Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024537
B. Smaradottir, S. Martinez, Jarle Audun Håland
Touchscreen assistive technology is designed to support speech interaction between visually disabled people and mobile devices, allowing the use of a choreography of gestures to interact with a touch user interface. This paper presents the evaluation of VoiceOver, a screen reader in Apple Inc. products, made in the research project Visually impaired users touching the screen- A user evaluation of assistive technology together with six visually disabled test participants. The aim was to identify challenges related to the performance of the gestures for screen interaction and evaluate the system response to the gestures. The main results showed that most of the hand gestures were easy to perform for the test participants. The system adequately responded to gesture interaction, but some inconsistent responses associated to several functionalities and lack of information were found.
{"title":"Evaluation of touchscreen assistive technology for visually disabled users","authors":"B. Smaradottir, S. Martinez, Jarle Audun Håland","doi":"10.1109/ISCC.2017.8024537","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024537","url":null,"abstract":"Touchscreen assistive technology is designed to support speech interaction between visually disabled people and mobile devices, allowing the use of a choreography of gestures to interact with a touch user interface. This paper presents the evaluation of VoiceOver, a screen reader in Apple Inc. products, made in the research project Visually impaired users touching the screen- A user evaluation of assistive technology together with six visually disabled test participants. The aim was to identify challenges related to the performance of the gestures for screen interaction and evaluate the system response to the gestures. The main results showed that most of the hand gestures were easy to perform for the test participants. The system adequately responded to gesture interaction, but some inconsistent responses associated to several functionalities and lack of information were found.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024511
A. Galletta, L. Bonanno, A. Celesti, S. Marino, P. Bramanti, M. Villari
Patients' data security and privacy is fundamental in the perspective of moving clinical data over the Cloud. Indeed, this concern has slowed down the adoption of Cloud services in the healthcare context. In fact, clinical operators are reluctant to open Hospital Information Systems (HIS) to external Cloud services. In this paper, we discuss system developed at the IRCCS “Bonino Pulejo” clinical and research centre (Italy) that is able to solve this concern. Such a system is based on two software components that are anonymizer and splitter. The first collects anonymize clinical data, whereas the second obfuscates and stores data in multiple Cloud storage providers. Thus, only authorized clinical operators can access data over the Cloud. A case of study considering real Magnetic Resonance Imaging (MRI) data is analysed in order to assess the performance of the whole system.
{"title":"An approach to share MRI data over the Cloud preserving patients' privacy","authors":"A. Galletta, L. Bonanno, A. Celesti, S. Marino, P. Bramanti, M. Villari","doi":"10.1109/ISCC.2017.8024511","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024511","url":null,"abstract":"Patients' data security and privacy is fundamental in the perspective of moving clinical data over the Cloud. Indeed, this concern has slowed down the adoption of Cloud services in the healthcare context. In fact, clinical operators are reluctant to open Hospital Information Systems (HIS) to external Cloud services. In this paper, we discuss system developed at the IRCCS “Bonino Pulejo” clinical and research centre (Italy) that is able to solve this concern. Such a system is based on two software components that are anonymizer and splitter. The first collects anonymize clinical data, whereas the second obfuscates and stores data in multiple Cloud storage providers. Thus, only authorized clinical operators can access data over the Cloud. A case of study considering real Magnetic Resonance Imaging (MRI) data is analysed in order to assess the performance of the whole system.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024620
Yali Yuan, Liuwei Huo, D. Hogrefe
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as the false alarm rate. The proposed TLMD algorithm also addresses some difficulties in data mining situations such as handling imbalance datasets, dealing with continuous attributes, and reducing noise in training dataset. We compared the performance of the proposed TLMD method with that of existing algorithms, using the detection rate, accuracy as well as false alarm rate on the KDDcup99 benchmark intrusion detection dataset. The experimental results prove that the proposed TLMD method has a reduced false alarm rate and a good detection rate based on the imbalanced dataset.
