2019 IEEE Global Communications Conference (GLOBECOM)最新文献

筛选
英文 中文
Cloud Database Encryption Technology Based on Combinatorial Encryption 基于组合加密的云数据库加密技术
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013204
Meng-yue Chen, Xiao Fu, B. Luo, Xiaojiang Du, M. Guizani
{"title":"Cloud Database Encryption Technology Based on Combinatorial Encryption","authors":"Meng-yue Chen, Xiao Fu, B. Luo, Xiaojiang Du, M. Guizani","doi":"10.1109/GLOBECOM38437.2019.9013204","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013204","url":null,"abstract":"Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is not guaranteed. In this paper, a database encryption technology is designed, which can balance the problem of information security and use efficiency well. In this paper, a simplified onion encryption model is designed and implemented, which can realize the full homomorphic encryption on the cloud database to a certain extent, and improve the efficiency of ciphertext operation to a certain extent. Keywords-cloud; database; full homomorphic encryption","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91002276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Max-Min Secrecy Rate for NOMA-Based UAV-Assisted Communications with Protected Zone 带保护区域的基于noma的无人机辅助通信的最大最小保密率
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013815
Zhisheng Yin, Min Jia, Wei Wang, Nan Cheng, Feng Lyu, Xuemin Shen
{"title":"Max-Min Secrecy Rate for NOMA-Based UAV-Assisted Communications with Protected Zone","authors":"Zhisheng Yin, Min Jia, Wei Wang, Nan Cheng, Feng Lyu, Xuemin Shen","doi":"10.1109/GLOBECOM38437.2019.9013815","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013815","url":null,"abstract":"In this paper, we study the secrecy provisioning downlink transmission in an aerial-assisted network, where the unmanned aerial vehicle (UAV) serves as an aerial platform to provide secure transmission for the mobile users (MUs) with coexist of Internet of Things (IoT) nodes (INs). Specifically, secure transmission is required for MUs to combat eavesdropping attacks and a desired successful transmission probability should be ensured for INs to receive the public instruction massages. To improve the secrecy rates (SRs) for MUs, we consider an eavesdropper-free area, i.e., protected zone, surrounding the UAV. With non-orthogonal multiple access (NOMA) for MUs, the power allocation to each MU is optimized to maximize the minimum secrecy rate of MUs within the protected zone, under the constraints of successful receiving probability requirements for INs. To solve this problem, we first prove that the max-min SR can be obtained when SRs of all users are equal, and then a dichotomy-based successive power allocation policy is proposed. Numerical results show that higher max-min secrecy rate can be achieved by our proposed power allocation policy than the traditional policy.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91104600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Physical Layer Security in Multiuser VLC Systems with a Randomly Located Eavesdropper 具有随机窃听器的多用户VLC系统的物理层安全性
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013592
Sunghwan Cho, Gaojie Chen, J. Coon
{"title":"Physical Layer Security in Multiuser VLC Systems with a Randomly Located Eavesdropper","authors":"Sunghwan Cho, Gaojie Chen, J. Coon","doi":"10.1109/GLOBECOM38437.2019.9013592","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013592","url":null,"abstract":"This paper proposes a secrecy enhancement mechanism for multiuser visible light communication (VLC) systems. Thanks to the inherent advantages of visible light that it cannot penetrate opaque walls and its channel gain largely depends on the distance, VLC systems can serve multiple users at a time with high security and dense spatial reuse. Nevertheless, in the presence of multiple users, the interference caused by other users' signals should be carefully considered when analyzing the secrecy rate and data rate performance measures. By employing a continuous LED model, we formulate an optimization problem to find the optimal set of LEDs that should be used for communication such that the average secrecy rate for the secured user is maximized while satisfying data rate requirements for the other ordinary users. Numerical results are provided to verify that the relative locations of multiple users, the spatial distribution of a random eavesdropper, and the required data rates are significant factors that affect the secrecy performance in multiuser VLC systems.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"776 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89458775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Robust Network Traffic Modeling Approach to Software Defined Networking 软件定义网络的鲁棒网络流量建模方法
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013538
Liuwei Huo, Dingde Jiang, H. Song
