2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

筛选
英文 中文
Control Communication in SDN-based Dynamic Multi-hop Wireless Infrastructure-less Networks 基于sdn的动态多跳无线无基础设施网络控制通信
Ayush Dusia, V. Mishra, A. Sethi
{"title":"Control Communication in SDN-based Dynamic Multi-hop Wireless Infrastructure-less Networks","authors":"Ayush Dusia, V. Mishra, A. Sethi","doi":"10.1109/ANTS.2018.8710097","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710097","url":null,"abstract":"Nodes in a dynamic wireless network are expected to autonomously self-organize and configure routes for communicating amongst themselves. Such networks have applications in several scenarios, including military, disaster relief, and search and rescue operations. Designing a solution for such networks is challenging because of their unique characteristics. Traditionally, decentralized solutions have been sought-after. In the past few years, Software-Defined Networking (SDN) has emerged as a promising approach for designing effective solutions for different types of networks. In this paper, we present an SDN-based architecture and a control communication protocol for dynamic multi-hop wireless infrastructure-less networks. In particular, the solution is designed for networks with 1) node mobility and unreliable connectivity, 2) unstructured network topology, 3) limited bandwidth and high interference due to multi-hop communication in a shared channel, 4) no out-of-band communication channel, and 5) no location-tracking services for learning the position of mobile nodes. We evaluate our architecture and control communication protocol in NS-3 and compare the results with two conventional solutions - OLSR and DSDV. The results demonstrate up to 40% reduction in the routing overhead while achieving the same or better throughput than the conventional solutions for networks of size up to 50 nodes.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129672609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
QoS Enhancement using Intelligent Cluster Head Selection Routing Technique in Vehicular Ad Hoc Networks in case of RSU failure 基于智能簇头选择路由技术的车载Ad Hoc网络RSU故障QoS增强
C. Raut, S. Devane
{"title":"QoS Enhancement using Intelligent Cluster Head Selection Routing Technique in Vehicular Ad Hoc Networks in case of RSU failure","authors":"C. Raut, S. Devane","doi":"10.1109/ANTS.2018.8710102","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710102","url":null,"abstract":"Use of clustering in VANET have proven effective technique to enhance QoS. Clustering based solution in current research designed by considering the geographical distances as well as network dynamics (mobility). Present research work has improved the QoS, yet the failure of infrastructure is not considered, which will definitely hamper the QoS where the quality of infrastructure is not good. This paper, intelligent cluster head routing protocol (ICHR) is proposed to work with RSU failure conditions in network efficiently for VANET. Additionally, the method of selecting cluster head has been changed to improve the QoS significantly. In case of RSU failure, the Intelligent CH (ICH) is selected from the all CH nodes based on the maximum probability of all three parameters to transmit the data over the alternate neighboring RSU through LTE network which is already in use for providing internet connection.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Minimum Cost Real-Time Ubiquitous Computing System Using Edge-Fog-Cloud 基于边缘雾云的最小成本实时普适计算系统
Surbhi Saraswat, Hari Prabhat Gupta, Tanima Dutta
{"title":"A Minimum Cost Real-Time Ubiquitous Computing System Using Edge-Fog-Cloud","authors":"Surbhi Saraswat, Hari Prabhat Gupta, Tanima Dutta","doi":"10.1109/ANTS.2018.8710091","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710091","url":null,"abstract":"With the development of diverse ubiquitous computing applications, tremendous amount of sensor data is generated. This data requires efficient localized processing and storage. A real-time ubiquitous system requires latency-aware processing to satisfy the deadline of the ubiquitous applications. Performing processing near the network, using Edge and Fog devices, meets this need. The cost of the ubiquitous system depends on the pricing of the processing and storage. In this paper, we present an Edge, Fog, and Cloud layers based ubiquitous computing system, which not only deals with the deadline of a given application but also minimizes the cost of the system. We derive expressions to estimate the cost of computing and storage of the ubiquitous computing system and delay of the network. We demonstrate an application of the analysis in the design of a minimum cost ubiquitous computing system. We propose an algorithm to determine the layers for executing the machine learning techniques required to satisfy the deadline of the system and simultaneously minimize the cost of the network.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Empirical Delay Models for 802.11 under Deterministic Convergecast Traffic 确定性汇聚流量下802.11的经验延迟模型
A. Ramesh, B. S. Vineeth
