{"title":"Joint Service Caching and Computation Offloading to Maximize System Profits in Mobile Edge-Cloud Computing","authors":"Qingyang Fan, Junyu Lin, Guangsheng Feng, Zihan Gao, Huiqiang Wang, Yafei Li","doi":"10.1109/MSN50589.2020.00050","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00050","url":null,"abstract":"Considering the advantages of mobile edge computing (MEC), such as low latency, high bandwidth, etc., more and more mobile services are cached to mobile edge servers. However, due to limited computing resources and storage capacity of mobile edge servers, it is hard to guarantee that all services are cached and all computation offloading requests are satisfied. In this paper, we jointly optimize service caching and computation offloading to maximize system profits in mobile edge-cloud computing (MECC). The problem is formalized as a nonconvex optimization problem with discrete variables. We propose a Dynamic Joint computation Offloading and Service Caching algorithm (DJOSC) to solve the problem. Specifically, a regularization technique and Lyapunov optimization theory are used to transform the problem into two subproblems, which are solved by convex optimization techniques. Numerical evaluations show that the maximum system profits can be achieved under different computing resources, storage capacities and bandwidth capacities.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kiyoshy Nakamura, P. Manzoni, M. Zennaro, Juan-Carlos Cano, C. Calafate
{"title":"[Invited] LoRaCTP: a LoRa based Content Transfer Protocol for sustainable edge computing","authors":"Kiyoshy Nakamura, P. Manzoni, M. Zennaro, Juan-Carlos Cano, C. Calafate","doi":"10.1109/MSN50589.2020.00090","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00090","url":null,"abstract":"In this paper we present a flexible protocol based on LoRa technology that allows for the transfer of “content” to large distances with very low energy. LoRaCTP provides all the necessary mechanisms to make LoRa reliable, by introducing a lightweight connection set-up and ideally allowing the sending of an as-long-as necessary data message. We designed this protocol as a communication support for edge based IoT solutions given its stability, low power usage and the possibility to cover long distances. We present the evaluation of the protocol with various sizes of data content and various distances to show its performance and reliability.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124200094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Yang Bryan Lim, Jer Shyuan Ng, Zehui Xiong, D. Niyato, Song Guo, Cyril Leung, C. Miao
{"title":"Dynamic Resource Allocation for Hierarchical Federated Learning","authors":"Wei Yang Bryan Lim, Jer Shyuan Ng, Zehui Xiong, D. Niyato, Song Guo, Cyril Leung, C. Miao","doi":"10.1109/MSN50589.2020.00038","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00038","url":null,"abstract":"One of the enabling technologies of Edge Intelligence is the privacy preserving machine learning paradigm called Federated Learning (FL). However, communication inefficiency remains a key bottleneck in FL. To reduce node failures and device dropouts, the Hierarchical Federated Learning (HFL) framework has been proposed whereby cluster heads are designated to support the data owners through intermediate model aggregation. This decentralized learning approach reduces the reliance on a central controller, e.g., the model owner. However, the issues of resource allocation and incentive design are not well-studied in the HFL framework. In this paper, we consider a two-level resource allocation and incentive mechanism design problem. In the lower level, the cluster heads offer rewards in exchange of the data owners’ participation, and the data owners are free to choose among any clusters to join. Specifically, we apply the evolutionary game theory to model the dynamics of the cluster selection process. In the upper level, given that each cluster head can choose to serve a model owner, the model owners have to compete for the services of the cluster head. As such, we propose a deep learning based auction mechanism to derive the valuation of each cluster head’s services. The performance evaluation shows the uniqueness and stability of our proposed evolutionary game, as well as the revenue maximizing property of the deep learning based auction.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Survivor Detection in UAV Thermal Imagery Based on Deep Learning","authors":"Jiong Dong, K. Ota, M. Dong","doi":"10.1109/MSN50589.2020.00065","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00065","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) uses evolved significantly due to its high durability, lower costs, easy implementation, and flexibility. After a natural disaster occurs, UAVs can quickly search the affected area to save more survivors. Dataset is crucial in developing a round-the-clock rescue system applying deep learning methods. In this paper, we collected a new thermal image dataset captured by UAV for post-disaster search and rescue (SAR) activities. After that, we employed several different deep convolutional neural networks to train the pedestrian detection models on our datasets, including YOLOV3, YOLOV3-MobileNetV1 and YOLOV3-MobileNetV3. Because the onboard microcomputer has limited computing capacity and memory, for balancing the inference time and accuracy, we find optimal points to prune and fine-tune the network based on the sensitivity of convolutional layers. We validate on NVIDIA’s Jetson TX2 and achieve 26.60 FPS (Frames per second) real-time performance.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125276229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Global Brain fuelled by Local intelligence: Optimizing Mobile Services and Networks with AI","authors":"Si-Ahmed Naas, Thaha Mohammed, S. Sigg","doi":"10.1109/MSN50589.2020.00021","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00021","url":null,"abstract":"Artificial intelligence (AI) is among the most influential technologies to improve daily lives and to promote further economic activities. Recently, a distributed intelligence, referred to as a global brain, has been developed to optimize mobile services and their respective delivery networks. Inspired by interconnected neuron clusters in the human nervous system, it is an architecture interconnecting various AI entities. This paper models the global brain architecture and communication among its components based on multi-agent system technology and graph theory. We target two possible scenarios for communication and propose an optimized communication algorithm. Extensive experimental evaluations using the Java Agent Development Framework (JADE), reveal the performance of the global brain based on optimized communication in terms of network complexity, network load, and the number of exchanged messages. We adapt activity recognition as a real-world problem and show the efficiency of the proposed architecture and communication mechanism based on system accuracy and energy consumption as compared to centralized learning, using a real testbed comprised of NVIDIA Jetson Nanos. Finally, we discuss emerging technologies to foster future global brain machinelearning tasks, such as voice recognition, image processing, natural language processing, and big data processing.