-
Unsupervised Contrastive Learning for Robust RF Device Fingerprinting Under Time-Domain Shift
Authors:
Jun Chen,
Weng-Keen Wong,
Bechir Hamdaoui
Abstract:
Radio Frequency (RF) device fingerprinting has been recognized as a potential technology for enabling automated wireless device identification and classification. However, it faces a key challenge due to the domain shift that could arise from variations in the channel conditions and environmental settings, potentially degrading the accuracy of RF-based device classification when testing and traini…
▽ More
Radio Frequency (RF) device fingerprinting has been recognized as a potential technology for enabling automated wireless device identification and classification. However, it faces a key challenge due to the domain shift that could arise from variations in the channel conditions and environmental settings, potentially degrading the accuracy of RF-based device classification when testing and training data is collected in different domains. This paper introduces a novel solution that leverages contrastive learning to mitigate this domain shift problem. Contrastive learning, a state-of-the-art self-supervised learning approach from deep learning, learns a distance metric such that positive pairs are closer (i.e. more similar) in the learned metric space than negative pairs. When applied to RF fingerprinting, our model treats RF signals from the same transmission as positive pairs and those from different transmissions as negative pairs. Through experiments on wireless and wired RF datasets collected over several days, we demonstrate that our contrastive learning approach captures domain-invariant features, diminishing the effects of domain-specific variations. Our results show large and consistent improvements in accuracy (10.8\% to 27.8\%) over baseline models, thus underscoring the effectiveness of contrastive learning in improving device classification under domain shift.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
On the Domain Generalizability of RF Fingerprints Through Multifractal Dimension Representation
Authors:
Benjamin Johnson,
Bechir Hamdaoui
Abstract:
RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a possible method for enabling secure device identification and authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data collected under one domain performs badly when tested on data collected under a different domain. Some examples of…
▽ More
RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a possible method for enabling secure device identification and authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data collected under one domain performs badly when tested on data collected under a different domain. Some examples of a domain change include varying the location or environment of the device and varying the time or day of the data collection. In this work, we propose using multifractal analysis and the variance fractal dimension trajectory (VFDT) as a data representation input to the deep neural network to extract device fingerprints that are domain generalizable. We analyze the effectiveness of the proposed VFDT representation in detecting device-specific signatures from hardware-impaired IQ (in-phase and quadrature) signals, and we evaluate its robustness in real-world settings, using an experimental testbed of 30 WiFi-enabled Pycom devices. Our experimental results show that the proposed VFDT representation improves the scalability, robustness and generalizability of the deep learning models significantly compared to when using IQ data samples.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security
Authors:
Abdurrahman Elmaghbub,
Bechir Hamdaoui
Abstract:
Next-generation networks aim for comprehensive connectivity, interconnecting humans, machines, devices, and systems seamlessly. This interconnectivity raises concerns about privacy and security, given the potential network-wide impact of a single compromise. To address this challenge, the Zero Trust (ZT) paradigm emerges as a key method for safeguarding network integrity and data confidentiality.…
▽ More
Next-generation networks aim for comprehensive connectivity, interconnecting humans, machines, devices, and systems seamlessly. This interconnectivity raises concerns about privacy and security, given the potential network-wide impact of a single compromise. To address this challenge, the Zero Trust (ZT) paradigm emerges as a key method for safeguarding network integrity and data confidentiality. This work introduces EPS-CNN, a novel deep-learning-based wireless device identification framework designed to serve as the device authentication layer within the ZT architecture, with a focus on resource-constrained IoT devices. At the core of EPS-CNN, a Convolutional Neural Network (CNN) is utilized to generate the device identity from a unique RF signal representation, known as the Double-Sided Envelope Power Spectrum (EPS), which effectively captures the device-specific hardware characteristics while ignoring device-unrelated information. Experimental evaluations show that the proposed framework achieves over 99%, 93%, and 95% testing accuracy when tested in same-domain (day, location, and channel), cross-day, and cross-location scenarios, respectively. Our findings demonstrate the superiority of the proposed framework in enhancing the accuracy, robustness, and adaptability of deep learning-based methods, thus offering a pioneering solution for enabling ZT IoT device identification.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Domain-Adaptive Device Fingerprints for Network Access Authentication Through Multifractal Dimension Representation
Authors:
Benjamin Johnson,
Bechir Hamdaoui
Abstract:
RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a potential solution for automated network access authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data from one domain performs badly when tested on data from a different domain. Some examples of a domain change include varying the…
▽ More
RF data-driven device fingerprinting through the use of deep learning has recently surfaced as a potential solution for automated network access authentication. Traditional approaches are commonly susceptible to the domain adaptation problem where a model trained on data from one domain performs badly when tested on data from a different domain. Some examples of a domain change include varying the device location or environment and varying the time or day of data collection. In this work, we propose using multifractal analysis and the variance fractal dimension trajectory (VFDT) as a data representation input to the deep neural network to extract device fingerprints that are domain generalizable. We analyze the effectiveness of the proposed VFDT representation in detecting device-specific signatures from hardware-impaired IQ signals, and evaluate its robustness in real-world settings, using an experimental testbed of 30 WiFi-enabled Pycom devices under different locations and at different scales. Our results show that the VFDT representation improves the scalability, robustness and generalizability of the deep learning models significantly compared to when using raw IQ data.
△ Less
Submitted 15 August, 2023;
originally announced August 2023.
-
EPS: Distinguishable IQ Data Representation for Domain-Adaptation Learning of Device Fingerprints
Authors:
Abdurrahman Elmaghbub,
Bechir Hamdaoui
Abstract:
Deep learning (DL)-based RF fingerprinting (RFFP) technology has emerged as a powerful physical-layer security mechanism, enabling device identification and authentication based on unique device-specific signatures that can be extracted from the received RF signals. However, DL-based RFFP methods face major challenges concerning their ability to adapt to domain (e.g., day/time, location, channel,…
▽ More
Deep learning (DL)-based RF fingerprinting (RFFP) technology has emerged as a powerful physical-layer security mechanism, enabling device identification and authentication based on unique device-specific signatures that can be extracted from the received RF signals. However, DL-based RFFP methods face major challenges concerning their ability to adapt to domain (e.g., day/time, location, channel, etc.) changes and variability. This work proposes a novel IQ data representation and feature design, termed Double-Sided Envelope Power Spectrum or EPS, that is proven to overcome the domain adaptation problems significantly. By accurately capturing device hardware impairments while suppressing irrelevant domain information, EPS offers improved feature selection for DL models in RFFP. Experimental evaluations demonstrate its effectiveness, achieving over 99% testing accuracy in same-day/channel/location evaluations and 93% accuracy in cross-day evaluations, outperforming the traditional IQ representation. Additionally, EPS excels in cross-location evaluations, achieving a 95% accuracy. The proposed representation significantly enhances the robustness and generalizability of DL-based RFFP methods, thereby presenting a transformative solution to IQ data-based device fingerprinting.
△ Less
Submitted 8 August, 2023;
originally announced August 2023.
