ICC 2019 - 2019 IEEE International Conference on Communications (ICC)最新文献

筛选
英文 中文
Sliced-RAN: Joint Slicing and Functional Split in Future 5G Radio Access Networks 切片ran:未来5G无线接入网络中的联合切片和功能分裂
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761081
Behnam Ojaghi, F. Adelantado, E. Kartsakli, A. Antonopoulos, C. Verikoukis
{"title":"Sliced-RAN: Joint Slicing and Functional Split in Future 5G Radio Access Networks","authors":"Behnam Ojaghi, F. Adelantado, E. Kartsakli, A. Antonopoulos, C. Verikoukis","doi":"10.1109/ICC.2019.8761081","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761081","url":null,"abstract":"The unprecedented surge in mobile data traffic, along with the wide range of services and the corresponding different performance requirements, has raised the need for a new mobile network architecture. In that sense, 5G has been conceived as a software defined network able to provide service-tailored connectivity. Network slicing is a key mechanism to serve efficiently the diversified service requirements. In this paper, we formulate the joint RAN slicing and functional split with optimization of centralization degree (CD) and throughput. Our results show that even though in terms of CD we have more costs, we can better meet the service requirements and also have more throughput in the network.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Context-Aware Adaptive Authentication and Authorization in Internet of Things 物联网环境感知自适应认证与授权
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761830
A. Arfaoui, S. Cherkaoui, A. Kribèche, S. Senouci, Mohamed Hamdi
{"title":"Context-Aware Adaptive Authentication and Authorization in Internet of Things","authors":"A. Arfaoui, S. Cherkaoui, A. Kribèche, S. Senouci, Mohamed Hamdi","doi":"10.1109/ICC.2019.8761830","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761830","url":null,"abstract":"The rapid technological advancements in wireless communications, ubiquitous sensing and mobile networking have paved the way for the emergence of the Internet of Things (IoT) era, where “anything” can be connected “anywhere” at “anytime”. However, the flourish of IoT still faces various security and privacy preserving challenges that need to be addressed. In such pervasive and heterogeneous environment where the context conditions dynamically and frequently change, efficient and context-aware mechanisms are required to meet the users' changing needs. Therefore, it seems crucial to design an adaptive access control scheme in order to remotely control smart things while considering the dynamic context changes. In this paper, we propose a Context-Aware Attribute-Based Access Control (CAABAC) approach that incorporates the contextual information with the Ciphertext-Policy Attribute-based Encryption (CP-ABE) to ensure data security and provide an adaptive contextual privacy. From a security perspective, the proposed scheme satisfies the security requirements such as confidentiality, context-aware privacy, and resilience against key escrow problem. Performance analysis proves the efficiency and the effectiveness of the proposed scheme compared to benchmark schemes in terms of storage, communication and computational cost.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Energy-Aware Task Allocation for Mobile IoT by Online Reinforcement Learning 基于在线强化学习的移动物联网能量感知任务分配
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761509
Jingjing Yao, N. Ansari
{"title":"Energy-Aware Task Allocation for Mobile IoT by Online Reinforcement Learning","authors":"Jingjing Yao, N. Ansari","doi":"10.1109/ICC.2019.8761509","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761509","url":null,"abstract":"Fog-aided Internet of Things (IoT) networks provide low latency IoT services by offloading computational intensive and delay sensitive tasks to the fog nodes, which are deployed close to the IoT devices. Mobile IoT relies on battery limited mobile IoT devices (e.g., wearable devices and smartphones) to provision networks with enhanced flexibility. Mobile IoT faces the challenges of varying wireless channel conditions and hence may degrade the quality of service (QoS). We investigate the task allocation, which intelligently distributes tasks to different fog nodes and adapts to IoT varying mobile environment, such that the average task completion latency, constrained by QoS requirements and mobile IoT device battery capacity, is minimized. An integer linear programming (ILP) problem is then formulated to solve this problem. However, it is difficult to obtain the user mobility patterns (i.e., future locations where tasks are offloaded) and user side information (i.e., task length and computing intensity). Therefore, we propose an online learning algorithm to engineer task allocation decisions and then demonstrate its performances by extensive simulations.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129895396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Architecture for Software Defined Drone Networks 软件定义无人机网络的体系结构
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761968
Mohannad A. Alharthi, A. Taha, H. Hassanein
