当前期刊: arXiv - CS - Networking and Internet Architecture Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Machine Learning (ML) In a 5G Standalone (SA) Self Organizing Network (SON)
    arXiv.cs.NI Pub Date : 2020-11-24
    Srinivasan Sridharan

    Machine learning (ML) is included in Self-organizing Networks (SONs) that are key drivers for enhancing the Operations, Administration, and Maintenance (OAM) activities. It is included in the 5G Standalone (SA) system is one of the 5G communication tracks that transforms 4G networking to next-generation technology that is based on mobile applications. The research's main aim is to an overview of machine

    更新日期:2020-11-25
  • CCIC-WSN: An Architecture for Single Channel Cluster-based Information-Centric Wireless Sensor Networks
    arXiv.cs.NI Pub Date : 2020-11-24
    Muhammad Atif Ur Rehman; Rehmat Ullah; Byung-Seo Kim; Boubakr Nour; Spyridon Mastorakis

    The promising vision of Information-Centric Networking (ICN) and of its realization, Named Data Networking (NDN), has attracted extensive attention in recent years in the context of the Internet of Things (IoT) and Wireless Sensor Networks (WSNs). However, a comprehensive NDN/ICN-based architectural design for WSNs, including specially tailored naming schemes and forwarding mechanisms, has yet to be

    更新日期:2020-11-25
  • Minimal Virtual Machines on IoT Microcontrollers: The Case of Berkeley Packet Filters with rBPF
    arXiv.cs.NI Pub Date : 2020-11-24
    Koen Zandberg; Emmanuel Baccelli

    Virtual machines (VM) are widely used to host and isolate software modules. However, extremely small memory and low-energy budgets have so far prevented wide use of VMs on typical microcontroller-based IoT devices. In this paper, we explore the potential of two minimal VM approaches on such low-power hardware. We design rBPF, a register-based VM based on extended Berkeley Packet Filters (eBPF). We

    更新日期:2020-11-25
  • InTAS -- The Ingolstadt Traffic Scenario for SUMO
    arXiv.cs.NI Pub Date : 2020-11-24
    Silas C. Lobo; Stefan Neumeier; Evelio M. G. Fernandez; Christian Facchi

    Vehicular Ad Hoc Networks (VANETs) are expected to be the next big step towards safer road transport, supporting applications to exchange information between vehicles. To develop novel applications for this area a high number of tests, considering all traffic situations, are demanded. However, it is unfeasible to reproduce these tests in real life, by the fact that any failure on the applications would

    更新日期:2020-11-25
  • Energy-Efficient Resource Allocation in Multi-UAV-Assisted Two-Stage Edge Computing for Beyond 5G Networks
    arXiv.cs.NI Pub Date : 2020-11-24
    Nway Nway Ei; Madyan Alsenwi; Yan Kyaw Tun; Zhu Han; Choong Seon Hong

    Unmanned aerial vehicle (UAV)-assisted multi-access edge computing (MEC) has become one promising solution for energy-constrained devices to meet the computation demand and the stringent delay requirement. In this work, we investigate a multiple UAVs-assisted two-stage MEC system in which the computation-intensive and delay-sensitive tasks of mobile devices (MDs) are cooperatively executed on both

    更新日期:2020-11-25
  • Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3
    arXiv.cs.NI Pub Date : 2020-11-24
    Gabriele Restuccia; Hannes Tschofenig; Emmanuel Baccelli

    Similarly to elsewhere on the Internet, practical security in the Internet of Things (IoT) is achieved by combining an array of mechanisms, at work at all layers of the protocol stack, in system software, and in hardware. Standard protocols such as Datagram Transport Layer Security (DTLS 1.2) and Transport Layer Security (TLS 1.2) are often recommended to secure communications to/from IoT devices.

    更新日期:2020-11-25
  • Efficient Broadcast for Timely Updates in Mobile Networks
    arXiv.cs.NI Pub Date : 2020-11-23
    Yu-Pin Hsu

    This letter considers a wireless network where an access point (AP) broadcasts timely updates to several mobile users. The timeliness of information owned by a user is characterized by the recently proposed age of information. While frequently broadcasting the timely updates and always using the maximum power can minimize the age of information for all users, that wastes valuable communication resources

    更新日期:2020-11-25
  • MAC for Machine Type Communications in Industrial IoT -- Part II: Scheduling and Numerical Results
    arXiv.cs.NI Pub Date : 2020-11-22
    Jie GaoSherman; Mushu LiSherman; Weihua ZhuangSherman; XueminSherman; Shen; Xu Li