-
On the Impact of the Hardware Warm-Up Time on Deep Learning-Based RF Fingerprinting
Authors:
Abdurrahman Elmaghbub,
Bechir Hamdaoui
Abstract:
Deep learning-based RF fingerprinting offers great potential for improving the security robustness of various emerging wireless networks. Although much progress has been done in enhancing fingerprinting methods, the impact of device hardware stabilization and warm-up time on the achievable fingerprinting performances has not received adequate attention. As such, this paper focuses on addressing th…
▽ More
Deep learning-based RF fingerprinting offers great potential for improving the security robustness of various emerging wireless networks. Although much progress has been done in enhancing fingerprinting methods, the impact of device hardware stabilization and warm-up time on the achievable fingerprinting performances has not received adequate attention. As such, this paper focuses on addressing this gap by investigating and shedding light on what could go wrong if the hardware stabilization aspects are overlooked. Specifically, our experimental results show that when the deep learning models are trained with data samples captured after the hardware stabilizes but tested with data captured right after powering on the devices, the device classification accuracy drops below 37%. However, when both the training and testing data are captured after the stabilization period, the achievable average accuracy exceeds 99%, when the model is trained and tested on the same day, and achieves 88% and 96% when the model is trained on one day but tested on another day, for the wireless and wired scenarios, respectively. Additionally, in this work, we leverage simulation and testbed experimentation to explain the cause behind the I/Q signal behavior observed during the device hardware warm-up time that led to the RF fingerprinting performance degradation. Furthermore, we release a large WiFi dataset, containing both unstable (collected during the warm-up period) and stable (collected after the warm-up period) captures across multiple days. Our work contributes datasets, explanations, and guidelines to enhance the robustness of RF fingerprinting in securing emerging wireless networks.
△ Less
Submitted 31 July, 2023;
originally announced August 2023.
-
HiNoVa: A Novel Open-Set Detection Method for Automating RF Device Authentication
Authors:
Luke Puppo,
Weng-Keen Wong,
Bechir Hamdaoui,
Abdurrahman Elmaghbub
Abstract:
New capabilities in wireless network security have been enabled by deep learning, which leverages patterns in radio frequency (RF) data to identify and authenticate devices. Open-set detection is an area of deep learning that identifies samples captured from new devices during deployment that were not part of the training set. Past work in open-set detection has mostly been applied to independent…
▽ More
New capabilities in wireless network security have been enabled by deep learning, which leverages patterns in radio frequency (RF) data to identify and authenticate devices. Open-set detection is an area of deep learning that identifies samples captured from new devices during deployment that were not part of the training set. Past work in open-set detection has mostly been applied to independent and identically distributed data such as images. In contrast, RF signal data present a unique set of challenges as the data forms a time series with non-linear time dependencies among the samples. We introduce a novel open-set detection approach based on the patterns of the hidden state values within a Convolutional Neural Network (CNN) Long Short-Term Memory (LSTM) model. Our approach greatly improves the Area Under the Precision-Recall Curve on LoRa, Wireless-WiFi, and Wired-WiFi datasets, and hence, can be used successfully to monitor and control unauthorized network access of wireless devices.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
A Survey on AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: Techniques, Challenges and Opportunities
Authors:
Opeyemi Ajibuwa,
Bechir Hamdaoui,
Attila A. Yavuz
Abstract:
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs) have shown great potential in identifying anomalies in the network traffic of networked autonomous systems. Despite the vast research efforts, practical deployments of such systems in the real world have been limited. Although the safety-critical nature of autonomous systems and the vulnerability of learning-ba…
▽ More
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs) have shown great potential in identifying anomalies in the network traffic of networked autonomous systems. Despite the vast research efforts, practical deployments of such systems in the real world have been limited. Although the safety-critical nature of autonomous systems and the vulnerability of learning-based techniques to adversarial attacks are among the potential reasons, the lack of objective evaluation and feasibility assessment metrics is one key reason behind the limited adoption of these systems in practical settings. This survey aims to address the aforementioned limitation by presenting an in-depth analysis of AI/ML-based IDSs/MDSs and establishing baseline metrics relevant to networked autonomous systems. Furthermore, this work thoroughly surveys recent studies in this domain, highlighting the evaluation metrics and gaps in the current literature. It also presents key findings derived from our analysis of the surveyed papers and proposes guidelines for providing AI/ML-based IDS/MDS solution approaches suitable for vehicular network applications. Our work provides researchers and practitioners with the needed tools to evaluate the feasibility of AI/ML-based IDS/MDS techniques in real-world settings, with the aim of facilitating the practical adoption of such techniques in emerging autonomous vehicular systems.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
ADL-ID: Adversarial Disentanglement Learning for Wireless Device Fingerprinting Temporal Domain Adaptation
Authors:
Abdurrahman Elmaghbub,
Bechir Hamdaoui,
Weng-Keen Wong
Abstract:
As the journey of 5G standardization is coming to an end, academia and industry have already begun to consider the sixth-generation (6G) wireless networks, with an aim to meet the service demands for the next decade. Deep learning-based RF fingerprinting (DL-RFFP) has recently been recognized as a potential solution for enabling key wireless network applications and services, such as spectrum poli…
▽ More
As the journey of 5G standardization is coming to an end, academia and industry have already begun to consider the sixth-generation (6G) wireless networks, with an aim to meet the service demands for the next decade. Deep learning-based RF fingerprinting (DL-RFFP) has recently been recognized as a potential solution for enabling key wireless network applications and services, such as spectrum policy enforcement and network access control. The state-of-the-art DL-RFFP frameworks suffer from a significant performance drop when tested with data drawn from a domain that is different from that used for training data. In this paper, we propose ADL-ID, an unsupervised domain adaption framework that is based on adversarial disentanglement representation to address the temporal domain adaptation for the RFFP task. Our framework has been evaluated on real LoRa and WiFi datasets and showed about 24% improvement in accuracy when compared to the baseline CNN network on short-term temporal adaptation. It also improves the classification accuracy by up to 9% on long-term temporal adaptation. Furthermore, we release a 5-day, 2.1TB, large-scale WiFi 802.11b dataset collected from 50 Pycom devices to support the research community efforts in develo** and validating robust RFFP methods.
△ Less
Submitted 28 January, 2023;
originally announced January 2023.
