首页 > 最新文献

2022 14th International Conference on Communications (COMM)最新文献

英文 中文
Two Elements Ultra Wideband MIMO Antenna for 5G Communications, WiFi-5 and WiFi-6 Applications 用于5G通信、WiFi-5和WiFi-6应用的双元素超宽带MIMO天线
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817255
Yazan Mohammad Hyasat, Dia Abualnadi, Yanal S. Faouri
In this paper, a two elements wideband MIMO antenna is proposed for 5G communications, WiFi-5, and WiFi-6 usage working in 3.89 GHz to 19.51 GHz frequency bandwidth with an FBW of 133.5 %. The antenna is composed of two identical rectangular patches, each with a circular slot, along with an E-shaped parasitic patch inside the slot. Also, an elliptical shape partial ground plane has been utilized to improve the impedance bandwidth of the suggested antenna. This design covers the n80 5G band (4.4 GHz – 4.99 GHz), and the complete bandwidth of both WiFi-5 and WiFi-6 (5.15 – 7.125) GHz. The mutual decoupling of the suggested MIMO antenna is below −20 dB over the whole frequency range. The proposed MIMO has an admirable correlation coefficient (ECC < 0.05), and the maximum channel capacity loss is 0.3 b/s/Hz. The proposed antenna has been simulated using HFSS software.
本文提出了一种用于5G通信、WiFi-5和WiFi-6使用的双元宽带MIMO天线,工作在3.89 GHz至19.51 GHz的频率带宽上,FBW为133.5%。天线由两个相同的矩形贴片组成,每个贴片都有一个圆形的槽,槽内还有一个e形的寄生贴片。此外,椭圆形状的部分地平面已被用于改善所建议天线的阻抗带宽。本设计涵盖n80 5G频段(4.4 GHz - 4.99 GHz),以及WiFi-5和WiFi-6 (5.15 - 7.125 GHz)的全带宽。在整个频率范围内,MIMO天线的相互去耦小于- 20 dB。该MIMO具有良好的相关系数(ECC < 0.05),最大信道容量损失为0.3 b/s/Hz。利用HFSS软件对该天线进行了仿真。
{"title":"Two Elements Ultra Wideband MIMO Antenna for 5G Communications, WiFi-5 and WiFi-6 Applications","authors":"Yazan Mohammad Hyasat, Dia Abualnadi, Yanal S. Faouri","doi":"10.1109/comm54429.2022.9817255","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817255","url":null,"abstract":"In this paper, a two elements wideband MIMO antenna is proposed for 5G communications, WiFi-5, and WiFi-6 usage working in 3.89 GHz to 19.51 GHz frequency bandwidth with an FBW of 133.5 %. The antenna is composed of two identical rectangular patches, each with a circular slot, along with an E-shaped parasitic patch inside the slot. Also, an elliptical shape partial ground plane has been utilized to improve the impedance bandwidth of the suggested antenna. This design covers the n80 5G band (4.4 GHz – 4.99 GHz), and the complete bandwidth of both WiFi-5 and WiFi-6 (5.15 – 7.125) GHz. The mutual decoupling of the suggested MIMO antenna is below −20 dB over the whole frequency range. The proposed MIMO has an admirable correlation coefficient (ECC < 0.05), and the maximum channel capacity loss is 0.3 b/s/Hz. The proposed antenna has been simulated using HFSS software.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132826920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative Results of Spam Email Detection Using Machine Learning Algorithms 利用机器学习算法检测垃圾邮件的比较结果
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817305
Rodica Paula Cota, Daniel Zinca
Among the problems caused by spam email are loss of productivity and increase in network resources consumption. Sometimes spam email contain malware as attachments or include links for phishing websites, leading to theft and loss of data. Many email servers are filtering spam but the process becomes increasingly difficult as spammers try to create messages that look similar to normal email. In this paper we implemented five Machine Learning Algorithms in the Python language using the scikit-learn library and we compared their performance against two publicly available spam email corpuses. The discussed algorithms are: Support Vector Machine, Random Forest, Logistic Regression, Multinomial Naive Bayes and Gaussian Naive Bayes.
