首页 > 最新文献

2015 7th International Conference on New Technologies, Mobility and Security (NTMS)最新文献

英文 中文
IPOL: A new journal for fully reproducible research; analysis of four years development IPOL:完全可重复研究的新期刊;四年发展分析
M. Colom, Bertrand Kerautret, Nicolas Limare, P. Monasse, J. Morel
After four years of development of the Image Processing On Line journal (IPOL), this article presents a first analysis and overview of its scientific and technical development. The main issues met and overcome from the beginning of the journal are described with a focus on the purpose of the journal to establish a state of the art on the main Image Processing topics. The evolution of the online demonstration is also presented with a first analysis of author/publisher criticism, which led to a proposal for a new modular architecture of its demo system.
《图像处理在线期刊》(Image Processing On Line journal, IPOL)经过四年的发展,本文首次对其科技发展进行了分析和综述。从期刊一开始就遇到和克服的主要问题被描述为期刊的目的,重点是建立一个关于主要图像处理主题的艺术状态。本文还首先分析了作者/出版商对在线演示的批评,并提出了一种新的演示系统模块化架构的建议。
{"title":"IPOL: A new journal for fully reproducible research; analysis of four years development","authors":"M. Colom, Bertrand Kerautret, Nicolas Limare, P. Monasse, J. Morel","doi":"10.1109/NTMS.2015.7266500","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266500","url":null,"abstract":"After four years of development of the Image Processing On Line journal (IPOL), this article presents a first analysis and overview of its scientific and technical development. The main issues met and overcome from the beginning of the journal are described with a focus on the purpose of the journal to establish a state of the art on the main Image Processing topics. The evolution of the online demonstration is also presented with a first analysis of author/publisher criticism, which led to a proposal for a new modular architecture of its demo system.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133499697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Indoor patient monitoring through Wi-Fi and mobile computing 通过Wi-Fi和移动计算进行室内患者监测
João M. G. Duarte, E. Cerqueira, L. Villas
The developments in wireless sensor networks, mobile technology and cloud computing have been pushing forward the concept of intelligent or smart cities, and each day smarter infrastructures are being developed with the aim of enhancing the well-being of citizens. These advances in technology can provide considerable benefits for the diverse components of smart cities including smart health which can be seen as the facet of smart cities dedicated to healthcare. A considerable defy that stills requiring appropriate responses is the development of mechanisms to detect health issues in patients from the very beginning. In this work, we propose a novel solution for indoor patient monitoring for medical purposes. The output of our solution will consist of a report containing the patterns of room occupation by the patient inside her/his home during a certain period of time. This report will allow health care professionals to detect changes on the behavior of the patient that can be interpreted as early signs of any health related issue. The proposed solution was implemented in an Android smartphone and tested in a real scenario. To assess our solution, 400 measurements divided into 10 experiments were performed, reaching a total of 391 correct detections which corresponds to an average effectiveness of 97.75%.
