Skip to main content
Top

2021 | Book

Broadband Communications, Networks, and Systems

11th EAI International Conference, BROADNETS 2020, Qingdao, China, December 11–12, 2020, Proceedings

insite
SEARCH

About this book

This book constitutes the refereed post-conference proceedings of the 11th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2020, which took place in Qingdao, China, in December 2020. The 13 full papers presented were carefully reviewed and selected from 32 submissions. The papers are thematically grouped as a session on wireless network and security and a session on communication quality.

Table of Contents

Frontmatter

Wireless Network and Security

Frontmatter
Possibility of Using Existed WLAN Infrastructure as an Emergency Network for Air-to-Ground Transmissions: The Case of WebRTC-Based Flying IoT System
Abstract
In many urban and industrial areas, there exist wireless network infrastructures - usually complex, covering large public buildings (often with adjacent parking lots and green areas). In the case of emergency situations, such infrastructure could be used as a production network (i.e. a network dedicated to the transmission of user data) for creating ad-hoc flying monitoring systems, composed of one or more air stations (drones equipped with specialized sensors and detectors, as well as a high resolution camera), and corresponding ground station(s). This paper proves that the existing network architecture is able to play a significant role in the casual assurance of suitable air-to-ground transmission of monitoring data. Transmissions are carried out between two WebRTC applications of IoT brokers, placed on the air station, and on the ground one. The stations are connected through the IEEE 802.11ac (Wi-Fi) production network. During experiments, two different wireless local area networks were used as a production network. The first one was dedicated to transmissions coming from the flying monitoring system. The second one was the private network of the AGH University of Science and Technology, available for the academic community. Results of experiments show that although a dedicated network better fits the needs of the flying monitoring system, a well-dimensioned public network that has good coverage of the monitored area is able to effectively replace it in an emergency.
Agnieszka Chodorek, Robert R. Chodorek, Krzysztof Wajda
Constructing a Green MPTCP Framework for Industrial Internet of Things Applications
Abstract
In the typical distributed applications, the data exchange between the communicating peers proceeds along the transport path established in the connection initialization phase, even if a better one is discovered during the active session. With the recent advancement in the multipath protocol development, e.g., MPTCP, the peers can benefit from a concurrent use of a few channels, thus improving the transmission quality. However, the present approaches to the multipath transfer organization tend to neglect the energy aspects, crucial for resource-constrained Internet of Things (IoT) devices. In this paper, a framework for MPTCP module tuning, targeting the power expenditure, is developed. A new Scheduler and a new Path Manager promoting a conservative energy economy are designed by adopting a formal optimization approach. Moreover, explicit guidelines regarding the TCP variant selection are provided. As confirmed by numerous experiments involving physical devices and real networks, the proposed configuration scheme allows for several percent energy gain with respect to the default one, thus setting a solid framework for green MPTCP-based Industrial IoT communication.
Michał Morawski, Przemysław Ignaciuk
Identification of Significant Permissions for Efficient Android Malware Detection
Abstract
Since Google unveiled Android OS for smartphones, malware are thriving with 3Vs, i.e. volume, velocity and variety. A recent report indicates that one out of every five business/industry mobile application leaks sensitive personal data. Traditional signature/heuristic based malware detection systems are unable to cope up with current malware challenges and thus threaten the Android ecosystem. Therefore recently researchers have started exploring machine learning and deep learning based malware detection systems. In this paper, we performed a comprehensive feature analysis to identify the significant Android permissions and propose an efficient Android malware detection system using machine learning and deep neural network. We constructed a set of 16 permissions (\(8\%\) of the total set) derived from variance threshold, auto-encoders, and principal component analysis to build a malware detection engine which consumes less train and test time without significant compromise on the model accuracy. Our experimental results show that the Android malware detection model based on the random forest classifier is most balanced and achieves the highest area under curve score of \(97.7\%\), which is better than the current state-of-art systems. We also observed that deep neural networks attain comparable accuracy to the baseline results but with a massive computational penalty.
Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak
Energy Efficiency Optimization for RF Energy Harvesting Relay System
Abstract
This paper conducts research on the RF energy harvesting relay network, and proposes an improved energy harvesting relay protocol, which allows the energy harvesting source node to retransmit data to improve the system diversity gain, and constructs energy harvesting slot allocation, subcarrier pairing, and power Optimized model of distributed system energy efficiency. A resource allocation algorithm based on optimal energy efficiency is further proposed. The Dinkelbach method is used to transform the nonlinear programming problem into a linear programming problem. Then, the Hungarian algorithm and the sub-gradient method are used to obtain the iterative algorithm based on energy efficiency optimization. Simulation shows that the algorithm reduces the complexity of the algorithm and has good global convergence.
Guangjun Liang, Jianfang Xin, Qun Wang, Lingling Xia, Meng Li

