{"title":"On the Analysis of AI-Optimized Aerial Cell-Free Massive MIMO","authors":"M. Alamgir, Brian Kelley","doi":"10.1109/CCNC51664.2024.10454699","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454699","url":null,"abstract":"This study examines a cell-free massive MIMO architecture for unmanned aerial vehicles (UAVs), It evaluates aerial access points (APs) coverage, performance, and data rate of the aerial cell-free network. It proposes deploying an aerial cell-free massive MIMO architecture to mitigate the effects of path loss and interference in aerial cellular networks. The analysis includes a 2-dimensional multi-armed bandit (MAB) model for beam selection optimized with machine learning and using millimeter-wave technology to analyze an aerial cell-free network that connects a HAPS (CPU/data network) with ground vehicles through UAV-based APs. The multi-armed bandit model incorporates 3GPP blockage stochastics, water-filling power allocation, and optimization of multi-user capacity. The results include the aerial cell-free model's comprehensive geometric and radio link simulation analysis. The simulation outcomes demonstrate that the suggested cell-free network outperforms aerial cellular networks and NLOS terrestrial cell-free networks. Finally, we present a comparative study between our MAB model-based AI technique and a conventional non-AI technique, highlighting the significant performance improvements achieved by our approach.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 11","pages":"784-791"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunistic Protocols for People Counting in Dynamic Networks","authors":"Alexander Jung, Helge Parzyjegla, Peter Danielis","doi":"10.1109/CCNC51664.2024.10454785","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454785","url":null,"abstract":"In the modern world, accurate crowd counting is integral to a multitude of applications, including urban planning, transportation management, and crowd control. The advent of opportunistic communication networks, which enable devices to sporadically exchange data in a decentralized fashion, has introduced a new set of challenges in crowd estimation. This paper delves into two opportunistic people counting protocols: UrbanCount and HeartBeatCount. UrbanCount, while a robust protocol in its own right, comes with certain limitations that hinder its real-world applicability. In response to these limitations, this paper introduces refinements to UrbanCount, making it more practical and effective. Additionally, a novel protocol called HeartBeatCount is presented, which significantly enhances crowd size estimation accuracy, particularly in sparse scenarios. Through an evaluation, we compare the performance of these protocols and conclude that HeartBeatCount offers a more resilient solution for opportunistic people counting in various real-world scenarios.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"66 9","pages":"198-201"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of RoCE Protocol in Backhaul Systems for Ultra-High-Speed THz Wireless LAN","authors":"Norimasa Yafune, Kazuto Yano, Keiichiro Mori, Toshikazu Sakano","doi":"10.1109/CCNC51664.2024.10454796","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454796","url":null,"abstract":"In advancing society, large-capacity and high-speed communication network, to handle rich contents like ultra-high-definition video and large-capacity sensing information, is becoming important. Accomplishing these demands needs an ultrawide bandwidth wireless Local Area Network (LAN). Improvements in wireless transmission speeds are expected with the development of ultra-high-speed wireless technology such as terahertz (THz) communication. However, the rapid growth of ultra-high-speed wireless network technology places a considerable strain on the backhaul network. Therefore, improvements in wired network technology are indispensable to achieve higher speeds. We investigated RDMA technology used in data centers to speed up in THz wireless LAN. This paper presents the construction of a backhaul system to connect a network coordinator and interconnected access points. It also reports evaluation results of the proposed system, including a comparative analysis concerning RoCE, TCP, and UDP. Furthermore, the effect of switching processing on the overall throughput.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"26 1","pages":"811-814"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Distributed Processing Communication Scheme for Real-Time Applications over Wide-Area Networks","authors":"Sanetora Hiragi, Bijoy Chand Chatterjee, Eiji Oki, Akio Kawabata","doi":"10.1109/CCNC51664.2024.10454684","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454684","url":null,"abstract":"Low-delay networking and edge computing will enable mission-critical applications to be delivered over wide-area networks. We consider this trend to be the realization that all users can share an application space without feeling any distance difference. We propose a distributed processing scheme that keeps the order of event occurrence regardless