2020 IEEE 28th International Conference on Network Protocols (ICNP)最新文献

筛选
英文 中文
Poster: Prototype of Configurable Redfish Query Proxy Module 海报:可配置红鱼查询代理模块原型
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259365
Chanyoung Park, Yoonsue Joe, Myounghwan Yoo, Dongeun Lee, Kyungtae Kang
{"title":"Poster: Prototype of Configurable Redfish Query Proxy Module","authors":"Chanyoung Park, Yoonsue Joe, Myounghwan Yoo, Dongeun Lee, Kyungtae Kang","doi":"10.1109/ICNP49622.2020.9259365","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259365","url":null,"abstract":"Redfish is a next-generation API standard for the management of data center infrastructures. This rich API can flexibly obtain data using a query string from the client side. However, this feature is optional and not fully supported by many services. We implemented a prototype Redfish query processing module on Nginx, a well-known open source web server. The Redfish query processing module can run with a proxy module and work with any server-side or client-side applications. Additionally, our prototype implementation can be configured to properly utilize queries, which are supported on a backend server, and improve performance. Our implementation was evaluated on an OpenBMC server and a mockup server and showed potential for performance improvement.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123174582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning at the Edge: Efficient Utilization of Limited CPU/GPU Resources by Multiplexing 边缘机器学习:通过多路复用有效利用有限的CPU/GPU资源
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259361
Aditya Dhakal, Sameer G. Kulkarni, K. Ramakrishnan
{"title":"Machine Learning at the Edge: Efficient Utilization of Limited CPU/GPU Resources by Multiplexing","authors":"Aditya Dhakal, Sameer G. Kulkarni, K. Ramakrishnan","doi":"10.1109/ICNP49622.2020.9259361","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259361","url":null,"abstract":"Edge clouds can provide very responsive services for end-user devices that require more significant compute capabilities than they have. But edge cloud resources such as CPUs and accelerators such as GPUs are limited and must be shared across multiple concurrently running clients. However, multiplexing GPUs across applications is challenging. Further, edge servers are likely to require considerable amounts of streaming data to be processed. Getting that data from the network stream to the GPU can be a bottleneck, limiting the amount of work GPUs do. Finally, the lack of prompt notification of job completion from GPU also results in ineffective GPU utilization. We propose a framework that addresses these challenges in the following manner. We utilize spatial sharing of GPUs to multiplex the GPU more efficiently. While spatial sharing of GPU can increase GPU utilization, the uncontrolled spatial sharing currently available with state-of-the-art systems such as CUDA-MPS can cause interference between applications, resulting in unpredictable latency. Our framework utilizes controlled spatial sharing of GPU, which limits the interference across applications. Our framework uses the GPU DMA engine to offload data transfer to GPU, therefore preventing CPU from being bottleneck while transferring data from the network to GPU. Our framework uses the CUDA event library to have timely, low overhead GPU notifications. Preliminary experiments show that we can achieve low DNN inference latency and improve DNN inference throughput by a factor of ~ 1.4.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123324404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fair Initial Access Design for mmWave Wireless 毫米波无线公平初始接入设计
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259392
S. Srinivasan, Xi Yu, A. Keshavarz-Haddad, Ehsan Aryafar
{"title":"Fair Initial Access Design for mmWave Wireless","authors":"S. Srinivasan, Xi Yu, A. Keshavarz-Haddad, Ehsan Aryafar","doi":"10.1109/ICNP49622.2020.9259392","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259392","url":null,"abstract":"Millimeter-wave (mmWave) systems use highly directional beams with narrow beamwidths to overcome the high path loss associated with their frequency bands. The use of narrow beams complicates the link establishment process as the transmitter and receiver need to search for appropriate beams before they can communicate with each other. Existing mmWave standards address the beam search process as part of the initial access (IA), and use contention based schemes that let multiple clients train their beams in the same search interval. However, there exists a severe power imbalance among competing clients’ beams, as clients naturally have different orientations and are at different distances from the same access point. This beam power imbalance coupled with poor contention protocols results in poor IA fairness in dynamic systems with multiple clients. We propose a joint power control and contention adaptation protocol (coined JPOC) that addresses this unfairness problem. JPOC uses an open-loop and client-side power control mechanism that reduces the beam power imbalance among competing clients. It also uses a model-driven contention adaptation protocol that optimally adjusts the duration of the contention time according to the system dynamics. Comprehensive evaluation through a mixture of experiments and simulations show that compared to existing 802.11 ad/ay standards, JPOC substantially reduces the contention overhead and increases the IA fairness.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121881014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lumos: Improving Smart Home IoT Visibility and Interoperability Through Analyzing Mobile Apps Lumos:通过分析移动应用程序提高智能家居物联网的可视性和互操作性
