2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)最新文献

筛选
英文 中文
Cost-Efficient Server Provisioning for Deadline-Constrained VNFs Chains: A Parallel VNF Processing Approach 期限约束VNF链的高效服务器配置:一种并行VNF处理方法
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651799
Somayeh Kianpisheh, R. Glitho
{"title":"Cost-Efficient Server Provisioning for Deadline-Constrained VNFs Chains: A Parallel VNF Processing Approach","authors":"Somayeh Kianpisheh, R. Glitho","doi":"10.1109/CCNC.2019.8651799","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651799","url":null,"abstract":"The fifth generation (5G) utilizes Network Functions Virtualization (NFV) and Software Defined Network (SDN) to provide applications. Among them, there are deadline constrained applications. When the traffic generated by applications traverses Virtual Network Functions (VNFs) chains, it may not be possible to meet the deadlines when the traffic is processed sequentially; even if very fast servers are provisioned to host the VNFs. We propose a parallel VNF processing approach for the traffic. This is done through pools of candidate servers that host VNFs which process the traffic. Considering the routing policy provided by the SDN routing application, the server selection problem with the aim of deadline satisfaction and cost minimization is modeled as a non-linear binary optimization problem. An iterative search algorithm is proposed to solve this problem. Simulations show enhancement in deadline satisfaction as well as cost reduction.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115407703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Channel Access Control for Collisions Caused by Hidden Nodes and Phase Synchronization among Periodic Data Flows 周期数据流间隐藏节点碰撞与相位同步的信道访问控制
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651756
Anh Huy Nguyen, Y. Tanigawa, H. Tode
{"title":"Channel Access Control for Collisions Caused by Hidden Nodes and Phase Synchronization among Periodic Data Flows","authors":"Anh Huy Nguyen, Y. Tanigawa, H. Tode","doi":"10.1109/CCNC.2019.8651756","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651756","url":null,"abstract":"With the rapid increase in IoT (Internet of Things) applications, more sensor devices, generating periodic data flows whose packets are transmitted at regular intervals, are being incorporated into WSNs (Wireless Sensor Networks). However, packet collision caused by the hidden node problem becomes serious particularly in large-scale multi-hop WSNs. Moreover, focusing on periodic data flows, continuous packet collisions among periodic data flows are caused once periodic packet transmission phases are synchronized. In this paper, we tackle the compounded negative effect of the hidden node problem and the continuous collision problem among periodic data flows. To realize this objective, we propose a new MAC layer mechanism. The proposed method predicts risky durations during which collision can be caused by hidden nodes by taking into account periodic characteristics of data packet generation. In the risky duration, each sensor node stops the transmission of packets in order to avoid collisions. To the best of our knowledge, this is the first paper that considers the compounded effect of hidden nodes and continuous collisions among periodic data flows. Other advantages of the proposed method include that any new control packets are not required and it can be implemented in widelydiffused IEEE 802.11 and IEEE 802.15.4 devices.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"7 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115237144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G K-Simulator and TestBench Demonstration Proposal 5G k -模拟器和试验台演示方案
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651672
Youngnam Han
{"title":"5G K-Simulator and TestBench Demonstration Proposal","authors":"Youngnam Han","doi":"10.1109/CCNC.2019.8651672","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651672","url":null,"abstract":"The fifth-generation (5G) communication systems are expected to be an important connecting infrastructure for information and knowledge exchanges among people, machines, sensors, devices, and even environments. The technical specifications for 5G communication systems are being made to satisfy performance requirements that are defined in ITU-R documents. In addition, the key performance indicators in 5G communication systems include peak and average data rate, mobility, energy efficiency, spectral efficiency, latency, connection density, and so on. These performance metrics need to be evaluated by simulators at different levels. Therefore, simulators play an important role in evaluating the performance of 5G communication systems as well as an individual technique. Most research institutes, universities, and industries have their own simulators, but with different levels of assumption and implementation depth according to technical needs of individual organization, which makes a fair comparison impossible.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint High Level QP and Low Level Power Control in NOMA/OMA Downlink Wireless Multimedia Communications NOMA/OMA下行无线多媒体通信中的高电平QP和低电平功率联合控制
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651865
Shuan He, Wei Wang, K. Sohraby
