619 research outputs found
On the Tradeoff between Energy Harvesting and Caching in Wireless Networks
Self-powered, energy harvesting small cell base stations (SBS) are expected
to be an integral part of next-generation wireless networks. However, due to
uncertainties in harvested energy, it is necessary to adopt energy efficient
power control schemes to reduce an SBSs' energy consumption and thus ensure
quality-of-service (QoS) for users. Such energy-efficient design can also be
done via the use of content caching which reduces the usage of the
capacity-limited SBS backhaul. of popular content at SBS can also prove
beneficial in this regard by reducing the backhaul usage. In this paper, an
online energy efficient power control scheme is developed for an energy
harvesting SBS equipped with a wireless backhaul and local storage. In our
model, energy arrivals are assumed to be Poisson distributed and the popularity
distribution of requested content is modeled using Zipf's law. The power
control problem is formulated as a (discounted) infinite horizon dynamic
programming problem and solved numerically using the value iteration algorithm.
Using simulations, we provide valuable insights on the impact of energy
harvesting and caching on the energy and sum-throughput performance of the SBS
as the network size is varied. Our results also show that the size of cache and
energy harvesting equipment at the SBS can be traded off, while still meeting
the desired system performance.Comment: To be presented at the IEEE International Conference on
Communications (ICC), London, U.K., 201
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward
expediting the deployment of its applications and services. In particular, the
functionality of the IoT devices is extremely dependent on the reliability of
their message transmission. Cyber attacks such as data injection,
eavesdropping, and man-in-the-middle threats can lead to security challenges.
Securing IoT devices against such attacks requires accounting for their
stringent computational power and need for low-latency operations. In this
paper, a novel deep learning method is proposed for dynamic watermarking of IoT
signals to detect cyber attacks. The proposed learning framework, based on a
long short-term memory (LSTM) structure, enables the IoT devices to extract a
set of stochastic features from their generated signal and dynamically
watermark these features into the signal. This method enables the IoT's cloud
center, which collects signals from the IoT devices, to effectively
authenticate the reliability of the signals. Furthermore, the proposed method
prevents complicated attack scenarios such as eavesdropping in which the cyber
attacker collects the data from the IoT devices and aims to break the
watermarking algorithm. Simulation results show that, with an attack detection
delay of under 1 second the messages can be transmitted from IoT devices with
an almost 100% reliability.Comment: 6 pages, 9 figure
Transfer Learning for Device Fingerprinting with Application to Cognitive Radio Networks
Primary user emulation (PUE) attacks are an emerging threat to cognitive
radio (CR) networks in which malicious users imitate the primary users (PUs)
signals to limit the access of secondary users (SUs). Ascertaining the identity
of the devices is a key technical challenge that must be overcome to thwart the
threat of PUE attacks. Typically, detection of PUE attacks is done by
inspecting the signals coming from all the devices in the system, and then
using these signals to form unique fingerprints for each device. Current
detection and fingerprinting approaches require certain conditions to hold in
order to effectively detect attackers. Such conditions include the need for a
sufficient amount of fingerprint data for users or the existence of both the
attacker and the victim PU within the same time frame. These conditions are
necessary because current methods lack the ability to learn the behavior of
both SUs and PUs with time. In this paper, a novel transfer learning (TL)
approach is proposed, in which abstract knowledge about PUs and SUs is
transferred from past time frames to improve the detection process at future
time frames. The proposed approach extracts a high level representation for the
environment at every time frame. This high level information is accumulated to
form an abstract knowledge database. The CR system then utilizes this database
to accurately detect PUE attacks even if an insufficient amount of fingerprint
data is available at the current time frame. The dynamic structure of the
proposed approach uses the final detection decisions to update the abstract
knowledge database for future runs. Simulation results show that the proposed
method can improve the performance with an average of 3.5% for only 10%
relevant information between the past knowledge and the current environment
signals.Comment: 6 pages, 3 figures, in Proceedings of IEEE 26th International
Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Hong
Kong, P.R. China, Aug. 201
- …