无线传感器网络、移动技术和云计算的发展推动了智能或智慧城市的概念,每天都在开发更智能的基础设施,旨在提高市民的福祉。这些技术进步可以为智能城市的各个组成部分提供相当大的好处,包括智能健康,这可以被视为智能城市致力于医疗保健的一个方面。仍然需要适当应对的一项重大挑战是建立从一开始就发现患者健康问题的机制。在这项工作中,我们提出了一种用于医疗目的的室内患者监测的新解决方案。我们的解决方案的输出将包括一份报告,其中包含在一定时期内患者在家中的房间占用模式。该报告将使卫生保健专业人员能够发现患者行为的变化,这些变化可以被解释为任何健康相关问题的早期迹象。提出的解决方案在Android智能手机中实现,并在真实场景中进行了测试。为了评估我们的解决方案,在10个实验中进行了400次测量,总共达到391次正确检测,平均有效性为97.75%。
{"title":"Indoor patient monitoring through Wi-Fi and mobile computing","authors":"João M. G. Duarte, E. Cerqueira, L. Villas","doi":"10.1109/NTMS.2015.7266497","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266497","url":null,"abstract":"The developments in wireless sensor networks, mobile technology and cloud computing have been pushing forward the concept of intelligent or smart cities, and each day smarter infrastructures are being developed with the aim of enhancing the well-being of citizens. These advances in technology can provide considerable benefits for the diverse components of smart cities including smart health which can be seen as the facet of smart cities dedicated to healthcare. A considerable defy that stills requiring appropriate responses is the development of mechanisms to detect health issues in patients from the very beginning. In this work, we propose a novel solution for indoor patient monitoring for medical purposes. The output of our solution will consist of a report containing the patterns of room occupation by the patient inside her/his home during a certain period of time. This report will allow health care professionals to detect changes on the behavior of the patient that can be interpreted as early signs of any health related issue. The proposed solution was implemented in an Android smartphone and tested in a real scenario. To assess our solution, 400 measurements divided into 10 experiments were performed, reaching a total of 391 correct detections which corresponds to an average effectiveness of 97.75%.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"87 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127994199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs) 在选择针对高级持续性威胁(apt)的安全对策时考虑技术和财务影响
G. G. Granadillo, Joaquín García, Hervé Debar, C. Ponchel, Laura Rodriguez Martin
This paper presents a model to evaluate and select security countermeasures from a pool of candidates. The model performs industrial evaluation and simulations of the financial and technical impact associated to security countermeasures. The financial impact approach uses the Return On Response Investment (RORI) index to compare the expected impact of the attack when no response is enacted against the impact after applying security countermeasures. The technical impact approach evaluates the protection level against a threat, in terms of confidentiality, integrity, and availability. We provide a use case on malware attacks that shows the applicability of our model in selecting the best countermeasure against an Advanced Persistent Threat.
本文提出了一种从备选方案池中评估和选择安全对策的模型。该模型执行与安全对策相关的财务和技术影响的工业评估和模拟。财务影响方法使用响应投资回报率(RORI)指数来比较不采取响应时攻击的预期影响与应用安全对策后的影响。技术影响方法根据机密性、完整性和可用性来评估针对威胁的保护级别。我们提供了一个关于恶意软件攻击的用例,该用例显示了我们的模型在选择针对高级持续性威胁的最佳对策方面的适用性。
{"title":"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)","authors":"G. G. Granadillo, Joaquín García, Hervé Debar, C. Ponchel, Laura Rodriguez Martin","doi":"10.1109/NTMS.2015.7266480","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266480","url":null,"abstract":"This paper presents a model to evaluate and select security countermeasures from a pool of candidates. The model performs industrial evaluation and simulations of the financial and technical impact associated to security countermeasures. The financial impact approach uses the Return On Response Investment (RORI) index to compare the expected impact of the attack when no response is enacted against the impact after applying security countermeasures. The technical impact approach evaluates the protection level against a threat, in terms of confidentiality, integrity, and availability. We provide a use case on malware attacks that shows the applicability of our model in selecting the best countermeasure against an Advanced Persistent Threat.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosis 一种基于单通道的远程深度睡眠监测系统,用于家庭失眠诊断
Sana Tmar-Ben Hamida, B. Ahmed
An efficient insomnia diagnosis and treatment requires the analysis of sleep stages and patterns in the vital signals and clinical face-to-face consultations. The measured signals are collected from different locations on the head and the body and used to evaluate the sleep quality and quantity. Generally, these measurements require spending several days of monitoring at sleep centers. However, the first night effect may cause perturbations to the control subjects and contrary to insomnia subjects who may sleep better because of the change of the sleep environment. Therefore, there is a great interest in developing non-invasive ambulatory physiological insomnia monitoring devices for in-home use. It has been shown in previous studies that the sleep quality can be evaluated based on the quantity of length of deep sleep particularly the slow wave sleep (SWS) periods. The aim of this paper is to present a new method to evaluate the deep sleep epochs using a single electrooculogram channel and to collect remotely the subjective data through sleep diaries.
