2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)最新文献

筛选
英文 中文
Performance Analysis of Relay Selection for IoT Networks over Generalized K Distribution 广义K分布下物联网网络中继选择性能分析
A. Dziri, M. Terré, N. Nasser
{"title":"Performance Analysis of Relay Selection for IoT Networks over Generalized K Distribution","authors":"A. Dziri, M. Terré, N. Nasser","doi":"10.1109/IWCMC.2019.8766438","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766438","url":null,"abstract":"In the communication scheme for Internet of Things (IoT) systems, reliability and low power are essential in ensuring the connection of a large lot of terminals. Multi-Hop based cooperative communication is a promising tool towards achieving that goals. Moreover, in many works of research, the channel fading is limited to multi-paths fading modeled by Rayleigh or Nakagami-m distributions, or a combination of the two with pathloss fading. In this paper, we have explored the Generalized K fading which offers a more general distribution encompassing multi-paths fading, pathloss fading and shadowing. Thus, we investigate the Decode and Forward relaying strategy over Generalized K channels for multi-hops IoT networks. We derive analytical expressions of the average symbol error probability and the outage probability. Finally, we show the validity of the theoretical results by simulation.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116553653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Intelligent Deterministic D2D Communication in Narrow-band Internet of Things 窄带物联网中的智能确定性D2D通信
Alissa Nauman, M. Jamshed, Y. Ahmad, R. Ali, Yousaf Bin Zikria, S. Kim
{"title":"An Intelligent Deterministic D2D Communication in Narrow-band Internet of Things","authors":"Alissa Nauman, M. Jamshed, Y. Ahmad, R. Ali, Yousaf Bin Zikria, S. Kim","doi":"10.1109/IWCMC.2019.8766786","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766786","url":null,"abstract":"To enable the internet of things (IoT) devices with increased coverage and optimized power consumption, the 3rd generation partnership (3GPP) standardizes the idea of narrowband IoT (NB-IoT) technology in the fifth generation (5G) of cellular communication. Re-transmission of control and data packets due to a poor link between user equipment (UE) and the base station (BS), is considered as one of the key feature in NB-IoT to ensure the data delivery of delay-sensitive applications, e.g. ambulance services and body sensor networks (BSN). This phenomenon degrades the energy efficiency of the already resource constrained systems. One key solution for NB-IoT UE is to exploit the device-to-device (D2D) communication using two hops instead of transmitting on a direct uplink, due to which the system performance increases. In an attempt to transmit the NB-IoT UE uplink data packet, splendid researchers have focused towards developing a D2D communication based strategy, which typically optimizes the expected packet delivery ratio (EDR) and end-to-end delay (EED) through an opportunistic method. However, such methodology imposes an additional delay due to the unavailability of active relaying nodes and increases the overall energy consumption of the system. This necessitates us to design an intelligent deterministic D2D (2D2D) relay selection strategy for delay sensitive NB-IoT UEs. The EDR and EED have been improved using deterministic programming based algorithm. Simulations with various parameters are carried out, and results are presented. Simulation results show that the deterministic algorithm gives better performance with a 10% increase in EDR and overcomes the additional delay.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121764486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Towards a Distributed Computation Offloading Architecture for Cloud Robotics 面向云机器人的分布式计算卸载体系结构
Rihab Chaâri, O. Cheikhrouhou, A. Koubâa, H. Youssef, Habib Hmam
{"title":"Towards a Distributed Computation Offloading Architecture for Cloud Robotics","authors":"Rihab Chaâri, O. Cheikhrouhou, A. Koubâa, H. Youssef, Habib Hmam","doi":"10.1109/IWCMC.2019.8766504","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766504","url":null,"abstract":"Cloud robotics is incessantly gaining ground, especially with the rapid expansion of wireless networks and Internet resources. In particular, computation offloading is emerging as a new trend, enabling robots with more powerful computation resources. It helps them to overcome the hardware and software limitations by leveraging parallel computing capabilities and the availability of large amounts of resources in the cloud. However, the performance gain of computation offloading in cloud robotics is still an ongoing research problem because of the conflicting factors that affect the performance. In this paper, we investigate this issue and we design a distributed cloud robotic architecture for computation offloading based on Kafka middleware as messaging broker. We experimentally validated our solution and tested its performance using image processing algorithms. Experimental results show a significant reduction in robot CPU load, as expected, with an increase in robot communication delays.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122039656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Cloud and Fog based Architecture for Energy Management of Smart City by using Meta-heuristic Techniques 基于元启发式技术的云雾智慧城市能源管理体系结构