{"title":"Two Layers Multi-class Detection method for network Intrusion Detection System","authors":"Yali Yuan, Liuwei Huo, D. Hogrefe","doi":"10.1109/ISCC.2017.8024620","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024620","url":null,"abstract":"Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as the false alarm rate. The proposed TLMD algorithm also addresses some difficulties in data mining situations such as handling imbalance datasets, dealing with continuous attributes, and reducing noise in training dataset. We compared the performance of the proposed TLMD method with that of existing algorithms, using the detection rate, accuracy as well as false alarm rate on the KDDcup99 benchmark intrusion detection dataset. The experimental results prove that the proposed TLMD method has a reduced false alarm rate and a good detection rate based on the imbalanced dataset.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024521
B. Çatay, M. Keskin
Many companies have a growing interest in utilizing alternative fuel vehicles in their logistics operations due to increasing environmental concerns in developed countries. Consequently, green vehicle routing problems have attracted more attention in the literature. The Electric Vehicle Routing Problem (EVRP) is one such problem where the customers are served using an electric vehicle (EV) fleet. In this problem, the energy on the battery of the EV is consumed proportionally with distance traveled and the EV may need recharging en route in order to complete its tour. In this study, we consider a variant of EVRP where the customers are associated with service time windows and the stations may be equipped with normal and quick charging systems. In the quick charge case, the battery is recharged with the same energy in a shorter time but at a higher cost. Our objective is to minimize energy costs while operating minimum number of vehicles. We formulate the mathematical programming models of the single and multiple charger cases and solve them using a commercial solver. Our aim is to investigate the complexity of the problems and analyze the potential benefits associated with the quick charging option.
{"title":"The impact of quick charging stations on the route planning of Electric Vehicles","authors":"B. Çatay, M. Keskin","doi":"10.1109/ISCC.2017.8024521","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024521","url":null,"abstract":"Many companies have a growing interest in utilizing alternative fuel vehicles in their logistics operations due to increasing environmental concerns in developed countries. Consequently, green vehicle routing problems have attracted more attention in the literature. The Electric Vehicle Routing Problem (EVRP) is one such problem where the customers are served using an electric vehicle (EV) fleet. In this problem, the energy on the battery of the EV is consumed proportionally with distance traveled and the EV may need recharging en route in order to complete its tour. In this study, we consider a variant of EVRP where the customers are associated with service time windows and the stations may be equipped with normal and quick charging systems. In the quick charge case, the battery is recharged with the same energy in a shorter time but at a higher cost. Our objective is to minimize energy costs while operating minimum number of vehicles. We formulate the mathematical programming models of the single and multiple charger cases and solve them using a commercial solver. Our aim is to investigate the complexity of the problems and analyze the potential benefits associated with the quick charging option.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024712
Luis Augusto Dias Knob, R. Esteves, L. Granville, L. Tarouco
Internet Exchange Points (IXPs) play a key role in the Internet architecture, enabling cost-effective connections among multiple autonomous systems (ASes). The management of IXP networks includes the activity of taking care of elephant flows; they represent a small number of the total flows of an IXP, but have high impact on the overall network traffic. Managing elephant flows involves adequate identification and eventually rerouting of such flows to more appropriate locations, to minimize the possible negative impact on the other (mice) flows. Elephant flow management becomes even more important in SDN-based IXPs that require controllers to have a consistent view of the underlying network to allow fine-grained adjustment. In this paper, we propose, develop, and evaluate a recommendation system to suggest alternative configurations to previously identified elephant flows in an SDN-based IXP network. In our solution, the IXP operator can define templates that ultimately define how elephant flows can be rerouted to achieve a specific objective. We demonstrate that our system can help IXP operators to mitigate the impact of elephant flows on the IXP network.