Communication Quality

Frontmatter
Analysis of QoS Schemes and Shaping Strategies for Large Scale IP Networks Based on Network Calculus
Abstract
IP network experts and engineers have been working on solutions for decades to promote the network QoS. Latency guarantee, as one of the key aspects of the QoS, is attracting increasing attentions with requirements from time-critical applications and the vision of building a fully connected, intelligent world. Meanwhile, Network Calculus is a theory that focuses on performance bound analysis for communication networks, and has been used in avionic networks. However, because of the extremely large scale and high complexity of IP networks, few works gave theoretically modeling and systematically analyzing for the QoS (i.e., latency bound) of IP networks. In this paper, three QoS schemes for IP networks are summarized and the performance on the perspective of efficiency is analyzed. The effect of ingress shaping is also investigated, and results show that a proper ingress shaping could benefit the overall network latency performance, and could be adapted to all three QoS schemes. An IP network use case is given with different QoS schemes applied and the performance is evaluated by using Network Calculus.
Lihao Chen, Jiayi Zhang, Tao Gao, Tongtong Wang
Research on Information Transmission Characteristics of Two-Layer Communication Network
Abstract
With the development of the Internet, the marketing model of the communications industry has transformed from call-based to social application-based. Analyzing information transmission of social application helps to develop marketing strategy for different customers’ needs. The paper proposes and constructs a two-layer communication user spreading model based on the SIR information dissemination model. Then we analyze the traditional model of virus spread on the network’s application, and get the simulation results of immunization strategy and the communication process of social application information on WeChat, microblog and QQ. Combining with the actual data, simulation results show that the spread of the three types of social applications reaches a peak in a short time with the increase of the spreading rate. The spreading scale of WeChat application is larger than the other two types of applications on the same spread rate. Based on the acquaintance (target) immune strategy, the three types of applications have faster transmission inhibition than the random immune strategy. The research results of this paper provide an effective theoretical base for setting up individuality service combination of mobile communication enterprise.
Zhenghui Li, Yuzhi Xiao, Haixiu Luo, Chunyang Tang
Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering
Abstract
Today anti-malware community is facing challenges due to ever-increasing sophistication and volume of malware attacks developed by adversaries. Traditional malware detection mechanisms are not able to cope-up against next-generation malware attacks. Therefore in this paper, we propose effective and efficient Android malware detection models based on machine learning and deep learning integrated with clustering. We performed a comprehensive study of different feature reduction, classification and clustering algorithms over various performance metrics to construct the Android malware detection models. Our experimental results show that malware detection models developed using Random Forest eclipsed deep neural network and other classifiers on the majority of performance metrics. The baseline Random Forest model without any feature reduction achieved the highest AUC of \(99.4\%\). Also, the segregating of vector space using clustering integrated with Random Forest further boosted the AUC to \(99.6\%\) in one cluster and direct detection of Android malware in another cluster, thus reducing the curse of dimensionality. Additionally, we found that feature reduction in detection models does improve the model efficiency (training and testing time) many folds without much penalty on effectiveness of detection model .
Hemant Rathore, Sanjay K. Sahay, Shivin Thukral, Mohit Sewak

