2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

筛选
英文 中文
QoS Aware Channel Selection and Power Allocation for Device-to-Device Communication 面向设备间通信的QoS感知信道选择和功率分配
Radhika Gour, Anshul Tyagi
{"title":"QoS Aware Channel Selection and Power Allocation for Device-to-Device Communication","authors":"Radhika Gour, Anshul Tyagi","doi":"10.1109/ANTS.2018.8710110","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710110","url":null,"abstract":"Device-to-Device (D2D) communication has proven as a candidate solution for offloading the data traffic and improving spectrum efficiency of cellular communication systems. It allows the terminals to communicate directly without increasing the load on the base station (BS). Underlay D2D is adopted in our work because it is more spectrum efficient due to channel sharing among cellular user (CU) and D2D pair. This kind of sharing is beneficial only when appropriate resource management is done otherwise it causes harmful interferences too. This work introduces an efficient and simple method to find multiple CUs as reuse partners for each D2D pair. After the selection of channels, power control is applied by means of convex optimization for D2D pairs to control the interference at the BS. The objective of the work is to maximize the D2D sum-rate without affecting CU's performance. The proposed scheme is then compared with existing pairing algorithms named as Hungarian also known as Kuhn-Munkres (KM) and IPPO algorithms and performance gain is verified through simulation results.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power, Cost and Reach Based Evaluation of Next Generation Passive Optical Networks Architectures 基于功耗、成本和覆盖范围的下一代无源光网络架构评估
Sukriti Garg, M. Aggarwal, A. Dixit
{"title":"Power, Cost and Reach Based Evaluation of Next Generation Passive Optical Networks Architectures","authors":"Sukriti Garg, M. Aggarwal, A. Dixit","doi":"10.1109/ANTS.2018.8710127","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710127","url":null,"abstract":"Evolution in passive optical access networks concentrate on increasing their capacity that can be in terms of the number of users served or the data rates served per user. Various techniques have been under consideration to achieve the same. Their names are first generation passive optical networks (PON), next generation-1 PON (NG-PON1), and next generation 2 PON (NG-PON2). However, none of them has proven to be the most efficient solution for every scenario (such as power, cost and reach efficiency). This calls for the evaluation of the existing PON architectures and provide an optimum solution. In this work, we evaluate the performance of Gigabit-capable PON (GPON), XG-PON, XLG-PON, wavelength division multiplexing PON (WDM-PON), and time and wavelength division multiplex PON (TWDM-PON) architectures in terms of their reach, cost and power consumption. On analyzing these architectures in OptSim software, we found that WDM-PON is an optimum solution for long reach and high data rate PON system if we neglect the cost constraint. Furthermore, for the cost effective solution, TWDM-PON fits best in terms of high data rate and low power consumption but provides lower reach in comparison to WDM-PON.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115688046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Security of Remote Key Less Entry for Vehicles 车辆远程无钥匙进入安全性研究
Jinita Patel, M. Das, Sukumar Nandi
{"title":"On the Security of Remote Key Less Entry for Vehicles","authors":"Jinita Patel, M. Das, Sukumar Nandi","doi":"10.1109/ANTS.2018.8710105","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710105","url":null,"abstract":"With the rapid growth in the automobile industry and the advancement in the embedded technology, the traditional mechanical key for operating vehicles is gradually replaced by Remote Keyless Entry (RKE) system. Enabling RKE system in vehicles not only improves the security of car access but also facilitates convenience to users. At the same time, RKE system introduces many threats such as eavesdropping, relay, replay attack, On-board Diagnostic (OBD) port scan attack, key fob cloning, jamming and so on. In this paper, we discuss on the keyless car entry system, observe some security weaknesses in a recent RKE system and present a new RKE system. The proposed RKE system uses the notion of unclonable security module to minimize the OBD port scan attack including other known threats. The proposed RKE system achieves authentication of car as well as key fob by preserving privacy of the communicating entities. The security analysis and experimental results show that the proposed RKE system is secure and practical with respect to efficiency and user convenience.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115716997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Novel Insights into Probability of Success of Random Access Scheme in 5G Millimeter Wave Cellular Network 5G毫米波蜂窝网络中随机接入方案成功概率的新见解
