首页 > 最新文献

2018 Seventh International Conference on Communications and Networking (ComNet)最新文献

英文 中文
Optimization of a Scalable and Adaptable Diversity/Multiplexing Trade-Off in 28 GHz Systems 28ghz系统中可扩展和自适应分集/复用权衡的优化
Pub Date : 2018-11-01 DOI: 10.1109/COMNET.2018.8622180
Halima Bergaoui, Yosra Mlayah, F. Tlili, F. Rouissi
This paper investigates the optimization of the feedback information required by the adaptation of MIMO techniques in a large-scale environment. The main aim is to propose three optimization techniques and compare its BER performances in a 28 GHz system. It is shown that the reduction of the feedback amount leads to a BER increase. However the "keep" approach based method can guarantee near optimal BER performances while ensuring a remarkable feedback’s reduction.
本文研究了大规模环境下MIMO技术自适应所需反馈信息的优化问题。主要目的是提出三种优化技术,并比较其在28ghz系统中的误码率性能。结果表明,反馈量的减小会导致误码率的增加。然而,基于“保持”方法的方法可以保证接近最优的误码率性能,同时保证显著的反馈减少。
{"title":"Optimization of a Scalable and Adaptable Diversity/Multiplexing Trade-Off in 28 GHz Systems","authors":"Halima Bergaoui, Yosra Mlayah, F. Tlili, F. Rouissi","doi":"10.1109/COMNET.2018.8622180","DOIUrl":"https://doi.org/10.1109/COMNET.2018.8622180","url":null,"abstract":"This paper investigates the optimization of the feedback information required by the adaptation of MIMO techniques in a large-scale environment. The main aim is to propose three optimization techniques and compare its BER performances in a 28 GHz system. It is shown that the reduction of the feedback amount leads to a BER increase. However the \"keep\" approach based method can guarantee near optimal BER performances while ensuring a remarkable feedback’s reduction.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Matching-Theoretic Approach to User-Association and Channel Assignment in Downlink Multi-Cell NOMA Networks 下行多小区NOMA网络中用户关联和信道分配的匹配理论研究
Pub Date : 2018-11-01 DOI: 10.1109/COMNET.2018.8622292
M. W. Baidas, Zainab S. Bahbahani, E. Alsusa
In this paper, the problem of stable user-association and channel assignment in downlink multi-cell NOMA networks is studied. Specifically, the aim is to match network users to channels available at each base-station, while taking into account negative network externality resulting from inter-user interference. Specifically, a solution procedure to determine the optimal power allocation for proportional-fairness SINR-based maximization is devised, which is used to determine the preferences of different user sets over the available channels of each base-station, and the preferences of base-stations for each network user. After that, two centralized polynomial-time complexity stable matching algorithms based on the many-to-one student-project allocation matching problem are proposed to associate users with base-stations and assign channels to them. Simulation results are presented to validate the efficacy of the proposed algorithms, and compare them with a centralized joint user-association, channel assignment, and power allocation scheme, where it has been shown that the proposed algorithms yield comparable SINR per user as well as efficiently assign channels to cell-edge users, while achieving proportional-fairness.
本文研究了下行多小区NOMA网络中稳定的用户关联和信道分配问题。具体来说,目标是将网络用户与每个基站的可用信道相匹配,同时考虑到用户间干扰造成的负面网络外部性。具体而言,设计了基于比例公平sinr的最优功率分配的求解过程,用于确定不同用户集对每个基站可用信道的偏好,以及每个网络用户对基站的偏好。然后,基于多对一学生-项目分配匹配问题,提出了两种集中式多项式时间复杂度稳定匹配算法,将用户与基站关联并为其分配信道。仿真结果验证了所提出算法的有效性,并将其与集中式联合用户关联、信道分配和功率分配方案进行了比较,结果表明,所提出的算法在实现比例公平的同时,可以产生相当的每用户信噪比,并有效地将信道分配给蜂窝边缘用户。
{"title":"A Matching-Theoretic Approach to User-Association and Channel Assignment in Downlink Multi-Cell NOMA Networks","authors":"M. W. Baidas, Zainab S. Bahbahani, E. Alsusa","doi":"10.1109/COMNET.2018.8622292","DOIUrl":"https://doi.org/10.1109/COMNET.2018.8622292","url":null,"abstract":"In this paper, the problem of stable user-association and channel assignment in downlink multi-cell NOMA networks is studied. Specifically, the aim is to match network users to channels available at each base-station, while taking into account negative network externality resulting from inter-user interference. Specifically, a solution procedure to determine the optimal power allocation for proportional-fairness SINR-based maximization is devised, which is used to determine the preferences of different user sets over the available channels of each base-station, and the preferences of base-stations for each network user. After that, two centralized polynomial-time complexity stable matching algorithms based on the many-to-one student-project allocation matching problem are proposed to associate users with base-stations and assign channels to them. Simulation results are presented to validate the efficacy of the proposed algorithms, and compare them with a centralized joint user-association, channel assignment, and power allocation scheme, where it has been shown that the proposed algorithms yield comparable SINR per user as well as efficiently assign channels to cell-edge users, while achieving proportional-fairness.