{"title":"A Robust Network Traffic Modeling Approach to Software Defined Networking","authors":"Liuwei Huo, Dingde Jiang, H. Song","doi":"10.1109/GLOBECOM38437.2019.9013538","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013538","url":null,"abstract":"Software Defined Networking (SDN) architecture satisfies the flexibility and scalability requirements of Internet of Things (IoT) network. A large amounts of IoT data is transmitted and exchanged through IoT network. However, many of services of IoT are sensitive to latency and bandwidth, so the network traffic model and measurement in IoT are different legacy networks. In this paper, we propose a robust network traffic modeling approach and use it to estimate network traffic in IoT. To obtain the measurement results with low overhead and high accuracy, we model the network traffic as liner function with noise. Then, we collect the statistics of coarse-grained traffic of flows and fine-grained traffic of links, and use the robust network traffic model to forecast the network traffic with the coarse-grained measurement of flows. In order to optimize the estimation results, we propose an optimization function to decrease the estimation errors. Since the optimization function is NP-hard problem, then we use a heuristic algorithm to obtain the optimal solution of the fine-grained measurement. Finally, we conduct some simulations to verify the proposed measurement scheme. Simulation results show that our approach is feasible and effective.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89828179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Agent Deep Reinforcement Learning Based User Association for Dense mmWave Networks 基于多智能体深度强化学习的密集毫米波网络用户关联
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013751
Mohamed Sana, A. Domenico, E. Strinati
{"title":"Multi-Agent Deep Reinforcement Learning Based User Association for Dense mmWave Networks","authors":"Mohamed Sana, A. Domenico, E. Strinati","doi":"10.1109/GLOBECOM38437.2019.9013751","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013751","url":null,"abstract":"Finding the optimal association between users and base stations that maximizes the network sum-rate is a complex task. This problem is combinatorial and non-convex, and is even more challenging in millimeter-wave networks due to beamforming, blockages, and severe path loss. Despite the interest that this problem has gained over the last years, the various solutions proposed so far in the literature still fail at being flexible, computationally effective, and suitable to the dynamic nature of mobile networks. This paper addresses these issues with a novel distributed algorithm based on multi-agent reinforcement learning. More specifically, we model each user as an agent, which, at each time step, maps its observations to an action corresponding to an association request to a base station in its coverage range. Our numerical results show that the proposed solution offers near optimal performance and thanks to its flexibility, provides large sum-rate gain with respect to the state-of-art approaches.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89896603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cooperative Detection for Ambient Backscatter Assisted Generalized Spatial Modulation 环境后向散射辅助广义空间调制的协同检测
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014316
Zhe Ma, F. Gao, Jing Jiang, Ying-Chang Liang
{"title":"Cooperative Detection for Ambient Backscatter Assisted Generalized Spatial Modulation","authors":"Zhe Ma, F. Gao, Jing Jiang, Ying-Chang Liang","doi":"10.1109/GLOBECOM38437.2019.9014316","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014316","url":null,"abstract":"In this paper, we propose a Bayesian cooperative detection algorithm for ambient backscatter assisted generalized spatial modulation (AB-GSM) system, which recovers information from both the ambient backscatter sensor (ABS) and the generalized spatial modulation (GSM) source. To exploit the inherent sparsity of GSM, we adopt a two-layer hierarchical prior model for source symbol. Moreover, we derive linear detectors for comparison. Simulation results show that the proposed algorithm can achieve a superior detection accuracy than linear detectors in under-determined AB-GSM systems.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89900840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AZUPT: Adaptive Zero Velocity Update Based on Neural Networks for Pedestrian Tracking 基于神经网络的行人跟踪自适应零速度更新
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9014070
Xinguo Yu, Ben Liu, Xinyue Lan, Zhuoling Xiao, Shuisheng Lin, Bo Yan, Liang Zhou
{"title":"AZUPT: Adaptive Zero Velocity Update Based on Neural Networks for Pedestrian Tracking","authors":"Xinguo Yu, Ben Liu, Xinyue Lan, Zhuoling Xiao, Shuisheng Lin, Bo Yan, Liang Zhou","doi":"10.1109/GLOBECOM38437.2019.9014070","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9014070","url":null,"abstract":"Zero Velocity Update (ZUPT) has played a key role in Pedestrian Dead Reckoning (PDR) with inertial measurement units (IMU). However, it is both crucial and difficult to determine ZUPT conditions given complex and varying motion types such as walking, fast walking or running, and different walking habits of distinct people, which have direct and significant impact on the tracking accuracy. In this research we proposed a model based on deep neural networks to determine moments when the ZUPT should be conducted. The proposed model ensures nearly identical performance regardless of different motion types. It has been demonstrated by extensive experiments conducted in three different scenarios that our model can work equally well with different pedestrians and walking patterns, enabling the wide use of PDR in real-world applications.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"3 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90023399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Efficient Method to Monitor Downlink Traffic for 4G and 5G Networks 一种监控4G和5G网络下行流量的有效方法
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013377