-
Uncovering the Portability Limitation of Deep Learning-Based Wireless Device Fingerprints
Authors:
Bechir Hamdaoui,
Abdurrahman Elmaghbub
Abstract:
Recent device fingerprinting approaches rely on deep learning to extract device-specific features solely from raw RF signals to identify, classify and authenticate wireless devices. One widely known issue lies in the inability of these approaches to maintain good performances when the training data and testing data are collected under varying deployment domains. For example, when the learning mode…
▽ More
Recent device fingerprinting approaches rely on deep learning to extract device-specific features solely from raw RF signals to identify, classify and authenticate wireless devices. One widely known issue lies in the inability of these approaches to maintain good performances when the training data and testing data are collected under varying deployment domains. For example, when the learning model is trained on data collected from one receiver but tested on data collected from a different receiver, the performance degrades substantially compared to when both training and testing data are collected using the same receiver. The same also happens when considering other varying domains, like channel condition and protocol configuration. In this paper, we begin by explaining, through testbed experiments, the challenges these fingerprinting techniques face when it comes to domain portability. We will then present some ideas on how to go about addressing these challenges so as to make deep learning-based device fingerprinting more resilient to domain variability.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication
Authors:
Jared Gaskin,
Bechir Hamdaoui,
Weng-Keen Wong
Abstract:
Deep learning based device fingerprinting has emerged as a key method of identifying and authenticating devices solely via their captured RF transmissions. Conventional approaches are not portable to different domains in that if a model is trained on data from one domain, it will not perform well on data from a different but related domain. Examples of such domains include the receiver hardware us…
▽ More
Deep learning based device fingerprinting has emerged as a key method of identifying and authenticating devices solely via their captured RF transmissions. Conventional approaches are not portable to different domains in that if a model is trained on data from one domain, it will not perform well on data from a different but related domain. Examples of such domains include the receiver hardware used for collecting the data, the day/time on which data was captured, and the protocol configuration of devices. This work proposes Tweak, a technique that, using metric learning and a calibration process, enables a model trained with data from one domain to perform well on data from another domain. This process is accomplished with only a small amount of training data from the target domain and without changing the weights of the model, which makes the technique computationally lightweight and thus suitable for resource-limited IoT networks. This work evaluates the effectiveness of Tweak vis-a-vis its ability to identify IoT devices using a testbed of real LoRa-enabled devices under various scenarios. The results of this evaluation show that Tweak is viable and especially useful for networks with limited computational resources and applications with time-sensitive missions.
△ Less
Submitted 1 September, 2022;
originally announced September 2022.
-
Deep-Learning-Based Device Fingerprinting for Increased LoRa-IoT Security: Sensitivity to Network Deployment Changes
Authors:
Bechir Hamdaoui,
Abdurrahman Elmaghbub
Abstract:
Deep-learning-based device fingerprinting has recently been recognized as a key enabler for automated network access authentication. Its robustness to impersonation attacks due to the inherent difficulty of replicating physical features is what distinguishes it from conventional cryptographic solutions. Although device fingerprinting has shown promising performances, its sensitivity to changes in…
▽ More
Deep-learning-based device fingerprinting has recently been recognized as a key enabler for automated network access authentication. Its robustness to impersonation attacks due to the inherent difficulty of replicating physical features is what distinguishes it from conventional cryptographic solutions. Although device fingerprinting has shown promising performances, its sensitivity to changes in the network operating environment still poses a major limitation. This paper presents an experimental framework that aims to study and overcome the sensitivity of LoRa-enabled device fingerprinting to such changes. We first begin by describing RF datasets we collected using our LoRa-enabled wireless device testbed. We then propose a new fingerprinting technique that exploits out-of-band distortion information caused by hardware impairments to increase the fingerprinting accuracy. Finally, we experimentally study and analyze the sensitivity of LoRa RF fingerprinting to various network setting changes. Our results show that fingerprinting does relatively well when the learning models are trained and tested under the same settings. However, when trained and tested under different settings, these models exhibit moderate sensitivity to channel condition changes and severe sensitivity to protocol configuration and receiver hardware changes when IQ data is used as input. However, with FFT data is used as input, they perform poorly under any change.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
An Analysis of Complex-Valued CNNs for RF Data-Driven Wireless Device Classification
Authors:
Jun Chen,
Weng-Keen Wong,
Bechir Hamdaoui,
Abdurrahman Elmaghbub,
Kathiravetpillai Sivanesan,
Richard Dorrance,
Lily L. Yang
Abstract:
Recent deep neural network-based device classification studies show that complex-valued neural networks (CVNNs) yield higher classification accuracy than real-valued neural networks (RVNNs). Although this improvement is (intuitively) attributed to the complex nature of the input RF data (i.e., IQ symbols), no prior work has taken a closer look into analyzing such a trend in the context of wireless…
▽ More
Recent deep neural network-based device classification studies show that complex-valued neural networks (CVNNs) yield higher classification accuracy than real-valued neural networks (RVNNs). Although this improvement is (intuitively) attributed to the complex nature of the input RF data (i.e., IQ symbols), no prior work has taken a closer look into analyzing such a trend in the context of wireless device identification. Our study provides a deeper understanding of this trend using real LoRa and WiFi RF datasets. We perform a deep dive into understanding the impact of (i) the input representation/type and (ii) the architectural layer of the neural network. For the input representation, we considered the IQ as well as the polar coordinates both partially and fully. For the architectural layer, we considered a series of ablation experiments that eliminate parts of the CVNN components. Our results show that CVNNs consistently outperform RVNNs counterpart in the various scenarios mentioned above, indicating that CVNNs are able to make better use of the joint information provided via the in-phase (I) and quadrature (Q) components of the signal.
△ Less
Submitted 20 February, 2022;
originally announced February 2022.
-
Comprehensive RF Dataset Collection and Release: A Deep Learning-Based Device Fingerprinting Use Case
Authors:
Abdurrahman Elmaghbub,
Bechir Hamdaoui
Abstract:
Deep learning-based RF fingerprinting has recently been recognized as a potential solution for enabling newly emerging wireless network applications, such as spectrum access policy enforcement, automated network device authentication, and unauthorized network access monitoring and control. Real, comprehensive RF datasets are now needed more than ever to enable the study, assessment, and validation…
▽ More
Deep learning-based RF fingerprinting has recently been recognized as a potential solution for enabling newly emerging wireless network applications, such as spectrum access policy enforcement, automated network device authentication, and unauthorized network access monitoring and control. Real, comprehensive RF datasets are now needed more than ever to enable the study, assessment, and validation of newly developed RF fingerprinting approaches. In this paper, we present and release a large-scale RF fingerprinting dataset, collected from 25 different LoRa-enabled IoT transmitting devices using USRP B210 receivers. Our dataset consists of a large number of SigMF-compliant binary files representing the I/Q time-domain samples and their corresponding FFT-based files of LoRa transmissions. This dataset provides a comprehensive set of essential experimental scenarios, considering both indoor and outdoor environments and various network deployments and configurations, such as the distance between the transmitters and the receiver, the configuration of the considered LoRa modulation, the physical location of the conducted experiment, and the receiver hardware used for training and testing the neural network models.
△ Less
Submitted 6 January, 2022;
originally announced January 2022.
-
Deep Neural Network Feature Designs for RF Data-Driven Wireless Device Classification
Authors:
Bechir Hamdaoui,
Abdurrahman Elmaghbub,
Seifeddine Mejri
Abstract:
Most prior works on deep learning-based wireless device classification using radio frequency (RF) data apply off-the-shelf deep neural network (DNN) models, which were matured mainly for domains like vision and language. However, wireless RF data possesses unique characteristics that differentiate it from these other domains. For instance, RF data encompasses intermingled time and frequency featur…
▽ More
Most prior works on deep learning-based wireless device classification using radio frequency (RF) data apply off-the-shelf deep neural network (DNN) models, which were matured mainly for domains like vision and language. However, wireless RF data possesses unique characteristics that differentiate it from these other domains. For instance, RF data encompasses intermingled time and frequency features that are dictated by the underlying hardware and protocol configurations. In addition, wireless RF communication signals exhibit cyclostationarity due to repeated patterns (PHY pilots, frame prefixes, etc.) that these signals inherently contain. In this paper, we begin by explaining and showing the unsuitability as well as limitations of existing DNN feature design approaches currently proposed to be used for wireless device classification. We then present novel feature design approaches that exploit the distinct structures of the RF communication signals and the spectrum emissions caused by transmitter hardware impairments to custom-make DNN models suitable for classifying wireless devices using RF signal data. Our proposed DNN feature designs substantially improve classification robustness in terms of scalability, accuracy, signature anti-cloning, and insensitivity to environment perturbations. We end the paper by presenting other feature design strategies that have great potentials for providing further performance improvements of the DNN-based wireless device classification, and discuss the open research challenges related to these proposed strategies.
