2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

筛选
英文 中文
An Investigation of the Network Characteristics and Requirements of 3D Environmental Digital Twins for Inspection Robots 检测机器人三维环境数字孪生网络特征及要求研究
Hasan Kivrak, P. D. E. Baniqued, S. Watson, B. Lennox
{"title":"An Investigation of the Network Characteristics and Requirements of 3D Environmental Digital Twins for Inspection Robots","authors":"Hasan Kivrak, P. D. E. Baniqued, S. Watson, B. Lennox","doi":"10.1109/WoWMoM54355.2022.00093","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00093","url":null,"abstract":"Digital twins tend to be on the way of becoming the future of robots, artificial intelligence, and IoT devices, especially in industrial applications. Creating a digital twin solution will help to solve challenges faced in managing the tasks in their operating environment since it enables an integrated solution for the framework that seamlessly connects to their physical counterparts with the latest internet technologies. In this study, we aim to develop a synchronous, situational-aware, bi-directional/multi-directional digital twin platform that allows us to perceive real-time/simultaneous flow of sensory environmental data and remotely operate robots through digital twins for continuous inspection. To achieve this aim, we will investigate the interoperability issues in robot teleoperation with 3D mapping of a remote unknown environment case scenario.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130121054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Reliable Localization with a Single Unaided Receiver by AoA 用AoA实现单接收机的可靠定位
Hongya Wang, H. Luan
{"title":"Toward Reliable Localization with a Single Unaided Receiver by AoA","authors":"Hongya Wang, H. Luan","doi":"10.1109/WoWMoM54355.2022.00066","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00066","url":null,"abstract":"In recent years, most indoor localization systems coordinate the angle of arrival (AoA) of multiple access points (APs) for triangulation or sacrifice the availability of the system in order to obtain accurate time of flight (ToF), which is not conducive to the actual deployment of the system. The recent standardization by IEEE of Fine Timing Measurement (FTM), a native firmware implementation ToF based approach for ranging. In this way, we can pay more attention to AoA-based localization system. We present SAP-AoA, a WIFI based localization system, which only requires one AP and one channel to complete localization. To accomplish this, we use two incident angles and the distance between two antennas to determine the unique constraint of the target, and then search the localization field to get the target. At the same time, we simulate the FTM value and use it with SAP-AoA to obtain better positioning accuracy. We implemented SAP-AoA using Intel 5300 commodity WIFI cards and deployed it in four environments with different multipath propagation. Results indicate the best median localization error is 0.85m.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast and accurate edge resource scaling for 5G/6G networks with distributed deep neural networks 基于分布式深度神经网络的5G/6G网络边缘资源快速准确扩展
Theodoros Giannakas, T. Spyropoulos, O. Smid
{"title":"Fast and accurate edge resource scaling for 5G/6G networks with distributed deep neural networks","authors":"Theodoros Giannakas, T. Spyropoulos, O. Smid","doi":"10.1109/WoWMoM54355.2022.00021","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00021","url":null,"abstract":"Network slicing has been proposed as a paradigm for 5G+ networks. The operators slice physical resources from the edge, all the way to datacenter, and are responsible to micromanage the allocation of these resources among tenants bound by predefined Service Level Agreements (SLAs). A key task, for which recent works have advocated the use of Deep Neural Networks (DNNs), is tracking the tenant demand and scaling its resources. Nevertheless, for edge resources (e.g. RAN), a question arises whether operators can: (a) scale edge resources fast enough (often in the order of ms) and (b) afford to transmit huge amounts of data towards a cloud where such a DNN-based algorithm might operate. We propose a Distributed-DNN architecture for a class of such problems: a small subset of the DNN layers at the edge attempt to act as fast, standalone resource allocator; this is coupled with a Bayesian mechanism to intelligently offload a subset of (harder) decisions to additional DNN layers running at a remote cloud. Using the publicly available Milano dataset, we investigate how such a DDNN should be jointly trained, as well as operated, to efficiently address (a) and (b), resolving up to 60% of allocation decisions locally with little or no penalty on the allocation cost.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"11 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design, implementation, and testing of a microservices-based Digital Twins framework for network management and control 基于微服务的数字孪生网络管理和控制框架的设计、实现和测试
A. Lombardo, G. Morabito, Salvatore Quattropani, Carmelo Ricci