垃圾邮件造成的问题包括生产力的损失和网络资源消耗的增加。有时垃圾邮件包含恶意软件作为附件或包含钓鱼网站的链接,导致数据被盗和丢失。许多电子邮件服务器都在过滤垃圾邮件,但这一过程变得越来越困难,因为垃圾邮件发送者试图创建看起来与普通电子邮件相似的邮件。在本文中,我们使用scikit-learn库在Python语言中实现了五种机器学习算法,并将它们的性能与两个公开的垃圾邮件语料库进行了比较。讨论的算法有:支持向量机、随机森林、逻辑回归、多项朴素贝叶斯和高斯朴素贝叶斯。
{"title":"Comparative Results of Spam Email Detection Using Machine Learning Algorithms","authors":"Rodica Paula Cota, Daniel Zinca","doi":"10.1109/comm54429.2022.9817305","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817305","url":null,"abstract":"Among the problems caused by spam email are loss of productivity and increase in network resources consumption. Sometimes spam email contain malware as attachments or include links for phishing websites, leading to theft and loss of data. Many email servers are filtering spam but the process becomes increasingly difficult as spammers try to create messages that look similar to normal email. In this paper we implemented five Machine Learning Algorithms in the Python language using the scikit-learn library and we compared their performance against two publicly available spam email corpuses. The discussed algorithms are: Support Vector Machine, Random Forest, Logistic Regression, Multinomial Naive Bayes and Gaussian Naive Bayes.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116499227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constraints of Fiber Weave Effect on High-Speed Circuits 高速电路中纤维编织效应的约束
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817220
Maria Dragan, D. Brinaru, S. Halunga
High-speed circuits impose special restrictions on dielectrics with smaller constant dielectric permittivity. On these circuits, velocity increases with the decrease of relative dielectric permittivity. On the other hand, the cost of the system will increase due to substrate's cost, as substrates with low loss at higher frequencies, as N4000-13, are more expensive comparing to the most common substrates as FR4, and design cost will also increase due to the need of proper evaluation of the electromagnetic and signal integrity aspects. High speed and ultra-high speed sensors, 5G networks and IoT applications require lower latency and lower jitter, higher data rates and demand timing analyses while minimizing power consumption. In the current paper, we will analyze several aspects on signal integrity, circuits with frequency dependent dielectric models and fiber weave effect (FWE) upon the dielectric model to characterize the composite structure of printed circuit boards' (PCB) substrates. Also, we will study and include in simulation circuit various types of laminated fabrics and describe the impact of fiberglass effect on the proposed circuit. Coupled lines or single ended lines in the proposed circuit model the interconnections on the PCB. Based on these circuits, we represented the reflection and transmission coefficients for two materials that allows analyzes of composite type substrates: FR4 and N4000-13. In order to highlight the FWE, we designed a circuit with two uncoupled lines and we study the reflection and insertion loss that appear with the increase of the frequency.
高速电路对介电常数较小的介质有特殊的限制。在这些电路中,速度随相对介电常数的减小而增大。另一方面,由于衬底的成本,系统的成本将增加,因为在更高频率下具有低损耗的衬底(如N4000-13)与最常见的衬底(如FR4)相比更昂贵,并且由于需要适当评估电磁和信号完整性方面,设计成本也将增加。高速和超高速传感器、5G网络和物联网应用需要更低的延迟和更低的抖动、更高的数据速率和需求时序分析,同时最大限度地降低功耗。在本论文中,我们将从信号完整性、频率相关介电模型电路和介电模型上的纤维编织效应(FWE)几个方面来分析印刷电路板(PCB)衬底的复合结构。此外,我们将研究并在模拟电路中包含各种类型的层压织物,并描述玻璃纤维效应对所提议电路的影响。电路中的耦合线或单端线模拟了PCB上的互连。基于这些电路,我们表示了两种材料的反射和透射系数,可以分析复合类型的衬底:FR4和N4000-13。为了突出FWE,我们设计了一种双不耦合线电路,研究了随频率增加而出现的反射损耗和插入损耗。
{"title":"Constraints of Fiber Weave Effect on High-Speed Circuits","authors":"Maria Dragan, D. Brinaru, S. Halunga","doi":"10.1109/comm54429.2022.9817220","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817220","url":null,"abstract":"High-speed circuits impose special restrictions on dielectrics with smaller constant dielectric permittivity. On these circuits, velocity increases with the decrease of relative dielectric permittivity. On the other hand, the cost of the system will increase due to substrate's cost, as substrates with low loss at higher frequencies, as N4000-13, are more expensive comparing to the most common substrates as FR4, and design cost will also increase due to the need of proper evaluation of the electromagnetic and signal integrity aspects. High speed and ultra-high speed sensors, 5G networks and IoT applications require lower latency and lower jitter, higher data rates and demand timing analyses while minimizing power consumption. In the current paper, we will analyze several aspects on signal integrity, circuits with frequency dependent dielectric models and fiber weave effect (FWE) upon the dielectric model to characterize the composite structure of printed circuit boards' (PCB) substrates. Also, we will study and include in simulation circuit various types of laminated fabrics and describe the impact of fiberglass effect on the proposed circuit. Coupled lines or single ended lines in the proposed circuit model the interconnections on the PCB. Based on these circuits, we represented the reflection and transmission coefficients for two materials that allows analyzes of composite type substrates: FR4 and N4000-13. In order to highlight the FWE, we designed a circuit with two uncoupled lines and we study the reflection and insertion loss that appear with the increase of the frequency.