△ Less
Submitted 2 March, 2021;
originally announced May 2021.
-
CAFT: Congestion-Aware Fault-Tolerant Load Balancing for Three-Tier Clos Data Centers
Authors:
Sultan Alanazi,
Bechir Hamdaoui
Abstract:
Production data centers operate under various workload sizes ranging from latency-sensitive mice flows to long-lived elephant flows. However, the predominant load balancing scheme in data center networks, equal-cost multi-path (ECMP), is agnostic to path conditions and performs poorly in asymmetric topologies, resulting in low throughput and high latencies. In this paper, we propose CAFT, a distri…
▽ More
Production data centers operate under various workload sizes ranging from latency-sensitive mice flows to long-lived elephant flows. However, the predominant load balancing scheme in data center networks, equal-cost multi-path (ECMP), is agnostic to path conditions and performs poorly in asymmetric topologies, resulting in low throughput and high latencies. In this paper, we propose CAFT, a distributed congestion-aware fault-tolerant load balancing protocol for 3-tier data center networks. It first collects, in real time, the complete congestion information of two subsets from the set of all possible paths between any two hosts. Then, the best path congestion information from each subset is carried across the switches, during the Transport Control Protocol (TCP) connection process, to make path selection decision. Having two candidate paths improve the robustness of CAFT to asymmetries caused by link failures. Large-scale ns-3 simulations show that CAFT outperforms Expeditus in mean flow completion time (FCT) and network throughput for both symmetric and asymmetric scenarios.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
Traffic Behavior in Cloud Data Centers: A Survey
Authors:
Jarallah Alqahtani,
Sultan Alanazi,
Bechir Hamdaoui
Abstract:
Data centers (DCs) nowadays house tens of thousands of servers and switches, interconnected by high-speed communication links. With the rapid growth of cloud DCs, in both size and number, tremendous efforts have been undertaken to efficiently design the network and manage the traffic within these DCs. However, little effort has been made toward measuring, understanding and chattelizing how the net…
▽ More
Data centers (DCs) nowadays house tens of thousands of servers and switches, interconnected by high-speed communication links. With the rapid growth of cloud DCs, in both size and number, tremendous efforts have been undertaken to efficiently design the network and manage the traffic within these DCs. However, little effort has been made toward measuring, understanding and chattelizing how the network-level traffic of these DCs behave. In this paper, we aim to present a systematic taxonomy and survey of these DC studies. Specifically, our survey first decomposes DC network traffic behavior into two main stages, namely (1) data collection methodologies and (2) research findings, and then classifies and discusses the recent research studies in each stage. Finally, the survey highlights few research challenges related to DC network traffic that require further research investigation.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
Bert: Scalable Source Routed Multicast for Cloud Data Centers
Authors:
Jarallah Alqahtani,
Bechir Hamdaoui
Abstract:
Traditional IP multicast routing is not suitable for cloud data center (DC) networks due to the need for supporting large numbers of groups with large group sizes. State-of-the-art DC multicast routing approaches aim to overcome the scalability issues by, for instance, taking advantage of the symmetry of DC topologies and the programmability of DC switches to compactly encode multicast group infor…
▽ More
Traditional IP multicast routing is not suitable for cloud data center (DC) networks due to the need for supporting large numbers of groups with large group sizes. State-of-the-art DC multicast routing approaches aim to overcome the scalability issues by, for instance, taking advantage of the symmetry of DC topologies and the programmability of DC switches to compactly encode multicast group information inside packets, thereby reducing the overhead resulting from the need to store the states of flows at the network switches. However, although these scale well with the number of multicast groups, they do not do so with group sizes, and as a result, they yield substantial traffic control overhead and network congestion. In this paper, we present Bert, a scalable, source-initiated DC multicast routing approach that scales well with both the number and the size of multicast groups, and does so through clustering, by dividing the members of the multicast group into a set of clusters with each cluster employing its own forwarding rules. Compared to the state-of-the-art approach, Bert yields much lesser traffic control overhead by significantly reducing the packet header sizes and the number of extra packet transmissions, resulting from the need for compacting forwarding rules across the switches.
△ Less
Submitted 10 August, 2020;
originally announced August 2020.
-
Dynamic Spectrum Sharing in the Age of Millimeter Wave Spectrum Access
Authors:
Bechir Hamdaoui,
Bassem Khalfi,
Nizar Zorba
Abstract:
Next-generation wireless networks are facing spectrum shortage challenges, mainly due to, among other factors, the projected massive numbers of IoT connections and the emerging bandwidth-hungry applications that such networks ought to serve. Spectrum is scarce and expensive, and therefore, it is of crucial importance to devise dynamic and flexible spectrum access policies and techniques that yield…
▽ More
Next-generation wireless networks are facing spectrum shortage challenges, mainly due to, among other factors, the projected massive numbers of IoT connections and the emerging bandwidth-hungry applications that such networks ought to serve. Spectrum is scarce and expensive, and therefore, it is of crucial importance to devise dynamic and flexible spectrum access policies and techniques that yield optimal usage of such a precious resource. A new trend recently being adopted as a key solution to this spectrum scarcity challenge is to exploit higher frequency bands, namely mmWave bands, that were considered impractical few years ago, but are now becoming feasible due to recent advances in electronics. Though, fortunately, spectrum regulatory bodies have responded by allowing the use of new bands in the mmWave frequencies, much work still needs to be done to benefit from such new spectra.
