查看更多>>摘要:Urban crowdsourced transportation, which can solve traffic problem within city, is a new scenario where citizens share vehicles to take passengers and packages while driving. Differing from the traditional location based crowdsourcing system (e.g., crowdsensing system), the task has to be completed with visiting two different locations (i.e., start and end points), so task allocation algorithms in crowdsensing cannot be leveraged in urban crowdsourced transportation directly. To solve this problem, we first prove that maximizing the crowdsourcing system's profit (i.e., maximizing the total saved distance) is an NP-hard problem. We propose a heuristic greedy algorithm called Saving Most First (SMF) which is simple and effective in assigning tasks. Then, an optimized SMF based genetic algorithm (SMF-GA) is devised to jump out of the local optimal result. Finally, we demonstrate the performance of SMF and SMF-GA with extensive evaluations, based on a large scale real vehicle traces. The evaluation with large scale real dataset indicates that both SMF and SMF-GA algorithms outperform other benchmark algorithms in terms of saved distance, participant profits, etc.
查看更多>>摘要:Monitoring physical assault is critical for the prevention of juvenile delinquency and promotion of school harmony. A large portion of assault events, particularly school violence among teenagers, usually happen at indoor secluded places. Pioneering approaches employ always-on-body sensors or cameras in the limited surveillance area, which are privacy-invasive and cannot provide ubiquitous assault monitoring. In this paper, we present Wi-Dog, a noninvasive physical assault monitoring scheme that enables privacy-preserving monitoring in ubiquitous circumstances. Wi-Dog is based on widely deployed commodity Wi-Fi infrastructures. The key intuition is that Wi-Fi signals are easily distorted by human motions, and motion-induced signals could convey informative characteristics, such as intensity, regularity, and continuity. Specifically, to explicitly reveal the substantive properties of physical assault, we innovatively propose a set of signal processing methods for informative components extraction by selecting sensitive antenna pairs and subcarriers. Then a novel signal-complexity-based segmentation method is developed as a location-independent indicator to monitor targeted movement transitions. Finally, holistic analysis is employed based on domain knowledge, and we distinguish the violence process from both local and global perspective using time-frequency features. We implement Wi-Dog on commercial Wi-Fi devices and evaluate it in real indoor environments. Experimental results demonstrate the effectiveness of Wi-Dog which consistently outperforms the advanced abnormal detection methods with a higher true detection rate of 94% and a lower false alarm rate of 8%.
查看更多>>摘要:In Sept. 2015, the International Telecommunication Union-Radiocommunications Standardization Sector (ITU-R) has released the service recommendations of the fifth generation (5G) mobile networks known as International Mobile Telecommunications 2020 (IMT-2020). Instead of solely boosting the data rates, like the past evaluations from IMT-2000 to IMT-Advanced, an IMT-2020 system shall support three categories of wireless scenarios, including enhanced mobile broadband (eMBB), ultra-reliability and low latency communication (URLLC), and massive machine-type communication (mMTC), to sustain the 20 Gbps peak data rate, 100 Mbps user experienced data rate, 10 Mbps/m~2 area traffic capacity, 10~6 devices/km~2 connection density, 1 ms latency, and 500 km/hr mobility. To compete for being an IMT-2020 system, 3GPP consequently launched the normative works of "New Radio (NR)" in Release 15 and Release 16. In Jun. 2018, Phase I normative work of NR (i.e., Release 15) has completed, and Phase II (i.e., Release 16) has subsequently begun. The feature technologies in NR thus include communications using millimeter/centimeter wave carriers (spectrum above 6 GHz), nonorthogonal multiple access (NOMA), advanced vehicle-to-everything (V2X), directional transmission/reception, software-defined network (SDN), etc.
查看更多>>摘要:Mobile fog computing (MFC) is an emerging paradigm that extends cloud computing (CC) by adding a new layer between the cloud and its end users. With the cloud-aware MFC, the cloud can pre-push certain important resources to the fog to reduce the networking latency and release the traffic burden over the links. The end user then is able to perform offline computing on the fog layer so that only the important results need to be delivered to and stored in the cloud. Moreover, the dense geographical deployment of fog servers enables the system to be aware of the end user's location. Therefore, some location-sensitive applications could be well supported by the fog-aided cloud systems. Note that the cloud-aware MFC is different from the mobile edge computing (MEC), another promising technology for overcoming the shortcomings of CC, since MFC is able to jointly work with the cloud, but MEC is usually defined by the exclusion of CC. Specifically, in MEC, computing applications, data, and services are pushed away from the centralized nodes to the network edge, which enables network edge to run in an isolated environment from the rest of the network and provides access to local resources and data. In contrast, MFC provides not only a system-level horizontal architecture but also a new way to distribute, orchestrate, and manage secure resources across the network rather than just performing computing at the network edge.
Thomas HausteinRicardo SantosKonstantin KoslowskiJulian Daube...
