Zhonglin Sun, Yannis Spyridis, Achilleas Sesis, G. Efstathopoulos, Elisavet Grigoriou, T. Lagkas, P. Sarigiannidis
{"title":"Intentional Islanding of Power Systems Through Self-Embedding Learning","authors":"Zhonglin Sun, Yannis Spyridis, Achilleas Sesis, G. Efstathopoulos, Elisavet Grigoriou, T. Lagkas, P. Sarigiannidis","doi":"10.1109/GCWkshps52748.2021.9682069","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682069","url":null,"abstract":"Intentional islanding is a procedure to divide the electrical grid into several parts to guarantee the stability of a system in the case of failure. This study provides an unsupervised deep neural network to deal with the issue of intentional islanding. We propose to use a self-learning neural network to improve the generalisation performance of the islanding task. In addition, we use a merging technology to assign isolated buses to their neighbour's label. Experiments are carried out on several grid cases to illustrate the effect of our solution.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"2016 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86130343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. A. Al-Mohammed, A. Al-Ali, E. Yaacoub, K. Abualsaud, T. Khattab
{"title":"Detecting Attackers during Quantum Key Distribution in IoT Networks using Neural Networks","authors":"H. A. Al-Mohammed, A. Al-Ali, E. Yaacoub, K. Abualsaud, T. Khattab","doi":"10.1109/GCWkshps52748.2021.9681988","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681988","url":null,"abstract":"Internet of Things (IoT) deployments face significant security challenges due to the limited energy and computational power of IoT devices. These challenges are more serious in the quantum communications era, where certain attackers might have quantum computing capabilities, which renders IoT devices more vulnerable. This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers, while considering the use case of sensors deployed in railroad networks. Neural Network (NN) techniques are proposed in order to detect the presence of an attacker during QKD without the need to disrupt the key distribution process. The results show that the proposed techniques can reach 99% accuracy.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"97 8","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91400551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Min Zhu, David G. M. Mitchell, M. Lentmaier, D. Costello
{"title":"Modeling a Sliding Window Decoder for Spatially Coupled LDPC Codes","authors":"Min Zhu, David G. M. Mitchell, M. Lentmaier, D. Costello","doi":"10.1109/GCWkshps52748.2021.9682064","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682064","url":null,"abstract":"Due to their capacity achieving performance with sliding window decoding (SWD), spatially coupled LDPC (SC-LDPC) codes are emerging as candidates for next generation channel coding applications. In this paper we present a general model of SWD of SC-LDPC codes and develop an analysis that allows us to estimate error probability performance under decoder error propagation conditions that can occur when low latency operation is desired. We also show how the model parameters can be estimated and indicate how the model can be used to predict the performance of code doping techniques used to mitigate the effects of decoder error propagation.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87185876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Changqing Song, Lizhi Qin, Hongzhi Zhao, S. Shao, Youxi Tang
{"title":"Secrecy Degradation for Inevitable Phase Noise in Artificial Noise Shielded FH Systems","authors":"Changqing Song, Lizhi Qin, Hongzhi Zhao, S. Shao, Youxi Tang","doi":"10.1109/GCWkshps52748.2021.9682033","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682033","url":null,"abstract":"This paper adopts an artificial noise (AN) shielded frequency hopping (FH) architecture to counteract both wire-tapping and hostile attack, but the inevitable phase noise will degrade both the AN cancellation and secrecy performance. Considering this, first, the AN cancellation performance is analyzed by separating the received AN into the cancellable common phase component (CPC) and non-cancellable inter-carrier interference (ICI). On top of this, the system secrecy is analyzed via secrecy capacity, and the secrecy degradation for phase noise is extracted in terms of 3 dB coherence bandwidth of the adopted oscillators, transmitting power ratio of AN to expected signal (ES), propagation channel quality, and parameter estimation period. Numerical and simulation results show that phase noise will degrade both the AN cancellation and secrecy performance, and this degradation can be diminished by shortening the parameter estimation period, optimizing the power ratio of AN to ES, and improving the propagation channel quality.