{"title":"Joint High Level QP and Low Level Power Control in NOMA/OMA Downlink Wireless Multimedia Communications","authors":"Shuan He, Wei Wang, K. Sohraby","doi":"10.1109/CCNC.2019.8651865","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651865","url":null,"abstract":"Improving Quality of Experience (QoE) of User Equipment (UE) in wireless multimedia services is a critical challenge. In this paper we study the joint design of high level dynamic video Quantization Parameter (QP) and the low level power control in QoE-driven downlink wireless multimedia services. Furthermore, we study QoE performance with new Non-Orthogonal Multiple Access (NOMA) schemes in the Base Station (BS) – UE multimedia downlink, and discuss the performance in comparison with conventional Orthogonal Multiple Access (OMA). We mathematically model UE’s QoE gain (also known as utility) by considering UE’s perceived data quality and the corresponding data cost. Then we show that there exists an optimal data consumption option for UE to achieve utility maximization based on different cost coefficients. In addition, the power allocation strategies and their associated constraints are investigated in both OMA and NOMA transmission schemes. Finally, through numerical simulations, we quantitatively analyze the impact of low level power allocation and high level QP control on UEs’ utility gain and the system throughput performance.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123544234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Demonstration of a 5G Multi-access Edge Cloud Enabled Smart Sorting Machine for Industry 4.0 面向工业4.0的5G多接入边缘云智能分拣机演示
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651732
Alexander Kropp, Robert-Steve Schmoll, Giang T. Nguyen, F. Fitzek
{"title":"Demonstration of a 5G Multi-access Edge Cloud Enabled Smart Sorting Machine for Industry 4.0","authors":"Alexander Kropp, Robert-Steve Schmoll, Giang T. Nguyen, F. Fitzek","doi":"10.1109/CCNC.2019.8651732","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651732","url":null,"abstract":"This demonstrator, which is completely realized in software and hardware, shows the influence of latency in a very descriptive and interactive way with the example of a Mobile Edge Cloud or legacy cloud operated ball sorting machine. The demonstrator has every essential element that would be found in a real production machine or control loop. It consists of a sensor, a controller and several actuators. Through the Control and Monitoring Interface, the audience of the demo has a simple and self-explanatory way to interact with the demonstrator. In addition the advantages of Multi-access Edge Computing compared to legacy cloud computing and embedded computing are explained in the context of industry 4.0.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Voice Based One Step Solution for Bulk IoT Device Onboarding 基于语音的批量物联网设备登录一步解决方案
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651724
Vinay Kumar, Sujay Mohan, Rakesh Kumar
{"title":"A Voice Based One Step Solution for Bulk IoT Device Onboarding","authors":"Vinay Kumar, Sujay Mohan, Rakesh Kumar","doi":"10.1109/CCNC.2019.8651724","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651724","url":null,"abstract":"Device Onboarding refers to the first time registration of a device into an Internet of Things (IoT) network. The process can be as simple as pairing of two devices or as complicated as connecting thousands of devices. This process varies significantly across different device vendors. Currently, onboarding process can onboard one device at a time and can take around 5-20 minutes for the lay user. As per International Data Corporation (IDC) [1], number of smart devices is growing faster and approximately 80 billion devices will be connected by 2025. The need for onboarding multiple devices quickly will therefore assume great importance. In this paper, we propose a software-based one-step solution that can securely onboard multiple microphone enabled devices with a single voice command (e.g., “Onboard all devices”). The efficacy of the proposed approach is demonstrated by onboarding multiple IoT devices successfully within the voice range with a single voice command.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121484522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fast Spectral Assessment for Handover Decisions in 5G Networks 5G网络切换决策的快速频谱评估
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651673
Kostas Chounos, Stratos Keranidis, A. Apostolaras, T. Korakis
{"title":"Fast Spectral Assessment for Handover Decisions in 5G Networks","authors":"Kostas Chounos, Stratos Keranidis, A. Apostolaras, T. Korakis","doi":"10.1109/CCNC.2019.8651673","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651673","url":null,"abstract":"In this paper, we present a UE-driven light-weight mechanism for fast handover decision and efficient WLAN selection in the context of 5G networks. As the network deployments are expected to be denser and the mobile user will be offered a multitude of alternative short coverage range options to have her mobile traffic served, her roaming decision will be performance critical. While the current 3GPP standardization considers the use of network performance statistics of nearby WLANs for the UE-driven roaming selection to address the uncertainty of the shared wireless medium, their collection and processing inevitably affects the mobile user performance and inserts an accuracy-performance tradeoff. We introduce a spectrum assessment framework, that is based on commercial hardware and open-source software, to evaluate the conditions on the nearby WLANs and let the UE to infer their performance with minimum overhead relying on Duty Cycle evaluation and the RSSI metrics. Our ready-to-be deployed solution leverages the use of off-the-shelf equipment and commercial devices and enables fast decision procedures for the WLAN selection with low collection and processing overhead. We evaluate our mechanism by conducting testbed experiments. The results reveal performance gains in terms of UE’s achieved throughput when enabling the proposed framework to infer the spectral WLAN conditions and decide for the AP to roam.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122275104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Geo-Fencing in Wireless LANs with Camera for Location-Based Access Control 基于位置访问控制的摄像机无线局域网地理围栏