In this paper, we discuss some key spectrum management challenges that pertain to dynamic spectrum access at the mmWave frequencies, which need to be overcome in order to promote dynamic spectrum sharing at these mmWave bands. We also propose new techniques that enable efficient dynamic spectrum sharing at the mmWave bands by addressing some of the discussed challenges, and highlight open research challenges that still need to be addressed to fully unleash the potential of dynamic spectrum sharing at mmWave bands.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
Peak Power Shaving for Reduced Electricity Costs in Cloud Data Centers: Opportunities and Challenges
Authors:
Mehiar Dabbagh,
Bechir Hamdaoui,
Ammar Rayes
Abstract:
An electricity bill of a data center (DC) is determined not only by how much energy the DC consumes, but especially by how the consumed energy is spread over time during the billing cycle. More specifically, these electricity costs are essentially made up of two major charges: Energy Charge, a cost based on the amount of consumed energy (in kWh), and Peak Charge, a cost based on the maximum power…
▽ More
An electricity bill of a data center (DC) is determined not only by how much energy the DC consumes, but especially by how the consumed energy is spread over time during the billing cycle. More specifically, these electricity costs are essentially made up of two major charges: Energy Charge, a cost based on the amount of consumed energy (in kWh), and Peak Charge, a cost based on the maximum power (in kW) requested during the billing cycle. The latter charge component is forced to encourage DCs to balance and regulate their power demands over the billing cycle, allowing the utility company to manage congestion without increasing supply. This billing model has thus called for the development of peak power shaving approaches that reduce costs by smoothing peak power demands over the billing cycle to minimize the Peak Charge component. In this paper, we investigate peak power shaving approaches, and begin by using Google data traces to quantify and provide a real sense of how much electricity cost reduction can peak power demand shaving achieve on a Google DC cluster. We then discuss why peak power shaving is well-suited for reducing electricity costs of DCs, and describe two commonly used peak shaving approaches, namely energy storage and workload modulation. We finally identify and describe key research problems that remain unsolved and require further investigation.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
Unleashing the Power of Participatory IoT with Blockchains for Increased Safety and Situation Awareness of Smart Cities
Authors:
Bechir Hamdaoui,
Mohamed Alkalbani,
Taieb Znati,
Ammar Rayes
Abstract:
IoT emerges as an unprecedented paradigm with great potential for changing how people interact, think and live. It is making existing Internet services feasible in ways that were previously impossible, as well as paving the way for new situation-awareness applications suitable for smart cities, such as realtime video surveillance, traffic control, and emergency management. These applications will…
▽ More
IoT emerges as an unprecedented paradigm with great potential for changing how people interact, think and live. It is making existing Internet services feasible in ways that were previously impossible, as well as paving the way for new situation-awareness applications suitable for smart cities, such as realtime video surveillance, traffic control, and emergency management. These applications will typically rely on large numbers of IoT devices to collect and collaboratively process streamed data to enable real-time decision making. In this paper, we introduce the concept of Semantic Virtual Space (SVS), an abstraction for virtualized cloud-enabled IoT infrastructure that is commensurate with the goals and needs of these emerging smart city applications, and propose and discuss scalable architectures and mechanisms that enable and automate the deployment and management of multiple SVS instances on top of the cloud-enabled IoT infrastructure.
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band
Authors:
Mohamed Grissa,
Attila A. Yavuz,
Bechir Hamdaoui
Abstract:
As part of its ongoing efforts to meet the increased spectrum demand, the Federal Communications Commission (FCC) has recently opened up 150 MHz in the 3.5 GHz band for shared wireless broadband use. Access and operations in this band, aka Citizens Broadband Radio Service (CBRS), will be managed by a dynamic spectrum access system (SAS) to enable seamless spectrum sharing between secondary users (…
▽ More
As part of its ongoing efforts to meet the increased spectrum demand, the Federal Communications Commission (FCC) has recently opened up 150 MHz in the 3.5 GHz band for shared wireless broadband use. Access and operations in this band, aka Citizens Broadband Radio Service (CBRS), will be managed by a dynamic spectrum access system (SAS) to enable seamless spectrum sharing between secondary users (SUs) and incumbent users. Despite its benefits, SAS's design requirements, as set by FCC, present privacy risks to SUs, merely because SUs are required to share sensitive operational information (e.g., location, identity, spectrum usage) with SAS to be able to learn about spectrum availability in their vicinity. In this paper, we propose TrustSAS , a trustworthy framework for SAS that synergizes state-of-the-art cryptographic techniques with blockchain technology in an innovative way to address these privacy issues while complying with FCC's regulatory design requirements. We analyze the security of our framework and evaluate its performance through analysis, simulation and experimentation. We show that TrustSAS can offer high security guarantees with reasonable overhead, making it an ideal solution for addressing SUs' privacy issues in an operational SAS environment.
△ Less
Submitted 6 July, 2019;
originally announced July 2019.
-
Location Privacy in Cognitive Radios with Multi-Server Private Information Retrieval
Authors:
Mohamed Grissa,
Attila A. Yavuz,
Bechir Hamdaoui
Abstract:
Spectrum database-based cognitive radio networks (CRNs) have become the de facto approach for enabling unlicensed secondary users (SUs) to identify spectrum vacancies in channels owned by licensed primary users (PUs). Despite its merits, the use of spectrum databases incurs privacy concerns for both SUs and PUs. Single-server private information retrieval (PIR) has been used as the main tool to ad…
▽ More
Spectrum database-based cognitive radio networks (CRNs) have become the de facto approach for enabling unlicensed secondary users (SUs) to identify spectrum vacancies in channels owned by licensed primary users (PUs). Despite its merits, the use of spectrum databases incurs privacy concerns for both SUs and PUs. Single-server private information retrieval (PIR) has been used as the main tool to address this problem. However, such techniques incur extremely large communication and computation overheads while offering only computational privacy. Besides, some of these PIR protocols have been broken.
In this paper, we show that it is possible to achieve high efficiency and (information-theoretic) privacy for both PUs and SUs in database-driven CRN with multi-server PIR. Our key observation is that, by design, database-driven CRNs comprise multiple databases that are required, by the Federal Communications Commission, to synchronize their records. To the best of our knowledge, we are the first to exploit this observation to harness multi-server PIR technology to guarantee an optimal privacy for both SUs and PUs, thanks to the unique properties of database-driven CRN . We showed, analytically and empirically with deployments on actual cloud systems, that multi-server PIR is an ideal tool to provide efficient location privacy in database-driven CRN.
△ Less
Submitted 3 July, 2019;
originally announced July 2019.
-
An Efficient Technique for Protecting Location Privacy of Cooperative Spectrum Sensing Users
Authors:
Mohamed Grissa,
Attila Yavuz,
Bechir Hamdaoui
Abstract:
Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered wi…
▽ More
Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered with privacy-preserving capabilities so as to provide SUs with incentives for participating in the sensing task. In this paper, we propose an efficient privacy-preserving protocol that uses an additional architectural entity and makes use of various cryptographic mechanisms to preserve the location privacy of SUs while performing reliable and efficient spectrum sensing. We show that not only is our proposed scheme secure and more efficient than existing alternatives, but also achieves fault tolerance and is robust against sporadic network topological changes.
△ Less
Submitted 15 July, 2018;
originally announced July 2018.
-
LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks
Authors:
Mohamed Grissa,
Attila Yavuz,
Bechir Hamdaoui
Abstract:
Cognitive Radio Networks (CRNs) enable opportunistic access to the licensed channel resources by allowing unlicensed users to exploit vacant channel opportunities. One effective technique through which unlicensed users, often referred to as Secondary Users (SUs), acquire whether a channel is vacant is cooperative spectrum sensing. Despite its effectiveness in enabling CRN access, cooperative sensi…
▽ More
Cognitive Radio Networks (CRNs) enable opportunistic access to the licensed channel resources by allowing unlicensed users to exploit vacant channel opportunities. One effective technique through which unlicensed users, often referred to as Secondary Users (SUs), acquire whether a channel is vacant is cooperative spectrum sensing. Despite its effectiveness in enabling CRN access, cooperative sensing suffers from location privacy threats, merely because the sensing reports that need to be exchanged among the SUs to perform the sensing task are highly correlated to the SUs' locations. In this paper, we develop a new Location Privacy for Optimal Sensing (LPOS) scheme that preserves the location privacy of SUs while achieving optimal sensing performance through voting-based sensing. In addition, LPOS is the only alternative among existing CRN location privacy preserving schemes (to the best of our knowledge) that ensures high privacy, achieves fault tolerance, and is robust against the highly dynamic and wireless nature of CRNs.
△ Less
Submitted 9 June, 2018;
originally announced June 2018.