Internet交换点(Internet Exchange point, ixp)在Internet体系结构中起着关键作用,能够在多个自治系统(自治系统)之间实现经济高效的连接。IXP网络的管理包括照顾大象流动的活动;它们只占IXP总流量的一小部分,但对整个网络流量有很大影响。大象流的管理包括充分识别并最终将这些流重新路由到更合适的位置,以尽量减少对其他(老鼠)流可能产生的负面影响。大象流管理在基于sdn的ixp中变得更加重要,因为它要求控制器具有底层网络的一致视图,以便进行细粒度的调整。在本文中,我们提出、开发和评估了一个推荐系统,为基于sdn的IXP网络中先前识别的大象流提供替代配置建议。在我们的解决方案中,IXP操作符可以定义模板,这些模板最终定义如何重路由大象流以实现特定目标。我们证明了我们的系统可以帮助IXP操作员减轻大象流对IXP网络的影响。
{"title":"Mitigating elephant flows in SDN-based IXP networks","authors":"Luis Augusto Dias Knob, R. Esteves, L. Granville, L. Tarouco","doi":"10.1109/ISCC.2017.8024712","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024712","url":null,"abstract":"Internet Exchange Points (IXPs) play a key role in the Internet architecture, enabling cost-effective connections among multiple autonomous systems (ASes). The management of IXP networks includes the activity of taking care of elephant flows; they represent a small number of the total flows of an IXP, but have high impact on the overall network traffic. Managing elephant flows involves adequate identification and eventually rerouting of such flows to more appropriate locations, to minimize the possible negative impact on the other (mice) flows. Elephant flow management becomes even more important in SDN-based IXPs that require controllers to have a consistent view of the underlying network to allow fine-grained adjustment. In this paper, we propose, develop, and evaluate a recommendation system to suggest alternative configurations to previously identified elephant flows in an SDN-based IXP network. In our solution, the IXP operator can define templates that ultimately define how elephant flows can be rerouted to achieve a specific objective. We demonstrate that our system can help IXP operators to mitigate the impact of elephant flows on the IXP network.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024615
D. Gomes, P. Endo, G. Gonçalves, Daniel Rosendo, Guto Leoni Santos, J. Kelner, D. Sadok, M. Mahloo
A data center is divided into three basic subsystems: information technology (IT), power, and cooling. Cooling plays an important role related to data center availability, and a failure in this subsystem may cause an interruption of services. Generally, a redundant cooling subsystem is implemented based on replacing the failed component by the standby one. However, it also can be based on a rotation of computer room air conditioners (CRACs). This paper proposes scalable models that represent the cooling subsystem behavior to evaluate the impact of cooling failures on the data center availability. Models are based on the TIA-942 standard and represent Tiers I and II. We validate our model by comparing our results with the literatures. Our results show that the CRACs' rotation has similar results in availability when compared to the replace strategy.
{"title":"Evaluating the cooling subsystem availability on a Cloud data center","authors":"D. Gomes, P. Endo, G. Gonçalves, Daniel Rosendo, Guto Leoni Santos, J. Kelner, D. Sadok, M. Mahloo","doi":"10.1109/ISCC.2017.8024615","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024615","url":null,"abstract":"A data center is divided into three basic subsystems: information technology (IT), power, and cooling. Cooling plays an important role related to data center availability, and a failure in this subsystem may cause an interruption of services. Generally, a redundant cooling subsystem is implemented based on replacing the failed component by the standby one. However, it also can be based on a rotation of computer room air conditioners (CRACs). This paper proposes scalable models that represent the cooling subsystem behavior to evaluate the impact of cooling failures on the data center availability. Models are based on the TIA-942 standard and represent Tiers I and II. We validate our model by comparing our results with the literatures. Our results show that the CRACs' rotation has similar results in availability when compared to the replace strategy.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123272849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024672
Leonardo Cotta, Pedro O. S. Vaz de Melo, A. Loureiro
The recent exponential growth of the Internet of Things (IoT) and its mobile devices asks for the advancement of mobile networks technology. In such direction, current and next generations of cellular and vehicular networks foresees adhoc communication. In such paradigm, as entities are constantly moving, connections between them are intermittent and of little, if none, reliability. Recent studies have explored entities connections and how to design efficient ad-hoc communication algorithms for them. In this paper, using real mobility data, we study how and to what extent the entities mobility affects the network (global) and the entities (local) connectivity. We propose and leverage existing mobility metrics to capture both the depth and the spread of entities trajectories. Furthermore, we show how global connectivity is related to the depth of the trajectories, while local connectivity is related to the spread of the trajectories. Finally, as we use both human and vehicular mobility data, we discuss how their mobility nature can affect their mobility characteristics and connectivity.