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651877
Go Yamanaka, T. Nishio, M. Morikura, Koji Yamamoto, Yuichi Maki, Shin'ichiro Eitoku, Takuya Indo
{"title":"Geo-Fencing in Wireless LANs with Camera for Location-Based Access Control","authors":"Go Yamanaka, T. Nishio, M. Morikura, Koji Yamamoto, Yuichi Maki, Shin'ichiro Eitoku, Takuya Indo","doi":"10.1109/CCNC.2019.8651877","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651877","url":null,"abstract":"This paper proposes a camera-based geo-fencing system for wireless local area networks (WLANs) which enables geo-location based wireless access control to intuitively manage the area where the WLANs are available. The proposed system leverages camera to localize WLAN users accurately and estimates the proximity of users to objects in the real world. Meanwhile, conventional geo-location based access control suffers from low accuracy of RSSI based localization. As an example of geo-location based access control, we execute a WLAN activation control which allows STAs to pre-activate WLAN and associates with access points (APs) so that the power consumption and time to obtain contents are reduced. Experimental results show the feasibility of camera-based geo-fencing.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks 物联网网络异常活动检测的两级混合模型
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651782
I. Ullah, Q. Mahmoud
{"title":"A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks","authors":"I. Ullah, Q. Mahmoud","doi":"10.1109/CCNC.2019.8651782","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651782","url":null,"abstract":"In this paper we propose a two-level hybrid anomalous activity detection model for intrusion detection in IoT networks. The level-1 model uses flow-based anomaly detection, which is capable of classifying the network traffic as normal or anomalous. The flow-based features are extracted from the CICIDS2017 and UNSW-15 datasets. If an anomaly activity is detected then the flow is forwarded to the level-2 model to find the category of the anomaly by deeply examining the contents of the packet. The level-2 model uses Recursive Feature Elimination (RFE) to select significant features and Synthetic Minority Over-Sampling Technique (SMOTE) for oversampling and Edited Nearest Neighbors (ENN) for cleaning the CICIDS2017 and UNSW-15 datasets. Our proposed model precision, recall and F score for level-1 were measured 100% for the CICIDS2017 dataset and 99% for the UNSW-15 dataset, while the level-2 model precision, recall, and F score were measured at 100 % for the CICIDS2017 dataset and 97 % for the UNSW-15 dataset. The predictor we introduce in this paper provides a solid framework for the development of malicious activity detection in IoT networks.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128731692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Improving of Fairness by Dynamic Sensitivity Control and Transmission Power Control with Access Point Cooperation in Dense WLAN 基于接入点协作的动态灵敏度控制和传输功率控制提高密集无线局域网公平性
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) Pub Date : 2019-01-01 DOI: 10.1109/CCNC.2019.8651714
Koki Iwai, Takanobu Ohnuma, H. Shigeno, Yusuke Tanaka
{"title":"Improving of Fairness by Dynamic Sensitivity Control and Transmission Power Control with Access Point Cooperation in Dense WLAN","authors":"Koki Iwai, Takanobu Ohnuma, H. Shigeno, Yusuke Tanaka","doi":"10.1109/CCNC.2019.8651714","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651714","url":null,"abstract":"Wireless Local Area Networks (WLANs) have been deployed more densely according to high wireless demands. In a dense environment where a lot of stations (STAs) located closely, co-channel interference decreases system performance seriously. IEEE 802.11ax Task Group focuses on spatial reuse that utilizes finite frequency resources to address this problem. Although existing studies about spatial reuse have been discussed so far, interference from other basic service sets (BSSs) and cooperation with each access point (AP) have not been considered fully. To enhance communication fairness, we propose fair Dynamic Sensitivity and Transmission Power Control (fairDSTPC) that adjusts CCAT and transmission power based on AP cooperation. We improve communication environment of BSS which results in the worst throughput by exchanging information, such as throughput and number of sent data frames, between APs. Simulation results showed that our method achieved effectiveness compared with existing method and legacy system. In an open space scenario, our method reached approximately two times higher 5% ile downlink throughput than an existing method while maintaining 5% ile uplink throughput and aggregate throughput.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128100089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信