{"title":"A Novel Cross-Layer Model Based Communication Network for Satellite Constellations","authors":"Yifei Jiang, Shufan Wu, Qiankun Mo","doi":"10.1109/ICCSN52437.2021.9463641","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463641","url":null,"abstract":"With the rapid development of satellite technologies, ten of thousands satellites are emitted. To construct several mega constellations providing high-performance communications network with global coverage becomes a reality. Such space-based communications network can support many different applications including Internet access, mobile telecommunications and frequency sensing and so on. The focus of this paper is to introduce a communications network structure working for satellite constellations to realize the above applications. In this paper, we utilize a part of OSI model as cross-layer model system. In this system, each layer share information with each other, and the decision of individual layer contains whole information. As a result, our design can realize low-cost and high-performance simultaneous to solve the complex requirements in the communication of satellite Constellations. Such cross-layer model in aerospace network application is the originality of this paper.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127724503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mobile Sink Data Collection Algorithm Based on JGLE Metrics","authors":"Yulong Han","doi":"10.1109/ICCSN52437.2021.9463645","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463645","url":null,"abstract":"Aiming at the problem of energy hole in data collection in wireless sensor network, the paper proposes a mobile Sink data collection algorithm called MSDCA-JGLE in which the JGLE metrics is applied to dynamically select cluster head. Aiming at the NP-hard problem of mobile path planning of the Sink in cluster head nodes, an improved nearest neighbor algorithm is presented to get the approximate optimal solution of the problem. The simulation results show that the proposed algorithm can balance the energy consumption of network nodes, maximize the network life, and ensure the reliability and integrity of data collection.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Signal Fngerprint Extraction Based on Convolutional Deep Belief Network","authors":"Weichen Zhao, Junshe An","doi":"10.1109/ICCSN52437.2021.9463643","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463643","url":null,"abstract":"Signal Fingerprint is a physical layer based wireless security algorithm desinged for recognizing legal devices. The non-ideality of transmitting circuit will lead to small but unique distortions in the signal emitted by this circuit. Signal fingerprint is aiming at extracting those unique distortions from received signal in order to identify the related radiofrequency circuit and wireless device. Traditional signal fingerprint extraction depends on carefully designed formula whose application scope is narrow and the accuracy cannot be guaranteed. Supervised deep learning based signal fingerprint extraction enjoys high accuracy and can be deployed in many different circumstances. But the large amount labeled data required in training stage is a strong requirement that cannot be easily met. Besides, the network might be sensitive to noise. To solve those problems, this paper proposes a Convolutional Deep Belief Network (CDBN) based signal fingerprint extraction algorithm. The signal fingerprint extraction is performed by network itself with the spectrum of signal as input. So the accuracy can be improved and application scope can be widen. Due to the unsupervised essence of CDBN, the constraint of labeled data is relieved.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127422575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Service Function Chain Deployment Using a Viterbi-Based Algorithm","authors":"Dong Zhai, Xiangru Meng, Qiao-yan Kang, Hang Hu, Qingwei Meng, Yuan Liang","doi":"10.1109/ICCSN52437.2021.9463659","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463659","url":null,"abstract":"Network Function virtualization (NFV) decouples network functions from hardware, improves the flexibility of resource allocation, and enhances network scalability. However, NFV also introduces several security threats since it relies on software, which makes attacking it or manipulating its services easier than having the network functions provided by hardware only. So security problem is a major concern for network operators and NFV users. This paper proposes a security and delay optimization service function chain (SFC) deployment method based on Viterbi algorithm. The proposed method considers the security demand level and transmission delay. Experiment results show that the proposed method not only has the best acceptance ratio, but also improves the virtual network function security level match degree and reduces the average transmission delay.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Time and Power Allocation for Wireless Powered NOMA-MEC Systems","authors":"Binbin Su, Hongbo Liu, Jin Meng","doi":"10.1109/ICCSN52437.2021.9463665","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463665","url":null,"abstract":"This paper considers a hybrid wireless powered non-orthogonal multiple access (NOMA) enabled mobile edge computing (MEC) systems. The transmit energy beamforming, transmit power and time allocations are jointly optimized to maximize the computation rate of the strong user, while satisfying the computation rate requirement of the weak user and the harvested energy constraints. The optimal solution is proposed in a semi-closed form by adopting Lagrange duality method. Simulation results show that the proposed system yields better performance than the existing schemes.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Du Enyu, W. Wenjun, Si Pengbo, Zhang Xuanyi, Yang Wenhui