{"title":"Design, implementation, and testing of a microservices-based Digital Twins framework for network management and control","authors":"A. Lombardo, G. Morabito, Salvatore Quattropani, Carmelo Ricci","doi":"10.1109/WoWMoM54355.2022.00092","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00092","url":null,"abstract":"The introduction of the Software Defined Networking (SDN) paradigm is radically changing the way in which networks are thought, designed, and managed. The reasons of such huge success are manifold; one of the most relevant is that SDN enables an agile management of the network that can quickly adapt its behavior to the dynamics of the user needs and context conditions. In this sense, SDN represents a fundamental step towards the vision of an autonomous network. Nevertheless, network adaptation still requires the intervention of the network manager that installs and configures the network applications executed by the network operating system. In this context, the application of the Digital Twin (DT) technology can trigger a significant leap forward. In fact, the DT of the network can interact with the other relevant DTs and, applying artificial intelligence techniques, interact with the network operating system and take care of the network application installation and configuration. In this paper we motivate and introduce a platform, implemented exploiting microservices, for the realization of such a vision. The proposed platform is applied in a simple use case to demonstrate the proposed workflow and the resulting impact on network operations.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT 偏振指纹:无线物联网中一种新的物理层认证方法
Jinlong Xu, Dong Wei, Weiqing Huang
{"title":"Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT","authors":"Jinlong Xu, Dong Wei, Weiqing Huang","doi":"10.1109/WoWMoM54355.2022.00063","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00063","url":null,"abstract":"Radio frequency (RF) fingerprinting is a low-cost, high-efficiency, and high-security authentication technique for wireless IoT devices with limited resources, but RF fingerprinting faces problems such as small fingerprint differences, low finger-print stability, and high implementation difficulty. In order to solve these problems, we propose a novel concept of polarization fingerprinting. Polarization fingerprint (PF) is manifested as the correlation between polarization state and frequency. The properties of PF include group feature, individual feature and directionality. Group feature characterizes the antenna structure, and individual feature characterizes the antenna hardware imperfections. The directionality comes from the vector property of polarization and contains the relative position information of the communicating devices. The directionality solves the problem of similar fingerprints that may occur when the number of devices increases, which cannot be solved by RF fingerprinting. Compared to RF fingerprint, PF can exist stably and continuously, which not only solves the problem of low fingerprint stability, but also makes polarization fingerprinting based authentication easier to be implemented. The stability and continuity of PF allow more samples to be obtained during authentication. We also proved that increasing the sample amount can reduce the false alarm rate of authentication. Finally, we conducted experiments based on wireless IoT devices. Experiment results show that polarization fingerprinting based authentication has better performance than RF fingerprinting based under the same conditions.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical Study of 5G Downlink & Uplink Scheduling and its Effects on Latency 5G上下行调度及其对时延影响的实证研究
Justus Rischke, Christian L. Vielhaus, Peter Sossalla, Sebastian Itting, Giang T. Nguyen, F. Fitzek
{"title":"Empirical Study of 5G Downlink & Uplink Scheduling and its Effects on Latency","authors":"Justus Rischke, Christian L. Vielhaus, Peter Sossalla, Sebastian Itting, Giang T. Nguyen, F. Fitzek","doi":"10.1109/WoWMoM54355.2022.00017","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00017","url":null,"abstract":"5G campus networks, whose advantages include flexible deployment, can be a promising candidate for production plants to complement existing Wifi-based networks. Toward that goal, 5G has to satisfy strict requirements about real-time communication to facilitate novel use cases. However, the realtime-capability of 5G is not well understood yet. In this work, we deliver insights into the functioning of 5G NR RAN Release 15, which includes actual one-way delay and Round-Trip Time (RTT) measurements for Downlink and Uplink in a private 5G Standalone campus network. The extensive measurement results reveal that these delays are correlated, and the corresponding RTT, i.e. the sum of Downlink and Uplink delays, is discreetly clustered, ranging between 12ms and 40ms. The measurements also show that the distribution of RTTs is mainly dependent on the packet rates and their inter-arrival times. Our study helps expand the current understanding of 5G used for latency-critical applications. We make the code and the measurement data traces publicly available as the IEEE DataPort 5G Campus Networks: Measurement Traces dataset (DOI 10.21227/xe3c-e968).","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reviewers: SwarmNet 2022
