-
Wireless Powering Internet of Things with UAVs: Challenges and Opportunities
Authors:
Yalin Liu,
Hong-Ning Dai,
Qubeijian Wang,
Muhammad Imran,
Nadra Guizani
Abstract:
Unmanned aerial vehicles (UAVs) have the potential to overcome the deployment constraint of Internet of Things (IoT) in remote or rural area. Wirelessly powered communications (WPC) can address the battery limitation of IoT devices through transferring wireless power to IoT devices. The integration of UAVs and WPC, namely UAV-enabled Wireless Powering IoT (Ue-WPIoT) can greatly extend the IoT appl…
▽ More
Unmanned aerial vehicles (UAVs) have the potential to overcome the deployment constraint of Internet of Things (IoT) in remote or rural area. Wirelessly powered communications (WPC) can address the battery limitation of IoT devices through transferring wireless power to IoT devices. The integration of UAVs and WPC, namely UAV-enabled Wireless Powering IoT (Ue-WPIoT) can greatly extend the IoT applications from cities to remote or rural areas. In this article, we present a state-of-the-art overview of Ue-WPIoT by first illustrating the working flow of Ue-WPIoT and discussing the challenges. We then introduce the enabling technologies in realizing Ue-WPIoT. Simulation results validate the effectiveness of the enabling technologies in Ue-WPIoT. We finally outline the future directions and open issues.
△ Less
Submitted 9 May, 2022; v1 submitted 11 September, 2020;
originally announced September 2020.
-
DeepNetQoE: Self-adaptive QoE Optimization Framework of Deep Networks
Authors:
Rui Wang,
Min Chen,
Nadra Guizani,
Yong Li,
Hamid Gharavi,
Kai Hwang
Abstract:
Future advances in deep learning and its impact on the development of artificial intelligence (AI) in all fields depends heavily on data size and computational power. Sacrificing massive computing resources in exchange for better precision rates of the network model is recognized by many researchers. This leads to huge computing consumption and satisfactory results are not always expected when com…
▽ More
Future advances in deep learning and its impact on the development of artificial intelligence (AI) in all fields depends heavily on data size and computational power. Sacrificing massive computing resources in exchange for better precision rates of the network model is recognized by many researchers. This leads to huge computing consumption and satisfactory results are not always expected when computing resources are limited. Therefore, it is necessary to find a balance between resources and model performance to achieve satisfactory results. This article proposes a self-adaptive quality of experience (QoE) framework, DeepNetQoE, to guide the training of deep networks. A self-adaptive QoE model is set up that relates the model's accuracy with the computing resources required for training which will allow the experience value of the model to improve. To maximize the experience value when computer resources are limited, a resource allocation model and solutions need to be established. In addition, we carry out experiments based on four network models to analyze the experience values with respect to the crowd counting example. Experimental results show that the proposed DeepNetQoE is capable of adaptively obtaining a high experience value according to user needs and therefore guiding users to determine the computational resources allocated to the network models.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Security of 5G-V2X: Technologies, Standardization and Research Directions
Authors:
Vishal Sharma,
Ilsun You,
Nadra Guizani
Abstract:
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, b…
▽ More
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, but it fails to handle the demands of high throughput, ultra-high reliability, and ultra-low latency alongside its security mechanisms. To counter this, 5G-V2X is considered as an integral solution, which not only resolves the issues related to LTE-V2X but also provides a function-based network setup. Several reports have been given for the security of 5G, but none of them primarily focuses on the security of 5G-V2X. This article provides a detailed overview of 5G-V2X with a security-based comparison to LTE-V2X. A novel Security Reflex Function (SRF)-based architecture is proposed and several research challenges are presented related to the security of 5G-V2X. Furthermore, the article lays out requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary for 5G-V2X.
△ Less
Submitted 18 December, 2019; v1 submitted 23 May, 2019;
originally announced May 2019.
-
Structured Bayesian Compression for Deep models in mobile enabled devices for connected healthcare
Authors:
Sijia Chen,
Bin Song,
Xiaojiang Du,
Nadra Guizani
Abstract:
Deep Models, typically Deep neural networks, have millions of parameters, analyze medical data accurately, yet in a time-consuming method. However, energy cost effectiveness and computational efficiency are important for prerequisites develo** and deploying mobile-enabled devices, the mainstream trend in connected healthcare.
Deep Models, typically Deep neural networks, have millions of parameters, analyze medical data accurately, yet in a time-consuming method. However, energy cost effectiveness and computational efficiency are important for prerequisites develo** and deploying mobile-enabled devices, the mainstream trend in connected healthcare.
△ Less
Submitted 13 February, 2019;
originally announced February 2019.
-
Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment
Authors:
Zhihong Tian,
Wei Shi,
Yuhang Wang,
Chunsheng Zhu,
Xiaojiang Du,
Shen Su,
Yanbin Sun,
Nadra Guizani
Abstract:
Edge computing is providing higher class intelligent service and computing capabilities at the edge of the network. The aim is to ease the backhaul impacts and offer an improved user experience, however, the edge artificial intelligence exacerbates the security of the cloud computing environment due to the dissociation of data, access control and service stages. In order to prevent users from usin…
▽ More
Edge computing is providing higher class intelligent service and computing capabilities at the edge of the network. The aim is to ease the backhaul impacts and offer an improved user experience, however, the edge artificial intelligence exacerbates the security of the cloud computing environment due to the dissociation of data, access control and service stages. In order to prevent users from using the edge-cloud computing environment to carry out lateral movement attacks, we proposed a method named CloudSEC meaning real time lateral movement detection based on evidence reasoning network for the edge-cloud environment. The concept of vulnerability correlation is introduced. Based on the vulnerability knowledge and environmental information of the network system, the evidence reasoning network is constructed, and the lateral movement reasoning ability provided by the evidence reasoning network is used. CloudSEC realizes the reconfiguration of the efficient real-time attack process. The experiment shows that the results are complete and credible.