Shilpi Varshney, Shreya Tyagi, B. Sainath
{"title":"Novel Insights into Probability of Success of Random Access Scheme in 5G Millimeter Wave Cellular Network","authors":"Shilpi Varshney, Shreya Tyagi, B. Sainath","doi":"10.1109/ANTS.2018.8710051","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710051","url":null,"abstract":"As we progress towards the fifth generation (5G) wireless systems to meet the data rate requirements, it becomes difficult for the conventional cellular networks to provide connectivity in the uplink to a huge number of connected devices. Hence, the adoption of the millimeter wave (mmWave) technology will ease the integration of IoT devices into the 5G cellular network. In this paper, we consider a stochastic geometry model to investigate baseline Random Access scheme’s success probability in the Internet of things (IoT) that uses millimeter wave (mmWave) cellular communication technology. Specifically, to obtain novel insights, we analyze probability of success of the random access scheme in the following three scenarios: i) Success probability as a function of the signal power-to-noise ratio (SNR), ii) Success probability as a function of the signal power-to-interference ratio (SIR), and iii) Success probability in terms of signal power-to-interference plus noise ratio (SINR). Furthermore, we approximate the probability of success in LOS region using a simplified ball model for a large number of IoT devices. Using Monte Carlo simulations, the approximation of LOS-ball comes out to be sufficiently accurate with the analytical results for typical IoT intensity.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121077821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Optimal Packet Scheduling with Individual Packet Delay Constraints 具有单个包延迟约束的能量最优包调度
Dony J. Muttath, M. Santhoshkumar, K. Premkumar
{"title":"Energy Optimal Packet Scheduling with Individual Packet Delay Constraints","authors":"Dony J. Muttath, M. Santhoshkumar, K. Premkumar","doi":"10.1109/ANTS.2018.8710104","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710104","url":null,"abstract":"We consider a problem of scheduling packets in a fading link where each packet is required to reach the destination before a delay deadline. Time is slotted, and at the beginning of each slot, a packet arrives according to an arrival process. A packet on arrival is stored in a buffer, and it is required to reach the destination before a total delay of $d+ 1$ slots (i.e., the maximum waiting time in the buffer can be d time-slots and one time-slot delay for transmission). At the beginning, the transmitter is provided with a finite energy $E_{0}$, and the problem that we consider is to obtain an optimum scheduler that decides which time-slots to be used for transmission such that it maximizes the number of packet transmissions with a total energy $E_{0}$, and within a delay deadline of $d+1$ time-slots for each packet. We model this problem as a Markov Decision process, and provide a dynamic programming (DP) based solution which is prohibitively complex, but can be numerically solved. The computational complexity of the DP solution motivates us to provide two sub-optimal heuristic solutions to the scheduling problem. We provide the throughput and average energy performance of the heuristic solutions.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MEC and IoT Based Automatic Agent Reconfiguration in Industry 4.0 工业4.0中基于MEC和物联网的自动代理重构
S. K. Datta, C. Bonnet
{"title":"MEC and IoT Based Automatic Agent Reconfiguration in Industry 4.0","authors":"S. K. Datta, C. Bonnet","doi":"10.1109/ANTS.2018.8710126","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710126","url":null,"abstract":"The Internet of Things (IoT) and connected devices are impacting enterprises, public sector bodies, and citizens in many ways. In parallel, upcoming 5G and Multi-Access Edge Computing (MEC) are aiming to enable ultra low latency use cases for IoT. This paper proposes to utilize MEC and IoT based architecture for automatic agent reconfiguration in smart manufacturing floors. The EURECOM IoT Platform is extended to achieve this purpose.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121888786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Apache Spark Based Analytics of Squid Proxy Logs 基于Apache Spark的Squid代理日志分析
D. Mishra, Salim Pathan, C. Murthy