{"title":"An Architecture for Software Defined Drone Networks","authors":"Mohannad A. Alharthi, A. Taha, H. Hassanein","doi":"10.1109/ICC.2019.8761968","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761968","url":null,"abstract":"Drones or Unmanned Aerial Vehicles (UAVs) are utilized in a wide range of applications, as they are considered flexible and cost-effective. Novel applications have been recently explored, such as providing communications and Internet coverage where ground infrastructure is lacking or in temporary situations. In this paper, we propose a drone-based network architecture enabled by Software Defined Networking (SDN) to provide dynamic and flexible networking capabilities, suitable for different types of drone applications and deployments, while we discuss associated challenges related to SDN in done networks.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126664153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Learning Multiple Primary Transmit Power Levels for Smart Spectrum Sharing 基于智能频谱共享的多主发射功率学习
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761201
Rui Zhang, Peng Cheng, Zhuo Chen, Yonghui Li, B. Vucetic
{"title":"Learning Multiple Primary Transmit Power Levels for Smart Spectrum Sharing","authors":"Rui Zhang, Peng Cheng, Zhuo Chen, Yonghui Li, B. Vucetic","doi":"10.1109/ICC.2019.8761201","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761201","url":null,"abstract":"Multi-parameter cognition in a cognitive radio network provides a potential avenue to more efficient spectrum usage. In this paper, we propose a two-stage spectrum sharing strategy, where the primary user operates with multiple transmit power levels. Different from the conventional approaches, our method does not require any prior knowledge of the primary transmitter (PT) power characteristics. In the first stage, we use a conditionally conjugate Dirichlet process Gaussian mixture model to capture the multi-level power characteristics inherent in the PT signals, and design a Bayesian inference method to infer the model parameters. In the second stage, we propose a secondary transmitter (ST) prediction-transmission method based on reinforcement learning, which adapts to the PT power variation and strike an excellent tradeoff between the secondary network throughput and the interference to the primary network. The simulation results show the effectiveness of the proposed strategy.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130604639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Zero Site-Survey Overhead Indoor Tracking System using Particle Filter 基于粒子滤波的零站点测量架空室内跟踪系统
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761621
Feiyu Jin, Kai Liu, Hao Zhang, Weiwei Wu, Jingjing Cao, X. Zhai
{"title":"A Zero Site-Survey Overhead Indoor Tracking System using Particle Filter","authors":"Feiyu Jin, Kai Liu, Hao Zhang, Weiwei Wu, Jingjing Cao, X. Zhai","doi":"10.1109/ICC.2019.8761621","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761621","url":null,"abstract":"With rapid development of Internet of Things (IoT) and pervasive computing, indoor localization and tracking has attracted considerable attentions. This work aims at designing an effective and scalable indoor tracking system based on smart phones embedded with Wi-Fi interfaces and inertial sensors. Specifically, we first propose a zero site-survey overhead algorithm (ZSSO), which includes a step detection mechanism, a map constraint construction method and a customized particle filter. The step detection mechanism is used to count user steps based on raw data extracted from inertial sensors. The map constraint construction method is adopted to generate obstacle constraints of the indoor environment based on a two-step conversion method designed for indoor map. Finally, a customized particle filter is proposed to track user's positions continuously. Further, we propose an enhanced version of ZSSO (i.e., E-ZSSO) to improve tracking performance by incorporating with Wi-Fi fingerprint based localization technique. First, an automatic Wi-Fi fingerprint collection mechanism is developed for building the fingerprint database without extra site-survey overhead. Then, the Wi-Fi fingerprint based localization results are further adopted to speed up the convergence of the particle filter as well as to better calibrate the localization results. We have implemented the indoor tracking system in real-world environments and conducted comprehensive performance evaluation. The field testing results conclusively demonstrate the scalability and effectiveness of our proposed algorithms.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116354229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Missing Value Imputations by Rule-Based Incomplete Data Fuzzy Modeling 基于规则的不完全数据模糊建模缺失值估算
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761052
Xiaochen Lai, Xin Liu, Liyong Zhang, Chi Lin, M. Obaidat, K. Hsiao