Go2Edge - Edge Computing Networks, Systems and Services

Frontmatter
Experimental Evaluation of RSA Algorithms for SDN-Programmable VCSEL-Based S-BVT in High-Capacity and Cost-Efficient Optical Metro Networks
Abstract
Future metro networks need to increase the transport capacity and improve the cost- and power-efficiency. These challenges are tackled by the EU-H2020 PASSION project exploiting dense photonic integration and cost-efficient optical technologies. Specifically, PASSION investigates a) modular sliceable bandwidth variable transceivers (S-BVTs) built upòn a set of both vertical cavity surface emitting lasers (VCSEL) and Coherent Receivers (CO-Rx); and b) hierarchical switching nodes in a flexigrid network. An SDN controller handles the network programmability where a key functionality is the path computation and resource selection to fulfil the connection requirements. This is conducted by the Routing and Spectrum Assignment (RSA) algorithms. The considered S-BVT transmitter imposes that each S-BVT VCSEL reaches up to 50 Gb/s. Thus, connections requesting higher bandwidth (e.g., 200 Gb/s) are accommodated over several optical flows. In this context, two RSA algorithms called co-routed (RSA-CR) and inversed multiplexed (RSA-IM) optical flows are proposed and compared. The RSA-CR enforces that all the connection’s optical flows are routed over the same spatial path; the RSA-IM relaxes this allowing the optical flows being set up over different spatial routes. The experimental evaluation, made upon dynamic traffic, aims at comparing both RSA algorithms performance according to the blocked bandwidth ratio, the average used of S-BVT devices, and the average setup time.
Ricardo Martinez, Ramon Casellas, Michela Svaluto Moreolo, Josep Maria Fabrega, Ricard Vilalta, Raul Munoz, Laia Nadal, Juan Pedro Fernández Palacios, Víctor López, David Larrabeiti, Gabriel Otero
Implementing a Blockchain-Based Security System Applied to IoT
Abstract
Several discussions regarding IoT devices and Blockchain came out recently. On one hand, IoT devices have been widely adopted by a notable set of Internet services driven by their capacity to cover several needs (for example, monitoring a manufacturing process, guiding an autonomous car, or tracking a train). On the other hand, Blockchain technology has been considered by several companies to support some critical functionalities, such as security provisioning or data protection. Nowadays, many challenges on both technologies remain yet unsolved, in spite of the unstoppable and ever-growing interest both technologies are attracting. Actually, a substantial push to them both comes from their agnosticism, i.e., many scenarios, particularly those considered as smart, are considered as proper candidates for their deployment, for example smart transportation, smart manufacturing or smart cities, just to name a few. This paper focuses on the latter, proposing a preliminary architecture using both technologies intended to provide security and robustness in Smart Cities. Several Blockchain strategies are analysed in the paper to identify unequivocally every device that belongs to the proposed architecture, also describing the operation of the chosen Blockchain to meet the security requirements. In summary, in this paper, an architecture able to resist certain attacks and proven to be useful to the previous mentioned examples is designed and implemented.
Martí Miquel Martínez, Eva Marín-Tordera, Xavi Masip-Bruin, Sergio Sánchez-López, Jordi García
Joint Core and Spectrum Allocation in Dynamic Optical Networks with ROADMs with No Line Changes
Abstract
Future metro networks will connect many multiaccess edge computing resources (MEC) working in a coordinating fashion to provide users with cloud computing capabilities with very low latency. That highly distributed computing architecture has to be connected by a network that provides high bandwidth and flexibility. Elastic optical networks (EONs) are currently the best option to perform that task. In a next step of optical network evolution, EONs can increase the bandwidth that they provide by using multicore fibers (MCF). When dynamic optical circuits are established in these networks, the routing, core and spectrum assignment (RCSA) problem must be solved. In this paper, two algorithms are presented in order to solve the RCSA problem considering continuity constraints in both the spectrum and the core (as we consider a cost-effective metro network architecture based on ROADMs without line changes). One of these versions explores the full spectrum of all cores in order to grant the best solution when solving the RCSA problem. The results of a simulation study show that exploring all the cores when solving the RCSA problem can reduce the blocking ratio of those networks and, therefore, increase its performance at the expense of a slight increment of the computing time required to provide a solution.