{"title":"A Demo System for the Airport Gate Assignment Algorithm Study and Evaluation","authors":"Du Enyu, W. Wenjun, Si Pengbo, Zhang Xuanyi, Yang Wenhui","doi":"10.1109/ICCSN52437.2021.9463632","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463632","url":null,"abstract":"With the rapid development of civil aviation transportation, the airport gate assignment problem (AGAP) has become an important issue for improving the operation efficiency of airport. By now, there has been a lot of algorithm research on the AGAP. However, the dynamic of flight schedule and the huge amount of large hub airport has not been well considered. For the convenient of advanced algorithm study and evaluation, a demo system for the AGAP is designed and built providing the function of data input, animation display of gate assignment result and the AGAP algorithm module. The user interface and the animation are implemented using the HTML and CSS, the AGAP algorithm functions are called through JavaScript, and the PHP is responsible for accessing the MySQL database. The test result show that the system can process data properly and the animation is smooth. The monitoring data of system running environment show that the system works stably.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"57 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Laser Spot Tracking Algorithm for Underwater Wireless Optical Communication Based on Image Processing","authors":"Zuxiang Zheng, Hongxi Yin, Jianying Wang, Lianyou Jing","doi":"10.1109/ICCSN52437.2021.9463668","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463668","url":null,"abstract":"The APT for a laser spot underwater is one of the key technologies for underwater wireless laser communication. In this paper, an algorithm is proposed for fast and accurate tracking of underwater moving target spot based on laser spot image captured by CCD camera, i.e., MASMS algorithm, which combines the classical Kalman filtering algorithm with ASMS algorithm to improve the loss of the target when the target moves too fast. The performance of MASMS is tested, including center position error of a laser spot, frame rate, precision plot, and success plot, and compared with the classical algorithms such as Mean-Shift, ASMS, STRUCK, and KCF, which are available in literature. It is shown by our simulating experiment that the performance of MASMS algorithm is better than that of mentioned above four existing algorithms except for the only frame rate, that is slightly lower than KCF and ASMS. Therefore, the MASMS algorithm can be applied to track underwater wireless laser communication signals in the future in order to enhance the effectiveness and reliability of communication.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132249330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Physical Layer Security of Multi-user Hybrid RF/VLC Networks","authors":"Jiajia Qiao, Xiang Zhao, Yu Sun","doi":"10.1109/ICCSN52437.2021.9463663","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463663","url":null,"abstract":"Recently, the hybrid radio frequency (RF)/ visible light communication (VLC) network has been widely studied due to the advantages of high data transmission and no interference between the two networks. Taking the physical layer security (PLS) into account, most work on hybrid RF/VLC network focused on single user. However, many practical scenarios require hybrid network to serve multiple users (MU). Thus, in this paper, we make a study on the PLS of MU hybrid RF/VLC network where the messages to each of the users must be kept confidential from the other and also from the external eavesdropper. To enhance the secrecy performance of the hybrid network, we propose a zero forcing (ZF) beamforming strategy to ensure that the information of each legitimate user can not be received by other users and the eavesdropper. A sum secrecy rate (SSR) optimization problem is formulated under the ZF constraint and the constraint of the power transmitted from the VLC and the RF access point. To reduce the complexity of the original problem, we decouple it into two successive sub-problems and solve them via convex optimization theory and matrix theory. Simulation results show that a positive SSR can always be achieved, and the SSR of the MU hybrid RF/VLC network is superior to that of the standalone RF and VLC networks.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yujie Luo, Yang Li, Jie Yang, Li Ma, Wei Huang, Bingjie Xu
{"title":"Optimization of the Randomness Extraction Based on Toeplitz Matrix for High-Speed QRNG Post-Processing on GPU","authors":"Yujie Luo, Yang Li, Jie Yang, Li Ma, Wei Huang, Bingjie Xu","doi":"10.1109/ICCSN52437.2021.9463613","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463613","url":null,"abstract":"As one of the applications of randomness extraction, post-processing is important for the high-speed and real-time QRNG (Quantum Random Number Generator) system. This work proposes a multi-thread and streamed-processing algorithm to optimize post-processing based on Toeplitz matrix on GPU (Graphics Processing Unit) and achieves a high speed over 6.8 Gbps. Furthermore, random tests are done to evaluate the quality of the random bits generated. The results show that both the execution speed and the randomness can satisfy the requirements of the high-speed and real-time QRNG system.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quan Chen, Lei Yang, Xianfeng Liu, Bochao Cheng, Jianming Guo, Xuanran Li
{"title":"Modeling and Analysis of Inter-Satellite Link in LEO Satellite Networks","authors":"Quan Chen, Lei Yang, Xianfeng Liu, Bochao Cheng, Jianming Guo, Xuanran Li","doi":"10.1109/ICCSN52437.2021.9463648","DOIUrl":"https://doi.org/10.1109/ICCSN52437.2021.9463648","url":null,"abstract":"Low-Earth orbit (LEO) satellite networks have become an emerging and promising technology to provide wide-range network access. The inter-satellite links (ISLs) extend the service scope of the network and reduce its dependence on terrestrial infrastructures. This paper formulates the calculation model for the ISL geometrical parameters including range and pointing direction, which are key parameters for communication performance. The ISL variation patterns with satellite phase are theoretically derived and verified by numerical simulations. The propagation delay of multi-ISL path is also studied.","PeriodicalId":263568,"journal":{"name":"2021 13th International Conference on Communication Software and Networks (ICCSN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114856091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}