    In the second part of this paper, we develop a centralized packet transmission scheduling scheme to pair with the protocol designed in Part I and complete our medium access control (MAC) design for machine-type communications in the industrial internet of things. For the networking scenario, fine-grained scheduling that attends to each device becomes necessary, given stringent quality of service (QoS)

    更新日期:2020-11-25
  • MAC for Machine Type Communications in Industrial IoT -- Part I: Protocol Design and Analysis
    arXiv.cs.NI Pub Date : 2020-11-22
    Jie GaoSherman; Weihua ZhuangSherman; Mushu LiSherman; XueminSherman; Shen; Xu Li

    In this two-part paper, we propose a novel medium access control (MAC) protocol for machine-type communications in the industrial internet of things. The considered use case features a limited geographical area and a massive number of devices with sporadic data traffic and different priority types. We target at supporting the devices while satisfying their quality of service (QoS) requirements with

    更新日期:2020-11-25
  • On Connectivity-Aware Distributed Mobility Models for Area Coverage in Drone Networks
    arXiv.cs.NI Pub Date : 2020-11-22
    Mustafa Tosun; Umut Can Cabuk; Vahid Khalilpour Akram; Orhan Dagdeviren

    Drone networks are becoming increasingly popular in recent years and they are being used in many applications such as area coverage, delivery systems, military operations, etc. Area coverage is a broad family of applications where a group of connected drones collaboratively visit the whole or parts of an area to fulfill a specific objective and is widely being researched. Accordingly, different mobility

    更新日期:2020-11-25
  • BigBen: Telemetry Processing for Internet-wide Event Monitoring
    arXiv.cs.NI Pub Date : 2020-11-22
    Meenakshi Syamkumar; Yugali Gullapalli; Wei Tang; Paul Barford; Joel Sommers

    This paper describes BigBen, a network telemetry processing system designed to enable accurate and timely reporting of Internet events (e.g., outages, attacks and configuration changes). BigBen is distinct from other Internet-wide event detection systems in its use of passive measurements of Network Time Protocol (NTP) traffic. We describe the architecture of BigBen, which includes (i) a distributed

    更新日期:2020-11-25
  • Analysis of Movement-Based Connectivity Restoration Problem in Wireless Ad-Hoc and Sensor Networks
    arXiv.cs.NI Pub Date : 2020-11-21
    Umut Can Cabuk; Vahid Khalilpour Akram; Orhan Dagdeviren

    Topology control, including topology construction and maintenance phases, is a vital conception for wireless ad-hoc networks of any kind, expressly the wireless sensor networks (WSN). Topology maintenance, the latter phase, concerns several problems, such as optimizing the energy consumption, increasing the data rate, making clusters, and sustaining the connectivity. A disconnected network, among other

    更新日期:2020-11-25
  • Efficient Neural Network Implementation with Quadratic Neuron
    arXiv.cs.NI Pub Date : 2020-11-21
    Zirui Xu; Jinjun Xiong; Fuxun Yu; Xiang Chen

    Previous works proved that the combination of the linear neuron network with nonlinear activation functions (e.g. ReLu) can achieve nonlinear function approximation. However, simply widening or deepening the network structure will introduce some training problems. In this work, we are aiming to build a comprehensive second-order CNN implementation framework that includes neuron/network design and system

    更新日期:2020-11-25
  • Managing Latency in Edge-Cloud Environment
    arXiv.cs.NI Pub Date : 2020-11-23
    Lubomír Bulej; Tomáš Bureš; Adam Filandr; Petr Hnětynka; Iveta Hnětynkova; Jan Pacovský; Gabor Sandor; Ilias Gerostathopoulos

    Modern Cyber-physical Systems (CPS) include applications like smart traffic, smart agriculture, smart power grid, etc. Commonly, these systems are distributed and composed of end-user applications and microservices that typically run in the cloud. The connection with the physical world, which is inherent to CPS, brings the need to operate and respond in real-time. As the cloud becomes part of the computation

    更新日期:2020-11-25
  • LSTM-based Traffic Load Balancing and Resource Allocation for an Edge System
    arXiv.cs.NI Pub Date : 2020-11-20
    Thembelihle Dlamini; Sifiso Vilakati

    The massive deployment of small cell Base Stations (SBSs) empowered with computing capabilities presents one of the most ingenious solutions adopted for 5G cellular networks towards meeting the foreseen data explosion and the ultra-low latency demanded by mobile applications. This empowerment of SBSs with Multi-access Edge Computing (MEC) has emerged as a tentative solution to overcome the latency

