-
Belt and Brace: When Federated Learning Meets Differential Privacy
Authors:
Xuebin Ren,
Shusen Yang,
Cong Zhao,
Julie McCann,
Zongben Xu
Abstract:
Federated learning (FL) has great potential for large-scale machine learning (ML) without exposing raw data.Differential privacy (DP) is the de facto standard of privacy protection with provable guarantees.Advances in ML suggest that DP would be a perfect fit for FL with comprehensive privacy preservation. Hence, extensive efforts have been devoted to achieving practically usable FL with DP, which…
▽ More
Federated learning (FL) has great potential for large-scale machine learning (ML) without exposing raw data.Differential privacy (DP) is the de facto standard of privacy protection with provable guarantees.Advances in ML suggest that DP would be a perfect fit for FL with comprehensive privacy preservation. Hence, extensive efforts have been devoted to achieving practically usable FL with DP, which however is still challenging.Practitioners often not only are not fully aware of its development and categorization, but also face a hard choice between privacy and utility. Therefore, it calls for a holistic review of current advances and an investigation on the challenges and opportunities for highly usable FL systems with a DP guarantee. In this article, we first introduce the primary concepts of FL and DP, and highlight the benefits of integration. We then review the current developments by categorizing different paradigms and notions. Aiming at usable FL with DP, we present the optimization principles to seek a better tradeoff between model utility and privacy loss. Finally, we discuss future challenges in the emergent areas and relevant research topics.
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
Investigating Why Clinicians Deviate from Standards of Care: Liberating Patients from Mechanical Ventilation in the ICU
Authors:
Nur Yildirim,
Susanna Zlotnikov,
Aradhana Venkat,
Gursimran Chawla,
Jennifer Kim,
Leigh A. Bukowski,
Jeremy M. Kahn,
James McCann,
John Zimmerman
Abstract:
Clinical practice guidelines, care pathways, and protocols are designed to support evidence-based practices for clinicians; however, their adoption remains a challenge. We set out to investigate why clinicians deviate from the ``Wake Up and Breathe'' protocol, an evidence-based guideline for liberating patients from mechanical ventilation in the intensive care unit (ICU). We conducted over 40 hour…
▽ More
Clinical practice guidelines, care pathways, and protocols are designed to support evidence-based practices for clinicians; however, their adoption remains a challenge. We set out to investigate why clinicians deviate from the ``Wake Up and Breathe'' protocol, an evidence-based guideline for liberating patients from mechanical ventilation in the intensive care unit (ICU). We conducted over 40 hours of direct observations of live clinical workflows, 17 interviews with frontline care providers, and 4 co-design workshops at three different medical intensive care units. Our findings indicate that unlike prior literature suggests, disagreement with the protocol is not a substantial barrier to adoption. Instead, the uncertainty surrounding the application of the protocol for individual patients leads clinicians to deprioritize adoption in favor of tasks where they have high certainty. Reflecting on these insights, we identify opportunities for technical systems to help clinicians in effectively executing the protocol and discuss future directions for HCI research to support the integration of protocols into clinical practice in complex, team-based healthcare settings.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
CoFRIDA: Self-Supervised Fine-Tuning for Human-Robot Co-Painting
Authors:
Peter Schaldenbrand,
Gaurav Parmar,
Jun-Yan Zhu,
James McCann,
Jean Oh
Abstract:
Prior robot painting and drawing work, such as FRIDA, has focused on decreasing the sim-to-real gap and expanding input modalities for users, but the interaction with these systems generally exists only in the input stages. To support interactive, human-robot collaborative painting, we introduce the Collaborative FRIDA (CoFRIDA) robot painting framework, which can co-paint by modifying and engagin…
▽ More
Prior robot painting and drawing work, such as FRIDA, has focused on decreasing the sim-to-real gap and expanding input modalities for users, but the interaction with these systems generally exists only in the input stages. To support interactive, human-robot collaborative painting, we introduce the Collaborative FRIDA (CoFRIDA) robot painting framework, which can co-paint by modifying and engaging with content already painted by a human collaborator. To improve text-image alignment, FRIDA's major weakness, our system uses pre-trained text-to-image models; however, pre-trained models in the context of real-world co-painting do not perform well because they (1) do not understand the constraints and abilities of the robot and (2) cannot perform co-painting without making unrealistic edits to the canvas and overwriting content. We propose a self-supervised fine-tuning procedure that can tackle both issues, allowing the use of pre-trained state-of-the-art text-image alignment models with robots to enable co-painting in the physical world. Our open-source approach, CoFRIDA, creates paintings and drawings that match the input text prompt more clearly than FRIDA, both from a blank canvas and one with human created work. More generally, our fine-tuning procedure successfully encodes the robot's constraints and abilities into a foundation model, showcasing promising results as an effective method for reducing sim-to-real gaps.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Sketching AI Concepts with Capabilities and Examples: AI Innovation in the Intensive Care Unit
Authors:
Nur Yildirim,
Susanna Zlotnikov,
Deniz Sayar,
Jeremy M. Kahn,
Leigh A. Bukowski,
Sher Shah Amin,
Kathryn A. Riman,
Billie S. Davis,
John S. Minturn,
Andrew J. King,
Dan Ricketts,
Lu Tang,
Venkatesh Sivaraman,
Adam Perer,
Sarah M. Preum,
James McCann,
John Zimmerman
Abstract:
Advances in artificial intelligence (AI) have enabled unprecedented capabilities, yet innovation teams struggle when envisioning AI concepts. Data science teams think of innovations users do not want, while domain experts think of innovations that cannot be built. A lack of effective ideation seems to be a breakdown point. How might multidisciplinary teams identify buildable and desirable use case…
▽ More
Advances in artificial intelligence (AI) have enabled unprecedented capabilities, yet innovation teams struggle when envisioning AI concepts. Data science teams think of innovations users do not want, while domain experts think of innovations that cannot be built. A lack of effective ideation seems to be a breakdown point. How might multidisciplinary teams identify buildable and desirable use cases? This paper presents a first hand account of ideating AI concepts to improve critical care medicine. As a team of data scientists, clinicians, and HCI researchers, we conducted a series of design workshops to explore more effective approaches to AI concept ideation and problem formulation. We detail our process, the challenges we encountered, and practices and artifacts that proved effective. We discuss the research implications for improved collaboration and stakeholder engagement, and discuss the role HCI might play in reducing the high failure rate experienced in AI innovation.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
WiMANS: A Benchmark Dataset for WiFi-based Multi-user Activity Sensing
Authors:
Shuokang Huang,
Kaihan Li,
Di You,
Yichong Chen,
Arvin Lin,
Siying Liu,
Xiaohui Li,
Julie A. McCann
Abstract:
WiFi-based human sensing has exhibited remarkable potential to analyze user behaviors in a non-intrusive and device-free manner, benefiting applications as diverse as smart homes and healthcare. However, most previous works focus on single-user sensing, which has limited practicability in scenarios involving multiple users. Although recent studies have begun to investigate WiFi-based multi-user se…
▽ More
WiFi-based human sensing has exhibited remarkable potential to analyze user behaviors in a non-intrusive and device-free manner, benefiting applications as diverse as smart homes and healthcare. However, most previous works focus on single-user sensing, which has limited practicability in scenarios involving multiple users. Although recent studies have begun to investigate WiFi-based multi-user sensing, there remains a lack of benchmark datasets to facilitate reproducible and comparable research. To bridge this gap, we present WiMANS, to our knowledge, the first dataset for multi-user sensing based on WiFi. WiMANS contains over 9.4 hours of dual-band WiFi Channel State Information (CSI), as well as synchronized videos, monitoring simultaneous activities of multiple users. We exploit WiMANS to benchmark the performance of state-of-the-art WiFi-based human sensing models and video-based models, posing new challenges and opportunities for future work. We believe WiMANS can push the boundaries of current studies and catalyze the research on WiFi-based multi-user sensing.