一个有效的失眠诊断和治疗需要分析睡眠阶段和模式的生命信号和临床面对面咨询。测量信号从头部和身体的不同位置收集,用于评估睡眠质量和睡眠时间。一般来说,这些测量需要在睡眠中心进行数天的监测。然而,首夜效应可能会对对照组受试者造成扰动,与失眠受试者相反,失眠受试者可能会因为睡眠环境的改变而睡得更好。因此,有一个很大的兴趣在开发无创门诊生理失眠监测设备在家庭使用。以往的研究表明,睡眠质量可以根据深度睡眠的时间长短来评估,尤其是慢波睡眠(SWS)时期。本文的目的是提出一种利用单眼电图通道评估深度睡眠时期的新方法,并通过睡眠日记远程采集主观数据。
{"title":"A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosis","authors":"Sana Tmar-Ben Hamida, B. Ahmed","doi":"10.1109/NTMS.2015.7266469","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266469","url":null,"abstract":"An efficient insomnia diagnosis and treatment requires the analysis of sleep stages and patterns in the vital signals and clinical face-to-face consultations. The measured signals are collected from different locations on the head and the body and used to evaluate the sleep quality and quantity. Generally, these measurements require spending several days of monitoring at sleep centers. However, the first night effect may cause perturbations to the control subjects and contrary to insomnia subjects who may sleep better because of the change of the sleep environment. Therefore, there is a great interest in developing non-invasive ambulatory physiological insomnia monitoring devices for in-home use. It has been shown in previous studies that the sleep quality can be evaluated based on the quantity of length of deep sleep particularly the slow wave sleep (SWS) periods. The aim of this paper is to present a new method to evaluate the deep sleep epochs using a single electrooculogram channel and to collect remotely the subjective data through sleep diaries.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121489155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks 借用两跳邻居的地址,提高加入基于IEEE 802.15.5的网状无线传感器网络的成功概率
Cong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi
IEEE 802.15.5 standard supports mesh networking for IEEE 802.15.4 based low-rate wireless sensor network (WSN). Through assigning a consecutive address block (CAB) to a node, IEEE 802.15.5 enables routing without table, which eliminates route discovery latency and reduces communication overhead and energy consumption in addition to saving storage space for routing table. With CAB, however, a node may fail in joining the mesh network due to insufficient address. To overcome the address-lacking problem, the scheme called Borrowing Address from Two-hop Neighbor (BATN) is proposed in this paper, which provides with two procedures for the nodes to join or leave the mesh, respectively. In addition, the routing scheme under BATN is presented. Both theoretical and simulation results show that the proposed BATN is better than the basic address assignment scheme introduced in IEEE 802.15.5 standard and the existing address borrowing schemes in terms of the probability of the node's successful joining the mesh network and the number of bytes used in reporting the number of children in address assigning stage.