    更新日期:2020-11-25
  • Deep Smartphone Sensors-WiFi Fusion for Indoor Positioning and Tracking
    arXiv.cs.NI Pub Date : 2020-11-21
    Leonid Antsfeld; Boris Chidlovskii; Emilio Sansano-Sansano

    We address the indoor localization problem, where the goal is to predict user's trajectory from the data collected by their smartphone, using inertial sensors such as accelerometer, gyroscope and magnetometer, as well as other environment and network sensors such as barometer and WiFi. Our system implements a deep learning based pedestrian dead reckoning (deep PDR) model that provides a high-rate estimation

    更新日期:2020-11-25
  • Long Short Term Memory Networks for Bandwidth Forecasting in Mobile Broadband Networks under Mobility
    arXiv.cs.NI Pub Date : 2020-11-20
    Konstantinos Kousias; Apostolos Pappas; Ozgu Alay; Antonios Argyriou; Michael Riegler

    Bandwidth forecasting in Mobile Broadband (MBB) networks is a challenging task, particularly when coupled with a degree of mobility. In this work, we introduce HINDSIGHT++, an open-source R-based framework for bandwidth forecasting experimentation in MBB networks with Long Short Term Memory (LSTM) networks. We instrument HINDSIGHT++ following an Automated Machine Learning (AutoML) paradigm to first

    更新日期:2020-11-23
  • Low-Complexity Angle-Domain MIMO NOMA System with partial channel state information for MmWave Communications *
    arXiv.cs.NI Pub Date : 2020-11-20
    Israa KhaledIMT Atlantique - ELEC, LU; Charlotte LanglaisIMT Atlantique - ELEC; Ammar FalouLU; Bachar ElhassanLU; Michel JezequelIMT Atlantique - ELEC

    In millimeter-wave communication, digital beamsteering (DBS), only based on the user direction, is a promising angle-domain multi-antenna technique to mitigate the severe path loss and multiuser interference, with low-complexity and partial channel state information (CSI). In this paper, we design a power-domain non-orthogonal multiple access (NOMA) scheme that enhances the DBS performance trading-off

    更新日期:2020-11-23
  • Reliability Enhancement for VR Delivery in Mobile-Edge Empowered Dual-Connectivity $μ$Wave-mmWave HetNets
    arXiv.cs.NI Pub Date : 2020-11-20
    Zhuojia Gu; Hancheng Lu; Peilin Hong; Yongdong Zhang

    The reliability of current virtual reality (VR) delivery is low due to the limited resources on VR head-mounted displays (HMDs) and the transmission rate bottleneck of sub-6 GHz ($\mu$Wave) networks. In this paper, we propose a dual-connectivity $\mu$Wave-mmWave heterogeneous network architecture empowered by mobile edge capability. The core idea of the proposed architecture is to utilize the complementary

    更新日期:2020-11-23
  • WAE: Workload Automation Engine for CDN-specialized Container Orchestration
    arXiv.cs.NI Pub Date : 2020-11-19
    Elif Ak; Taner Ozdas; Serkan Sevim; Berk Canberk

    Content Delivery Network (CDN) has been emerged as a compelling technology to provide efficient and scalable web services even under high client request. However, this leads to a dilemma between minimum deployment cost and robust service under heavy loads. To solve this problem, we propose the Workload Automation Engine (WAE) which enables dynamic resource management, automated scaling and rapid service

    更新日期:2020-11-23
  • Reconfigurable Intelligent Surface Enabled Federated Learning: A Unified Communication-Learning Design Approach
    arXiv.cs.NI Pub Date : 2020-11-20
    Hang Liu; Xiaojun Yuan; Ying-Jun Angela Zhang

    To exploit massive amounts of data generated at mobile edge networks, federated learning (FL) has been proposed as an attractive substitute for centralized machine learning (ML). By collaboratively training a shared learning model at edge devices, FL avoids direct data transmission and thus overcomes high communication latency and privacy issues as compared to centralized ML. To improve the communication

    更新日期:2020-11-23
  • Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS
    arXiv.cs.NI Pub Date : 2020-11-19
    Sudheesh Singanamalla; Suphanat Chunhapanya; Marek Vavruša; Tanya Verma; Peter Wu; Marwan Fayed; Kurtis Heimerl; Nick Sullivan; Christopher Wood

    The Domain Name System (DNS) is the foundation of a human-usable Internet, responding to client queries for host-names with corresponding IP addresses and records. Traditional DNS is also unencrypted, and leaks user information to network operators. Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting traffic and hiding content