△ Less
Submitted 12 March, 2024; v1 submitted 24 January, 2024;
originally announced February 2024.
-
Customizing Textile and Tactile Skins for Interactive Industrial Robots
Authors:
Bo Ying Su,
Zhongqi Wei,
James McCann,
Wenzhen Yuan,
Changliu Liu
Abstract:
Tactile skins made from textiles enhance robot-human interaction by localizing contact points and measuring contact forces. This paper presents a solution for rapidly fabricating, calibrating, and deploying these skins on industrial robot arms. The novel automated skin calibration procedure maps skin locations to robot geometry and calibrates contact force. Through experiments on a FANUC LR Mate 2…
▽ More
Tactile skins made from textiles enhance robot-human interaction by localizing contact points and measuring contact forces. This paper presents a solution for rapidly fabricating, calibrating, and deploying these skins on industrial robot arms. The novel automated skin calibration procedure maps skin locations to robot geometry and calibrates contact force. Through experiments on a FANUC LR Mate 200id/7L industrial robot, we demonstrate that tactile skins made from textiles can be effectively used for human-robot interaction in industrial environments, and can provide unique opportunities in robot control and learning, making them a promising technology for enhancing robot perception and interaction.
△ Less
Submitted 6 August, 2023;
originally announced August 2023.
-
RobotSweater: Scalable, Generalizable, and Customizable Machine-Knitted Tactile Skins for Robots
Authors:
Zilin Si,
Tianhong Catherine Yu,
Katrene Morozov,
James McCann,
Wenzhen Yuan
Abstract:
Tactile sensing is essential for robots to perceive and react to the environment. However, it remains a challenge to make large-scale and flexible tactile skins on robots. Industrial machine knitting provides solutions to manufacture customizable fabrics. Along with functional yarns, it can produce highly customizable circuits that can be made into tactile skins for robots. In this work, we presen…
▽ More
Tactile sensing is essential for robots to perceive and react to the environment. However, it remains a challenge to make large-scale and flexible tactile skins on robots. Industrial machine knitting provides solutions to manufacture customizable fabrics. Along with functional yarns, it can produce highly customizable circuits that can be made into tactile skins for robots. In this work, we present RobotSweater, a machine-knitted pressure-sensitive tactile skin that can be easily applied on robots. We design and fabricate a parameterized multi-layer tactile skin using off-the-shelf yarns, and characterize our sensor on both a flat testbed and a curved surface to show its robust contact detection, multi-contact localization, and pressure sensing capabilities. The sensor is fabricated using a well-established textile manufacturing process with a programmable industrial knitting machine, which makes it highly customizable and low-cost. The textile nature of the sensor also makes it easily fit curved surfaces of different robots and have a friendly appearance. Using our tactile skins, we conduct closed-loop control with tactile feedback for two applications: (1) human lead-through control of a robot arm, and (2) human-robot interaction with a mobile robot.
△ Less
Submitted 5 March, 2023;
originally announced March 2023.
-
FRIDA: A Collaborative Robot Painter with a Differentiable, Real2Sim2Real Planning Environment
Authors:
Peter Schaldenbrand,
James McCann,
Jean Oh
Abstract:
Painting is an artistic process of rendering visual content that achieves the high-level communication goals of an artist that may change dynamically throughout the creative process. In this paper, we present a Framework and Robotics Initiative for Develo** Arts (FRIDA) that enables humans to produce paintings on canvases by collaborating with a painter robot using simple inputs such as language…
▽ More
Painting is an artistic process of rendering visual content that achieves the high-level communication goals of an artist that may change dynamically throughout the creative process. In this paper, we present a Framework and Robotics Initiative for Develo** Arts (FRIDA) that enables humans to produce paintings on canvases by collaborating with a painter robot using simple inputs such as language descriptions or images. FRIDA introduces several technical innovations for computationally modeling a creative painting process. First, we develop a fully differentiable simulation environment for painting, adopting the idea of real to simulation to real (real2sim2real). We show that our proposed simulated painting environment is higher fidelity to reality than existing simulation environments used for robot painting. Second, to model the evolving dynamics of a creative process, we develop a planning approach that can continuously optimize the painting plan based on the evolving canvas with respect to the high-level goals. In contrast to existing approaches where the content generation process and action planning are performed independently and sequentially, FRIDA adapts to the stochastic nature of using paint and a brush by continually re-planning and re-assessing its semantic goals based on its visual perception of the painting progress. We describe the details on the technical approach as well as the system integration.
△ Less
Submitted 2 October, 2022;
originally announced October 2022.
