS54860.2022.00134","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00134","url":null,"abstract":"Next-generation AI applications benefit from executing close to the network edge to better exploit co-locality to datasources and controlled actuators, and to meet stringent latency requirements. In the edge-enabled cloud continuum, time and safety-critical traffic coexists with best-effort flows, resulting in heterogeneous requirements that current networking middleware and frameworks struggle to support. This paper proposes INSANE, INtegrated Selective Acceleration at the Network Edge, the first edge-oriented middleware that integrates different network acceleration techniques (XDP, DPDK, RDMA, and TSN) within the same data distribution service. INSANE offers a uniform and simple interface, useful to support common data distribution patterns, that allow developers to exploit at runtime the most suitable network technology available in the dynamically determined deployment environment.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114841084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junmei Yao, H. Huang, Ruitao Xie, Xiaolong Zheng, Kaishun Wu
{"title":"SledZig: Boosting Cross-Technology Coexistence for Low-Power Wireless Devices","authors":"Junmei Yao, H. Huang, Ruitao Xie, Xiaolong Zheng, Kaishun Wu","doi":"10.1109/ICDCS54860.2022.00078","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00078","url":null,"abstract":"With the rapid growth of Internet of Things, the number of heterogeneous wireless devices working in the same frequency band increases dramatically, leading to severe cross-technology interference. To enable coexistence, researchers have proposed a large number of mechanisms to manage interference. However, existing mechanisms have severe modifications in either the physical or MAC (medium access control) layers, making them hard to be deployed on commercial devices. In this paper, we design and implement SledZig to boost cross-technology coexistence for low-power devices through both enabling more transmission opportunities and avoiding interference. SledZig is fully compatible with the standard in both physical and MAC layers. It decreases the WiFi signal power on the channel of low-power devices while keeps the WiFi transmission power unchanged, through making constellation points in the overlapped subcarriers have the lowest power, which can be achieved by just encoding the WiFi payload. We implement SledZig on hardware testbed and evaluate its performance under different settings. Experiment results show that SledZig can effectively increase ZigBee transmissions and improve its performance over a WiFi channel under various WiFi data traffic, with as low as 6.94% WiFi throughput loss.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liwang Lu, Zhongjie Ba, Feng Lin, Jinsong Han, Kui Ren
{"title":"ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures","authors":"Liwang Lu, Zhongjie Ba, Feng Lin, Jinsong Han, Kui Ren","doi":"10.1109/ICDCS54860.2022.00080","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00080","url":null,"abstract":"Recent years have witnessed enormous research efforts on WiFi sensing to enable intelligent services of Internet of Things. However, due to the omni-directional broadcasting manner of WiFi signals, the activity semantic underlying the signals is leaked to adversaries for surveillance in all probability. To reveal the threat, this paper demonstrates ActListener, which could eavesdrop on user activities imperceptibly using a WiFi infrastructure in any location of user sensing area. The proposed attack requires no direct physical access to the victim user’s devices and prior knowledge of activity recognition model details and device locations. In particular, ActListener first detects the signal segment induced by each human activity, and estimates the locations of legitimate devices and the victim users relative to the adversary’s device for further signal modeling. Then, ActListener models propagating WiFi signals to construct the relationship between physical locations and received signals, and converts the eavesdropped signals to that by legitimate devices based on the models. Furthermore, a neural network-based generative model is designed to calibrate the converted signals for resisting noises in over-the-air WiFi signals. Experiments show ActListener achieves 88.4% average α-similarity on recovering originally signals from eavesdropped ones, and over 90% accuracy in activity recognition.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129810835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}