    更新日期:2020-11-23
  • Design and Evaluation of Routing Artifacts as a Part of the Physical Internet Framework
    arXiv.cs.NI Pub Date : 2020-11-19
    Steffen Kaup; André Ludwig; Bogdan Franczyk

    Global freight demand will triple between 2015 and 2050, based on the current demand pathway, as predicted in the Transport Outlook 2019. Hence, a revolutionary change in transport efficiency is urgently needed. One approach to tackle this change is to transfer the successful model of the Digital Internet for data exchange to the physical transport of goods: The so-called Physical Internet (PI, or

    更新日期:2020-11-21
  • Throughput Optimal Uplink Scheduling in Heterogeneous PLC and LTE Communication for Delay Aware Smart Grid Applications
    arXiv.cs.NI Pub Date : 2020-11-19
    Qiyue Li; Tengfei Cao; Wei Sun; Weitao Li

    Smart grid is an energy network that integrates advanced power equipment, communication technology and control technology. It can transmit two-way power and data among all components of the grid at the same time. The existing smart grid communication technologies include power line carrier (PLC) com-munication, industrial Ethernet, passive optical networks and wireless communi-cation, each of which

    更新日期:2020-11-21
  • To Terminate or Not to Terminate Secure Sockets Layer (SSL) Traffic at the Load Balancer
    arXiv.cs.NI Pub Date : 2020-11-19
    Pierre Boisrond

    The concepts of terminating or not terminating Secure Sockets Layer (SSL) at the load balancer have always generated intriguing conversations. In this paper, the author explains the pros and cons of such concepts in a simplistic manner and also provides suggested recommendations to help organizations understand the security implications associated with unencrypted traffic flowing from the Load Balancer

    更新日期:2020-11-21
  • Implementing BOLA-BASIC on Puffer: Lessons for the use of SSIM in ABR logic
    arXiv.cs.NI Pub Date : 2020-11-19
    Emily Marx; Francis Y. Yan; Keith Winstein

    One ABR algorithm implemented on Puffer is BOLA-BASIC, the simplest variant of BOLA. BOLA finds wide use in industry, notably in the MPEG-DASH reference player used as the basis for video players at Akamai, BBC, Orange, and CBS. The overall goal of BOLA is to maximize each encoded chunk's video quality while minimizing rebuffering. To measure video quality, Puffer uses the structural similarity metric

    更新日期:2020-11-21
  • TrustSense: An energy efficient trust scheme for clustered wireless sensor networks
    arXiv.cs.NI Pub Date : 2020-11-19
    Adedayo Odesile; Brent Lagesse

    Designing security systems for wireless sensor networks presents a challenge due to their relatively low computational resources. This has rendered many traditional defense mechanisms based on cryptography infeasible for deployment on such networks. Reputation and anomaly detection systems have been implemented as viable alternatives, but existing implementations still struggle with providing efficient

    更新日期:2020-11-21
  • Energy Aware Deep Reinforcement Learning Scheduling for Sensors Correlated in Time and Space
    arXiv.cs.NI Pub Date : 2020-11-19
    Jernej Hribar; Andrei Marinescu; Alessandro Chiumento; Luiz A. DaSilva

    Millions of battery-powered sensors deployed for monitoring purposes in a multitude of scenarios, e.g., agriculture, smart cities, industry, etc., require energy-efficient solutions to prolong their lifetime. When these sensors observe a phenomenon distributed in space and evolving in time, it is expected that collected observations will be correlated in time and space. In this paper, we propose a

    更新日期:2020-11-21
  • NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems
    arXiv.cs.NI Pub Date : 2020-11-18
    Mohanad Sarhan; Siamak Layeghy; Nour Moustafa; Marius Portmann

    Machine Learning (ML)-based Network Intrusion Detection Systems (NIDSs) have proven to become a reliable intelligence tool to protect networks against cyberattacks. Network data features has a great impact on the performances of ML-based NIDSs. However, evaluating ML models often are not reliable, as each ML-enabled NIDS is trained and validated using different data features that may do not contain

    更新日期:2020-11-19
  • Traffic Characteristics of Virtual Reality over Edge-enabled Wi-Fi Networks
    arXiv.cs.NI Pub Date : 2020-11-18
    Seyedmohammad Salehi; Abdullah Alnajim; Xiaoqing Zhu; Malcolm Smith; Chien-Chung Shen; Leonard Cimini

    Virtual reality (VR) is becoming prevalent with a plethora of applications in education, healthcare, entertainment, etc. To increase the user mobility, and to reduce the energy consumption and production cost of VR head mounted displays (HMDs), wireless VR with edge-computing has been the focus of both industry and academia. However, transferring large video frames of VR applications with their stringent