△ Less
Submitted 12 February, 2019;
originally announced February 2019.
-
Privacy-preserving and Efficient Aggregation based on Blockchain for Power Grid Communications in Smart Communities
Authors:
Zhitao Guan,
Guanlin Si,
Xiaosong Zhang,
Longfei Wu,
Nadra Guizani,
Xiaojiang Du,
Yinglong Ma
Abstract:
Intelligence is one of the most important aspects in the development of our future communities. Ranging from smart home, smart building, to smart city, all these smart infrastructures must be supported by intelligent power supply. Smart grid is proposed to solve all challenges of future electricity supply. In smart grid, in order to realize optimal scheduling, a Smart Meter (SM) is installed at ea…
▽ More
Intelligence is one of the most important aspects in the development of our future communities. Ranging from smart home, smart building, to smart city, all these smart infrastructures must be supported by intelligent power supply. Smart grid is proposed to solve all challenges of future electricity supply. In smart grid, in order to realize optimal scheduling, a Smart Meter (SM) is installed at each home to collect the near real-time electricity consumption data, which can be used by the utilities to offer better smart home services. However, the near real-time data may disclose user's privacy. An adversary may track the application usage patterns by analyzing the user's electricity consumption profile. In this paper, we propose a privacy-preserving and efficient data aggregation scheme. We divide users into different groups and each group has a private blockchain to record its members' data. To preserve the inner privacy within a group, we use pseudonym to hide user's identity, and each user may create multiple pseudonyms and associate his/her data with different pseudonyms. In addition, the bloom filter is adopted for fast authentication. The analysis shows that the proposed scheme can meet the security requirements, and achieve a better performance than other popular methods.
△ Less
Submitted 4 June, 2018;
originally announced June 2018.
-
Spatio-temporal Trajectory Dataset Privacy Based on Network Traffic Control
Authors:
Qilong Han,
Qianqian Chen,
Kejia Zhang,
Xiaojiang Du,
Nadra Guizani
Abstract:
Collection of user's location and trajectory information that contains rich personal privacy in mobile social networks has become easier for attackers. Network traffic control is an important network system which can solve some security and privacy problems. In this paper, we consider a network traffic control system as a trusted third party and use differential privacy for protecting more persona…
▽ More
Collection of user's location and trajectory information that contains rich personal privacy in mobile social networks has become easier for attackers. Network traffic control is an important network system which can solve some security and privacy problems. In this paper, we consider a network traffic control system as a trusted third party and use differential privacy for protecting more personal trajectory data. We studied the influence of the high dimensionality and sparsity of trajectory data sets based on the availability of the published results. Based on similarity point aggregation reconstruction ideas and a prefix tree model, we proposed a hybrid publishing method of differential privacy spatiotemporal trajectory data sets APTB.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
D2D Big Data: Content Deliveries over Wireless Device-to-Device Sharing in Large Scale Mobile Networks
Authors:
Xiaofei Wang,
Yuhua Zhang,
Victor C. M. Leung,
Nadra Guizani,
Tianpeng Jiang
Abstract:
Recently the topic of how to effectively offload cellular traffic onto device-to-device (D2D) sharing among users in proximity has been gaining more and more attention of global researchers and engineers. Users utilize wireless short-range D2D communications for sharing contents locally, due to not only the rapid sharing experience and free cost, but also high accuracy on deliveries of interesting…
▽ More
Recently the topic of how to effectively offload cellular traffic onto device-to-device (D2D) sharing among users in proximity has been gaining more and more attention of global researchers and engineers. Users utilize wireless short-range D2D communications for sharing contents locally, due to not only the rapid sharing experience and free cost, but also high accuracy on deliveries of interesting and popular contents, as well as strong social impacts among friends. Nevertheless, the existing related studies are mostly confined to small-scale datasets, limited dimensions of user features, or unrealistic assumptions and hypotheses on user behaviors. In this article, driven by emerging Big Data techniques, we propose to design a big data platform, named D2D Big Data, in order to encourage the wireless D2D communications among users effectively, to promote contents for providers accurately, and to carry out offloading intelligence for operators efficiently. We deploy a big data platform and further utilize a large-scale dataset (3.56 TBytes) from a popular D2D sharing application (APP), which contains 866 million D2D sharing activities on 4.5 million files disseminated via nearly 850 million users in 13 weeks. By abstracting and analyzing multidimensional features, including online behaviors, content properties, location relations, structural characteristics, meeting dynamics, social arborescence, privacy preservation policies and so on, we verify and evaluate the D2D Big Data platform regarding predictive content propagating coverage. Finally, we discuss challenges and opportunities regarding D2D Big Data and propose to unveil a promising upcoming future of wireless D2D communications.
△ Less
Submitted 2 February, 2018;
originally announced February 2018.