IEEE 802.15.5标准支持基于IEEE 802.15.4的低速率无线传感器网络(WSN)的网状组网。IEEE 802.15.5通过为节点分配CAB (continuous address block),实现无表路由,在节省路由表存储空间的同时,消除了路由发现的延迟,降低了通信开销和能耗。但是,使用CAB时,节点可能由于地址不足而无法加入mesh网络。为了克服地址缺乏的问题,本文提出了一种名为“从两跳邻居借用地址”(BATN)的方案,该方案分别为节点加入或离开网格提供了两个过程。此外,还提出了BATN下的路由方案。理论和仿真结果表明,在节点成功加入mesh网络的概率和地址分配阶段报告子节点数所用的字节数两方面,所提出的BATN都优于IEEE 802.15.5标准中引入的基本地址分配方案和现有的地址借用方案。
{"title":"Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks","authors":"Cong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi","doi":"10.1109/NTMS.2015.7266474","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266474","url":null,"abstract":"IEEE 802.15.5 standard supports mesh networking for IEEE 802.15.4 based low-rate wireless sensor network (WSN). Through assigning a consecutive address block (CAB) to a node, IEEE 802.15.5 enables routing without table, which eliminates route discovery latency and reduces communication overhead and energy consumption in addition to saving storage space for routing table. With CAB, however, a node may fail in joining the mesh network due to insufficient address. To overcome the address-lacking problem, the scheme called Borrowing Address from Two-hop Neighbor (BATN) is proposed in this paper, which provides with two procedures for the nodes to join or leave the mesh, respectively. In addition, the routing scheme under BATN is presented. Both theoretical and simulation results show that the proposed BATN is better than the basic address assignment scheme introduced in IEEE 802.15.5 standard and the existing address borrowing schemes in terms of the probability of the node's successful joining the mesh network and the number of bytes used in reporting the number of children in address assigning stage.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design, implementation and evaluation of SDN-based resource management model 基于sdn的资源管理模型的设计、实现与评价
M. R. Çelenlioglu, Mohammed Alsadi, H. A. Mantar
Usage of the Internet has been changed over the past decade. Current tightly-coupled network architecture limits innovative actions. Besides, companies desire to provide better service while keeping their costs low. Software Defined Networking (SDN) is a new approach that provides abstract, programmable and open networking. It is brought up to address these issues. In this study, we present the design, implementation and evaluation of pre-established multi-path (PMP) based intradomain routing and resource management model for SDN-based networks. PMPs are established between each pair of edge nodes. Controller performs routing, admission control and resource management based on these paths. The experimental works show that the proposed model provides scalable admission control, routing and significantly improves resource utilization.
在过去的十年里,互联网的使用方式发生了变化。当前紧耦合的网络架构限制了创新行为。此外,公司希望在保持低成本的同时提供更好的服务。软件定义网络(SDN)是一种提供抽象、可编程和开放网络的新方法。它的提出是为了解决这些问题。在这项研究中,我们提出了基于sdn网络的预先建立的基于多路径(PMP)的域内路由和资源管理模型的设计、实现和评估。在每对边缘节点之间建立pmp。控制器根据这些路径执行路由、准入控制和资源管理。实验结果表明,该模型提供了可扩展的准入控制和路由,显著提高了资源利用率。
{"title":"Design, implementation and evaluation of SDN-based resource management model","authors":"M. R. Çelenlioglu, Mohammed Alsadi, H. A. Mantar","doi":"10.1109/NTMS.2015.7266484","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266484","url":null,"abstract":"Usage of the Internet has been changed over the past decade. Current tightly-coupled network architecture limits innovative actions. Besides, companies desire to provide better service while keeping their costs low. Software Defined Networking (SDN) is a new approach that provides abstract, programmable and open networking. It is brought up to address these issues. In this study, we present the design, implementation and evaluation of pre-established multi-path (PMP) based intradomain routing and resource management model for SDN-based networks. PMPs are established between each pair of edge nodes. Controller performs routing, admission control and resource management based on these paths. The experimental works show that the proposed model provides scalable admission control, routing and significantly improves resource utilization.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling information flow properties with UML 用UML建模信息流属性
Kuzman Katkalov, K. Stenzel, M. Borek, W. Reif
Providing guarantees regarding the privacy of sensitive information in a distributed system consisting of mobile apps and services is a challenging task. Our IFlow approach allows the model-driven development of such systems, as well as the automatic generation of code and a formal model. In this paper, we introduce modeling guidelines for the design of intuitive, flexible and expressive information flow properties with UML. Further, we show how these properties can be guaranteed using a combination of automatic language-based information flow control and model-based interactive verification.