A. Butt, Sajjad Khan, Tehreem Ashfaq, Sakeena Javaid, Norin Abdul Sattar, N. Javaid
{"title":"A Cloud and Fog based Architecture for Energy Management of Smart City by using Meta-heuristic Techniques","authors":"A. Butt, Sajjad Khan, Tehreem Ashfaq, Sakeena Javaid, Norin Abdul Sattar, N. Javaid","doi":"10.1109/IWCMC.2019.8766702","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766702","url":null,"abstract":"Cloud servers provide services over the internet by using Virtual Machines (VMs). The power consumption of Physical Machines (PMs) needs to be considered, as VMs are running on physical machines. When a consumer sends request to the cloud, it takes time to respond because of distant location of cloud. Due to which delay and latency issue arises. Fog is introduced to overcome the peculiarities of cloud. In fog computing environment, the operational challenges for the research community are: reducing the energy consumption and load balancing. The energy consumption of the fog resources depends on the requests that are allocated to the set of VMs. This is a challenging task. In this paper, three layered architecture cloud, fog and consumer layer are proposed. The cloud and fog provide VMs to run the consumers’ application quickly. The meta-heuristic algorithm that is: Genetic Algorithm (GA) is proposed and Binary Particle Swarm Optimization (BPSO) is implemented to balance the set of requests on VMs of cloud and fog. The proposed and implemented algorithm is compared with existing PSO and BAT algorithms to measure efficiency. The Closest Data Center (CDC), Optimize Response Time (ORT), Reconfigure Dynamically with Load (RDL) is implemented to optimize the Response Time (RT) and Processing Time (PT). These policies also decide which requests are allocated to which Data Center (DC). The proposed GA and implemented BPSO are use to minimize the computational cost and also decrease the RT and PT of DCs.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
UAV detection and identification in the Internet of Things 物联网中的无人机检测与识别
Jingcheng Zhao, Xinru Fu, Zongkai Yang, Fengtong Xu
{"title":"UAV detection and identification in the Internet of Things","authors":"Jingcheng Zhao, Xinru Fu, Zongkai Yang, Fengtong Xu","doi":"10.1109/IWCMC.2019.8766519","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766519","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have been widely used in fifth-generation (5G) and the Internet of Things (IoT) because they can carry devices for communications and IoT and fly in a flexible and controllable manner. At present, in flight control, the UAV is mainly positioned by satellite. However, it may be interfered by the strong electromagnetic deception signal. A method for UAV assisted positioning is needed. In this work, we propose a new method of using radar to position the UAV. The range resolution capability of the wideband radar is used to acquire the target position in the detection area. The time-frequency analysis method is used to analyze the micro-Doppler effect generated by the rotation of the UAV rotor, and to identify whether the detected target is a UAV. The cepstrum method is used to estimate the feature data of the UAV such as the number of rotors and the speed, then the UAV is classified by the obtained feature data. The simulation results of the number of rotors, the rotation speed of each rotor and the position of the UAV is shown in the article.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Software Defined Internet of Vehicles: a survey from QoS and scalability perspectives 软件定义的汽车互联网:从服务质量和可扩展性角度的调查
K. Smida, H. Tounsi, M. Frikha, Yeqiong Song
{"title":"Software Defined Internet of Vehicles: a survey from QoS and scalability perspectives","authors":"K. Smida, H. Tounsi, M. Frikha, Yeqiong Song","doi":"10.1109/IWCMC.2019.8766647","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766647","url":null,"abstract":"The idea of leveraging Software Defined Networking (SDN) in vehicular networks has drawn a lot of attention in the last years. SDN flexibility and programmability brought promising solutions for VANET challenges, namely Quality of Services (QoS) and scalability which are the main characteristics of Internet of Vehicles (IoV). Such networks are characterized by fast topological changes due to their variable dynamicity and density. In fact, SDN decouples control plane and data plane, providing programmability to configure the network. However, based on a single controller, SDN is criticized for not supporting scalability and for decreasing the overall network Quality of service. Using multiple controllers becomes the tendency of recent works to meet the need of large networks. Throughout this paper, we survey the proposed SDN-based architectures for vehicular networks. Considering the control plane impact, centralized or distributed, the QoS improvements brought by theses architectures are studied and criticized in order to derive the suitability of each proposal to resolve the IoV challenges and meet its requirements for the various applications.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129570112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Enhancing Firewall Filter Performance Using Neural Networks 利用神经网络增强防火墙过滤性能
Heba Saleous, Z. Trabelsi