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"56 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87243501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive RF Dataset Collection and Release: A Deep Learning-Based Device Fingerprinting Use Case","authors":"Abdurrahman Elmaghbub, B. Hamdaoui","doi":"10.1109/GCWkshps52748.2021.9682024","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682024","url":null,"abstract":"Deep learning-based RF fingerprinting has recently been recognized as a potential solution tor enabling newly emerging wireless network applications, such as spectrum access policy enforcement, automated network device authentication, and unauthorized network access monitoring and control. Real, comprehensive RF datasets are now needed more than ever to enable the study, assessment, and validation of newly developed RF fingerprinting approaches. In this paper, we present nod release a large-scale RF fingerprinting dataset, collected from 25 different LoRa-enabled IoT transmitting devices using USRP B210 receivers. Our dataset consists of a large number of SigMF- compliant binary files representing the I/Q time-domain samples and their corresponding FFT-based files of LoRa transmissions. This dataset provides a comprehensive set of essential experimental scenarios, considering both indoor and outdoor environments and various network deployments and configurations, such as the distance between the transmitters and the receiver, the configuration of the considered LoRa modulation, the physical location of the conducted experiment, and the receiver hardware used for training and testing the neural network models.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"4 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90282644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symbol-Level Precoding and Passive Beamforming Design for IRS-Aided Cognitive Radio Networks","authors":"Guangyang Zhang, Chao Shen, B. Ai, Z. Zhong","doi":"10.1109/GCWkshps52748.2021.9681951","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681951","url":null,"abstract":"In this paper, we consider a joint beamforming design in a cognitive radio (CR) network aided with an intelligent reflecting surface (IRS) panel. The symbol-level precoding (SLP) is adopted at the base station to enhance the symbol error rate (SER) performance of the network. The joint beamforming design is formulated as a nonconvex optimization problem to achieve max-min fairness in the secondary network subject to the interference temperature constraints, the maximum power constraint, and the constant modulus constraints over the passive beamformer. To solve this problem with the coupling between variables, we propose an algorithm based on the alternating optimization (AO) technique, and then two subproblems can be obtained to optimize the transmit and passive beamformers alternately. Specifically, a penalized successive convex approximation (P-SCA) method is developed to optimize the passive beamformer. The simulation results demonstrate that the SLP technique can further enhance the system performance in terms of signal-to-interference-plus-noise ratio (SINR) compared with the conventional block-level precoding.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85661166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Chamkhia, A. Erbad, A. Al-Ali, Amr Mohamed, A. Refaey, M. Guizani
{"title":"Security Performance Analysis of a Health System using Hybrid NOMA-OMA based IoT System","authors":"H. Chamkhia, A. Erbad, A. Al-Ali, Amr Mohamed, A. Refaey, M. Guizani","doi":"10.1109/GCWkshps52748.2021.9682100","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682100","url":null,"abstract":"Internet of Things (IoT) systems have been playing a significant role in improving the quality of various applications and services. With the expansion increase of loT devices and users, different Multiple Access (MA) techniques have been proposed to overcome the spectrum scarcity and the high latency. However, in MA-based loT systems, communication is not only threatened by external eavesdroppers but also by untrusted internal users. Therefore, proposing secured MA-based loT systems is of high importance. This paper proposes a hybrid Non Orthogonal Multiple Access (NOMA) I Orthogonal Multiple Access (OMA)-based loT system to improve the data transmission security. The proposed scheme exploits the advantages of the two different MA techniques as well as the Physical Layer Security (PLS). We first describe the system model and then we detail the proposed scheme and the relevant performance analysis. Finally, our simulation results verify the accuracy of the derived expressions and evaluate the advantage of the proposed scheme, when compared to the pure NOMA and pure OMA-based loT systems.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74023980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abderrazak Abdaoui, A. Erbad, A. Al-Ali, Amr Mohamed, M. Guizani