of the distance between users and an application server. The proposed scheme can be applied to both optimistic synchronization algorithms (OSA) and conservative synchronization algorithms (CSA). In the proposed scheme, arrival events with a delay within a predefined set time (correction time) are sorted in order of occurrence before application processing. We formulate the proposed scheme as an integer linear programming (ILP) problem. The objective function of ILP consists of the number of users excluded from the delay quality, the amount of memory consumed for a rollback in OSA, and the maximum end-to-end delay. The three parts of the objective function are set weight and the sum of parts with weight is minimized. We evaluate the proposed scheme for 1000 users distributed in two types of network models. Numerical results indicate that the proposed scheme reduces memory consumption compared to that of the conventional OSA scheme. The proposed scheme works as CSA in which all events are sorted in the occurrence order if the correction time is set above the delay for the slowest event to arrive at the server.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"108 5","pages":"25-30"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Open-Loop Transmit Power Control for Scalable Cell-Free Networks","authors":"Keita Fukushima, Keiichi Mizutani, H. Harada","doi":"10.1109/CCNC51664.2024.10454839","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454839","url":null,"abstract":"Toward 6G, cell-free networks (CFN) are attracting attention as a solution to the problem of poor communication quality at the cell edge. In CFN, many access points are densely deployed and cooperatively operated as distributed MIMO systems. In uplink communication in CFN, transmit power control (TPC) is required to mitigate interference and ensure fairness between users. In this paper, we propose an open-loop TPC algorithm for CFN and evaluate its performance by computer simulation. As a result, an improvement of 55.0% in the fifth percentile spectral efficiency is achieved compared to the case without TPC while maintaining a higher average spectral efficiency.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"87 2","pages":"1074-1075"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACADEME: Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network","authors":"T. Vrind, Chandar Kumar, Debabrata Das","doi":"10.1109/CCNC51664.2024.10454698","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454698","url":null,"abstract":"In the 6G wireless network, there may be a communication architecture with three levels of systems: user equipment (UE), non-terrestrial aerial low altitude platform (LAP), and terrestrial base station with mobile edge computing (MEC). Co-inference is the intelligent sharing of the multiple computing layers in the AI/ML model amongst the UE, LAP, and MEC. Computing, storage, and power shared between the above systems for co-inference will bring several system-level advantages. Furthermore, it optimizes the required data traffic bandwidth, energy consumption, and end-to-end latency. The available literature has analyzed the optimal split point of the AI/ML model between UE and MEC (one wireless link). However, to the best of our knowledge, there is no study on the AI/ML split model in the case of UE, LAP, and MEC architectures with two wireless links (UE to LAP and LAP to MEC). In this paper, for the first time, we propose a novel device-edge co-inference with a LAP-based aerial cell having computing power. We present a novel Aerial Cell-Assisted Device-Edge co-inference ModEl (ACADEME) algorithm that optimally assigns layers to compute to UE, LAP, and MEC according to two wireless link characteristics to minimize power consumption and latency of inference. Through mathematical modelling and simulations, we show that the proposed coinference substantially reduces latency, i.e., by 47% through the selection of the two optimal split points of the AI/ML model, one each at the UE and the LAP-based aerial cell, respectively.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"70 3","pages":"1006-1009"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection","authors":"Alex Howe, Dale Peasley, Mauricio Papa","doi":"10.1109/CCNC51664.2024.10454841","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454841","url":null,"abstract":"This paper evaluates the use of graph neural network (GNN) based autoencoders for detecting network intrusions or anomalous traffic in Operational Technology (OT) networks. Traditional intrusion detection methods often struggle to capture the complex relationships and interdependencies found in OT network communications. These spatial relationships can provide information vital for identifying harder to detect attacks (i.e. Advanced Persistent Threats). GNNs are a machine learning technique which operate on graph-structured data and can be used to identify underlying patterns and relationships between the nodes. Graph autoencoders (GAEs) are an unsupervised GNN-based learning technique that incorporates an encoder-decoder architecture and can be