-
ACE: Towards Application-Centric Edge-Cloud Collaborative Intelligence
Authors:
Luhui Wang,
Cong Zhao,
Shusen Yang,
Xinyu Yang,
Julie McCann
Abstract:
Intelligent applications based on machine learning are impacting many parts of our lives. They are required to operate under rigorous practical constraints in terms of service latency, network bandwidth overheads, and also privacy. Yet current implementations running in the Cloud are unable to satisfy all these constraints. The Edge-Cloud Collaborative Intelligence (ECCI) paradigm has become a pop…
▽ More
Intelligent applications based on machine learning are impacting many parts of our lives. They are required to operate under rigorous practical constraints in terms of service latency, network bandwidth overheads, and also privacy. Yet current implementations running in the Cloud are unable to satisfy all these constraints. The Edge-Cloud Collaborative Intelligence (ECCI) paradigm has become a popular approach to address such issues, and rapidly increasing applications are developed and deployed. However, these prototypical implementations are developer-dependent and scenario-specific without generality, which cannot be efficiently applied in large-scale or to general ECC scenarios in practice, due to the lack of supports for infrastructure management, edge-cloud collaborative service, complex intelligence workload, and efficient performance optimization. In this article, we systematically design and construct the first unified platform, ACE, that handles ever-increasing edge and cloud resources, user-transparent services, and proliferating intelligence workloads with increasing scale and complexity, to facilitate cost-efficient and high-performing ECCI application development and deployment. For verification, we explicitly present the construction process of an ACE-based intelligent video query application, and demonstrate how to achieve customizable performance optimization efficiently. Based on our initial experience, we discuss both the limitations and vision of ACE to shed light on promising issues to elaborate in the approaching ECCI ecosystem.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
IRONWAN: Increasing Reliability of Overlap** Networks in LoRaWAN
Authors:
Laksh Bhatia,
Po-Yu Chen,
Michael Breza,
Cong Zhao,
Julie A. McCann
Abstract:
LoRaWAN deployments follow an ad-hoc deployment model that has organically led to overlap** communication networks, sharing the wireless spectrum, and completely unaware of each other. LoRaWAN uses ALOHA-style communication where it is almost impossible to schedule transmission between networks belonging to different owners properly. The inability to schedule overlap** networks will cause inte…
▽ More
LoRaWAN deployments follow an ad-hoc deployment model that has organically led to overlap** communication networks, sharing the wireless spectrum, and completely unaware of each other. LoRaWAN uses ALOHA-style communication where it is almost impossible to schedule transmission between networks belonging to different owners properly. The inability to schedule overlap** networks will cause inter-network interference, which will increase node-to-gateway message losses and gateway-to-node acknowledgement failures. This problem is likely to get worse as the number of LoRaWAN networks increase. In response to this problem, we propose IRONWAN, a wireless overlay network that shares communication resources without modifications to underlying protocols. It utilises the broadcast nature of radio communication and enables gateway-to-gateway communication to facilitate the search for failed messages and transmit failed acknowledgements already received and cached in overlap** network's gateways. IRONWAN uses two novel algorithms, a Real-time Message Inter-arrival Predictor, to highlight when a server has not received an expected uplink message. The Interference Predictor ensures that extra gateway-to-gateway communication does not negatively impact communication bandwidth. We evaluate IRONWAN on a 1000-node simulator with up to ten gateways and a 10-node testbed with 2-gateways. Results show that IRONWAN can achieve up to 12\% higher packet delivery ratio (PDR) and total messages received per node while increasing the minimum PDR by up to 28\%. These improvements save up to 50\% node's energy. Finally, we demonstrate that IRONWAN has comparable performance to an optimal solution (wired, centralised) but with 2-32 times lower communication costs. IRONWAN also has up to 14\% better PDR when compared to FLIP, a wired-distributed gateway-to-gateway protocol in certain scenarios.
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Dataset: LoED: The LoRaWAN at the Edge Dataset
Authors:
Laksh Bhatia,
Michael Breza,
Ramona Marfievici,
Julie A. McCann
Abstract:
This paper presents the LoRaWAN at the Edge Dataset (LoED), an open LoRaWAN packet dataset collected at gateways. Real-world LoRaWAN datasets are important for repeatable sensor-network and communications research and evaluation as, if carefully collected, they provide realistic working assumptions. LoED data is collected from nine gateways over a four month period in a dense urban environment. Th…
▽ More
This paper presents the LoRaWAN at the Edge Dataset (LoED), an open LoRaWAN packet dataset collected at gateways. Real-world LoRaWAN datasets are important for repeatable sensor-network and communications research and evaluation as, if carefully collected, they provide realistic working assumptions. LoED data is collected from nine gateways over a four month period in a dense urban environment. The dataset contains packet header information and all physical layer properties reported by gateways such as the CRC, RSSI, SNR and spreading factor. Files are provided to analyse the data and get aggregated statistics. The dataset is available at: doi.org/10.5281/zenodo.4121430
△ Less
Submitted 27 October, 2020;
originally announced October 2020.
-
Control Communication Co-Design for Wide Area Cyber-Physical Systems
Authors:
Laksh Bhatia,
Ivana Tomić,
Anqi Fu,
Michael Breza,
Julie A. McCann
Abstract:
Wide Area Cyber-Physical Systems (WA-CPSs) are a class of control systems that integrate low-powered sensors, heterogeneous actuators and computer controllers into large infrastructure that span multi-kilometre distances. Current wireless communication technologies are incapable of meeting the communication requirements of range and bounded delays needed for the control of WA-CPSs. To solve this p…
▽ More
Wide Area Cyber-Physical Systems (WA-CPSs) are a class of control systems that integrate low-powered sensors, heterogeneous actuators and computer controllers into large infrastructure that span multi-kilometre distances. Current wireless communication technologies are incapable of meeting the communication requirements of range and bounded delays needed for the control of WA-CPSs. To solve this problem, we use a Control-Communication Co-design approach for WA-CPSs, that we refer to as the $C^3$ approach, to design a novel Low-Power Wide Area (LPWA) MAC protocol called \textit{Ctrl-MAC} and its associated event-triggered controller that can guarantee the closed-loop stability of a WA-CPS. This is the first paper to show that LPWA wireless communication technologies can support the control of WA-CPSs. LPWA technologies are designed to support one-way communication for monitoring and are not appropriate for control. We present this work using an example of a water distribution network application which we evaluate both through a co-simulator (modelling both physical and cyber subsystems) and testbed deployments. Our evaluation demonstrates full control stability, with up to $50$\% better packet delivery ratios and $80$\% less average end-to-end delays when compared to a state of the art LPWA technology. We also evaluate our scheme against an idealised, wired, centralised, control architecture and show that the controller maintains stability and the overshoots remain within bounds.
△ Less
Submitted 17 August, 2020;
originally announced August 2020.
-
Contact-Aware Opportunistic Data Forwarding in Disconnected LoRaWAN Mobile Networks
Authors:
Po-Yu Chen,
Laksh Bhatia,
Roman Kolcun,
David Boyle,
Julie A. McCann
Abstract:
LoRaWAN is one of the leading Low Power Wide Area Network (LPWAN) architectures. It was originally designed for systems consisting of static sensor or Internet of Things (IoT) devices and static gateways. It was recently updated to introduce new features such as nano-second timestamps which open up applications to enable LoRaWAN to be adopted for mobile device tracking and localisation. In such mo…
▽ More
LoRaWAN is one of the leading Low Power Wide Area Network (LPWAN) architectures. It was originally designed for systems consisting of static sensor or Internet of Things (IoT) devices and static gateways. It was recently updated to introduce new features such as nano-second timestamps which open up applications to enable LoRaWAN to be adopted for mobile device tracking and localisation. In such mobile scenarios, devices could temporarily lose communication with the gateways because of interference from obstacles or deep fading, causing throughput reduction and delays in data transmission. To overcome this problem, we propose a new data forwarding scheme. Instead of holding the data until the next contact with gateways, devices can forward their data to nearby devices that have a higher probability of being in contact with gateways. We propose a new network metric called Real-Time Contact-Aware Expected Transmission Count (RCA-ETX) to model this contact probability in real-time. Without making any assumption on mobility models, this metric exploits data transmission delays to model complex device mobility. We also extend RCA-ETX with a throughput-optimal stochastic backpressure routing scheme and propose Real-Time Opportunistic Backpressure Collection (ROBC), a protocol to counter the stochastic behaviours resulting from the dynamics associated with mobility. To apply our approaches seamlessly to LoRaWAN-enabled devices, we further propose two new LaRaWAN classes, namely Modified Class-C and Queue-based Class-A. Both of them are compatible with LoRaWAN Class-A devices. Our data-driven experiments, based on the London bus network, show that our approaches can reduce data transmission delays up to $25\%$ and provide a $53\%$ throughput improvement in data transfer performance.