    更新日期:2020-11-19
  • Integration of Blockchain and IoT: An Enhanced Security Perspective
    arXiv.cs.NI Pub Date : 2020-11-05
    Mahdi H. Miraz; Maaruf Ali

    Blockchain (BC), a by-product of Bitcoin cryptocurrency, has gained immense and wide scale popularity for its applicability in various diverse domains - especially in multifaceted non-monetary systems. By adopting cryptographic techniques such as hashing and asymmetric encryption - along with distributed consensus approach, a Blockchain based distributed ledger not only becomes highly secure but also

    更新日期:2020-11-19
  • On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch
    arXiv.cs.NI Pub Date : 2020-11-18
    Levente Csikor; Vipul Ujawane; Dinil Mon Divakaran

    Being a crucial part of networked systems, packet classification has to be highly efficient; however, software switches in cloud environments still face performance challenges. The recently proposed Tuple Space Explosion (TSE) attack exploits an algorithmic deficiency in Open vSwitch (OVS). In TSE, legitimate low-rate attack traffic makes the cardinal linear search algorithm in the Tuple Space Search

    更新日期:2020-11-19
  • The Potential of Multi-Layered Hierarchical Non-Terrestrial Networks for 6G
    arXiv.cs.NI Pub Date : 2020-11-17
    Dengke Wang; Marco Giordani; Mohamed-Slim Alouini; Michele Zorzi

    6th generation (6G) communication research is currently focusing on non-terrestrial networks (NTNs) to promote ubiquitous and ultra-high-capacity global connectivity. Specifically, multi-layered hierarchical networks, i.e., the orchestration among different aerial/space platforms, including Unmanned Aerial Vehicles (UAVs), High Altitude Platforms (HAPs), and satellites co-operating at different altitudes

    更新日期:2020-11-18
  • The Case for Retraining of ML Models for IoT Device Identification at the Edge
    arXiv.cs.NI Pub Date : 2020-11-17
    Roman KolcunImperial College London; Diana Andreea PopescuUniversity of Cambridge; Vadim SafronovUniversity of Cambridge; Poonam YadavUniversity of York; Anna Maria MandalariImperial College London; Yiming XieImperial College London; Richard MortierUniversity of Cambridge; Hamed HaddadiImperial College London

    Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such they would greatly benefit from automated management. This requires robustly identifying devices so that appropriate network security policies can be applied. We address this challenge by exploring how to accurately identify IoT devices based on their network behavior, using resources available at the

    更新日期:2020-11-18
  • Reinforcement Learning of Graph Neural Networks for Service Function Chaining
    arXiv.cs.NI Pub Date : 2020-11-17
    DongNyeong Heo; Doyoung Lee; Hee-Gon Kim; Suhyun Park; Heeyoul Choi

    In the management of computer network systems, the service function chaining (SFC) modules play an important role by generating efficient paths for network traffic through physical servers with virtualized network functions (VNF). To provide the highest quality of services, the SFC module should generate a valid path quickly even in various network topology situations including dynamic VNF resources

    更新日期:2020-11-18
  • Optimal Accuracy-Time Trade-off for Deep Learning Services in Edge Computing Systems
    arXiv.cs.NI Pub Date : 2020-11-17
    Minoo Hosseinzadeh; Andrew Wachal; Hana Khamfroush; Daniel E. Lucani

    With the increasing demand for computationally intensive services like deep learning tasks, emerging distributed computing platforms such as edge computing (EC) systems are becoming more popular. Edge computing systems have shown promising results in terms of latency reduction compared to the traditional cloud systems. However, their limited processing capacity imposes a trade-off between the potential

    更新日期:2020-11-18
  • Analyzing Current Interference Situations of Connected Devices Using Context-Information and the Centralized Broker-Approach
    arXiv.cs.NI Pub Date : 2020-11-16
    Daniel Lindenschmitt; Michael Karrenbauer; Hans D. Schotten

    The digitalization of manufacturing processes is leading to a highly increased amount of connected devices. In the course of this development a process was developed and implemented, which optimizes IEEE 802.11-systems relating to the interference situation by using context-information. This was realized by division into two fields. First of all, data providers calculate their own interference situation

    更新日期:2020-11-17
  • Introduction of an Architecture for Flexible Future Process Control Systems as Enabler for Industry 4.0
    arXiv.cs.NI Pub Date : 2020-11-16
    Michael Gundall; Calvin Glas; Hans D. Schotten