{"title":"Enhancing Firewall Filter Performance Using Neural Networks","authors":"Heba Saleous, Z. Trabelsi","doi":"10.1109/IWCMC.2019.8766576","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766576","url":null,"abstract":"The Internet has grown to a point where people all over the world have grown dependent of the convenient communication medium that is being provided. However, with this dependency, malicious traffic has become a major concern. Because of this, firewalls are a mandatory part of any network, due to their ability to filter the traffic based on rules that state which packets should be accepted or denied. However, filter rules must be manually configured by a network administrator, and packets that do not fit any rule may be subject to wrong judgment by the firewall. This can become tedious in larger networks. Neural networks can learn the filter rules that have been set by administrators in order to decide if packets that do not fit any specific rules should be accepted or denied. The neural network will be trained with existing packet data and their firewall actions, and then tested to determine its filtering accuracy compared to the firewall.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128004425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced ADR for LoRaWAN networks with mobility 具有移动性的LoRaWAN网络的增强ADR
Norhane Benkahla, H. Tounsi, Yeqiong Song, M. Frikha
{"title":"Enhanced ADR for LoRaWAN networks with mobility","authors":"Norhane Benkahla, H. Tounsi, Yeqiong Song, M. Frikha","doi":"10.1109/IWCMC.2019.8766738","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766738","url":null,"abstract":"LoRa is becoming an attractive low cost and low power WAN solution for many real-world IoT applications. LoRa has been designed for static end-devices to individually use the optimal configuration through an adaptive data rate mechanism (ADR), thanks to the possibility to choose a set of LoRa physical layer transmission parameters. However a large class of IoT applications (e.g. connected farm) also includes mobile nodes with specific mobility patterns. For those applications, the current ADR control algorithm may not be efficient when the radio channel attenuation rapidly changes because of the node mobility. This paper contributes to enhance the ADR mechanism by taking into account the position of the mobile devices and their trajectories in order to have a dynamic allocation. The Enhanced-ADR (E-ADR) minimizes the transmission time and energy consumption as well as packet loss for mobile devices. The testbed-based experiments show that E-ADR improves the quality of service (QoS) of the overall networks.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124526356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Secure Semi-Blind AF relaying networks using multiple eavesdroppers 使用多个窃听器的安全半盲AF中继网络
W. H. Alouane
{"title":"Secure Semi-Blind AF relaying networks using multiple eavesdroppers","authors":"W. H. Alouane","doi":"10.1109/IWCMC.2019.8766643","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766643","url":null,"abstract":"In this paper, we investigate a secure semi-blind amplify-and-forward (AF) relaying system over Rayleigh fading channels. We consider a reactive relay selection where the relay is selected based on the highest instantaneous signal-to-noise ratio (SNR) of the second hop. We evaluate the ergodic secrecy capacity using source-assisted jamming (SAJ) and considering that relays act as eavesdroppers. In order to improve the secrecy performance, a direct link between the source and destination is considered. Numerical results are presented to verify the accuracy of the proposed mathematical analysis. Moreover, a comparison between secure semi-blind AF relaying system and secure channel-state-information (CSI)-assisted AF relaying system is performed to further prove the exactness of our analysis. The proposed secure semi-blind AF relaying system has a simpler mathematical analysis and a comparable secrecy performance as compared to secure CSI-assisted AF relaying system.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124263368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay Study in Multi-controller Software Defined Vehicular Network Using OpenDaylight for Emergency Applications 基于OpenDaylight的多控制器软件定义车辆网络应急时延研究
K. Smida, H. Tounsi, M. Frikha, Yeqiong Song
{"title":"Delay Study in Multi-controller Software Defined Vehicular Network Using OpenDaylight for Emergency Applications","authors":"K. Smida, H. Tounsi, M. Frikha, Yeqiong Song","doi":"10.1109/IWCMC.2019.8766633","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766633","url":null,"abstract":"SDN is a promising solution for vehicular networks challenges. Distributing the SDN control plane achieved more scalability and performance. However, synchronization between different controllers of network state generates extra-delay that is not suitable with delay-sensitive applications in vehicular networks like emergency services. In this paper, we investigate the e2e (end-to-end) delay in variable density vehicular scenarios with variable number of controllers. Our experiments prove the benefits of using multi-controllers in terms of delay but also the need of the deployment of the effective number according to the vehicular network density.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114701611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信