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131953340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the wireless communication protocols' energy efficiency for versatile WSN deployments 多用途WSN部署无线通信协议的能效评估
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817242
Irina Petra Manciu, D. Sacaleanu, L. Perisoara
The objective of this paper is to evaluate, from the point of view of energy efficiency, the communication protocols whose characteristics make them suitable to the implementation requirements in the infrastructure of Wireless Sensor Networks (WSN). The WiFi, GSM and LoRa protocols are evaluated in this regard, being some of the most widely used for applications of sensor networks. An accurate estimation of the energy consumption for network connection, data acquisition, raw data processing, and data transmission helps proper sizing for versatile indoor or outdoor monitoring solution. The tests were performed on similar data acquisition boards, with similar sensor shields for acquired parameters, but with different data communication transceivers. A special interest was shown to LoRa, and the results of the tests show the flexibility and adaptability of this protocol in WSN with low volume data exchange.
本文的目的是从能源效率的角度来评估通信协议,这些协议的特性使其适合无线传感器网络(WSN)基础设施的实现要求。在这方面对WiFi、GSM和LoRa协议进行了评估,它们是传感器网络应用中最广泛使用的一些协议。准确估计网络连接、数据采集、原始数据处理和数据传输的能耗,有助于为多功能室内或室外监控解决方案提供合适的尺寸。测试在类似的数据采集板上进行,对采集的参数具有类似的传感器屏蔽,但使用不同的数据通信收发器。测试结果表明,该协议在小容量数据交换的无线传感器网络中具有良好的灵活性和适应性。
{"title":"Evaluation of the wireless communication protocols' energy efficiency for versatile WSN deployments","authors":"Irina Petra Manciu, D. Sacaleanu, L. Perisoara","doi":"10.1109/comm54429.2022.9817242","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817242","url":null,"abstract":"The objective of this paper is to evaluate, from the point of view of energy efficiency, the communication protocols whose characteristics make them suitable to the implementation requirements in the infrastructure of Wireless Sensor Networks (WSN). The WiFi, GSM and LoRa protocols are evaluated in this regard, being some of the most widely used for applications of sensor networks. An accurate estimation of the energy consumption for network connection, data acquisition, raw data processing, and data transmission helps proper sizing for versatile indoor or outdoor monitoring solution. The tests were performed on similar data acquisition boards, with similar sensor shields for acquired parameters, but with different data communication transceivers. A special interest was shown to LoRa, and the results of the tests show the flexibility and adaptability of this protocol in WSN with low volume data exchange.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134563788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An e-Business Services Composition Framework 电子商务服务组合框架
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817251
E. Pop, Daniela Gîfu
E-business offers to economic agents the opportunity to increase the efficiency of their activity, promote and offer their products and services on a large and diversified market. Often a single service, separately, does not meet all the needs of various categories and groups of customers. In such a situation, service composition can provide more technical, commercial, informational facilities than each separate component service can offer. There are many web-based frameworks used for e-business, but still with limitations. The paper presents a Services Composition Framework and a wise algorithm for e-business models, based on REST and SOAP web services. It is intended to be used for the development of e-business models, comprising stock market exchange, e-commerce, e-banking, etc. The customers can access the framework services, through Smartphones, on mobile and wireless communication channels. Within a Quality-of-Service performance analysis of the e-business Service Composition Framework, the response time and throughput for multiuser access simultaneous requests were evaluated. A stock market exchange service is considered, as an e-business service example, while Bucharest Stock Exchange information is the digital content source for data transactions.