-
Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures
Authors:
Mohamed Grissa,
Attila A. Yavuz,
Bechir Hamdaoui
Abstract:
In this paper, we propose new location privacy preserving schemes for database-driven cognitive radio networks that protect secondary users' (SUs) location privacy while allowing them to learn spectrum availability in their vicinity. Our schemes harness probabilistic set membership data structures to exploit the structured nature of spectrum databases (DBs) and SUs' queries. This enables us to cre…
▽ More
In this paper, we propose new location privacy preserving schemes for database-driven cognitive radio networks that protect secondary users' (SUs) location privacy while allowing them to learn spectrum availability in their vicinity. Our schemes harness probabilistic set membership data structures to exploit the structured nature of spectrum databases (DBs) and SUs' queries. This enables us to create a compact representation of DB that could be queried by SUs without having to share their location with DB, thus guaranteeing their location privacy. Our proposed schemes offer different cost-performance characteristics. Our first scheme relies on a simple yet powerful two-party protocol that achieves unconditional security with a plausible communication overhead by making DB send a compacted version of its content to SU which needs only to query this data structure to learn spectrum availability. Our second scheme achieves significantly lower communication and computation overhead for SUs, but requires an additional architectural entity which receives the compacted version of the database and fetches the spectrum availability information in lieu of SUs to alleviate the overhead on the latter. We show that our schemes are secure, and also demonstrate that they offer significant advantages over existing alternatives for various performance and/or security metrics.
△ Less
Submitted 9 June, 2018;
originally announced June 2018.
-
Exploiting wideband spectrum occupancy heterogeneity for weighted compressive spectrum sensing
Authors:
Bassem Khalfi,
Bechir Hamdaoui,
Mohsen Guizani,
Nizar Zorba
Abstract:
Compressive sampling has shown great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that aimed to develop techniques that leverage compressive sampling to enable compressed wideband spectrum sensing. These techniques consider homogeneous wideband spectrum where all bands are assumed to have similar PU tr…
▽ More
Compressive sampling has shown great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that aimed to develop techniques that leverage compressive sampling to enable compressed wideband spectrum sensing. These techniques consider homogeneous wideband spectrum where all bands are assumed to have similar PU traffic characteristics. In practice, however, wideband spectrum is not homogeneous, in that different spectrum bands could have different PU occupancy patterns. In fact, the nature of spectrum assignment, in which applications of similar types are often assigned bands within the same block, dictates that wideband spectrum is indeed heterogeneous, as different application types exhibit different behaviors. In this paper, we consider heterogeneous wideband spectrum, where we exploit this inherent, block-like structure of wideband spectrum to design efficient compressive spectrum sensing techniques that are well suited for heterogeneous wideband spectrum. We propose a weighted $\ell_1$-minimization sensing information recovery algorithm that achieves more stable recovery than that achieved by existing approaches while accounting for the variations of spectrum occupancy across both the time and frequency dimensions. Through intensive numerical simulations, we show that our approach achieves better performance when compared to the state-of-the-art approaches.
△ Less
Submitted 4 June, 2018;
originally announced June 2018.
-
Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing
Authors:
Mohamed Grissa,
Attila A. Yavuz,
Bechir Hamdaoui
Abstract:
Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered wi…
▽ More
Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered with privacy preserving capabilities so as to provide SUs with incentives for participating in the sensing task. In this paper, we propose privacy preserving protocols that make use of various cryptographic mechanisms to preserve the location privacy of SUs while performing reliable and efficient spectrum sensing. We also present cost-performance tradeoffs. The first consists on using an additional architectural entity at the benefit of incurring lower computation overhead by relying only on symmetric cryptography. The second consists on using an additional secure comparison protocol at the benefit of incurring lesser architectural cost by not requiring extra entities. Our schemes can also adapt to the case of a malicious fusion center as we discuss in this paper. We also show that not only are our proposed schemes secure and more efficient than existing alternatives, but also achieve fault tolerance and are robust against sporadic network topological changes.
△ Less
Submitted 3 June, 2018;
originally announced June 2018.
-
Location Privacy in Cognitive Radio Networks: A Survey
Authors:
Mohamed Grissa,
Bechir Hamdaoui,
Attila A. Yavuz
Abstract:
Cognitive radio networks (CRNs) have emerged as an essential technology to enable dynamic and opportunistic spectrum access which aims to exploit underutilized licensed channels to solve the spectrum scarcity problem. Despite the great benefits that CRNs offer in terms of their ability to improve spectrum utilization efficiency, they suffer from user location privacy issues. Knowing that their whe…
▽ More
Cognitive radio networks (CRNs) have emerged as an essential technology to enable dynamic and opportunistic spectrum access which aims to exploit underutilized licensed channels to solve the spectrum scarcity problem. Despite the great benefits that CRNs offer in terms of their ability to improve spectrum utilization efficiency, they suffer from user location privacy issues. Knowing that their whereabouts may be exposed can discourage users from joining and participating in the CRNs, thereby potentially hindering the adoption and deployment of this technology in future generation networks. The location information leakage issue in the CRN context has recently started to gain attention from the research community due to its importance, and several research efforts have been made to tackle it. However, to the best of our knowledge, none of these works have tried to identify the vulnerabilities that are behind this issue or discuss the approaches that could be deployed to prevent it. In this paper, we try to fill this gap by providing a comprehensive survey that investigates the various location privacy risks and threats that may arise from the different components of this CRN technology, and explores the different privacy attacks and countermeasure solutions that have been proposed in the literature to cope with this location privacy issue. We also discuss some open research problems, related to this issue, that need to be overcome by the research community to take advantage of the benefits of this key CRN technology without having to sacrifice the users' privacy.
△ Less
Submitted 3 June, 2018;
originally announced June 2018.
-
Responsive Content-Centric Delivery in Large Urban Communication Networks: A LinkNYC Use-Case
Authors:
Hassan Sinky,
Bassem Khalfi,
Bechir Hamdaoui,
Ammar Rayes
Abstract:
Large urban communication networks such as smart cities are an ecosystem of devices and services cooperating to address multiple issues that greatly benefit end users, cities and the environment. LinkNYC is a first-of-its-kind urban communications network aiming to replace all payphones in the five boroughs of New York City (NYC) with kiosk-like structures providing free public Wi-Fi. We consolida…
▽ More
Large urban communication networks such as smart cities are an ecosystem of devices and services cooperating to address multiple issues that greatly benefit end users, cities and the environment. LinkNYC is a first-of-its-kind urban communications network aiming to replace all payphones in the five boroughs of New York City (NYC) with kiosk-like structures providing free public Wi-Fi. We consolidate these networks with standalone edge cloud devices known as cloudlets and introduce geographically distributed content delivery cloudlets (CDCs) to store popular Internet content closer to end users; essential in environments with diverse and dynamic content interests. A content-centric and delivery framework is proposed leveraging NYC's population densities and CDCs for interest-based in-network caching. Analysis shows that although the adoption of multiple CDCs dramatically improves overall network performance, advanced caching policies are needed when considering increased content heterogeneity. Thus, we propose popularity-driven (pLFU) and cooperation-based (sLFU) caching policies at individual CDCs to account for user and content dynamics over time. The amalgamation of urban population densities, multiple CDC placements and smarter caching techniques help exploit the ultimate benefits of a content-centric urban communications network and dramatically improves overall network performance and responsiveness. Our proposed solutions are validated using LinkNYC as a use-case.