{"title":"Reviewers: SwarmNet 2022","authors":"","doi":"10.1109/wowmom54355.2022.00009","DOIUrl":"https://doi.org/10.1109/wowmom54355.2022.00009","url":null,"abstract":"","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BSBA: Burst Series Based Approach for Identifying Fake Free-traffic 基于突发级数的假自由流量识别方法
Sijia Li, Chang Liu, Zhuguo Li, Qingya Yang, Anlin Xu, Gaopeng Gou
{"title":"BSBA: Burst Series Based Approach for Identifying Fake Free-traffic","authors":"Sijia Li, Chang Liu, Zhuguo Li, Qingya Yang, Anlin Xu, Gaopeng Gou","doi":"10.1109/WoWMoM54355.2022.00019","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00019","url":null,"abstract":"In recent years, mobile traffic has gradually become a major part of network traffic. To attract customers, mobile network operators provide free-traffic, which is a preferential policy that is free of charge for specific application traffic. Since the emergence of free-traffic, fake free-traffic also appeared soon. Fake free-traffic is a malicious behavior, which helps attackers illegally use network resources and evade network resource charging. The appearance of fake free-traffic maliciously harms the interests of operators and disrupts the rules of network resource charging. Because of the uniqueness of free-traffic, it encapsulates a layer of the HTTP protocol in addition to the actual application communication protocol, existing studies on encrypted traffic analysis are not applicable to identify fake free-traffic. In this paper, we propose Burst Series Based Approach (BSBA), a novel method for identifying fake free-traffic. The key idea behind BSBA is to construct effective features by capturing the differences of burst series among fake free-traffic, free-traffic and non-free traffic, and combine the constructed features with machine learning algorithms to identify fake free-traffic. We collect a real-world traffic dataset and conduct evaluations to verify the effectiveness of the BSBA. Experiment results demonstrate that the BSBA achieves excellent performances (96.82% Accuracy, 96.46% Precision, 96.57% Recall and 96.51% F1-score) and is superior to the state-of-the-art methods.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128149062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint 段检测算法:基于位约束的CAN总线入侵检测
Kaixuan Zheng, S. Zou, Guosheng Xu, Zixiang Bi
{"title":"Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint","authors":"Kaixuan Zheng, S. Zou, Guosheng Xu, Zixiang Bi","doi":"10.1109/WoWMoM54355.2022.00070","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00070","url":null,"abstract":"With the rapid development of Internet of Vehicles and autonomous driving technologies, car manufacturers provide more comfortable and safe driving experience while gradually exposing their vehicles to the background of cyber-attacks. As the car’s interior communicates through the CAN bus, the intrusion detection for CAN bus becomes crucial. Some studies use bus data characteristics, machine learning algorithms, or information theory algorithms to perform intrusion detection on the CAN bus, but they have problems such as low detection accuracy, high performance requirements, and insufficient detection granularity. This paper innovatively proposes a lightweight detection algorithm—Segment Detection Algorithm (SDA), which calculates the bit flip rate by segment, discovers the variation relationship between bits within each segment, and utilizes multiple inter-message features to achieve the detection of abnormal traffic. Experiments show that compared with existing research, the algorithm has effectively improved the detection accuracy, especially the detection of replay attacks. In addition, the algorithm has extremely low time complexity, can adapt to the limited resources in the vehicle environment, and achieve high-precision real-time detection of abnormal traffic.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling WIP:基于射线发射传播损耗建模的移动映射导出的真实世界三维模型
T. Wahl, D. Borrmann, M. Bleier, A. Nüchter, T. Wiemann, T. Hänel, N. Aschenbruck
{"title":"WIP: Real-world 3D models derived from mobile mapping for ray launching based propagation loss modeling","authors":"T. Wahl, D. Borrmann, M. Bleier, A. Nüchter, T. Wiemann, T. Hänel, N. Aschenbruck","doi":"10.1109/WoWMoM54355.2022.00048","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00048","url":null,"abstract":"This work in progress paper presents an automated approach for network coverage prediction in real-world environments by combining mobile mapping, 3D mesh generation, and a ray launching based network simulator. We identify the challenges and demonstrate the functionality of such a pipeline. We preview an empirical evaluation in a realistic real-world environment.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信