电子商务为经济代理人提供了提高其活动效率的机会,在一个庞大而多样化的市场上推销和提供他们的产品和服务。通常一项单独的服务并不能满足不同类别和群体客户的所有需求。在这种情况下,服务组合可以提供比每个单独的组件服务所能提供的更多的技术、商业和信息设施。有许多基于web的框架用于电子商务,但仍然有局限性。本文提出了一个基于REST和SOAP web服务的电子商务模型服务组合框架和智能算法。它旨在用于开发电子商务模式,包括股票市场交易、电子商务、电子银行等。客户可以通过智能手机、移动和无线通信渠道访问框架服务。在电子商务服务组合框架的服务质量性能分析中,对多用户同时访问请求的响应时间和吞吐量进行了评估。将股票市场交换服务视为电子商务服务示例,而布加勒斯特证券交易所信息是数据交易的数字内容源。
{"title":"An e-Business Services Composition Framework","authors":"E. Pop, Daniela Gîfu","doi":"10.1109/comm54429.2022.9817251","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817251","url":null,"abstract":"E-business offers to economic agents the opportunity to increase the efficiency of their activity, promote and offer their products and services on a large and diversified market. Often a single service, separately, does not meet all the needs of various categories and groups of customers. In such a situation, service composition can provide more technical, commercial, informational facilities than each separate component service can offer. There are many web-based frameworks used for e-business, but still with limitations. The paper presents a Services Composition Framework and a wise algorithm for e-business models, based on REST and SOAP web services. It is intended to be used for the development of e-business models, comprising stock market exchange, e-commerce, e-banking, etc. The customers can access the framework services, through Smartphones, on mobile and wireless communication channels. Within a Quality-of-Service performance analysis of the e-business Service Composition Framework, the response time and throughput for multiuser access simultaneous requests were evaluated. A stock market exchange service is considered, as an e-business service example, while Bucharest Stock Exchange information is the digital content source for data transactions.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130171594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long range thermal image object recognition for perimeter security 用于周边安全的远程热图像目标识别
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817184
Roxana Mihaescu, S. Carata, Mihai Chindea, M. Ghenescu
Nowadays, the field of long-range thermal image processing is increasingly popular. Although this technology has several advantages in terms of security and monitoring, there are not enough autonomous algorithms for processing these images. In this paper, we aim to address two of the main problems in this field: lack of long-range thermal databases and shortage of autonomous monitoring systems. Firstly, we are introducing a new proprietary database with long-range thermal images. Further, we present a thermal detection algorithm, capable of running on real-time monitoring systems. This algorithm is based on a general-purpose DNN (Deep Neural Network) object detector - the YOLO (You Only Look Once) model. Thus, with minimal computing and hardware resources, this article aims to bring a plus in the field of long-range thermal Image processing.
目前,远程热图像处理领域日益受到重视。尽管该技术在安全性和监控方面具有一些优势,但目前还没有足够的自主算法来处理这些图像。在本文中,我们旨在解决这一领域的两个主要问题:缺乏远程热数据库和缺乏自主监测系统。首先,我们引入了一个新的专有的远程热图像数据库。此外,我们提出了一种能够在实时监控系统上运行的热检测算法。该算法基于通用的DNN(深度神经网络)对象检测器- YOLO(你只看一次)模型。因此,在最小的计算和硬件资源下,本文旨在为远程热图像处理领域带来优势。
{"title":"Long range thermal image object recognition for perimeter security","authors":"Roxana Mihaescu, S. Carata, Mihai Chindea, M. Ghenescu","doi":"10.1109/comm54429.2022.9817184","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817184","url":null,"abstract":"Nowadays, the field of long-range thermal image processing is increasingly popular. Although this technology has several advantages in terms of security and monitoring, there are not enough autonomous algorithms for processing these images. In this paper, we aim to address two of the main problems in this field: lack of long-range thermal databases and shortage of autonomous monitoring systems. Firstly, we are introducing a new proprietary database with long-range thermal images. Further, we present a thermal detection algorithm, capable of running on real-time monitoring systems. This algorithm is based on a general-purpose DNN (Deep Neural Network) object detector - the YOLO (You Only Look Once) model. Thus, with minimal computing and hardware resources, this article aims to bring a plus in the field of long-range thermal Image processing.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129900653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data forwarding to Fog with guaranteed fault tolerance in Internet of Things (IoT) 物联网(IoT)中保证容错的数据转发到Fog
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817179
Seyedsalar Sefati, S. Halunga