    The term Industry 4.0, which refers to the fourth industrial revolution, aims at the digitalization of industries, including all kinds of production assets. With the help of these, so-called industrial cyber-physical systems, which form the industrial Internet of Things, numerous novel use cases that are key enabler for a smart manufacturing, can be realized. However, existing facilities mainly consist

    更新日期:2020-11-17
  • Application of Virtualization Technologies in Novel Industrial Automation: Catalyst or Show-Stopper?
    arXiv.cs.NI Pub Date : 2020-11-16
    Michael Gundall; Daniel Reti; Hans D. Schotten

    Industry 4.0 describes an adaptive and changeable production, where its factory cells have to be reconfigured at very short intervals, e.g. after each workpiece. Furthermore, this scenario cannot be realized with traditional devices, such as programmable logic controllers. Here the use of well-proven technologies of the information technology are conquering the production hall (IT-OT convergence).

    更新日期:2020-11-17
  • Proportionally Fair approach for Tor's Circuits Scheduling
    arXiv.cs.NI Pub Date : 2020-11-16
    Lamiaa Basyoni; Aiman Erbad; Amr Mohamed; Ahmed Refaey; Mohsen Guizani

    The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing to the extent that it is starting to affect the performance. Recently, Tor's resource allocation among circuits has been studied as one cause of poor Tor network performance. In this

    更新日期:2020-11-17
  • Performance Analysis of an Interference-Limited RIS-Aided Network
    arXiv.cs.NI Pub Date : 2020-11-15
    Liang Yang; Yin Yang; Daniel Benevides da Costa; Imene Trigui

    In this work, the performance of reconfigurable intelligent surface (RIS)-aided communication systems corrupted by the co-channel interference (CCI) at the destination is investigated. Assuming Rayleigh fading and equal-power CCI, we present the analysis for the outage probability (OP), average bit error rate (BER), and ergodic capacity. In addition, an asymptotic outage analysis is carried in order

    更新日期:2020-11-17
  • Echo-CGC: A Communication-Efficient Byzantine-tolerant Distributed Machine Learning Algorithm in Single-Hop Radio Network
    arXiv.cs.NI Pub Date : 2020-11-15
    Qinzi Zhang; Lewis Tseng

    In this paper, we focus on a popular DML framework -- the parameter server computation paradigm and iterative learning algorithms that proceed in rounds. We aim to reduce the communication complexity of Byzantine-tolerant DML algorithms in the single-hop radio network. Inspired by the CGC filter developed by Gupta and Vaidya, PODC 2020, we propose a gradient descent-based algorithm, Echo-CGC. Our main

    更新日期:2020-11-17
  • Quantum communication capacity transition of complex quantum networks
    arXiv.cs.NI Pub Date : 2020-11-14
    Quntao Zhuang; Bingzhi Zhang

    Quantum network is the key to enable distributed quantum information processing. As the single-link communication rate decays exponentially with the distance, to enable reliable end-to-end quantum communication, the number of nodes need to grow with the network scale. For highly connected networks, we identify a threshold transition in the capacity as the density of network nodes increases---below

    更新日期:2020-11-17
  • SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol
    arXiv.cs.NI Pub Date : 2020-11-14
    Pietro Tedeschi; Spiridon Bakiras; Roberto Di Pietro

    Contact tracing via mobile applications is gaining significant traction in the battle against Covid-19. A plethora of contact tracing apps have been developed and deployed in several countries around the world. However, people are rightfully concerned about the security and privacy risks of such applications. To this end, the contribution of this work is twofold. First, we present an in-depth analysis

    更新日期:2020-11-17
  • Impact of Temporary Fork on the Evolution of Mining Pools in Blockchain Networks: An Evolutionary Game Analysis
    arXiv.cs.NI Pub Date : 2020-11-14
    Canhui Chen; Xu Chen; Jiangshan Yu; Weigang Wu; Di Wu

    Temporary fork is a fundamental phenomenon in many blockchains with proof of work, and the analysis of temporary fork has recently drawn great attention. Different from existing efforts that focus on the blockchain system factors such as block size, network propagation delay or block generation speed, in this paper we explore a new key dimension of computing power from the miners' perspective. Specifically

    更新日期:2020-11-17
  • iHorology: Lowering the Barrier to Microsecond-level Internet Time
    arXiv.cs.NI Pub Date : 2020-11-13
    Sathiya Kumaran Mani; Yi Cao; Paul Barford; Darryl Veitch