△ Less
Submitted 30 May, 2018;
originally announced May 2018.
-
Compressed Wideband Spectrum Sensing: Concept, Challenges and Enablers
Authors:
Bechir Hamdaoui,
Bassem Khalfi,
Mohsen Guizani
Abstract:
Spectrum sensing research has mostly been focusing on narrowband access, and not until recently have researchers started looking at wideband spectrum. Broadly speaking, wideband spectrum sensing approaches can be categorized into two classes: Nyquist-rate and sub-Nyquist-rate sampling approaches. Nyquist-rate approaches have major practical issues that question their suitability for realtime appli…
▽ More
Spectrum sensing research has mostly been focusing on narrowband access, and not until recently have researchers started looking at wideband spectrum. Broadly speaking, wideband spectrum sensing approaches can be categorized into two classes: Nyquist-rate and sub-Nyquist-rate sampling approaches. Nyquist-rate approaches have major practical issues that question their suitability for realtime applications; this is mainly because their high-rate sampling requirement calls for complex hardware and signal processing algorithms that incur significant delays. Sub-Nyquist-rate approaches, on the other hand, are more appealing due to their less stringent sampling-rate requirement. Although various concepts have been investigated to ensure sub-Nyquist rates, compressive sampling theory is definitely one concept that has attracted so much interest. This paper explains and illustrates how compressive sampling has been leveraged to improve wideband spectrum sensing by enabling spectrum occupancy recovery with sub-Nyquist sampling rates. The paper also introduces new ideas with great potential for further wideband spectrum sensing enhancements, and identifies key future research challenges and directions that remain to be investigated.
△ Less
Submitted 10 May, 2018;
originally announced May 2018.
-
A Particle Filtering Approach for Enabling Distributed and Scalable Sharing of DSA Network Resources
Authors:
Bassem Khalfi,
Mahdi Ben Ghorbel,
Bechir Hamdaoui,
Mohsen Guizani,
Nizar Zorba
Abstract:
Handling the massive number of devices needed in numerous applications such as smart cities is a major challenge given the scarcity of spectrum resources. Dynamic spectrum access (DSA) is seen as a potential candidate to support the connectivity and spectrum access of these devices. We propose an efficient technique that relies on particle filtering to enable distributed resource allocation and sh…
▽ More
Handling the massive number of devices needed in numerous applications such as smart cities is a major challenge given the scarcity of spectrum resources. Dynamic spectrum access (DSA) is seen as a potential candidate to support the connectivity and spectrum access of these devices. We propose an efficient technique that relies on particle filtering to enable distributed resource allocation and sharing for large-scale dynamic spectrum access networks. More specifically, we take advantage of the high tracking capability of particle filtering to efficiently assign the available spectrum and power resources among cognitive users. Our proposed technique maximizes the per-user throughput while ensuring fairness among users, and it does so while accounting for the different users' quality of service requirements and the channel gains' variability. Through intensive simulations, we show that our proposed approach performs well by achieving high overall throughput while improving user's fairness under different objective functions. Furthermore, it achieves higher performance when compared to state-of-the-art techniques.
△ Less
Submitted 17 October, 2017;
originally announced October 2017.
-
Extracting and Exploiting Inherent Sparsity for Efficient IoT Support in 5G: Challenges and Potential Solutions
Authors:
Bassem Khalfi,
Bechir Hamdaoui,
Mohsen Guizani
Abstract:
Besides enabling an enhanced mobile broadband, next generation of mobile networks (5G) are envisioned for the support of massive connectivity of heterogeneous Internet of Things (IoT)s. These IoTs are envisioned for a large number of use-cases including smart cities, environment monitoring, smart vehicles, etc. Unfortunately, most IoTs have very limited computing and storage capabilities and need…
▽ More
Besides enabling an enhanced mobile broadband, next generation of mobile networks (5G) are envisioned for the support of massive connectivity of heterogeneous Internet of Things (IoT)s. These IoTs are envisioned for a large number of use-cases including smart cities, environment monitoring, smart vehicles, etc. Unfortunately, most IoTs have very limited computing and storage capabilities and need cloud services. Hence, connecting these devices through 5G systems requires huge spectrum resources in addition to handling the massive connectivity and improved security. This article discusses the challenges facing the support of IoTs through 5G systems. The focus is devoted to discussing physical layer limitations in terms of spectrum resources and radio access channel connectivity. We show how sparsity can be exploited for addressing these challenges especially in terms of enabling wideband spectrum management and handling the connectivity by exploiting device-to-device communications and edge-cloud. Moreover, we identify major open problems and research directions that need to be explored towards enabling the support of massive heterogeneous IoTs through 5G systems.
△ Less
Submitted 21 July, 2017;
originally announced July 2017.
-
Optimizing Joint Data and Power Transfer in Energy Harvesting Multiuser Wireless Networks
Authors:
Bassem Khalfi,
Bechir Hamdaoui,
Mahdi Ben Ghorbel,
Mohsen Guizani,
Xi Zhang,
Nizar Zorba
Abstract:
Energy harvesting emerges as a potential solution for prolonging the lifetime of the energy-constrained mobile wireless devices. In this paper, we focus on Radio Frequency (RF) energy harvesting for multiuser multicarrier mobile wireless networks. Specifically, we propose joint data and energy transfer optimization frameworks for powering mobile wireless devices through RF energy harvesting. We in…
▽ More
Energy harvesting emerges as a potential solution for prolonging the lifetime of the energy-constrained mobile wireless devices. In this paper, we focus on Radio Frequency (RF) energy harvesting for multiuser multicarrier mobile wireless networks. Specifically, we propose joint data and energy transfer optimization frameworks for powering mobile wireless devices through RF energy harvesting. We introduce a power utility that captures the power consumption cost at the base station (BS) and the used power from the users' batteries, and determine optimal power resource allocations that meet data rate requirements of downlink and uplink communications. Two types of harvesting capabilities are considered at each user: harvesting only from dedicated RF signals and hybrid harvesting from both dedicated and ambient RF signals. The developed frameworks increase the end users' battery lifetime at the cost of a slight increase in the BS power consumption. Several evaluation studies are conducted in order to validate our proposed frameworks.
△ Less
Submitted 21 July, 2017;
originally announced July 2017.
-
Efficient Spectrum Availability Information Recovery for Wideband DSA Networks: A Weighted Compressive Sampling Approach
Authors:
Bassem Khalfi,
Bechir Hamdaoui,
Mohsen Guizani,
Nizar Zorba
Abstract:
Compressive sampling has great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that leverage compressive sampling to enable efficient wideband spectrum sensing. These efforts consider homogenous wideband spectrum, where all bands are assumed to have similar PU traffic characteristics. In practice, however…
▽ More
Compressive sampling has great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that leverage compressive sampling to enable efficient wideband spectrum sensing. These efforts consider homogenous wideband spectrum, where all bands are assumed to have similar PU traffic characteristics. In practice, however, wideband spectrum is not homogeneous, in that different spectrum bands could present different PU occupancy patterns. In fact, the nature of spectrum assignment, in which applications of similar types are often assigned bands within the same block, dictates that wideband spectrum is indeed heterogeneous. In this paper, we consider heterogeneous wideband spectrum, and exploit its inherent, block-like structure to design efficient compressive spectrum sensing techniques that are well suited for heterogeneous wideband spectrum. We propose a weighted $\ell_1-$minimization sensing information recovery algorithm that achieves more stable recovery than that achieved by existing approaches while accounting for the variations of spectrum occupancy across both the time and frequency dimensions. In addition, we show that our proposed algorithm requires a lesser number of sensing measurements when compared to the state-of-the-art approaches.