The Internet of Things (IoT) is a technology that employs a variety of sensors and wireless communication protocols. People are leveraging IoT to make their lives easier by using innovative and intelligent equipment. One of them is home automation, which works in conjunction with the actuators and sensors linked to the network. The massive increase in the number of sensors, embedded systems, personal devices, etc., will increase the load and, thus, the faults. In such complicated and dense networks, the capacity to offer reliable services in any circumstance is required, and the IoT sensors should not be interrupted. Fault-tolerance methods are essential to maintain low latency and high reliability in IoT systems. A dynamic and sophisticated algorithm is needed to ensure the services in real-world applications. In this proposed method, firstly, the Fog retrieves and stores the Availability, Reliability, and Throughput information (ART) from each cluster. Then, the second round compares the parameters available for the current situation because it is possible to fail in each round. If the ART is equal with the first round, the situation is continuous; otherwise, Fog requests from the Cluster Head (CH) to find the faulty sensor. By removing the faulty sensor, the adjacent nodes must re-route. The proposed method has been simulated in a NS3 environment and achieved high reliability and throughput compared to other algorithms.
物联网(IoT)是一种采用各种传感器和无线通信协议的技术。人们正在利用物联网通过使用创新和智能设备使他们的生活更轻松。其中之一是家庭自动化,它与连接到网络的执行器和传感器一起工作。传感器、嵌入式系统、个人设备等数量的大量增加,将增加负载,从而增加故障。在如此复杂和密集的网络中,需要在任何情况下提供可靠服务的能力,并且物联网传感器不应该中断。容错方法对于保持物联网系统的低延迟和高可靠性至关重要。需要一个动态和复杂的算法来确保实际应用程序中的服务。在该方法中,Fog首先从每个集群中检索并存储可用性、可靠性和吞吐量信息(ART);然后,第二轮比较当前情况可用的参数,因为在每轮中都有可能失败。如果抗逆转录病毒治疗与第一轮相同,则情况是连续的;否则,Fog会向Cluster Head (CH)请求查找故障传感器。通过移除故障传感器,相邻节点必须重新路由。该方法在NS3环境下进行了仿真,与其他算法相比,具有较高的可靠性和吞吐量。
{"title":"Data forwarding to Fog with guaranteed fault tolerance in Internet of Things (IoT)","authors":"Seyedsalar Sefati, S. Halunga","doi":"10.1109/comm54429.2022.9817179","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817179","url":null,"abstract":"The Internet of Things (IoT) is a technology that employs a variety of sensors and wireless communication protocols. People are leveraging IoT to make their lives easier by using innovative and intelligent equipment. One of them is home automation, which works in conjunction with the actuators and sensors linked to the network. The massive increase in the number of sensors, embedded systems, personal devices, etc., will increase the load and, thus, the faults. In such complicated and dense networks, the capacity to offer reliable services in any circumstance is required, and the IoT sensors should not be interrupted. Fault-tolerance methods are essential to maintain low latency and high reliability in IoT systems. A dynamic and sophisticated algorithm is needed to ensure the services in real-world applications. In this proposed method, firstly, the Fog retrieves and stores the Availability, Reliability, and Throughput information (ART) from each cluster. Then, the second round compares the parameters available for the current situation because it is possible to fail in each round. If the ART is equal with the first round, the situation is continuous; otherwise, Fog requests from the Cluster Head (CH) to find the faulty sensor. By removing the faulty sensor, the adjacent nodes must re-route. The proposed method has been simulated in a NS3 environment and achieved high reliability and throughput compared to other algorithms.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing Personal Data in a Video Identification System 保护视像识别系统内的个人资料
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817196
Florin Rastoceanu, Daniel-Tiberius Hriţcu, Constantin Grozea, Marilena Lazar
The increasing use of video surveillance systems raises security concerns regarding the processing of personal data. The security of personal data must be ensured throughout the process of acquisition, transport, storage, processing and discretionary access. In this paper we propose a solution that provides protection for personal data carried by, or stored in a video identification system. Using simple cryptographic methods, the proposed system architecture manages to ensure confidentiality, integrity and authenticity, but also controlled access to personal data. Furthermore, we demonstrate the possibility of using a inexpensive solution with limited resources to secure the video stream in transit. The presented solution is suitable for real-time video communication systems and can ensure the requirements imposed by the GDPR regulations regarding the protection of personal data.