△ Less
Submitted 14 April, 2020;
originally announced April 2020.
-
The Limits of LoRaWAN in Event-Triggered Wireless Networked Control Systems
Authors:
Ivana Tomić,
Laksh Bhatia,
Michael J. Breza,
Julie A. McCann
Abstract:
Wireless sensors and actuators offer benefits to large industrial control systems. The absence of wires for communication reduces the deployment cost, maintenance effort, and provides greater flexibility for sensor and actuator location and system architecture. These benefits come at a cost of a high probability of communication delay or message loss due to the unreliability of radio-based communi…
▽ More
Wireless sensors and actuators offer benefits to large industrial control systems. The absence of wires for communication reduces the deployment cost, maintenance effort, and provides greater flexibility for sensor and actuator location and system architecture. These benefits come at a cost of a high probability of communication delay or message loss due to the unreliability of radio-based communication. This unreliability poses a challenge to contemporary control systems that are designed with the assumption of instantaneous and reliable communication. Wireless sensors and actuators create a paradigm shift in engineering energy-efficient control schemes coupled with robust communication schemes that can maintain system stability in the face of unreliable communication. This paper investigates the feasibility of using the low-power wide-area communication protocol LoRaWAN with an event-triggered control scheme through modelling in Matlab. We show that LoRaWAN is capable of meeting the maximum delay and message loss requirements of an event-triggered controller for certain classes of applications. We also expose the limitation in the use of LoRaWAN when message size or communication range requirements increase or the underlying physical system is exposed to significant external disturbances.
△ Less
Submitted 4 February, 2020;
originally announced February 2020.
-
The Separator, a Two-Phase Oil and Water Gravity CPS Separator Testbed
Authors:
Michael Breza,
Laksh Bhatia,
Ivana Tomic,
Anqi Fu,
Waqas Ikram,
Valentinos Kongezos,
Julie A. McCann
Abstract:
Industrial Control Systems (ICS) are evolving with advances in new technology. The addition of wireless sensors and actuators and new control techniques means that engineering practices from communication systems are being integrated into those used for control systems. The two are engineered in very different ways. Neither engineering approach is capable of accounting for the subtle interactions…
▽ More
Industrial Control Systems (ICS) are evolving with advances in new technology. The addition of wireless sensors and actuators and new control techniques means that engineering practices from communication systems are being integrated into those used for control systems. The two are engineered in very different ways. Neither engineering approach is capable of accounting for the subtle interactions and interdependence that occur when the two are combined. This paper describes our first steps to bridge this gap, and push the boundaries of both computer communication system and control system design. We present The Separator testbed, a Cyber-Physical testbed enabling our search for a suitable way to engineer systems that combine both computer networks and control systems.
△ Less
Submitted 1 February, 2020;
originally announced February 2020.
-
XPC: Fast and Reliable Synchronous Transmission Protocols for 2-Phase Commit and 3-Phase Commit
Authors:
Alberto Spina,
Michael Breza,
Naranker Dulay,
Julie McCann
Abstract:
One of the major challenges for the engineering of wireless sensing systems is to improve the software abstractions and frameworks that are available to programmers while ensuring system reliability and efficiency. The distributed systems community have developed a rich set of such abstractions for building dependable distributed systems connected using wired networks, however after 20 years resea…
▽ More
One of the major challenges for the engineering of wireless sensing systems is to improve the software abstractions and frameworks that are available to programmers while ensuring system reliability and efficiency. The distributed systems community have developed a rich set of such abstractions for building dependable distributed systems connected using wired networks, however after 20 years research many of these elude wireless sensor systems. In this paper we present X Process Commit (XPC) an atomic commit protocol framework that utilizes Synchronous Transmission (ST). We also introduce Hybrid, a technique that allows us to exploit the advantages of the Glossy and Chaos Synchronous Transmission primitives to get lower latency and higher reliability than either. Using XPC and Hybrid we demonstrate how to build protocols for the classical 2-phase and 3-phase commit abstractions and evaluate these demonstrating significantly improved performance and reliability than the use of Glossy or Chaos individually as dissemination primitives. We address how we overcame the timing challenges of bringing Glossy and Chaos together to form Hybrid and through extensive experimentation demonstrate that it is robust to in-network radio interference caused by multiple sources. We are first to present testbed results that show that Hybrid can provide almost 100% reliability in a network of nodes suffering from various levels of radio interference.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Resource Allocation for Non-Orthogonal Multiple Access (NOMA) Enabled LPWA Networks
Authors:
Kaihan Li,
Fatma Benkhelifa,
Julie McCann
Abstract:
In this paper, we investigate the resource allocation for uplink non-orthogonal multiple access (NOMA) enabled low-power wide-area (LPWA) networks to support the massive connectivity of users/nodes. Here, LPWA nodes communicate with a central gateway through resource blocks like channels, transmission times, bandwidths, etc. The nodes sharing the same resource blocks suffer from intra-cluster inte…
▽ More
In this paper, we investigate the resource allocation for uplink non-orthogonal multiple access (NOMA) enabled low-power wide-area (LPWA) networks to support the massive connectivity of users/nodes. Here, LPWA nodes communicate with a central gateway through resource blocks like channels, transmission times, bandwidths, etc. The nodes sharing the same resource blocks suffer from intra-cluster interference and possibly inter-cluster interference, which makes current LPWA networks unable to support the massive connectivity. Using the minimum transmission rate metric to highlight the interference reduction that results from the addition of NOMA, and while assuring user throughput fairness, we decompose the minimum rate maximization optimization problem into three sub-problems. First, a low-complexity sub-optimal nodes clustering scheme is proposed assigning nodes to channels based on their normalized channel gains. Then, two types of transmission time allocation algorithms are proposed that either assure fair or unfair transmission time allocation between LPWA nodes sharing the same channel. For a given channel and transmission time allocation, we further propose an optimal power allocation scheme. Simulation evaluations demonstrate approximately 100dB improvement of the selected metric for a single network with 4000 active nodes.
△ Less
Submitted 30 September, 2019; v1 submitted 25 August, 2019;
originally announced August 2019.