△ Less
Submitted 20 July, 2017; v1 submitted 2 July, 2017;
originally announced July 2017.
-
When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance
Authors:
Mohamed Grissa,
Attila A. Yavuz,
Bechir Hamdaoui
Abstract:
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communicati…
▽ More
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communications Commission (FCC), all certified spectrum databases synchronize their records. Hence, the same copy of spectrum database is available through multiple (distinct) providers. We harness the synergy between multi-server private information retrieval (PIR) and database- driven CRN architecture to offer an optimal level of privacy with high efficiency by exploiting this observation. We demonstrated, analytically and experimentally with deployments on actual cloud systems that, our adaptations of multi-server PIR outperform that of the (currently) fastest single-server PIR by a magnitude of times with information theoretic security, collusion resiliency, and fault-tolerance features. Our analysis indicates that multi-server PIR is an ideal cryptographic tool to provide location privacy in database-driven CRNs, in which the requirement of replicated databases is a natural part of the system architecture, and therefore SUs can enjoy all advantages of multi-server PIR without any additional architectural and deployment costs.
△ Less
Submitted 2 May, 2017;
originally announced May 2017.
-
FogMQ: A Message Broker System for Enabling Distributed, Internet-Scale IoT Applications over Heterogeneous Cloud Platforms
Authors:
Sherif Abdelwahab,
Bechir Hamdaoui
Abstract:
Excessive tail end-to-end latency occurs with conventional message brokers as a result of having massive numbers of geographically distributed devices communicate through a message broker. On the other hand, broker-less messaging systems, though ensure low latency, are highly dependent on the limitation of direct device-to-device (D2D) communication technologies, and cannot scale well as large num…
▽ More
Excessive tail end-to-end latency occurs with conventional message brokers as a result of having massive numbers of geographically distributed devices communicate through a message broker. On the other hand, broker-less messaging systems, though ensure low latency, are highly dependent on the limitation of direct device-to-device (D2D) communication technologies, and cannot scale well as large numbers of resource-limited devices exchange messages. In this paper, we propose FogMQ, a cloud-based message broker system that overcomes the limitations of conventional systems by enabling autonomous discovery, self-deployment, and online migration of message brokers across heterogeneous cloud platforms. For each device, FogMQ provides a high capacity device cloning service that subscribes to device messages. The clones facilitate near-the-edge data analytics in resourceful cloud compute nodes. Clones in FogMQ apply Flock, an algorithm mimicking flocking-like behavior to allow clones to dynamically select and autonomously migrate to different heterogeneous cloud platforms in a distributed manner.
△ Less
Submitted 3 October, 2016;
originally announced October 2016.
-
Flocking Virtual Machines in Quest for Responsive IoT Cloud Services
Authors:
Sherif Abdelwahab,
Bechir Hamdaoui
Abstract:
We propose Flock; a simple and scalable protocol that enables live migration of Virtual Machines (VMs) across heterogeneous edge and conventional cloud platforms to improve the responsiveness of cloud services. Flock is designed with properties that are suitable for the use cases of the Internet of Things (IoT). We describe the properties of regularized latency measurements that Flock can use for…
▽ More
We propose Flock; a simple and scalable protocol that enables live migration of Virtual Machines (VMs) across heterogeneous edge and conventional cloud platforms to improve the responsiveness of cloud services. Flock is designed with properties that are suitable for the use cases of the Internet of Things (IoT). We describe the properties of regularized latency measurements that Flock can use for asynchronous and autonomous migration decisions. Such decisions allow communicating VMs to follow a flocking-like behavior that consists of three simple rules: separation, alignment, and cohesion. Using game theory, we derive analytical bounds on Flock's Price of Anarchy (PoA), and prove that flocking VMs converge to a Nash Equilibrium while settling in the best possible cloud platforms. We verify the effectiveness of Flock through simulations and discuss how its generic objective can simply be tweaked to achieve other objectives, such as cloud load balancing and energy consumption minimization.
△ Less
Submitted 2 October, 2016;
originally announced October 2016.
-
A Simple Algorithm for Coloring m-Clique Holes
Authors:
Bechir Hamdaoui
Abstract:
An m-clique hole is a sequence $φ=(Φ_1,Φ_2,\dots,Φ_m)$ of $m$ distinct cliques such that $|Φ_i| \leq m$ for all $i=1,2,\ldots,m$, and whose clique graph is a hole on $m$ vertices. That is, $φ$ is an m-clique hole if for all $i\neq j$, $i,j=1,2,\ldots,m$, $Φ_i \cap Φ_{j} \neq \emptyset$ if and only if $(j-1)~\mbox{mod}~m = (j+1)~\mbox{mod}~m = i~\mbox{mod}~m$. This paper derives a sufficient and ne…
▽ More
An m-clique hole is a sequence $φ=(Φ_1,Φ_2,\dots,Φ_m)$ of $m$ distinct cliques such that $|Φ_i| \leq m$ for all $i=1,2,\ldots,m$, and whose clique graph is a hole on $m$ vertices. That is, $φ$ is an m-clique hole if for all $i\neq j$, $i,j=1,2,\ldots,m$, $Φ_i \cap Φ_{j} \neq \emptyset$ if and only if $(j-1)~\mbox{mod}~m = (j+1)~\mbox{mod}~m = i~\mbox{mod}~m$. This paper derives a sufficient and necessary condition on m-colorability of m-clique holes, and proposes a coloring algorithm that colors m-clique holes with exactly m colors.
△ Less
Submitted 27 August, 2015;
originally announced August 2015.
-
Cloud-Assisted Remote Sensor Network Virtualization for Distributed Consensus Estimation
Authors:
Sherif Abdelwahab,
Bechir Hamdaoui,
Mohsen Guizani
Abstract:
We develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. We first propose a distributed sensor network virtualization algorithm that searches for, selects, and coordinates Internet-accessible sensors to perform a sensing task in a specific region. The algorithm converges in linearithmic time for large-scale…
▽ More
We develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. We first propose a distributed sensor network virtualization algorithm that searches for, selects, and coordinates Internet-accessible sensors to perform a sensing task in a specific region. The algorithm converges in linearithmic time for large-scale networks, and requires exchanging a number of messages that is at most linear in the number of sensors. Second, we design an uncoordinated, distributed algorithm that relies on the selected sensors to estimate a set of parameters without requiring synchronization among the sensors. Our simulation results show that the proposed algorithm, when compared to conventional ADMM (Alternating Direction Method of Multipliers), reduces communication overhead significantly without compromising the estimation error. In addition, the convergence time, though increases slightly, is still linear as in the case of conventional ADMM.
△ Less
Submitted 14 January, 2015;
originally announced January 2015.