在一个由移动应用程序和服务组成的分布式系统中,为敏感信息的隐私提供保障是一项具有挑战性的任务。我们的IFlow方法允许这样的系统的模型驱动开发,以及代码和正式模型的自动生成。本文介绍了用UML设计直观、灵活、富有表现力的信息流属性的建模准则。此外,我们还展示了如何使用基于语言的自动信息流控制和基于模型的交互式验证的组合来保证这些属性。
{"title":"Modeling information flow properties with UML","authors":"Kuzman Katkalov, K. Stenzel, M. Borek, W. Reif","doi":"10.1109/NTMS.2015.7266507","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266507","url":null,"abstract":"Providing guarantees regarding the privacy of sensitive information in a distributed system consisting of mobile apps and services is a challenging task. Our IFlow approach allows the model-driven development of such systems, as well as the automatic generation of code and a formal model. In this paper, we introduce modeling guidelines for the design of intuitive, flexible and expressive information flow properties with UML. Further, we show how these properties can be guaranteed using a combination of automatic language-based information flow control and model-based interactive verification.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures 面向电子医疗智能物联网的威胁识别及自适应安全对策
Kashif Habib, W. Leister
The Things in the smart Internet of Things (IoT) depend more on self decision making abilities instead of relying on human interventions. In the IoT, static security mechanisms are not well suited to handle all security risks sufficiently. A security mechanism can be considered static if it is developed with fixed security measures whereas an adaptive security mechanism can be considered dynamic if it can continuously monitor, analyse, and reassess a security risk at runtime. Adaptive security mechanisms can be a better choice to secure dynamic and heterogeneous computing systems in the IoT. This paper presents a patient monitoring scenario using the smart IoT and aims at highlighting all important assets, vulnerabilities, and threats that can harm assets and disrupt eHealth systems. We describe adaptive security and introduce a concept of adaptive security countermeasures for the smart IoT in eHealth.
智能物联网(IoT)中的物更多地依赖于自我决策能力,而不是依赖于人为干预。在物联网中,静态安全机制并不能很好地应对所有安全风险。如果安全机制是用固定的安全措施开发的,那么它可以被认为是静态的,而如果自适应安全机制可以在运行时持续监控、分析和重新评估安全风险,那么它可以被认为是动态的。自适应安全机制是保护物联网中动态和异构计算系统的更好选择。本文介绍了一个使用智能物联网的患者监测场景,旨在突出所有可能损害资产和破坏电子卫生系统的重要资产、漏洞和威胁。我们描述了自适应安全,并介绍了电子健康智能物联网的自适应安全对策概念。
{"title":"Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures","authors":"Kashif Habib, W. Leister","doi":"10.1109/NTMS.2015.7266525","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266525","url":null,"abstract":"The Things in the smart Internet of Things (IoT) depend more on self decision making abilities instead of relying on human interventions. In the IoT, static security mechanisms are not well suited to handle all security risks sufficiently. A security mechanism can be considered static if it is developed with fixed security measures whereas an adaptive security mechanism can be considered dynamic if it can continuously monitor, analyse, and reassess a security risk at runtime. Adaptive security mechanisms can be a better choice to secure dynamic and heterogeneous computing systems in the IoT. This paper presents a patient monitoring scenario using the smart IoT and aims at highlighting all important assets, vulnerabilities, and threats that can harm assets and disrupt eHealth systems. We describe adaptive security and introduce a concept of adaptive security countermeasures for the smart IoT in eHealth.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121548195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settings 自组织车辆:在城市和高速公路设置的车辆自组织网络的探索性评价
Claudio Correa, J. Ueyama, R. Meneguette, L. Villas, G. P. R. Filho
A Vehicular Ad hoc network (VANET) represents a unique subset among mobile ad hoc networks (MANET), in which the nodes are vehicles provided with their own communications technology. In this paper, there is a convergence of approaches to meet expectations with regard to examining performance in the operational settings in protocols like AID, DBRS, SRD, and the ADDHV, which are designed to disseminate messages. A comparative evaluation makes it possible to explore the strategies employed by these protocols when faced with challenges such as network partition and the problem of broadcast storm, which can damage the dissemination process. The results shown as a set of metrics obtained in different vehicular traffic schemes complete the investigation.