{"title":"A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT","authors":"Abderrazak Abdaoui, A. Erbad, A. Al-Ali, Amr Mohamed, M. Guizani","doi":"10.1109/GCWkshps52748.2021.9682030","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682030","url":null,"abstract":"Emerging technologies change the qualities of modern healthcare by employing smart systems for patient monitoring. To well use the data surrounding the patient, tiny sensing devices and smart gateways are involved. These sensing systems have been used to collect and analyze the real-time data remotely in Internet of Medical Thinks (IoM). Since the patient sensed information is so sensitive, the security and privacy of medical data are becoming challenging problem in IoM. It is then important to ensure the security, privacy and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for the IoM. In this paper, in order to improve the authentication and communications in health care applications, we present a novel secure and anonymous authentication scheme. We will use elliptic curve cryptography (ECC) with random numbers generated by fuzzy logic. We simulate IoM scheme using network simulator 3 (NS3) and we employ optimized link state routing protocol (OLSR) algorithm and ECC at each node of the network. We apply some attack algorithms such as Pollard’s ρ and Baby-step Giant-step to evaluate the vulnerability of the proposed scheme.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"65 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75038959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Particle Swarm Optimized Federated Learning For Securing IoT Devices","authors":"P. Kishore, S. Barisal, D. Mohapatra","doi":"10.1109/GCWkshps52748.2021.9681946","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9681946","url":null,"abstract":"Federated learning (FL) focuses on interpreting optimization, privacy, and communication but pays little consideration to enhance training and results on the edge devices. The major challenge on these Internet of Things (IoT) devices is efficient training and inference. Another considerable challenge is securing IoT devices for a long time. This paper resolves it by selecting appropriate parameters for building a local machine learning or deep learning (ML/DL) model. Appropriate parameters will make the model's training less computationally expensive and secure the edge or IoT device. So, we propose a particle swarm optimization (PSO) method to optimize the hyper-parameter environments for the bounded DL model in an FL environment. First, we select the 2-gram represented Application Programming Interface (API) calls of the malicious and benign instances for the dataset's feature. Then, API calls of the sample are represented using 2-gram, and their frequency fills the dataset's rows. Later, we represent the sample's feature in a grayscale image and apply the LeNet-5 model. Our experiment indicates that PSO efficiently tunes the hyperparameters of LeNet-5 compared to the grid search method. The near-optimal parameters for FL do not affect the model's accuracy.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"60 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75119705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ergodic Capacity Analysis of Large Intelligent Surface Assisted MIMO Systems","authors":"Marjan Abbasi Mosleh, F. Héliot, R. Tafazolli","doi":"10.1109/GCWkshps52748.2021.9682121","DOIUrl":"https://doi.org/10.1109/GCWkshps52748.2021.9682121","url":null,"abstract":"Meta-material-based antenna designs, such as large intelligent surface (LIS), are expected to be a game changer in future wireless cellular systems, since they provide a simple yet effective mean of drastically improving the wireless propagation environment. This paper investigates the ergodic capacity of LIS-aided multiple input multiple output (MIMO), a.k.a. MIMO-LIS, systems. To this end, the derivation of the probability density function (pdf) of the cascaded channel, i.e. the transmitter-to-LIS-to-receiver channel, is studied. Moreover, both high signal-to-noise ratio (SNR) asymptotic expression and closed-form approximations of this ergodic capacity are provided. Monte-Carlo simulations graphically validate the correctness and accuracy of our various expressions, for different antenna configurations. Furthermore, our performance analysis shows that the MIMO-LIS system outperforms both MIMO-AF and MIMO systems (by more than 60% and 15% respectively, at a 30 dB SNR) from an ergodic capacity point of view, which confirms that LIS can be beneficial for improving the propagation environment.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"26 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74487375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}