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BIA: A Blockchain-based Identity Authorization Mechanism","authors":"Xiaodong Ren, Feilong Lin, Zhongyu Chen, Changbing Tang, Zhonglong Zheng, Minglu Li","doi":"10.1109/MSN50589.2020.00031","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00031","url":null,"abstract":"The abuse of personal identity information is one of the most serious problems worldwide. Most social services or businesses use the identity authorization to confirm their validity and legality and the copies of users’ identity certification are usually recorded by the service providers. It is easy to leak the users’ identity information due to the untrustworthy service provider or single-point security failure, and various social problems are then caused. To deal with such problems, this paper proposes a Blockchain-based Identity Authorization mechanism (BIA). First, an Identity Authorization Module (IAM) is devised, which reads the identity certificate and transform the identity plaintext to ciphertext under the authorization by the user’s identity certificate entity and password. IAM guarantees the security of identity information by keeping its plaintext offline. Second, a Business Contract Module (BCM) is designed, which provides a general smart contract framework for identity authorization that can be adopted by most of social services or businesses. Third, a double-chain blockchain infrastructure is developed, whereby the encrypted identity information and service smart contracts are respectively recorded in the tamper-resistant, non-repudiable, and publicly verifiable way. Finally, a prototype system has been developed to verify the security, feasibility and effectiveness of the proposed BIA.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Analysis of Automatic Distribution Changes for Power Grid","authors":"Mei Shi, Zhen Wang, Pengfei Yu, Qi Du","doi":"10.1109/MSN50589.2020.00120","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00120","url":null,"abstract":"In view of the actual demand of power supply enterprises for the construction of distribution network, it is necessary to integrate the two kinds of business, namely the abnormal operation of distribution network equipment and the operation and monitoring of distribution network, through the integration of power network sensor network and other technologies, the operation and distribution data and the integration of “big data” technology to carry out integrated management of the entire distribution network dispatching and production business. Based on PMS2.5 and GIS2.0, we propose a new scheme to analyse distribution changes for power grid, with the help of the parameter comparison analysis, the mutual authentication between the two systems construction of distribution network equipment move detection function. It can realize electricity information area over, demolition, shut down the usage scenarios and system parameter changes between the data management, at the same time auxiliary by automatic matching method, improved the camp with penetration data accuracy.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MobiFit: Contactless Fitness Assistant for Freehand Exercises Using Just One Cellular Signal Receiver","authors":"Guanlong Teng, Feng Hong, Yue Xu, Jianbo Qi, Ruobing Jiang, Chao Liu, Zhongwen Guo","doi":"10.1109/MSN50589.2020.00057","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00057","url":null,"abstract":"Freehand exercises help improve physical fitness without any requirements on devices, or places (e.g., gyms). Existing fitness assistant systems require wearing smart devices or exercising at specific positions, which compromises the ubiquitous availability of freehand exercises. This work proposes MobiFit, a contactless freehand exercise assistant using just one cellular signal receiver. MobiFit monitors the ubiquitous cellular signals sent by the base station and provides accurate repetition counting, exercise type recognition, and workout quality assessment without any attachments to the human body. To design MobiFit, we first analyze the characteristics of the received cellular signal sequence during freehand exercises through experimental studies. Based on the observation, we construct the analytic model of the received signals. Guided by the analytic model, MobiFit segments out every repetition and rest interval from one exercise session through spectrogram analysis, and extracts low-frequency features from each repetition for type recognition. We have implemented the prototype of MobiFit and collected 22,960 exercise repetitions performed by ten volunteers over six months. The results confirm that MobiFit achieves high counting accuracy of 98.6%, high recognition accuracy of 94.1%, and low repetition duration estimation error within 0.3s. Besides, the experiments show that MobiFit works both indoor and outdoor, and supports multiple users exercising together.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UEIoT 2020 Workshop","authors":"","doi":"10.1109/msn50589.2020.00014","DOIUrl":"https://doi.org/10.1109/msn50589.2020.00014","url":null,"abstract":"","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124367441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying unfamiliar callers’ professions from privacy-preserving mobile phone data","authors":"Jiaquan Zhang, Xiaoming Yao, Xiaoming Fu","doi":"10.1109/MSN50589.2020.00088","DOIUrl":"https://doi.org/10.1109/MSN50589.2020.00088","url":null,"abstract":"Identifying an unfamiliar caller’s profession is important to protect citizens’ personal safety and property. Due to limited data protection of many popular online services in some countries such as taxi hailing or takeouts ordering, many users encounter an increasing number of phone calls from strangers. This may aggravate the situation that criminals pretend to be delivery staff or taxi drivers, bringing threats to the society. Additionally, many people nowadays suffer from excessive digital marketing and fraud phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, and do not work for identification of multiple professions. We observed that web service requests issued from users’ mobile phones which may show their Apps preferences, spatial and temporal patterns, and other profession related information. This offers us a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users’ mobile phone raw data may violate the more and more strict private data protection policies or regulations (e.g. GDPR 71). Using appropriate statistical methods to eliminate private information and preserve personal characteristics, provides a way to identify mobile phone callers without privacy concern. In this paper, we exploit privacy-preserving mobile data to develop a model which can automatically identify the callers who are divided into four categories of users: normal users (other professions), taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters. The validation results over an anonymized dataset of 1,282 users with a period of 3 months in Shanghai City prove that the proposed model could achieve an accuracy of 75+%.","PeriodicalId":447605,"journal":{"name":"2020 16th International Conference on Mobility, Sensing and Networking (MSN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126301905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}