I. Viloria, R. J. Durán, I. de Miguel, L. Ruiz, N. Merayo, J. C. Aguado, P. Fernández, R. M. Lorenzo, E. J. Abril
Comparison of Efficient Planning and Optimization Methods of Last Mile Delivery Resources
Abstract
A review of recent Last Mile Delivery optimization proposals is presented. The proposals are classified according to the criteria of collaboration, ranging from optimization of a single route to the integration of multiple carriers. An alternative proposal is presented, based also on collaboration, but which does not involve either integration into a single organization or sharing of its resources. Each carrier is represented as a Virtual Organization of Agents (VO). A global optimizer, also a VO, oversees the search for deliveries that can be better delivered by another carrier and new routes are calculated based on a win-win approach. This approach has the advantages of being easily configurable by integrating or removing the VO of each carrier, highly distributable using a cloud infrastructure, easily scalable both for physical areas and computational resources using the cloud infrastructure in case more computational power is needed. It also allows the sharing of the least amount of information possible among carriers, so that they only know about the deliveries that they are losing or gaining.
J. A. Maestro, S. Rodriguez, R. Casado, J. Prieto, J. M. Corchado
Decision Making Under Uncertainty for the Deployment of Future Networks in IoT Scenarios
Abstract
The main characteristic of various emerging communication network paradigms in the dimensioning, control and deployment of future networks is the fact that they are human-centric, entailing closely-knit interactions between telematics and human activities. Considering the effect of user behavior, whose dynamics are difficult to model, new uncertainties are introduced in these systems, bringing about network resource management challenges. Within this context, this study seeks to review different decision-making computational methods in conditions of uncertainty for Internet of Things scenarios such as smart spaces, and industry 4.0, through a systematic literature review. According to our research results, a new paradigm for computationally capturing and modeling human behavior context must be developed with the purpose of improving resource management.
Néstor Alzate Mejía, Germán Santos Boada, José Roberto de Almeida Amazonas
An Initial Approach to a Multi-access Edge Computing Reference Architecture Implementation Using Kubernetes
Abstract
The increasing demand of data and real-time analysis has given rise to edge computing, providing benefits such as low latency, efficient bandwidth usage, fine-grained location tracking, or task offloading. Edge computing based on containers brings additional benefits, facilitating the development and deployment of scalable applications adapting to changing market demands. But in order to enable edge computing in the telco industry, it is important that current standardization efforts are followed by software platforms implementing those standards. This paper proposes an approach to the design and implementation of an edge computing platform based on Kubernetes and Helm providing functional blocks and APIs as defined by ETSI in the Multi-Access Edge Computing (MEC) reference architecture. Although this proposal is still at a work-in-progress state, this paper describes the design and implementation of an open-source proof-of-concept scenario focusing on the lifecycle management of cloud native MEC applications. The resulting prototype shows the feasibility of this approach, that can be adequate to create a lightweight MEC demonstration platform for university laboratories and experimentation.
Ignacio D. Martínez-Casanueva, Luis Bellido, Carlos M. Lentisco, David Fernández
Backmatter
Metadata
Title
Broadband Communications, Networks, and Systems
Editors
Honghao Gao
Ramón J. Durán Barroso
Pang Shanchen
Rui Li
Copyright Year
2021
Electronic ISBN
978-3-030-68737-3
Print ISBN
978-3-030-68736-6
DOI
https://doi.org/10.1007/978-3-030-68737-3

Premium Partner