{"title":"Understanding the role of mobility in real mobile ad-hoc networks connectivity","authors":"Leonardo Cotta, Pedro O. S. Vaz de Melo, A. Loureiro","doi":"10.1109/ISCC.2017.8024672","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024672","url":null,"abstract":"The recent exponential growth of the Internet of Things (IoT) and its mobile devices asks for the advancement of mobile networks technology. In such direction, current and next generations of cellular and vehicular networks foresees adhoc communication. In such paradigm, as entities are constantly moving, connections between them are intermittent and of little, if none, reliability. Recent studies have explored entities connections and how to design efficient ad-hoc communication algorithms for them. In this paper, using real mobility data, we study how and to what extent the entities mobility affects the network (global) and the entities (local) connectivity. We propose and leverage existing mobility metrics to capture both the depth and the spread of entities trajectories. Furthermore, we show how global connectivity is related to the depth of the trajectories, while local connectivity is related to the spread of the trajectories. Finally, as we use both human and vehicular mobility data, we discuss how their mobility nature can affect their mobility characteristics and connectivity.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024572
R. Kiyumi, C. Foh, S. Vural, R. Tafazolli
Dynamic network conditions are inevitable in wireless sensor networks (WSNs). In multihop WSN data collection scenarios, data traffic load becomes heavier closer to the data sink. Therefore, extensive research work has been devoted to duty cycle adaptation mechanisms to meet the time-varying and/or spatially non-uniform traffic loads. In this paper, we propose a new algorithm, called Control-theoretic approach for Duty Cycle Adaptation (CDCA), based on the non-beacon-enable mode of the IEEE 802.15.4 protocol. We consider a distributed controller to be run at each node which adapts its duty cycle to achieve energy efficiency and maximise packet delivery performance under variable traffic conditions. CDCA adjusts a sensor's duty cycle using a traffic estimation mechanism based on a novel concept called a virtual queue. This is determined based on the sensor's local queue length as well as explicit packet-drop indications collected from its child nodes in a multihop tree structure rooted at the network's data sink. Based on control theory, the proposed controller is analysed to derive system stability. Performance results obtained using Network Simulator 3 demonstrate that CDCA outperforms the most recent and relevant scheme by saving more energy while also significantly improving packet delivery ratio to the data sink.