    High precision, synchronized clocks are essential to a growing number of Internet applications. Standard protocols and their associated server infrastructure have been shown to typically enable client clocks to synchronize on the order of tens of milliseconds. We address one of the key challenges to high precision Internet timekeeping - the intrinsic contribution to clock error of path asymmetry between

    更新日期:2020-11-16
  • Measuring time delay in path MTU discovery in transmitting a packet in IPv4 and IPv6 network
    arXiv.cs.NI Pub Date : 2020-11-11
    Ishfaq Hussain; Janibul Bashir

    Path MTU Discovery (PMTUD) was initially designed for Internet protocol version 4 (IPv4) to prevent the communication loss due to smaller path MTU. This protocol is then further developed for Internet protocol version 6 (IPv6) with new set of constraints. In IPv4 network, the PMTUD activates when the packets DF bit is set, while as in IPv6, PMTUD is always running for every packet. In this paper, we

    更新日期:2020-11-16
  • An overview of wireless sensor network security attacks: Mode of operation, severity and mitigation techniques
    arXiv.cs.NI Pub Date : 2020-11-13
    Onwuegbuzie Innocent Uzougbo; Samuel-Soma M. Ajibade; Fele Taiwo

    Wireless Sensor Network (WSN) is the network of the future. As it gradually gains ground by transforming our lives and environments into a Smart World, it will definitely call for attention from selfish minded Attackers. The first section of this paper introduces the Wireless Sensor Network, its constraints, architecture, and mode of operation. It goes ahead to discuss the applications of WSN in health

    更新日期:2020-11-16
  • The Influence of the Buffer Size in Packet Loss for Competing Multimedia and Bursty Traffic
    arXiv.cs.NI Pub Date : 2020-11-12
    Luis Sequeira; Julian Fernandez-Navajas; Luis Casadesus; Jose Saldana; Idelkys Quintana; Jose Ruiz-Mas

    This work presents an analysis of the effect of the access router buffer size on packet loss rate and how it can affect the QoS of multimedia services when bursty traffic is present. VoIP traffic, real traces of viedoconferencing and videosurvellance are used in two different scenarios with medium link utilization. The study shows that the bursty nature of some applications may impair the MOS of voice

    更新日期:2020-11-16
  • A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
    arXiv.cs.NI Pub Date : 2020-11-13
    Olakunle Ibitoye; Ashraf Matrawy; M. Omair Shafiq

    The proliferation of smart, connected, always listening devices have introduced significant privacy risks to users in a smart home environment. Beyond the notable risk of eavesdropping, intruders can adopt machine learning techniques to infer sensitive information from audio recordings on these devices, resulting in a new dimension of privacy concerns and attack variables to smart home users. Techniques

    更新日期:2020-11-16
  • UHD-DPDK Performance Analysis for Advanced Software Radio Communications
    arXiv.cs.NI Pub Date : 2020-11-12
    Daniel Brennan; Vuk Marojevic

    Research conducted in LTE and 5G wireless communications systems uses common off-the-shelf hardware components and commercial software defined radio (SDR) hardware. One of the more popular SDR platforms is the Ettus USRP product line which uses the UHD driver and transport protocol framework. System performance can be increased using kernel bypass frameworks along with UHD. This paper investigates

    更新日期:2020-11-13
  • Integration of 5G with TSN as Prerequisite for a Highly Flexible Future Industrial Automation: Time Synchronization based on IEEE 802.1AS
    arXiv.cs.NI Pub Date : 2020-11-12
    Michael Gundall; Christopher Huber; Peter Rost; Ruediger Halfmann; Hans D. Schotten

    Industry 4.0 brings up new types of use cases, whereby mobile use cases play a significant role. These use cases have stringent requirements on both automation and communication systems that cannot be achieved with recent shop floor technologies. Therefore, novel technologies such as IEEE time-sensitive networking (TSN) and Open Platform Communications Unified Architecture (OPC UA) are being introduced

    更新日期:2020-11-13
  • Machine Learning Interpretability Meets TLS Fingerprinting
    arXiv.cs.NI Pub Date : 2020-11-12
    Mahdi Jafari Siavoshani; Amir Hossein Khajepour; Amirmohammad Ziaei; Amir Ali Gatmiri; Ali Taheri

    Protecting users' privacy over the Internet is of great importance. However, due to the increasing complexity of network protocols and components, it becomes harder and harder to maintain. Therefore, investigating and understanding how data is leaked from the information transport platform/protocols can lead us to a more secure environment. In this paper, we propose an iterative framework to find the