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259352
Jeongmin Kim, Steven Y. Ko, Soo-A Son, Dongsu Han
{"title":"Lumos: Improving Smart Home IoT Visibility and Interoperability Through Analyzing Mobile Apps","authors":"Jeongmin Kim, Steven Y. Ko, Soo-A Son, Dongsu Han","doi":"10.1109/ICNP49622.2020.9259352","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259352","url":null,"abstract":"The era of Smart Homes and the Internet of Things (IoT) calsl for integrating diverse \"smart\" devices, including sensors, actuators, and home appliances. However, enabling interoperation across heterogeneous IoT devices is a challenging task because vendors use their own control and communication protocols. Prior approaches have attempted to solve this problem by asking for vendor support, or even fundamentally re-designing the architecture of IoT devices. These approaches face limitations as they require disruptive changes.This paper explores a new approach to improving IoT interoperability without requiring architectural changes or vendor participation. Focusing on smart-home environments, we propose Lumos that improves interoperability by leveraging Android apps that control IoT devices. Lumos uses this information learned from IoT apps to enable \"best-effort\" interoperation across heterogeneous devices. Our evaluation with 15 commercial IoT devices from three major IoT platforms and in-depth user studies conducted with 24 participants demonstrate the promising efficacy of Lumos for implementing diverse interoperation scenarios.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AdapLoRa: Resource Adaptation for Maximizing Network Lifetime in LoRa networks AdapLoRa:在LoRa网络中实现最大网络生存期的资源自适应
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259398
Weifeng Gao, Zhiwei Zhao, G. Min
{"title":"AdapLoRa: Resource Adaptation for Maximizing Network Lifetime in LoRa networks","authors":"Weifeng Gao, Zhiwei Zhao, G. Min","doi":"10.1109/ICNP49622.2020.9259398","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259398","url":null,"abstract":"LoRa has attracted much research attention due to its long communication range and low power consumption on end devices. In LoRa networks, the energy consumption on the end devices can be unfair, because some end devices have to use large spreading factors (leading to long transmission time) or large transmission power to reach a far-away gateway, and their energy consumption can be quite different. As a result, these end devices will run out of their batteries much faster, which may significantly reduce the network lifetime. The existing works have focused on the static resource allocation in LoRa networks to achieve energy fairness. However, due to the dynamic wireless environment, the static allocation can be inefficient in practice. In this paper, we develop AdapLoRa, a lifetime-aware dynamic network resource allocation system, to maximize the network lifetime of LoRa networks. AdapLoRa periodically adapts the resource allocation according to the link quality of end devices. A fine-grained network model is developed to capture the link quality variations and network interference. Finally, by considering the adaptation overhead (e.g., energy consumed by end devices to receive the configuration commands), we propose to gradually improve the network lifetime by periodically estimating network lifetime with different resource allocations. We implement AdapLoRa on a LoRa testbed, and the experimental results reveal that AdapLoRa improves the network lifetime by 23.7% compared with the state-of-the-art works.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126384306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
CloakLoRa: A Covert Channel over LoRa PHY CloakLoRa: LoRa PHY上的隐蔽通道
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259364
Ningning Hou, Yuanqing Zheng
{"title":"CloakLoRa: A Covert Channel over LoRa PHY","authors":"Ningning Hou, Yuanqing Zheng","doi":"10.1109/ICNP49622.2020.9259364","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259364","url":null,"abstract":"This paper describes our design and implementation of a covert channel over LoRa physical layer (PHY). LoRa adopts a unique modulation scheme (chirp spread spectrum (CSS)) to enable long range communication at low-power consumption. CSS uses the initial frequencies of LoRa chirps to differentiate LoRa symbols, while simply ignoring other RF parameters (e.g., amplitude and phase). Our study reveals that the LoRa physical layer leaves sufficient room to build a covert channel by embedding covert information with a modulation scheme orthogonal to CSS. To demonstrate the feasibility of building a covert channel, we implement CloakLoRa. CloakLoRa embeds covert information into a regular LoRa packet by modulating the amplitudes of LoRa chirps while keeping the frequency intact. As amplitude modulation is orthogonal to CSS, a regular LoRa node receives the LoRa packet as if no secret information is embedded into the packet. Such an embedding method is transparent to all security mechanisms at upper layers in current LoRaWAN. As such, an attacker can create an amplitude modulated covert channel over LoRa without being detected by current LoRaWAN security mechanism. We conduct comprehensive evaluations with COTS LoRa nodes and receive-only software defined radios and experiment results show that CloakLoRa can send covert information over 250m.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Online Cooperative Resource Allocation at the Edge: A Privacy-Preserving Approach 边缘在线协作资源分配:一种隐私保护方法