{"title":"Missing Value Imputations by Rule-Based Incomplete Data Fuzzy Modeling","authors":"Xiaochen Lai, Xin Liu, Liyong Zhang, Chi Lin, M. Obaidat, K. Hsiao","doi":"10.1109/ICC.2019.8761052","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761052","url":null,"abstract":"Missing values are a common phenomenon in real-world datasets, which decreases the quality and reliability of data mining. Traditional regression-based imputation method estimates missing values through the relationship between attributes inferred by complete records. In order to describe the relationship more appropriately and make better use of present values, a rule-based incomplete data modeling method is proposed to impute missing values in this paper. The method utilizes incomplete records together with complete records for establishing Takagi-Sugeno (TS) models. In this process, the incomplete dataset is divided into several subsets and the linear functions containing only significant variables are built to describe the relationships between attributes in each subset. Experimental results demonstrate that the proposed method can effectively improve the performance of missing value imputation.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114748843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimum Priority Class Selection Under Wi-Fi/LTE Coexistence Wi-Fi/LTE共存下的最优优先级选择
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8762024
I. Samy, Loukas Lazos
{"title":"Optimum Priority Class Selection Under Wi-Fi/LTE Coexistence","authors":"I. Samy, Loukas Lazos","doi":"10.1109/ICC.2019.8762024","DOIUrl":"https://doi.org/10.1109/ICC.2019.8762024","url":null,"abstract":"Wi-Fi and LTE standards define several traffic classes to prioritize applications based on their requirements. When these technologies coexist in unlicensed bands, the class selection of one system impacts the performance of the other. In this paper, we investigate how the traffic class selection affects the delay for completing the transmission of a fixed number of bits. We develop an analytical framework which characterizes the average delay under Wi-Fi/LTE coexistence. Our framework allows us to optimize the class selection for a Wi-Fi or LTE station based on the traffic class selected by the surrounding stations and minimize the average delay. We show that operating at a high priority class does not always minimize delay. Under certain contention and class selection conditions, a low priority class reduces the collision probability while increasing the airtime once the channel is captured. This leads to a lower overall delay. We provide numerical examples that demonstrate the inherent tradeoffs between the traffic class parameters.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cross-Layer Analysis of RFID Systems with Correlated Shadowing and Random Radiation Efficiency 具有相关阴影和随机辐射效率的RFID系统的跨层分析
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761060
R. Valentini, R. Alesii, M. Levorato, F. Santucci
{"title":"Cross-Layer Analysis of RFID Systems with Correlated Shadowing and Random Radiation Efficiency","authors":"R. Valentini, R. Alesii, M. Levorato, F. Santucci","doi":"10.1109/ICC.2019.8761060","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761060","url":null,"abstract":"In this paper, we propose an equivalent channel model for the analysis of passive backscattering systems (e.g., Radio Frequency Identification systems). The proposed framework accurately models radiation efficiencies at the backscattering nodes whose communication channels are affected by spatially correlated shadowing. First, we derive the distribution of interference in the system and the probability that a node will activate as a function of a specific geographical distribution of the nodes. Then, we approximate the capture probability using a multivariate moment matching approach. The rationale is to provide an underlying structure for the cross-layer analysis of current MAC protocols with the perspective of performance enhancement. Numerical results illustrate the performance of a standard MAC protocol for passive RFID systems, including an accurate evaluation of the impact of the channel characterization.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124464961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection 基于大感知数据的入侵检测强化学习
ICC 2019 - 2019 IEEE International Conference on Communications (ICC) Pub Date : 2019-05-20 DOI: 10.1109/ICC.2019.8761575
S. Otoum, B. Kantarci, H. Mouftah
{"title":"Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection","authors":"S. Otoum, B. Kantarci, H. Mouftah","doi":"10.1109/ICC.2019.8761575","DOIUrl":"https://doi.org/10.1109/ICC.2019.8761575","url":null,"abstract":"Wireless sensor and actuator networks are widely adopted in various applications such as critical infrastructure monitoring where sensory data in big volumes and velocity are prone to security vulnerabilities for the network and the monitored infrastructure. Despite the vulnerabilities of the big data phenomenon, intelligent data analytics technique can enable the analysis of huge amount of data and identification of intrusive behavior in real time. The main performance targets for any Intrusion Detection System (IDS) involve accuracy, detection, precision, F<sub>1</sub> score and Receiver Operating Characteristics. Pursuant to these, this paper proposes a big data-driven IDS approach in Wireless Sensor Networks by harnessing reinforcement learning techniques on a hybrid IDS framework. We study the performance of RL-IDS and compare it to the previously proposed Adaptive Machine Learning-based IDS (AML-IDS) namely the Adaptively Supervised and Clustered Hybrid IDS (ASCH-IDS). The experimental results show that RL-IDS can achieve  100% success in detection, accuracy and precision-recall rates whereas its predecessor ASCH-IDS performs with an accuracy level that is slightly above 99%.","PeriodicalId":402732,"journal":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信