{"title":"Apache Spark Based Analytics of Squid Proxy Logs","authors":"D. Mishra, Salim Pathan, C. Murthy","doi":"10.1109/ANTS.2018.8710044","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710044","url":null,"abstract":"Internet today is an integral part of an organization’s working. It is vital to monitor Internet traffic closely in order to detect threats and malicious activities which may not only impact the reputation of an organization but also lead to data loss. One way of achieving this goal is to monitor the logs of critical applications like proxy server which contains crucial information related to Internet activity. Log data is often huge and is ever growing. Also, forensic analysis of an event requires not only current data but also historical one. This poses a big problem of efficient and fast storage and retrieval of data. Traditional RDBMS technologies fail in such situations but with the advent of big data technologies like Apache Hadoop and Apache Spark this task has now become feasible. In this paper, we propose a Spark based system for analysis of Squid proxy logs. Using this system we generate statistics like top domains accessed, top users etc for studying traffic behavior within organization and detect malicious activity. We further study the variation in proposed system’s performance with increase in data volume and variation in spark parameters like number of executors, number of executor cores and executor memory. From our experimental study we conclude that log analysis with Spark is extremely fast with no significant performance variation observed with increase in data volume. The challenging task, however, is selecting spark parameters for getting optimal performance.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124676369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative Analysis of Low Cost Photodetectors for Visible Light Communication 低成本可见光通信光电探测器的比较分析
A. Bishnu, Suman Das, Megha Soni, V. Bhatia
{"title":"Comparative Analysis of Low Cost Photodetectors for Visible Light Communication","authors":"A. Bishnu, Suman Das, Megha Soni, V. Bhatia","doi":"10.1109/ANTS.2018.8710125","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710125","url":null,"abstract":"Visible light communication (VLC) has emerged as a promising supplement to radio frequency technology for secure and green wireless communication. In this paper, comparative analysis of various low cost photodetectors such as solar panel and silicon photodiode (PD) is performed to check the viability of VLC for low cost easily available commodity hardware. To check the viability of VLC in different practical scenarios, experiments are performed in dark room and in the presence of noise from sunlight and artificial light sources such as fluorescent and incandescent lamps. Experimental results indicate that PD exhibits superior performance over solar panel in terms of sharp rise and fall time. However, the bit error rate performance of solar panel is better than that of PD for the given setup.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123613035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of AF Relayed NLOS UV Communication Over Turbulent Channel 湍流信道上AF中继NLOS紫外通信性能分析
Kamal K. Garg, P. Singya, V. Bhatia
{"title":"Performance Analysis of AF Relayed NLOS UV Communication Over Turbulent Channel","authors":"Kamal K. Garg, P. Singya, V. Bhatia","doi":"10.1109/ANTS.2018.8710065","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710065","url":null,"abstract":"Ultraviolet (UV) communication experiences strong aerosol and molecular scattering which leads to non-line-of-sight (NLOS) connectivity. As the UV signal propagates through the atmosphere, the change in the refractive index of the atmosphere causes random fluctuations in the transmitted signal, this phenomenon is referred to as turbulence. The effect of atmospheric turbulence in NLOS UV communication link is usually ignored under the assumption of short distance communication. In this paper, we consider a NLOS UV communication system experiencing fading due to atmospheric turbulence and use relay-assisted transmission for improved connectivity. We present performance analysis of dual-hop amplify-and-forward (AF) relayed outdoor NLOS UV communication and derive closed-form expressions for the outage probability, average symbol error rate, ergodic capacity and relative diversity order. Analytical expressions using two different approximations are compared and validated with simulations.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ANTS 2018 Copyright Page 蚂蚁2018版权专页
{"title":"ANTS 2018 Copyright Page","authors":"","doi":"10.1109/ants.2018.8710166","DOIUrl":"https://doi.org/10.1109/ants.2018.8710166","url":null,"abstract":"","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信