越来越多的视频监控系统的使用引起了对个人数据处理的安全关注。在获取、传输、存储、处理和酌情访问的整个过程中,必须确保个人数据的安全。在本文中,我们提出了一种解决方案,为视频识别系统携带或存储的个人数据提供保护。使用简单的加密方法,所提出的系统架构设法确保机密性、完整性和真实性,同时也控制对个人数据的访问。此外,我们展示了使用有限资源的廉价解决方案来保护传输中的视频流的可能性。该解决方案适用于实时视频通信系统,能够满足GDPR法规对个人数据保护的要求。
{"title":"Securing Personal Data in a Video Identification System","authors":"Florin Rastoceanu, Daniel-Tiberius Hriţcu, Constantin Grozea, Marilena Lazar","doi":"10.1109/comm54429.2022.9817196","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817196","url":null,"abstract":"The increasing use of video surveillance systems raises security concerns regarding the processing of personal data. The security of personal data must be ensured throughout the process of acquisition, transport, storage, processing and discretionary access. In this paper we propose a solution that provides protection for personal data carried by, or stored in a video identification system. Using simple cryptographic methods, the proposed system architecture manages to ensure confidentiality, integrity and authenticity, but also controlled access to personal data. Furthermore, we demonstrate the possibility of using a inexpensive solution with limited resources to secure the video stream in transit. The presented solution is suitable for real-time video communication systems and can ensure the requirements imposed by the GDPR regulations regarding the protection of personal data.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BRIDGE: BRIDGing the gap bEtween CTI production and consumption 桥梁:弥合CTI生产和消费之间的差距
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817359
Marios Karatisoglou, Aristeidis Farao, Vaios Bolgouras, C. Xenakis
Security for businesses and organizations is essential to protect operational activities, trust relationship with clients and financial viability. Increased interest for research concerning cybersecurity issues has been shown recently, while at the same time professionals of this sector are employed to ensure safety. In turn, the efficacy and performance of both the researchers and professionals rely on the information provided by Cyber Threat Intelligence infrastructures. Automation of procedures regarding the collection, harmonization and processing of information is of utmost importance for Cyber Threat Intelligence, in order to effectively relay to the community data concerning newly emerged threats. Nevertheless, the process regarding the transfer of knowledge between Cyber Threat Intelligence and cybersecurity specialists is based on frameworks and procedures that are not in line with the needs and standards of modern times, being performed through obsolete methods and manual labor. In this paper, we propose BRIDGE, the first tool that streamlines the flow of intelligence between Cyber Threat Intelligence and cybersecurity professionals, by taking advantage of the Structured Threat Information eXpression standard, utilizing blockchain technology and automatically converting the intelligence needed in the form that researchers and other professionals require. Our experimental results demonstrate the efficiency of BRIDGE in terms of swiftness and performance improvement compared to the mainstream approach.