{"title":"Empirical Delay Models for 802.11 under Deterministic Convergecast Traffic","authors":"A. Ramesh, B. S. Vineeth","doi":"10.1109/ANTS.2018.8710111","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710111","url":null,"abstract":"Wireless sensor and actuator networks as well as industrial Internet of things networks use protocols such as IEEE 802. 15.4e TSCH, which uses deterministic scheduling, in order to collect data. The data collected from multiple sensor nodes is convergecast to a gateway. Since the scheduling is deterministic the data arrival at the gateway follows a periodic deterministic pattern. Often, in an industrial setting it is useful to take this collected data from multiple gateways and transfer it for cloud processing or storage. We consider an architecture where the convergecast data is communicated over WiFi to the cloud. Although real-time latency requirements are not imposed on this cloud transfer, average latency requirements still apply for use-cases like long term control of parameters or for updation of dashboards. In this context, we analyze the average latency performance of the 802.11 MAC layer with deterministic input traffic. We propose a data driven empirical model for the average delay of 802.11 under deterministic traffic.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121438699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Queuing Model for the Secondary Users in a Cognitive Radio Network for Improvement of QoS 基于认知无线网络中辅助用户动态排队模型的QoS改进
Kaushik Dutta, Rishav Mukherjee, A. Kundu, Shamik Kundu
{"title":"Dynamic Queuing Model for the Secondary Users in a Cognitive Radio Network for Improvement of QoS","authors":"Kaushik Dutta, Rishav Mukherjee, A. Kundu, Shamik Kundu","doi":"10.1109/ANTS.2018.8710124","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710124","url":null,"abstract":"The advent of various bandwidth-hungry applications now-a-days has increased the spectrum demand, thereby resulting in spectrum scarcity. Cognitive Radio Networks (CRN), proposed by the researchers, is a probable solution to the problem. CRN allows licensed Primary Users (PUs) to partly lease their unutilized spectrum to the opportunistic Secondary Users (SU) for effective Channel Utilization (CU) and enhanced Quality of Service (QoS). Now, use of buffers is a common approach to provide improved QoS to the SUs. However, if the waiting time of the SUs in the buffers exceed their time-out interval, the QoS degrades instead of improving. Thus, in this work, firstly, a CRN has been modeled using two buffers, namely, the New Queue (NQ) and the Pre-empted Queue (PQ). The NQ holds the newly requesting SUs while the PQ holds the SUs pre-empted by the PUs. Next, a model to determine the dynamic length of buffers has been proposed. It works based on the prior activity of the end-users and the requesting SU's waiting threshold. The model ensures service to user if it is admitted in the network. Otherwise, it is blocked or dropped. Blocking or dropping of the calls in this case provides a chance to the SUs to transmit via other base stations. The system is modeled using a multidimensional Continuous Time Markov Chain (CTMC) model. The dynamic queue helps to restrict the Level of Impatience (LOI) to 19.90% for the New Queue SUs and 14.93% for Preempted Queue SUs while achieving 99.33% CU.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"867 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Offloading in NOMA-HetNets using Imperfect CSI 基于不完全CSI的NOMA-HetNets卸载性能分析
Pragya Swami, V. Bhatia, Satyanarayana Vuppala, T. Ratnarajah
{"title":"Performance Analysis of Offloading in NOMA-HetNets using Imperfect CSI","authors":"Pragya Swami, V. Bhatia, Satyanarayana Vuppala, T. Ratnarajah","doi":"10.1109/ANTS.2018.8710131","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710131","url":null,"abstract":"The increase in number of cellular users had lead to the evolution from the traditional cellular networks to the more efficient heterogeneous cellular networks (HetNet) to handle the traffic. Offloading plays a vital role in handling the traffic from the congested macro base station by handing users to the less congested femto base stations (FBS). Further, non-orthogonal multiple access (NOMA) has proved to be efficient for the future generation networks. In this work, we study the offloading in HetNets, where the FBS tier serves the users using NOMA. Imperfect channel state information (CSI) is considered to analyze the outage probability of offloaded user, since, in practice CSI estimation requires significant system overhead, especially when the number of users are large. Hence, for practical systems, the analyses with imperfect CSI is more relevant. Some important observations regarding offloading to FBS tier with NOMA based on imperfect CSI are drawn. The analytical results are validated using Monte Carlo simulations.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125313414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
OCPDA: A novel approach towards detection of overloaded cloud providers in a federated environment OCPDA:一种在联邦环境中检测超载云提供商的新方法
Benay Kumar Ray, Oindrilla Ghosh, Srimoyee Bhattacherjee, Sarbani Roy, Sunirmal Khatua
