619 research outputs found

    On the Tradeoff between Energy Harvesting and Caching in Wireless Networks

    Full text link
    Self-powered, energy harvesting small cell base stations (SBS) are expected to be an integral part of next-generation wireless networks. However, due to uncertainties in harvested energy, it is necessary to adopt energy efficient power control schemes to reduce an SBSs' energy consumption and thus ensure quality-of-service (QoS) for users. Such energy-efficient design can also be done via the use of content caching which reduces the usage of the capacity-limited SBS backhaul. of popular content at SBS can also prove beneficial in this regard by reducing the backhaul usage. In this paper, an online energy efficient power control scheme is developed for an energy harvesting SBS equipped with a wireless backhaul and local storage. In our model, energy arrivals are assumed to be Poisson distributed and the popularity distribution of requested content is modeled using Zipf's law. The power control problem is formulated as a (discounted) infinite horizon dynamic programming problem and solved numerically using the value iteration algorithm. Using simulations, we provide valuable insights on the impact of energy harvesting and caching on the energy and sum-throughput performance of the SBS as the network size is varied. Our results also show that the size of cache and energy harvesting equipment at the SBS can be traded off, while still meeting the desired system performance.Comment: To be presented at the IEEE International Conference on Communications (ICC), London, U.K., 201

    Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things

    Full text link
    Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission. Cyber attacks such as data injection, eavesdropping, and man-in-the-middle threats can lead to security challenges. Securing IoT devices against such attacks requires accounting for their stringent computational power and need for low-latency operations. In this paper, a novel deep learning method is proposed for dynamic watermarking of IoT signals to detect cyber attacks. The proposed learning framework, based on a long short-term memory (LSTM) structure, enables the IoT devices to extract a set of stochastic features from their generated signal and dynamically watermark these features into the signal. This method enables the IoT's cloud center, which collects signals from the IoT devices, to effectively authenticate the reliability of the signals. Furthermore, the proposed method prevents complicated attack scenarios such as eavesdropping in which the cyber attacker collects the data from the IoT devices and aims to break the watermarking algorithm. Simulation results show that, with an attack detection delay of under 1 second the messages can be transmitted from IoT devices with an almost 100% reliability.Comment: 6 pages, 9 figure

    Transfer Learning for Device Fingerprinting with Application to Cognitive Radio Networks

    Full text link
    Primary user emulation (PUE) attacks are an emerging threat to cognitive radio (CR) networks in which malicious users imitate the primary users (PUs) signals to limit the access of secondary users (SUs). Ascertaining the identity of the devices is a key technical challenge that must be overcome to thwart the threat of PUE attacks. Typically, detection of PUE attacks is done by inspecting the signals coming from all the devices in the system, and then using these signals to form unique fingerprints for each device. Current detection and fingerprinting approaches require certain conditions to hold in order to effectively detect attackers. Such conditions include the need for a sufficient amount of fingerprint data for users or the existence of both the attacker and the victim PU within the same time frame. These conditions are necessary because current methods lack the ability to learn the behavior of both SUs and PUs with time. In this paper, a novel transfer learning (TL) approach is proposed, in which abstract knowledge about PUs and SUs is transferred from past time frames to improve the detection process at future time frames. The proposed approach extracts a high level representation for the environment at every time frame. This high level information is accumulated to form an abstract knowledge database. The CR system then utilizes this database to accurately detect PUE attacks even if an insufficient amount of fingerprint data is available at the current time frame. The dynamic structure of the proposed approach uses the final detection decisions to update the abstract knowledge database for future runs. Simulation results show that the proposed method can improve the performance with an average of 3.5% for only 10% relevant information between the past knowledge and the current environment signals.Comment: 6 pages, 3 figures, in Proceedings of IEEE 26th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Hong Kong, P.R. China, Aug. 201
    • …
    corecore