    更新日期:2020-11-13
  • Securing Password Authentication for Web-based Applications
    arXiv.cs.NI Pub Date : 2020-11-12
    Teik Guan Tan; Pawel Szalachowski; Jianying Zhou

    The use of passwords and the need to protect passwords are not going away. The majority of websites that require authentication continue to support password authentication. Even high-security applications such as Internet Banking portals, which deploy 2-factor authentication, rely on password authentication as one of the authentication factors. However phishing attacks continue to plague password-based

    更新日期:2020-11-13
  • Fast or Slow: An Autonomous Speed Control Approach for UAV-assisted IoT Data Collection Networks
    arXiv.cs.NI Pub Date : 2020-11-12
    Nam H. Chu; Dinh Thai Hoang; Diep N. Nguyen; Nguyen Van Huynh; Eryk Dutkiewicz

    Unmanned Aerial Vehicles (UAVs) have been emerging as an effective solution for IoT data collection networks thanks to their outstanding flexibility, mobility, and low operation costs. However, due to the limited energy and uncertainty from the data collection process, speed control is one of the most important factors to optimize the energy usage efficiency and performance for UAV collectors. This

    更新日期:2020-11-13
  • Empirically Characterizing the Buffer Behaviour of Real Devices
    arXiv.cs.NI Pub Date : 2020-11-11
    Luis Sequeira; Julian Fernandez-Navajas; Jose Saldana; Luis Casadesus

    All the routers include a buffer in order to enqueue packets waiting to be transmitted. The behaviour of the routers' buffer is of primary importance when studying network traffic, since it may modify some characteristics, as delay or jitter, and may also drop packets. As a consequence, the characterization of this buffer is interesting, especially when real-time flows are being transmitted: if the

    更新日期:2020-11-13
  • Analysis of the Matrix Event Graph Replicated Data Type
    arXiv.cs.NI Pub Date : 2020-11-12
    Florian Jacob; Carolin Beer; Norbert Henze; Hannes Hartenstein

    Matrix is a new kind of decentralized, topic-based publish-subscribe middleware for communication and data storage that is getting popular particularly as a basis for secure instant messaging. In comparison to traditional decentralized communication systems, Matrix replaces pure message passing with a replicated data structure. This data structure, which we extract and call the Matrix Event Graph (MEG)

    更新日期:2020-11-13
  • Realization of Stochastic Neural Networks and Its Potential Applications
    arXiv.cs.NI Pub Date : 2020-11-12
    S. Rahimi Kari

    Successive Cancellation Decoders have come a long way since the implementation of traditional SC decoders, but there still is a potential for improvement. The main struggle over the years was to find an optimal algorithm to implement them. Most of the proposed algorithms are not practical enough to be implemented in real-life. In this research, we aim to introduce the Efficiency of stochastic neural

    更新日期:2020-11-13
  • A Fast and Scalable Authentication Scheme in IoT for Smart Living
    arXiv.cs.NI Pub Date : 2020-11-12
    Jianhua Li; Jiong Jin; Lingjuan Lyu; Dong Yuan; Yingying Yang; Longxiang Gao; Chao Shen

    Numerous resource-limited smart objects (SOs) such as sensors and actuators have been widely deployed in smart environments, opening new attack surfaces to intruders. The severe security flaw discourages the adoption of the Internet of things in smart living. In this paper, we leverage fog computing and microservice to push certificate authority (CA) functions to the proximity of data sources. Through

    更新日期:2020-11-13
  • Joint Management of Compute and Radio Resources in Mobile Edge Computing: a Market Equilibrium Approach
    arXiv.cs.NI Pub Date : 2020-11-11
    Eugenio Moro; Ilario Filippini

    Edge computing has been recently introduced as a way to bring computational capabilities closer to end users of modern network-based services, in order to support existent and future delay-sensitive applications by effectively addressing the high propagation delay issue that affects cloud computing. However, the problem of efficiently and fairly manage the system resources presents particular challenges

    更新日期:2020-11-12
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
施普林格,自然编辑
ERIS期刊投稿
欢迎阅读创刊号
自然职场,为您触达千万科研人才
spring&清华大学出版社
城市可持续发展前沿研究专辑
Springer 纳米技术权威期刊征稿
全球视野覆盖
施普林格·自然新
chemistry
物理学研究前沿热点精选期刊推荐
自然职位线上招聘会
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
ACS Publications填问卷
阿拉丁试剂right
林亮
南方科技大学
朱守非
华东师范大学
胡少伟
有机所林亮
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
上海纽约大学
浙江大学
廖矿标
天合科研
x-mol收录
试剂库存
down
wechat
bug