24页
查看更多>>摘要:Future mobile data traffic predictions expect a significant increase in user data traffic, requiring new forms of mobile network infrastructures. Fifth generation (5G) communication standards propose the densification of small cell access base stations (BSs) in order to provide multigigabit and low latency connectivity. This densification requires a high capacity backhaul network. Using optical links to connect all the small cells is economically not feasible for large scale radio access networks where multiple BSs are deployed. A wireless backhaul formed by a mesh of millimeter-wave (mmWave) links is an attractive mobile backhaul solution, as flexible wireless (multihop) paths can be formed to interconnect all the access BSs. Moreover, a wireless backhaul allows the dynamic reconfiguration of the backhaul topology to match varying traffic demands or adaptively power on/off small cells for green backhaul operation. However, conducting and precisely controlling reconfiguration experiments over real mmWave multihop networks is a challenging task. In this paper, we develop a Software-Defined Networking (SDN) based approach to enable such a dynamic backhaul reconfiguration and use real-world mmWave equipment to setup a SDN-enabled mmWave testbed to conduct various reconfiguration experiments. In our approach, the SDN control plane is not only responsible for configuring the forwarding plane but also for the link configuration, antenna alignment, and adaptive mesh node power on/off operations. We implement the SDN-based reconfiguration operations in a testbed with four nodes, each equipped with multiple mmWave interfaces that can be mechanically steered to connect to different neighbors. We evaluate the impact of various reconfiguration operations on existing user traffic using a set of extensive testbed measurements. Moreover, we measure the impact of the channel assignment on existing traffic, showing that a setup with an optimal channel assignment between the mesh links can result in a 44% throughput increase, when compared to a suboptimal configuration.
Miguel A. Rodriguez-HernandezZhuhan JiangAngel Gomez-SacristanVicent Pla...
10页
查看更多>>摘要:The monitoring of cultural heritage is becoming common in cities to provide heritage preservation and prevent vandalism. Using sensors and video cameras for this task implies the need to transmit information. In this paper, the teletraffic that cameras and sensors generate is characterized and the transmissions' influence on the municipal communications network is evaluated. Then, we propose models for telecommunication traffic sources in an intelligent municipal heritage management service inside a smart sustainable city. The sources were simulated in a smart city scenario to find the proper quality of service (QoS) parameters for the communication network, using Valencia City as background. Specific sensors for intelligent municipal heritage management were selected and four telecommunication traffic sources were modelled according to real-life requirements and sensors datasheet. Different simulations were performed to find the proper CIR (Committed Information Rate) and PIR (Peak Information Rate) values and to study the effects of limited bandwidth networks. Packet loss, throughput, delay, and jitter were used to evaluate the network's performance. Consequently, the result was the selection of the minimum values for PIR and CIR that ensured QoS and thus optimized the traffic telecommunication costs associated with an intelligent municipal heritage management service.
查看更多>>摘要:Currently, communications in the vehicular ad hoc network (VANET) can be established via both Dedicated Short Range Communication (DSRC) and mobile cellular networks. To make use of existing Long Term Evolution (LTE) network in data transmissions, many methods are proposed to manage VANETs. Grouping the vehicles into clusters and organizing the network by clusters are one of the most universal and most efficacious ways. Since the high mobility of vehicles makes VANETs different from other mobile ad hoc networks (MANETs), the previous cluster-based methods for MANETs may have trouble for VANETs. In this paper, we introduce a center-based clustering algorithm to help self-organized VANETs forming stable clusters and decrease the status change frequency of vehicles on highways and two metrics. A novel Cluster Head (CH) selection algorithm is also proposed to reduce the impact of vehicle motion differences. We also introduce two metrics to improve the security of VANETs. A simulation is conducted to compare our mechanism to some other mechanisms. The results show that our mechanism obtains high stability and lower packet loss rate.
查看更多>>摘要:O2 is a communication protocol for music systems that extends and interoperates with the popular Open Sound Control (OSC) protocol. Many computer musicians routinely deal with problems of interconnection, unreliable message delivery, and clock synchronization. O2 solves these problems, offering named services, automatic network address discovery, clock synchronization, and a reliable message delivery option, as well as interoperability with existing OSC libraries and applications. Aside from these new features, O2 owes much of its design to OSC, making it easy to migrate existing OSC applications to O2 or for developers familiar with OSC to begin using O2. O2 addresses the problems of interprocess communication within distributed music applications.
查看更多>>摘要:Recently, D/DoS attacks have been launched by zombie IoT devices in smart home networks. They pose a great threat to network systems with Application Layer DDoS attacks being especially hard to detect due to their stealth and seemingly legitimacy. In this paper, we propose ForChaos, a lightweight detection algorithm for IoT devices, which is based on forecasting and chaos theory to identify flooding and DDoS attacks. For every time-series behaviour collected, a forecasting-technique prediction is generated, based on a number of features, and the error between the two values is calculated. In order to assess the error of the forecasting from the actual value, the Lyapunov exponent is used to detect potential malicious behaviour. In NS-3 we evaluate our detection algorithm through a series of experiments in flooding and slow-rate DDoS attacks. The results are presented and discussed in detail and compared with related studies, demonstrating its effectiveness and robustness.
查看更多>>摘要:The telecommunication infrastructure in emergency scenarios is necessarily composed of heterogeneous radio/mobile portions. Mobile Nodes (MNs) equipped with multiple network interfaces can assure continuous communications when different Radio Access Networks (RANs) that employ different Radio Access Technologies (RATs) are available. In this context, the paper proposes the definition of a Decision Maker (DM), within the protocol stack of the MN, in charge of performing network selections and handover decisions. The DM has been designed to optimize one or more performance metrics and it is based on Multiattribute Decision Making (MADM) methods. Among several MADM techniques considered, taken from the literature, the work is then focused on the TOPSIS approach, which allows introducing some improvements aimed at reducing the computational burden needed to select the RAT to be employed. The enhanced method is called Dynamic-TOPSIS (D-TOPSIS). Finally, the numerical results, obtained through a large simulative campaign and aimed at comparing the performance and the running time of the D-TOPSIS, the TOPSIS, and the algorithms found in the literature, are reported and discussed.