used for anomaly detection in graph structured data. This work evaluates the use of graph autoencoders for detecting anomalous edges (extracted from packets) in OT network data. Additionally, we introduce a method for encoding raw network traffic into discrete temporal graphs which can be used to apply GAEs for real-time intrusion detection. The proposed network traffic encoding scheme incorporates multi-dimensional edge attributes in order to capture information for determining the relevance of a given network packet. The approach is evaluated using two OT network datasets each containing labeled examples of commonly encountered malicious attack traffic. Results are compared against baseline anomaly detection methods including K-Nearest Neighbors, Deep Autoencoders, and Isolation Forest. The proposed graph autoencoder outperforms the baseline cases in terms of detection accuracy achieving a 31.05% and 8.64% improvement in F1 scores over the baseline models on the two OT network datasets.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Achim Schade, Vu Nguyen, Cansu Gencoglu, Giang T. Nguyen, F. Fitzek
{"title":"Intuitive Robot Control with Data Gloves for Industrial Use Cases","authors":"Achim Schade, Vu Nguyen, Cansu Gencoglu, Giang T. Nguyen, F. Fitzek","doi":"10.1109/CCNC51664.2024.10454653","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454653","url":null,"abstract":"Human-robot interaction is crucial in various industries and domains, such as manufacturing, healthcare, and entertainment. Natural and intuitive interactions between humans and robots are crucial. Legacy controllers were designed for two-dimensional visual display and, therefore, suboptimal for interaction in three-dimensional space. Hand gesture recognition with camera-based systems is often hindered by visual obstruction. We demonstrate a hand gesture system leveraging data gloves with inertial measurement units (IMU). This demonstration focuses on gesture recognition quality, enhancing robustness and responsiveness. Audiences can observe and directly participate using the data glove to maneuver a robotic dog remotely in real-time.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"95 11","pages":"1114-1115"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Siddiqua, Siming Liu, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink
{"title":"TIM-MARL: Information Sharing for Multi-Agent Reinforcement Learning in Smart Environments","authors":"A. Siddiqua, Siming Liu, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink","doi":"10.1109/CCNC51664.2024.10454813","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454813","url":null,"abstract":"Information sharing among agents to jointly solve problems is challenging for multi-agent reinforcement learning algorithms (MARL) in smart environments. In this paper, we present a novel information sharing approach for MARL, which introduces a Team Information Matrix (TIM) that integrates scenario-independent spatial and environmental information combined with the agent's local observations, augmenting both individual agent's performance and global awareness during the MARL learning. To evaluate this approach, we conducted experiments on three multi-agent scenarios of varying difficulty levels implemented in Unity ML-Agents Toolkit. Experimental results show that the agents utilizing our TIM-Shared variation outperformed those using decentralized MARL and achieved comparable performance to agents employing centralized MARL.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"107 4","pages":"1044-1045"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation","authors":"Wenxin Chen, Yingfei Dong, Zhenhai Duan","doi":"10.1109/CCNC51664.2024.10454872","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454872","url":null,"abstract":"As many mobile devices use Global Navigation Satellite Systems (GNSSs) to determine their locations for control, compromising such systems can result in serious consequences, as shown by existing GPS spoofing attacks. However, most such spoofing attacks focus on the effect of a single spoofer attacking a single receiver. In this paper, we investigate the impacts of a single spoofer on multiple receivers, motivated by research on attacking drone swarms. Our analysis independently shows that, using a single spoofer, multiple receivers at different locations in a spoofing area will see the same location reading. We consider the base case of spoofing four satellites and also the generic case when more satellites are involved in the spoofing attack. More importantly, we conduct real-world experiments to validate our analysis and demonstrate the potential threats to many practical applications. We use off-the-shelf SDR cards for spoofing and consumer GPS receivers for obtaining spoofed location readings. While this method can enable various attacks on mobile devices depending on GPS, it is also applicable to all existing GNSSs, because they use similar principles to determine locations.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"106 2","pages":"127-134"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}