车辆自组织网络(VANET)代表了移动自组织网络(MANET)中的一个独特子集,其中节点是具有自己通信技术的车辆。在本文中,有一种趋同的方法,以满足在诸如AID、DBRS、SRD和ADDHV等协议的操作环境中检查绩效的期望,这些协议旨在传播信息。通过比较评估,可以探索这些协议在面对网络分区和广播风暴问题等挑战时所采用的策略,这些挑战可能会破坏传播过程。结果显示为在不同车辆交通方案中获得的一组指标,完成了调查。
{"title":"Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settings","authors":"Claudio Correa, J. Ueyama, R. Meneguette, L. Villas, G. P. R. Filho","doi":"10.1109/NTMS.2015.7266470","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266470","url":null,"abstract":"A Vehicular Ad hoc network (VANET) represents a unique subset among mobile ad hoc networks (MANET), in which the nodes are vehicles provided with their own communications technology. In this paper, there is a convergence of approaches to meet expectations with regard to examining performance in the operational settings in protocols like AID, DBRS, SRD, and the ADDHV, which are designed to disseminate messages. A comparative evaluation makes it possible to explore the strategies employed by these protocols when faced with challenges such as network partition and the problem of broadcast storm, which can damage the dissemination process. The results shown as a set of metrics obtained in different vehicular traffic schemes complete the investigation.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128163995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced LTE physical downlink control channel design for machine-type communications 增强LTE物理下行链路控制信道设计,用于机器类型通信
Jinsong Hu, Mao Wang, K. J. Zou, Kristo W. Yang, Min Hua, Jingjing Zhang
The application of LTE to the machine-type communications (MTC) poses some serious challenges due to the large performance mismatch between the regular LTE user equipment and the MTC device, caused mainly by the physical limitations of MTC devices. This paper addresses these limitations and their implications to the communication signal's link performance and the corresponding link budget. The focus of this paper is on the downlink control channel design. We analyze the issues of the existing LTE control channels and propose an enhanced design specifically-tailored to overcome the limitations of MTC devices and the stringent link budget by applying repeated transmissions, frequency retuning, and the orthogonal spatial precoding based joint channel estimation, fully exploiting the time, frequency, as well as spatial diversities. The basic schemes proposed in this paper apply to other LTE channels as well, such as the uplink control channel, and the random access channel.
由于常规LTE用户设备与MTC设备之间存在较大的性能不匹配,这主要是由于MTC设备的物理限制造成的,因此LTE在机器类通信(MTC)中的应用面临着一些严峻的挑战。本文讨论了这些限制及其对通信信号链路性能和相应链路预算的影响。本文的重点是下行控制通道的设计。本文分析了现有LTE控制信道存在的问题,提出了一种专门针对MTC设备的限制和严格的链路预算的改进设计,通过应用重复传输、频率返回和基于正交空间预编码的联合信道估计,充分利用时间、频率和空间分集。本文提出的基本方案也适用于其他LTE信道,如上行控制信道和随机接入信道。
{"title":"Enhanced LTE physical downlink control channel design for machine-type communications","authors":"Jinsong Hu, Mao Wang, K. J. Zou, Kristo W. Yang, Min Hua, Jingjing Zhang","doi":"10.1109/NTMS.2015.7266491","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266491","url":null,"abstract":"The application of LTE to the machine-type communications (MTC) poses some serious challenges due to the large performance mismatch between the regular LTE user equipment and the MTC device, caused mainly by the physical limitations of MTC devices. This paper addresses these limitations and their implications to the communication signal's link performance and the corresponding link budget. The focus of this paper is on the downlink control channel design. We analyze the issues of the existing LTE control channels and propose an enhanced design specifically-tailored to overcome the limitations of MTC devices and the stringent link budget by applying repeated transmissions, frequency retuning, and the orthogonal spatial precoding based joint channel estimation, fully exploiting the time, frequency, as well as spatial diversities. The basic schemes proposed in this paper apply to other LTE channels as well, such as the uplink control channel, and the random access channel.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2015 7th International Conference on New Technologies, Mobility and Security (NTMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1