-
Structural Design Using Laplacian Shells
Authors:
Erva Ulu,
James McCann,
Levent Burak Kara
Abstract:
We introduce a method to design lightweight shell objects that are structurally robust under the external forces they may experience during use. Given an input 3D model and a general description of the external forces, our algorithm generates a structurally-sound minimum weight shell object. Our approach works by altering the local shell thickness repeatedly based on the stresses that develop insi…
▽ More
We introduce a method to design lightweight shell objects that are structurally robust under the external forces they may experience during use. Given an input 3D model and a general description of the external forces, our algorithm generates a structurally-sound minimum weight shell object. Our approach works by altering the local shell thickness repeatedly based on the stresses that develop inside the object. A key issue in shell design is that large thickness values might result in self-intersections on the inner boundary creating a significant computational challenge during optimization. To address this, we propose a shape parametrization based on the solution to the Laplace's equation that guarantees smooth and intersection-free shell boundaries. Combined with our gradient-free optimization algorithm, our method provides a practical solution to the structural design of hollow objects with a single inner cavity. We demonstrate our method on a variety of problems with arbitrary 3D models under complex force configurations and validate its performance with physical experiments.
△ Less
Submitted 25 June, 2019;
originally announced June 2019.
-
Performance Analysis of Clustered LoRa Networks
Authors:
Zhi** Qin,
Yuanwei Liu,
Geoffrey Ye Li,
Julie A. McCann
Abstract:
In this paper, we investigate the uplink transmission performance of low-power wide-area (LPWA) networks with regards to coexisting radio modules. We adopt long range (LoRa) radio technique as an example of the network of focus even though our analysis can be easily extended to other situations. We exploit a new topology to model the network, where the node locations of LoRa follow a Poisson clust…
▽ More
In this paper, we investigate the uplink transmission performance of low-power wide-area (LPWA) networks with regards to coexisting radio modules. We adopt long range (LoRa) radio technique as an example of the network of focus even though our analysis can be easily extended to other situations. We exploit a new topology to model the network, where the node locations of LoRa follow a Poisson cluster process (PCP) while other coexisting radio modules follow a Poisson point process (PPP). Unlike most of the performance analysis based on stochastic geometry, we take noise into consideration. More specifically, two models, with a fixed and a random number of active LoRa nodes in each cluster, respectively, are considered. To obtain insights, both the exact and simple approximated expressions for coverage probability are derived. Based on them, area spectral efficiency and energy efficiency are obtained. From our analysis, we show how the performance of LPWA networks can be enhanced through adjusting the density of LoRa nodes around each LoRa receiver. Moreover, the simulation results unveil that the optimal number of active LoRa nodes in each cluster exists to maximize the area spectral efficiency.
△ Less
Submitted 31 May, 2019;
originally announced May 2019.
-
Optimal Sampling of Water Distribution Network Dynamics using Graph Fourier Transform
Authors:
Zhuangkun Wei,
Alessio Pagani,
Guangtao Fu,
Ian Guymer,
Wei Chen,
Julie McCann,
Weisi Guo
Abstract:
Water Distribution Networks (WDNs) are critical infrastructures that ensure safe drinking water. One of the major threats is the accidental or intentional injection of pollutants. Data collection remains challenging in underground WDNs and in order to quantify its threat to end users, modeling pollutant spread with minimal sensor data is can important open challenge. Existing approaches using nume…
▽ More
Water Distribution Networks (WDNs) are critical infrastructures that ensure safe drinking water. One of the major threats is the accidental or intentional injection of pollutants. Data collection remains challenging in underground WDNs and in order to quantify its threat to end users, modeling pollutant spread with minimal sensor data is can important open challenge. Existing approaches using numerical optimisation suffer from scalability issues and lack detailed insight and performance guarantees. Applying general data-driven approaches such as compressed sensing (CS) offer limited improvements in sample node reduction. Graph theoretic approaches link topology (e.g. Laplacian spectra) to optimal sensing locations, it neglects the complex dynamics.
In this work, we introduce a novel Graph Fourier Transform (GFT) that exploits the low-rank property to optimally sample junction nodes in WDNs. The proposed GFT allows us to fully recover the full network dynamics using a subset of data sampled at the identified nodes. The proposed GFT technique offers attractive improvements over existing numerical optimisation, compressed sensing, and graph theoretic approaches. Our results show that, on average, with nearly 30-40\% of the junctions monitored, we are able to fully recover the dynamics of the whole network. The framework is useful beyond the application of WDNs and can be applied to a variety of infrastructure sensing for digital twin modeling.
△ Less
Submitted 6 April, 2019;
originally announced April 2019.
-
Dimensionality Reduction has Quantifiable Imperfections: Two Geometric Bounds
Authors:
Kry Yik Chau Lui,
Gavin Weiguang Ding,
Ruitong Huang,
Robert J. McCann
Abstract:
In this paper, we investigate Dimensionality reduction (DR) maps in an information retrieval setting from a quantitative topology point of view. In particular, we show that no DR maps can achieve perfect precision and perfect recall simultaneously. Thus a continuous DR map must have imperfect precision. We further prove an upper bound on the precision of Lipschitz continuous DR maps. While precisi…
▽ More
In this paper, we investigate Dimensionality reduction (DR) maps in an information retrieval setting from a quantitative topology point of view. In particular, we show that no DR maps can achieve perfect precision and perfect recall simultaneously. Thus a continuous DR map must have imperfect precision. We further prove an upper bound on the precision of Lipschitz continuous DR maps. While precision is a natural measure in an information retrieval setting, it does not measure `how' wrong the retrieved data is. We therefore propose a new measure based on Wasserstein distance that comes with similar theoretical guarantee. A key technical step in our proofs is a particular optimization problem of the $L_2$-Wasserstein distance over a constrained set of distributions. We provide a complete solution to this optimization problem, which can be of independent interest on the technical side.
△ Less
Submitted 31 October, 2018;
originally announced November 2018.
-
Lightweight Structure Design Under Force Location Uncertainty
Authors:
Erva Ulu,
James McCann,
Levent Burak Kara
Abstract:
We introduce a lightweight structure optimization approach for problems in which there is uncertainty in the force locations. Such uncertainty may arise due to force contact locations that change during use or are simply unknown a priori. Given an input 3D model, regions on its boundary where arbitrary normal forces may make contact, and a total force-magnitude budget, our algorithm generates a mi…
▽ More
We introduce a lightweight structure optimization approach for problems in which there is uncertainty in the force locations. Such uncertainty may arise due to force contact locations that change during use or are simply unknown a priori. Given an input 3D model, regions on its boundary where arbitrary normal forces may make contact, and a total force-magnitude budget, our algorithm generates a minimum weight 3D structure that withstands any force configuration capped by the budget. Our approach works by repeatedly finding the most critical force configuration and altering the internal structure accordingly. A key issue, however, is that the critical force configuration changes as the structure evolves, resulting in a significant computational challenge. To address this, we propose an efficient critical instant analysis approach. Combined with a reduced order formulation, our method provides a practical solution to the structural optimization problem. We demonstrate our method on a variety of models and validate it with mechanical tests.