{"title":"A Control-theoretic approach for Duty Cycle Adaptation in dynamic wireless sensor networks","authors":"R. Kiyumi, C. Foh, S. Vural, R. Tafazolli","doi":"10.1109/ISCC.2017.8024572","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024572","url":null,"abstract":"Dynamic network conditions are inevitable in wireless sensor networks (WSNs). In multihop WSN data collection scenarios, data traffic load becomes heavier closer to the data sink. Therefore, extensive research work has been devoted to duty cycle adaptation mechanisms to meet the time-varying and/or spatially non-uniform traffic loads. In this paper, we propose a new algorithm, called Control-theoretic approach for Duty Cycle Adaptation (CDCA), based on the non-beacon-enable mode of the IEEE 802.15.4 protocol. We consider a distributed controller to be run at each node which adapts its duty cycle to achieve energy efficiency and maximise packet delivery performance under variable traffic conditions. CDCA adjusts a sensor's duty cycle using a traffic estimation mechanism based on a novel concept called a virtual queue. This is determined based on the sensor's local queue length as well as explicit packet-drop indications collected from its child nodes in a multihop tree structure rooted at the network's data sink. Based on control theory, the proposed controller is analysed to derive system stability. Performance results obtained using Network Simulator 3 demonstrate that CDCA outperforms the most recent and relevant scheme by saving more energy while also significantly improving packet delivery ratio to the data sink.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024585
D. Efstathiou, G. Papadopoulos, D. Tsipouridou, F. Pavlidou
High level of security is essential in wireless communications multimedia applications. The last few years there has been an increase in research interest in the potential of the radio channel's physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in wireless systems. In this paper, we propose an enhancement to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot sub-carriers, essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the sub-carriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper receiver, does not have access to the information of the pilot sub-carriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity, the outage probability, the channel mean square error and the bit error rate. The proposed scheme is very simple and robust, strengthening security in multimedia applications.
{"title":"Enhancement of transmission security for OFDM based systems","authors":"D. Efstathiou, G. Papadopoulos, D. Tsipouridou, F. Pavlidou","doi":"10.1109/ISCC.2017.8024585","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024585","url":null,"abstract":"High level of security is essential in wireless communications multimedia applications. The last few years there has been an increase in research interest in the potential of the radio channel's physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in wireless systems. In this paper, we propose an enhancement to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot sub-carriers, essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the sub-carriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper receiver, does not have access to the information of the pilot sub-carriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity, the outage probability, the channel mean square error and the bit error rate. The proposed scheme is very simple and robust, strengthening security in multimedia applications.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131378950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ISCC.2017.8024648
George P. Petropoulos, K. Katsaros, Maria-Evgenia Xezonaki
Information-Centric Networking (ICN) has emerged as an interesting approach to overcome many of the limitations of legacy IP-based networks. However, the drastic changes to legacy infrastructure required to realise an ICN have significantly hindered its adoption by network operators. As a result, alternative deployment strategies are investigated, with Software-Defined Networking (SDN) arising as a solution compatible with legacy infrastructure, thus opening new possibilities for integrating ICN concepts in operators' networks. This paper discusses the seamless integration of these two architectural paradigms and suggests a scalable and dynamic network topology bootstrapping and management framework to deploy and operate ICN topologies over SDN-enabled operator networks. We describe the designed protocol and supporting mechanisms, as well as the minimum required implementation to realize this inter-operability. A proof-of-concept prototype has been implemented to validate the feasibility of the approach. Results show that topology bootstrapping time is not significantly affected by the topology size, substantially facilitating the intelligent management of an ICN-enabled network.
{"title":"OpenFlow-compliant topology management for SDN-enabled Information Centric Networks","authors":"George P. Petropoulos, K. Katsaros, Maria-Evgenia Xezonaki","doi":"10.1109/ISCC.2017.8024648","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024648","url":null,"abstract":"Information-Centric Networking (ICN) has emerged as an interesting approach to overcome many of the limitations of legacy IP-based networks. However, the drastic changes to legacy infrastructure required to realise an ICN have significantly hindered its adoption by network operators. As a result, alternative deployment strategies are investigated, with Software-Defined Networking (SDN) arising as a solution compatible with legacy infrastructure, thus opening new possibilities for integrating ICN concepts in operators' networks. This paper discusses the seamless integration of these two architectural paradigms and suggests a scalable and dynamic network topology bootstrapping and management framework to deploy and operate ICN topologies over SDN-enabled operator networks. We describe the designed protocol and supporting mechanisms, as well as the minimum required implementation to realize this inter-operability. A proof-of-concept prototype has been implemented to validate the feasibility of the approach. Results show that topology bootstrapping time is not significantly affected by the topology size, substantially facilitating the intelligent management of an ICN-enabled network.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}