{"title":"OCPDA: A novel approach towards detection of overloaded cloud providers in a federated environment","authors":"Benay Kumar Ray, Oindrilla Ghosh, Srimoyee Bhattacherjee, Sarbani Roy, Sunirmal Khatua","doi":"10.1109/ANTS.2018.8710148","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710148","url":null,"abstract":"A federated cloud environment helps different cloud service providers (CSP) to improve their performances in terms of Quality of Service $(mathrm {Q}mathrm {o}mathrm {S})$. For a federation to deliver its best, the workloads on its member CSPs should be balanced. Overloading a CSP leads to degradation in performance which is absolutely undesirable. To balance the workloads among the member CSPs of a federation, detection of the overloaded CSPs is important. The proposed model, Overloaded Cloud Provider Detection Algorithm(OCPDA), uses Multiple Linear Regression (MLR) based technique to estimate the loads of CSPs. Extensive simulation has been conducted which shows that OCPDA successfully detects overloaded CSPs in a federation.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks 软件定义网络大流量场景下控制器对主服务器DDoS攻击的缓解
R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli
{"title":"Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks","authors":"R. Sanjeetha, A. Prasanna, D. P. Kumar, A. Kanavalli","doi":"10.1109/ANTS.2018.8710066","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710066","url":null,"abstract":"One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for forwarding packets to the desired destination. To deliver a packet in SDN, the controller installs flow table rules on the source switch i.e. the switch which connects to the source host, multiple intermediate switches through which the packet will be transmitted, and the destination switch which connects to the destination host. In high traffic scenarios, the flow tables of these switches become full and the flow rules must be repeatedly replaced by the controller. Hiep T. Nguyen Tri et al. proposed a solution for the same, by using an OpenDaylight controller feature that forwards packets to the destination switch directly and install a flow table rules only on it. In this paper we show how a DDoS attack can be instigated on a primary server i.e. the server providing important services like web server, file server etc., present in SDN which uses the abovementioned solution during high traffic scenarios. The attack is instigated by generating huge number of packets with destination IP addresses such that it compels the controller to always choose the switch which connects the primary sever to the rest of the network as the destination switch. The flow table rules are repeatedly installed by the controller into this switch, leading to exhaustion of its flow table space. This blocks the genuine traffic between the primary server and its clients as the flow rules that would service legitimate clients get replaced by flow rules that process this attack traffic.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134580769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Implementation of an Ultra-Low Power Wake-up Radio for Wireless IoT Devices 用于无线物联网设备的超低功耗唤醒无线电的设计与实现
Anders Frøytlog, Linga Reddy Cenkeramaddi
{"title":"Design and Implementation of an Ultra-Low Power Wake-up Radio for Wireless IoT Devices","authors":"Anders Frøytlog, Linga Reddy Cenkeramaddi","doi":"10.1109/ANTS.2018.8710086","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710086","url":null,"abstract":"In this paper, we present the design and prototype implementation of an ultra-low power wake-up radio for wireless IoT devices. The prototyped wake-up radio consumes only 580nA from 3V power supply, covers distance range of up to 55 meters and achieves a sensitivity of -49.5dBm. This wakeup radio module can easily be integrated into wireless IoT devices and thereby reducing the overall power consumption of the battery powered and energy harvesting based devices. The prolonged life time of the devices can reduce the overall costs when deployed in large scale.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115275614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Emerging Access Technologies and Open Challenges in 5G IoT: From Physical Layer Perspective 5G物联网中的新兴接入技术和开放挑战:从物理层角度
Parthiban Annamalai, Jyotsna L. Bapat, D. Das
{"title":"Emerging Access Technologies and Open Challenges in 5G IoT: From Physical Layer Perspective","authors":"Parthiban Annamalai, Jyotsna L. Bapat, D. Das","doi":"10.1109/ANTS.2018.8710133","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710133","url":null,"abstract":"Internet of Things (IoT) is expected to play a prominent role in the envisioned networked society. In IoT ecosystem, Machine Type Communication (MTC) is the access technology that ensures wireless connectivity for end-user devices to the network. Diverse IoT applications pose conflicting requirements and challenges that must be resolved to fully realize the IoT ecosystem. Although the right access technology to address all these challenges is not available yet, notable progress has been made in the recent times to address most of the key requirements. Extended Coverage (EC)-GSM-IoT and Narrow Band (NB)-IoT have been standardized by 3GPP in Release 13 as the access technologies for IoT. Among non-3GPP community, Long Range (LoRa) has attracted significant attention. In this paper, the suitability of the aforementioned access technologies to various IoT services in terms of the relevant system parameters is explored. We have also identified many system design parameters that will have adverse implications if not configured correctly for the right IoT use case. Important open challenges to be addressed from physical layer (PHY) perspective are highlighted here that will help to realize a truly connected world.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信