△ Less
Submitted 1 November, 2018; v1 submitted 25 October, 2018;
originally announced October 2018.
-
Low-Power Wide-Area Networks for Sustainable IoT
Authors:
Zhi** Qin,
Frank Y. Li,
Geoffrey Ye Li,
Julie A. McCann,
Qiang Ni
Abstract:
Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the cu…
▽ More
Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the currently competing candidates of LPWA networks, such as narrowband IoT (NB-IoT) and long range (LoRa), in terms of technical fundamentals and large-scale deployment potential. Then we present two implementation examples on LPWA networks. By analyzing the field-test results, we identify several challenges that prevent LPWA technologies moving from the theory to wide-spread practice.
△ Less
Submitted 25 October, 2018;
originally announced October 2018.
-
Resource Allocation in Wireless Powered IoT Networks
Authors:
Xiaolan Liu,
Zhi** Qin,
Yue Gao,
Julie A. McCann
Abstract:
In this paper, efficient resource allocation for the uplink transmission of wireless powered IoT networks is investigated. We adopt LoRa technology as an example in the IoT network, but this work is still suitable for other communication technologies. Allocating limited resources, like spectrum and energy resources, among a massive number of users faces critical challenges. We consider grou** wi…
▽ More
In this paper, efficient resource allocation for the uplink transmission of wireless powered IoT networks is investigated. We adopt LoRa technology as an example in the IoT network, but this work is still suitable for other communication technologies. Allocating limited resources, like spectrum and energy resources, among a massive number of users faces critical challenges. We consider grou** wireless powered IoT users into available channels first and then investigate power allocation for users grouped in the same channel to improve the network throughput. Specifically, the user grou** problem is formulated as a many to one matching game. It is achieved by considering IoT users and channels as selfish players which belong to two disjoint sets. Both selfish players focus on maximizing their own utilities. Then we propose an efficient channel allocation algorithm (ECAA) with low complexity for user grou**. Additionally, a Markov Decision Process (MDP) is used to model unpredictable energy arrival and channel conditions uncertainty at each user, and a power allocation algorithm is proposed to maximize the accumulative network throughput over a finite-horizon of time slots. By doing so, we can distribute the channel access and dynamic power allocation local to IoT users. Numerical results demonstrate that our proposed ECAA algorithm achieves near-optimal performance and is superior to random channel assignment, but has much lower computational complexity. Moreover, simulations show that the distributed power allocation policy for each user is obtained with better performance than a centralized offline scheme.
△ Less
Submitted 1 February, 2019; v1 submitted 13 October, 2018;
originally announced October 2018.
-
Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks
Authors:
Ivana Tomic,
Po Yu Chen,
Michael J. Breza,
Julie A. McCann
Abstract:
Wireless Sensor Network (WSN) applications range from domestic Internet of Things systems like temperature monitoring of homes to the monitoring and control of large-scale critical infrastructures. The greatest risk with the use of WSNs in critical infrastructure is their vulnerability to malicious network level attacks. Their radio communication network can be disrupted, causing them to lose or d…
▽ More
Wireless Sensor Network (WSN) applications range from domestic Internet of Things systems like temperature monitoring of homes to the monitoring and control of large-scale critical infrastructures. The greatest risk with the use of WSNs in critical infrastructure is their vulnerability to malicious network level attacks. Their radio communication network can be disrupted, causing them to lose or delay data which will compromise system functionality. This paper presents Antilizer, a lightweight, fully-distributed solution to enable WSNs to detect and recover from common network level attack scenarios. In Antilizer each sensor node builds a self-referenced trust model of its neighbourhood using network overhearing. The node uses the trust model to autonomously adapt its communication decisions. In the case of a network attack, a node can make neighbour collaboration routing decisions to avoid affected regions of the network. Mobile agents further bound the damage caused by attacks. These agents enable a simple notification scheme which propagates collaborative decisions from the nodes to the base station. A filtering mechanism at the base station further validates the authenticity of the information shared by mobile agents. We evaluate Antilizer in simulation against several routing attacks. Our results show that Antilizer reduces data loss down to 1% (4% on average), with operational overheads of less than 1% and provides fast network-wide convergence.
△ Less
Submitted 25 September, 2018;
originally announced September 2018.
-
Poster Abstract: LPWA-MAC - a Low Power Wide Area network MAC protocol for cyber-physical systems
Authors:
Laksh Bhatia,
Ivana Tomic,
Julie A. McCann
Abstract:
Low-Power Wide-Area Networks (LPWANs) are being successfully used for the monitoring of large-scale systems that are delay-tolerant and which have low-bandwidth requirements. The next step would be instrumenting these for the control of Cyber-Physical Systems (CPSs) distributed over large areas which require more bandwidth, bounded delays and higher reliability or at least more rigorous guarantees…
▽ More
Low-Power Wide-Area Networks (LPWANs) are being successfully used for the monitoring of large-scale systems that are delay-tolerant and which have low-bandwidth requirements. The next step would be instrumenting these for the control of Cyber-Physical Systems (CPSs) distributed over large areas which require more bandwidth, bounded delays and higher reliability or at least more rigorous guarantees therein. This paper presents LPWA-MAC, a novel Low Power Wide-Area network MAC protocol, that ensures bounded end-to-end delays, high channel utility and supports many of the different traffic patterns and data-rates typical of CPS.
△ Less
Submitted 12 September, 2018;
originally announced September 2018.
-
Making Sense of the World: Models for Reliable Sensor-Driven Systems
Authors:
Muffy Calder,
Simon Dobson,
Michael Fisher,
Julie McCann
Abstract:
Sensor-driven systems are increasingly ubiquitous: they provide both data and information that can facilitate real-time decision-making and autonomous actuation, as well as enabling informed policy choices by service providers and regulators. But can we guarantee these system do what we expect, can their stake-holders ask deep questions and be confident of obtaining reliable answers? This is more…
▽ More
Sensor-driven systems are increasingly ubiquitous: they provide both data and information that can facilitate real-time decision-making and autonomous actuation, as well as enabling informed policy choices by service providers and regulators. But can we guarantee these system do what we expect, can their stake-holders ask deep questions and be confident of obtaining reliable answers? This is more than standard software engineering: uncertainty pervades not only sensors themselves, but the physical and digital environments in which these systems operate. While we cannot engineer this uncertainty away, through the use of models we can manage its impact in the design, development and deployment of sensor network software. Our contribution consists of two new concepts that improve the modelling process: frames of reference bringing together the different perspectives being modelled and their context; and the roles of different types of model in sensor-driven systems. In this position paper we develop these new concepts, illustrate their application to two example systems, and describe some of the new research challenges involved in modelling for assurance.
△ Less
Submitted 6 February, 2019; v1 submitted 28 March, 2018;
originally announced March 2018.