T. Ban, Alankrita Bhatt, Young-Han Kim
{"title":"An Efficient Method to Monitor Downlink Traffic for 4G and 5G Networks","authors":"T. Ban, Alankrita Bhatt, Young-Han Kim","doi":"10.1109/GLOBECOM38437.2019.9013377","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013377","url":null,"abstract":"This paper proposes a new scheme that allows the measurement of traffic loads of radio networks by decoding some information about the cell, such as downlink control information (DCI) broadcast on the physical downlink control channel (PDCCH). In the proposed scheme, a client decodes the entire DCI for all user equipments (UEs) with ongoing connections in a cell and extracts some information about the cell, such as the number of active UEs, the number of radio resources occupied, as well as the modulation and coding scheme used by each UE. Based on this information, mobile network carriers can measure exact traffic loads of cells preemptively without affecting ongoing connections. Contrary to an exhaustive searching scheme that attempts to decode DCI with all radio network temporary identifiers (RNTIs), the proposed scheme derives a small set of valid RNTIs by using an inverse function and attempts to decode DCI only with the valid RNTIs instead of the entire set of RNTIs. This reduction enables the client to recover the correct DCI with marginal computational complexity, which allows for real-time decoding of DCI. The simulation results show that the proposed scheme can significantly reduce the complexity required to decode the entire DCI in a cell, compared to the exhaustive searching scheme.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"5 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90879242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rate Maximization with Reinforcement Learning for Time-Varying Energy Harvesting Broadcast Channels 时变能量采集广播信道的强化学习速率最大化
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013583
Heasung Kim, W. Shin, Heecheol Yang, Nayoung Lee, Jungwoo Lee
{"title":"Rate Maximization with Reinforcement Learning for Time-Varying Energy Harvesting Broadcast Channels","authors":"Heasung Kim, W. Shin, Heecheol Yang, Nayoung Lee, Jungwoo Lee","doi":"10.1109/GLOBECOM38437.2019.9013583","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013583","url":null,"abstract":"In this paper, we consider a power allocation optimization technique for a time-varying fading broadcast channel in energy harvesting communication systems, in which a transmitter with a rechargeable battery transmits messages to receivers using the harvested energy. We first prove that the optimal online power allocation policy for the sum rate maximization of the transmitter is an increasing function of harvested energy, remaining battery, and each user's channel gain. We then construct an appropriate neural network by relying on increasing behavior of the optimal policy. This two-step approach, by using an effective function approximation as well as providing a fundamental guideline for neural network design, can prevent us from wasting the representational capacity of neural networks. On the basis of the neural network, we apply the policy gradient method to solve the power allocation problem. To validate the performance of our approach, we compare it with the closed-form the optimal policy in a partially observable Markov problem. Through further experiments, it is observed that our online solution achieves a performance close to the theoretical upper bound of the performance in a time-varying fading broadcast channel.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"45 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90962364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Incentive Mechanism and Relay Selection for D2D Relaying in Cellular Networks 蜂窝网络中D2D中继的激励机制与中继选择
2019 IEEE Global Communications Conference (GLOBECOM) Pub Date : 2019-12-01 DOI: 10.1109/GLOBECOM38437.2019.9013205
P. Mach, Zdenek Becvar, T. Spyropoulos
{"title":"Incentive Mechanism and Relay Selection for D2D Relaying in Cellular Networks","authors":"P. Mach, Zdenek Becvar, T. Spyropoulos","doi":"10.1109/GLOBECOM38437.2019.9013205","DOIUrl":"https://doi.org/10.1109/GLOBECOM38437.2019.9013205","url":null,"abstract":"The performance of the cell edge users (CUEs) can be improved if they transmit their data via suitable relay UEs (RUEs) exploiting device-to- device (D2D) communication. The critical aspect of the whole relaying concept is to offer convenient incentives for the RUEs to motivate them to act as relays. The contribution of this paper is twofold. First, we propose a new incentive mechanism for the RUEs that can exploit certain amount of resources allocated to the CUE. Depending on the preferences of users, the CUEs/RUEs can benefit from relaying in terms of capacity enhancement, reduction of energy consumption or both. In this respect, we provide a detailed analysis on how and when relaying is of benefit for both sides. Second, we propose a low-complexity greedy relay selection algorithm incorporating the incentive mechanism that increases capacity up to 32.1% and/or reduces energy consumption by up to 36.1% when compared to state-of-the-art schemes. Moreover, we show that the greedy approach gives close-to-optimal performance.","PeriodicalId":6868,"journal":{"name":"2019 IEEE Global Communications Conference (GLOBECOM)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89596721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信