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259382
Yuqing Li, Hok Chun Ng, Lin Zhang, Bo Li
{"title":"Online Cooperative Resource Allocation at the Edge: A Privacy-Preserving Approach","authors":"Yuqing Li, Hok Chun Ng, Lin Zhang, Bo Li","doi":"10.1109/ICNP49622.2020.9259382","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259382","url":null,"abstract":"Mobile edge computing provides a platform facilitating individual servers to pool their resources locally for cooperative computation. One fundamental problem in this new paradigm is how to effectively allocate crowdsourced edge resources to users competing in a highly unpredicted environment. This, apparently, cannot be realized without a truthful open market. On the other hand, enforcing truthfulness potentially incurs privacy problems. There have been efforts in differentially private auctions, in which exponential mechanism, designed for single-sided single-item auctions, is a common solution. However, such an approach is not applicable in two-sided combinatorial edge markets, further complicated by the extra migration cost on energy-constrained users often imposed by online allocation. In this paper, we propose OPTA, an online privacy-preserving truthful double auction mechanism for dynamic resource cooperation at the edge. Given uncertainties in future market behaviors, we harness competitive analysis by decomposing the online optimization into a series of single-round auctions such that their objectives are iteratively adjusted to capture the temporally-coupled nature of the problem. In each round, by jointly considering the features of exponential mechanism and greedy heuristic, we design a near-optimal allocation policy with efficiency and privacy guarantee. We further implement a critical-value pricing scheme for winners, realizing the truthfulness in expectation. Building upon the single-round results, our overall online algorithm achieves a provable competitive ratio. We validate the desirable properties of OPTA through theoretical analysis and extensive simulations.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131004931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Poster: Maintaining Training Efficiency and Accuracy for Edge-assisted Online Federated Learning with ABS 海报:保持ABS边缘辅助在线联邦学习的训练效率和准确性
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259386
Jiayu Wang, Zehua Guo, Sen Liu, Yuanqing Xia
{"title":"Poster: Maintaining Training Efficiency and Accuracy for Edge-assisted Online Federated Learning with ABS","authors":"Jiayu Wang, Zehua Guo, Sen Liu, Yuanqing Xia","doi":"10.1109/ICNP49622.2020.9259386","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259386","url":null,"abstract":"This paper proposes Adaptive Batch Sizing (ABS) for online federated learning. ABS is an iteration process-efficient solution that adaptively adjusts batch size of the training process at edge nodes. Preliminary results show that ABS maintains training efficiency and accuracy, compared with existing iteration round-efficient solutions.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Copyright notice] (版权)
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/icnp49622.2020.9259372
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icnp49622.2020.9259372","DOIUrl":"https://doi.org/10.1109/icnp49622.2020.9259372","url":null,"abstract":"","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123794159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: Securing IoT Through Coverage-Bounding Wireless Communication With Visible Light 海报:通过可见光覆盖无线通信保护物联网
2020 IEEE 28th International Conference on Network Protocols (ICNP) Pub Date : 2020-10-13 DOI: 10.1109/ICNP49622.2020.9259369
Qing Wang, Jona Beysens, Dave Singelée, S. Pollin
{"title":"Poster: Securing IoT Through Coverage-Bounding Wireless Communication With Visible Light","authors":"Qing Wang, Jona Beysens, Dave Singelée, S. Pollin","doi":"10.1109/ICNP49622.2020.9259369","DOIUrl":"https://doi.org/10.1109/ICNP49622.2020.9259369","url":null,"abstract":"We propose a concept of coverage-bounding and ‘visual’ wireless communication—HODOR 1 —to secure the Internet of Things (IoT). Coverage-bounding means the communication coverage is controlled accurately in 3-dimensions. ‘Visual’ implies that the communication coverage and process are visible to user, representing an important and user-friendly side-channel for se-curing IoT. HODOR can provide secure wireless communication both psychologically (visible to users) and technically (nodes only communicate with each other within their delimited coverage). It can benefit IoT applications for secure wireless communications, especially those that demand secure interactions in proximity.","PeriodicalId":233856,"journal":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信