-
Dynamical SimRank Search on Time-Varying Networks
Authors:
Weiren Yu,
Xuemin Lin,
Wenjie Zhang,
Julie A. McCann
Abstract:
In this article, we study the efficient dynamical computation of all-pairs SimRanks on time-varying graphs. Li {\em et al}.'s approach requires $O(r^4 n^2)$ time and $O(r^2 n^2)$ memory in a graph with $n$ nodes, where $r$ is the target rank of the low-rank SVD. (1) We first consider edge update that does not accompany new node insertions. We show that the SimRank update $ΔS$ in response to every…
▽ More
In this article, we study the efficient dynamical computation of all-pairs SimRanks on time-varying graphs. Li {\em et al}.'s approach requires $O(r^4 n^2)$ time and $O(r^2 n^2)$ memory in a graph with $n$ nodes, where $r$ is the target rank of the low-rank SVD. (1) We first consider edge update that does not accompany new node insertions. We show that the SimRank update $ΔS$ in response to every link update is expressible as a rank-one Sylvester matrix equation. This provides an incremental method requiring $O(Kn^2)$ time and $O(n^2)$ memory in the worst case to update all pairs of similarities for $K$ iterations. (2) To speed up the computation further, we propose a lossless pruning strategy that captures the "affected areas" of $ΔS$ to eliminate unnecessary retrieval. This reduces the time of the incremental SimRank to $O(K(m+|AFF|))$, where $m$ is the number of edges in the old graph, and $|AFF| (\le n^2)$ is the size of "affected areas" in $ΔS$, and in practice, $|AFF| \ll n^2$. (3) We also consider edge updates that accompany node insertions, and categorize them into three cases, according to which end of the inserted edge is a new node. For each case, we devise an efficient incremental algorithm that can support new node insertions. (4) We next design an efficient batch incremental method that handles "similar sink edges" simultaneously and eliminates redundant edge updates. (5) To achieve linear memory, we devise a memory-efficient strategy that dynamically updates all pairs of SimRanks column by column in just $O(Kn+m)$ memory, without the need to store all $(n^2)$ pairs of old SimRank scores. Experimental studies on various datasets demonstrate that our solution substantially outperforms the existing incremental SimRank methods, and is faster and more memory-efficient than its competitors on million-scale graphs.
△ Less
Submitted 31 October, 2017;
originally announced November 2017.
-
Self-Synchronization in Duty-cycled Internet of Things (IoT) Applications
Authors:
Poonam Yadav,
Julie A. McCann,
Tiago Pereira
Abstract:
In recent years, the networks of low-power devices have gained popularity. Typically these devices are wireless and interact to form large networks such as the Machine to Machine (M2M) networks, Internet of Things (IoT), Wearable Computing, and Wireless Sensor Networks. The collaboration among these devices is a key to achieving the full potential of these networks. A major problem in this field i…
▽ More
In recent years, the networks of low-power devices have gained popularity. Typically these devices are wireless and interact to form large networks such as the Machine to Machine (M2M) networks, Internet of Things (IoT), Wearable Computing, and Wireless Sensor Networks. The collaboration among these devices is a key to achieving the full potential of these networks. A major problem in this field is to guarantee robust communication between elements while kee** the whole network energy efficient. In this paper, we introduce an extended and improved emergent broadcast slot (EBS) scheme, which facilitates collaboration for robust communication and is energy efficient. In the EBS, nodes communication unit remains in slee** mode and are awake just to communicate. The EBS scheme is fully decentralized, that is, nodes coordinate their wake-up window in partially overlapped manner within each duty-cycle to avoid message collisions. We show the theoretical convergence behavior of the scheme, which is confirmed through real test-bed experimentation.
△ Less
Submitted 28 July, 2017;
originally announced July 2017.
-
BRPL: Backpressure RPL for High-throughput and Mobile IoTs
Authors:
Yad Tahir,
Shusen Yang,
Julie McCann
Abstract:
RPL, an IPv6 routing protocol for Low power Lossy Networks (LLNs), is considered to be the de facto routing standard for the Internet of Things (IoT). However, more and more experimental results demonstrate that RPL performs poorly when it comes to throughput and adaptability to network dynamics. This significantly limits the application of RPL in many practical IoT scenarios, such as an LLN with…
▽ More
RPL, an IPv6 routing protocol for Low power Lossy Networks (LLNs), is considered to be the de facto routing standard for the Internet of Things (IoT). However, more and more experimental results demonstrate that RPL performs poorly when it comes to throughput and adaptability to network dynamics. This significantly limits the application of RPL in many practical IoT scenarios, such as an LLN with high-speed sensor data streams and mobile sensing devices. To address this issue, we develop BRPL, an extension of RPL, providing a practical approach that allows users to smoothly combine any RPL Object Function (OF) with backpressure routing. BRPL uses two novel algorithms, QuickTheta and QuickBeta, to support time-varying data traffic loads and node mobility respectively. We implement BRPL on Contiki OS, an open-source operating system for the Internet of Things. We conduct an extensive evaluation using both real-world experiments based on the FIT IoT-LAB testbed and large-scale simulations using Cooja over 18 virtual servers on the Cloud. The evaluation results demonstrate that BRPL not only is fully backward compatible with RPL (i.e. devices running RPL and BRPL can work together seamlessly), but also significantly improves network throughput and adaptability to changes in network topologies and data traffic loads. The observed packet loss reduction in mobile networks is, at a minimum, 60% and up to 1000% can be seen in extreme cases.
△ Less
Submitted 19 May, 2017;
originally announced May 2017.
-
Non-orthogonal Multiple Access in Large-Scale Heterogeneous Networks
Authors:
Yuanwei Liu,
Zhi** Qin,
Maged Elkashlan,
Arumugam Nallanathan,
Julie A. McCann
Abstract:
In this paper, the potential benefits of applying non-orthogonal multiple access (NOMA) technique in $K$-tier hybrid heterogeneous networks (HetNets) is explored. A promising new transmission framework is proposed, in which NOMA is adopted in small cells and massive multiple-input multiple-output (MIMO) is employed in macro cells. For maximizing the biased average received power for mobile users,…
▽ More
In this paper, the potential benefits of applying non-orthogonal multiple access (NOMA) technique in $K$-tier hybrid heterogeneous networks (HetNets) is explored. A promising new transmission framework is proposed, in which NOMA is adopted in small cells and massive multiple-input multiple-output (MIMO) is employed in macro cells. For maximizing the biased average received power for mobile users, a NOMA and massive MIMO based user association scheme is developed. To evaluate the performance of the proposed framework, we first derive the analytical expressions for the coverage probability of NOMA enhanced small cells. We then examine the spectrum efficiency of the whole network, by deriving exact analytical expressions for NOMA enhanced small cells and a tractable lower bound for massive MIMO enabled macro cells. Lastly, we investigate the energy efficiency of the hybrid HetNets. Our results demonstrate that: 1) The coverage probability of NOMA enhanced small cells is affected to a large extent by the targeted transmit rates and power sharing coefficients of two NOMA users; 2) Massive MIMO enabled macro cells are capable of significantly enhancing the spectrum efficiency by increasing the number of antennas; 3) The energy efficiency of the whole network can be greatly improved by densely deploying NOMA enhanced small cell base stations (BSs); and 4) The proposed NOMA enhanced HetNets transmission scheme has superior performance compared to the orthogonal multiple access~(OMA) based HetNets.