企业和组织的安全对于保护运营活动、与客户的信任关系和财务可行性至关重要。最近,人们对网络安全问题的研究越来越感兴趣,与此同时,这一领域的专业人员也被雇佣来确保安全。反过来,研究人员和专业人员的效能和表现都依赖于网络威胁情报基础设施提供的信息。为了有效地向社会传递有关新出现威胁的数据,有关信息收集、协调和处理的程序自动化对网络威胁情报至关重要。然而,网络威胁情报和网络安全专家之间的知识转移过程基于不符合现代需求和标准的框架和程序,通过过时的方法和手工劳动进行。在本文中,我们提出了BRIDGE,这是第一个简化网络威胁情报和网络安全专业人员之间情报流动的工具,它利用结构化威胁信息表达标准,利用区块链技术,并自动将所需情报转换为研究人员和其他专业人员所需的形式。我们的实验结果表明,与主流方法相比,BRIDGE在速度和性能方面都具有效率。
{"title":"BRIDGE: BRIDGing the gap bEtween CTI production and consumption","authors":"Marios Karatisoglou, Aristeidis Farao, Vaios Bolgouras, C. Xenakis","doi":"10.1109/comm54429.2022.9817359","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817359","url":null,"abstract":"Security for businesses and organizations is essential to protect operational activities, trust relationship with clients and financial viability. Increased interest for research concerning cybersecurity issues has been shown recently, while at the same time professionals of this sector are employed to ensure safety. In turn, the efficacy and performance of both the researchers and professionals rely on the information provided by Cyber Threat Intelligence infrastructures. Automation of procedures regarding the collection, harmonization and processing of information is of utmost importance for Cyber Threat Intelligence, in order to effectively relay to the community data concerning newly emerged threats. Nevertheless, the process regarding the transfer of knowledge between Cyber Threat Intelligence and cybersecurity specialists is based on frameworks and procedures that are not in line with the needs and standards of modern times, being performed through obsolete methods and manual labor. In this paper, we propose BRIDGE, the first tool that streamlines the flow of intelligence between Cyber Threat Intelligence and cybersecurity professionals, by taking advantage of the Structured Threat Information eXpression standard, utilizing blockchain technology and automatically converting the intelligence needed in the form that researchers and other professionals require. Our experimental results demonstrate the efficiency of BRIDGE in terms of swiftness and performance improvement compared to the mainstream approach.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"38 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automotive Ethernet Architecture for the Connected Dacia Logan Electric Vehicle Dacia Logan电动汽车的汽车以太网架构
Pub Date : 2022-06-16 DOI: 10.1109/comm54429.2022.9817188
L. Perisoara, D. Sacaleanu, Cosmin Danisor
Automotive Ethernet is an ideal choice for high-speed buses within modern vehicles, used by Advanced Driver Assistance Systems (ADAS), multimedia, navigation, telematics. This paper analysis the advantages of using Automotive Ethernet in vehicles. For a Dacia Logan Electric Vehicle (EV), converted from a classical vehicle with Internal Combustion Engine (ICE), an Ethernet network architecture is proposed for the communication between different Electronic Control Units (ECUs). To gather data from the vehicle's Controller Area Network (CAN), a CAN to Ethernet gateway is developed based on Raspberry Pi. To send data to a web server, an industrial Teltonika RUTX09 mobile router with Ethernet interface is used. Different measurements are performed for acquiring data from the CAN bus, or to investigate the network performances of the mobile Internet Service Provider (ISP). Finally, signal integrity of Ethernet bus is measured and analyzed.
汽车以太网是现代车辆高速客车的理想选择,可用于高级驾驶辅助系统(ADAS)、多媒体、导航和远程信息处理。本文分析了车载以太网的优点。针对Dacia Logan电动汽车(EV),提出了一种以太网网络架构,用于不同电子控制单元(ecu)之间的通信。为了从车辆的控制器区域网络(CAN)收集数据,基于树莓派开发了一个CAN到以太网网关。为了将数据发送到web服务器,使用带有以太网接口的工业Teltonika RUTX09移动路由器。为了从CAN总线获取数据,或为了调查移动互联网服务提供商(ISP)的网络性能,执行了不同的测量。最后,对以太网总线的信号完整性进行了测量和分析。
{"title":"Automotive Ethernet Architecture for the Connected Dacia Logan Electric Vehicle","authors":"L. Perisoara, D. Sacaleanu, Cosmin Danisor","doi":"10.1109/comm54429.2022.9817188","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817188","url":null,"abstract":"Automotive Ethernet is an ideal choice for high-speed buses within modern vehicles, used by Advanced Driver Assistance Systems (ADAS), multimedia, navigation, telematics. This paper analysis the advantages of using Automotive Ethernet in vehicles. For a Dacia Logan Electric Vehicle (EV), converted from a classical vehicle with Internal Combustion Engine (ICE), an Ethernet network architecture is proposed for the communication between different Electronic Control Units (ECUs). To gather data from the vehicle's Controller Area Network (CAN), a CAN to Ethernet gateway is developed based on Raspberry Pi. To send data to a web server, an industrial Teltonika RUTX09 mobile router with Ethernet interface is used. Different measurements are performed for acquiring data from the CAN bus, or to investigate the network performances of the mobile Internet Service Provider (ISP). Finally, signal integrity of Ethernet bus is measured and analyzed.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126424095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 14th International Conference on Communications (COMM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1