△ Less
Submitted 9 May, 2017;
originally announced May 2017.
-
Reliability or Sustainability: Optimal Data Stream Estimation and Scheduling in Smart Water Networks
Authors:
Sokratis Kartakis,
Shusen Yang,
Julie A. McCann
Abstract:
As a typical Cyber-Physical System (CPS), smart water distribution networks require monitoring of underground water pipes with high sample rates for precise data analysis and water network control. Due to poor underground wireless channel quality and long-range communication requirements, high transmission power is typically adopted to communicate high-speed sensor data streams; posing challenges…
▽ More
As a typical Cyber-Physical System (CPS), smart water distribution networks require monitoring of underground water pipes with high sample rates for precise data analysis and water network control. Due to poor underground wireless channel quality and long-range communication requirements, high transmission power is typically adopted to communicate high-speed sensor data streams; posing challenges for long term sustainable monitoring. In this paper, we develop the first sustainable water sensing system, exploiting energy harvesting opportunities from water flows. Our system does this by scheduling the transmission of a subset of the data streams, while other correlated streams are estimated using auto-regressive models based on the sound-velocity propagation of pressure signals inside water networks. To compute the optimal scheduling policy, we formalize a stochastic optimization problem to maximize the estimation reliability, while ensuring the system's sustainable operation under dynamic conditions. We develop Data Transmission Scheduling (DTS), an asymptotically optimal scheme; and FAST-DTS, a lightweight online algorithm that can adapt to arbitrary energy and correlation dynamics. Using over 170 days of real data from our smart water system deployment and conducting in-vitro experiments to our small-scale testbed; our evaluation demonstrates that Fast-DTS significantly outperforms three alternatives, considering data reliability, energy utilization, and sustainable operation.
△ Less
Submitted 22 March, 2017;
originally announced March 2017.
-
Modulation and Multiple Access for 5G Networks
Authors:
Yunlong Cai,
Zhi** Qin,
Fangyu Cui,
Geoffrey Ye Li,
Julie A. McCann
Abstract:
Fifth generation (5G) wireless networks face various challenges in order to support large-scale heterogeneous traffic and users, therefore new modulation and multiple access (MA) schemes are being developed to meet the changing demands. As this research space is ever increasing, it becomes more important to analyze the various approaches, therefore in this article we present a comprehensive overvi…
▽ More
Fifth generation (5G) wireless networks face various challenges in order to support large-scale heterogeneous traffic and users, therefore new modulation and multiple access (MA) schemes are being developed to meet the changing demands. As this research space is ever increasing, it becomes more important to analyze the various approaches, therefore in this article we present a comprehensive overview of the most promising modulation and MA schemes for 5G networks. We first introduce the different types of modulation that indicate their potential for orthogonal multiple access (OMA) schemes and compare their performance in terms of spectral efficiency, out-of-band leakage, and bit-error rate. We then pay close attention to various types of non-orthogonal multiple access (NOMA) candidates, including power-domain NOMA, code-domain NOMA, and NOMA multiplexing in multiple domains. From this exploration we can identify the opportunities and challenges that will have significant impact on the design of modulation and MA for 5G networks.
△ Less
Submitted 21 February, 2017;
originally announced February 2017.
-
Rapid, User-Transparent, and Trustworthy Device Pairing for D2D-Enabled Mobile Crowdsourcing
Authors:
Cong Zhao,
Shusen Yang,
Xinyu Yang,
Julie McCann
Abstract:
Mobile Crowdsourcing is a promising service paradigm utilizing ubiquitous mobile devices to facilitate largescale crowdsourcing tasks (e.g. urban sensing and collaborative computing). Many applications in this domain require Device-to-Device (D2D) communications between participating devices for interactive operations such as task collaborations and file transmissions. Considering the private part…
▽ More
Mobile Crowdsourcing is a promising service paradigm utilizing ubiquitous mobile devices to facilitate largescale crowdsourcing tasks (e.g. urban sensing and collaborative computing). Many applications in this domain require Device-to-Device (D2D) communications between participating devices for interactive operations such as task collaborations and file transmissions. Considering the private participating devices and their opportunistic encountering behaviors, it is highly desired to establish secure and trustworthy D2D connections in a fast and autonomous way, which is vital for implementing practical Mobile Crowdsourcing Systems (MCSs). In this paper, we develop an efficient scheme, Trustworthy Device Pairing (TDP), which achieves user-transparent secure D2D connections and reliable peer device selections for trustworthy D2D communications. Through rigorous analysis, we demonstrate the effectiveness and security intensity of TDP in theory. The performance of TDP is evaluated based on both real-world prototype experiments and extensive trace-driven simulations. Evaluation results verify our theoretical analysis and show that TDP significantly outperforms existing approaches in terms of pairing speed, stability, and security.
△ Less
Submitted 8 January, 2017;
originally announced January 2017.
-
LoPub: High-Dimensional Crowdsourced Data Publication with Local Differential Privacy
Authors:
Xuebin Ren,
Chia-Mu Yu,
Weiren Yu,
Shusen Yang,
Xinyu Yang,
Julie A. McCann,
Philip S. Yu
Abstract:
High-dimensional crowdsourced data collected from a large number of users produces rich knowledge for our society. However, it also brings unprecedented privacy threats to participants. Local privacy, a variant of differential privacy, is proposed as a means to eliminate the privacy concern. Unfortunately, achieving local privacy on high-dimensional crowdsourced data raises great challenges on bot…
▽ More
High-dimensional crowdsourced data collected from a large number of users produces rich knowledge for our society. However, it also brings unprecedented privacy threats to participants. Local privacy, a variant of differential privacy, is proposed as a means to eliminate the privacy concern. Unfortunately, achieving local privacy on high-dimensional crowdsourced data raises great challenges on both efficiency and effectiveness. Here, based on EM and Lasso regression, we propose efficient multi-dimensional joint distribution estimation algorithms with local privacy. Then, we develop a Locally privacy-preserving high-dimensional data Publication algorithm, LoPub, by taking advantage of our distribution estimation techniques. In particular, both correlations and joint distribution among multiple attributes can be identified to reduce the dimension of crowdsourced data, thus achieving both efficiency and effectiveness in locally private high-dimensional data publication. Extensive experiments on real-world datasets demonstrated that the efficiency of our multivariate distribution estimation scheme and confirm the effectiveness of our LoPub scheme in generating approximate datasets with local privacy.
△ Less
Submitted 20 August, 2017; v1 submitted 13 December, 2016;
originally announced December 2016.