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130427999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security analysis in Enhanced LoRaWAN duty cycle 增强型LoRaWAN占空比的安全性分析
Pub Date : 2018-11-01 DOI: 10.1109/COMNET.2018.8622296
Norhane Benkahla, B. Belgacem, M. Frikha
Our environment is getting smarter and smarter and we will reach billions of IoT devices. Being able to implement the IoT properly requires several challenges to take up. This is why the LPWAN technologies were recently introduced. Among many of LPWAN candidate, lora’s power efficiency and long rang features have made it of of the most important candidate for the IoT technology. The constraints of duty cycle limitation was studied in [1] where a shared duty cycle was proposed using different allocation strategies. In this paper, we propose to study the vulnerability of a proposed Enhanced LoRaWAN duty cycle that may turn into an attack: bit flipping and spoofing attack. We propose and evaluate a solution to guaranteed the security in a dynamic behavior of a duty cycle.
我们的环境变得越来越智能,我们将接触到数十亿的物联网设备。能够正确实施物联网需要应对几个挑战。这就是最近引入LPWAN技术的原因。在众多LPWAN候选者中,lora的功率效率和远程特性使其成为物联网技术最重要的候选者之一。文献[1]研究了占空比限制的约束,提出了使用不同分配策略实现共享占空比。在本文中,我们建议研究提出的增强型LoRaWAN占空比的脆弱性,该脆弱性可能会变成攻击:位翻转和欺骗攻击。我们提出并评估了一种保证占空比动态行为安全的解决方案。
{"title":"Security analysis in Enhanced LoRaWAN duty cycle","authors":"Norhane Benkahla, B. Belgacem, M. Frikha","doi":"10.1109/COMNET.2018.8622296","DOIUrl":"https://doi.org/10.1109/COMNET.2018.8622296","url":null,"abstract":"Our environment is getting smarter and smarter and we will reach billions of IoT devices. Being able to implement the IoT properly requires several challenges to take up. This is why the LPWAN technologies were recently introduced. Among many of LPWAN candidate, lora’s power efficiency and long rang features have made it of of the most important candidate for the IoT technology. The constraints of duty cycle limitation was studied in [1] where a shared duty cycle was proposed using different allocation strategies. In this paper, we propose to study the vulnerability of a proposed Enhanced LoRaWAN duty cycle that may turn into an attack: bit flipping and spoofing attack. We propose and evaluate a solution to guaranteed the security in a dynamic behavior of a duty cycle.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ComNet 2018 Copyright Page ComNet 2018版权页面
Pub Date : 2018-11-01 DOI: 10.1109/comnet.2018.8622278
{"title":"ComNet 2018 Copyright Page","authors":"","doi":"10.1109/comnet.2018.8622278","DOIUrl":"https://doi.org/10.1109/comnet.2018.8622278","url":null,"abstract":"","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116840924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Physical Layer Security in Optical Wireless Communication Systems 无线光通信系统物理层安全研究
Pub Date : 2018-11-01 DOI: 10.1109/COMNET.2018.8622294
Mohanad Obeed, A. Salhab, Mohamed-Slim Alouini, S. Zummo
As the existing radio-frequency (RF) networks cannot meet the ever-increasing data rate demand, the optical wireless communication (OWC), which uses a wide untapped unregulated spectrum, has been proposed as a promising technology to overcome the RF spectrum limitations. On the other hand, with the increasing demand for high data rate and the prevalence of the broadcast-nature networks, researchers have recently come up with new mechanisms to improve secure communication using physical layer techniques. Compared to RF networks, the OWC networks are more secure and less susceptible to the interception because of the small coverage provided by LEDs, and because they work properly only in the presence of the line-of-sight (LoS) components. However, the security in OWC networks is still an issue, especially in visible light communication (VLC) when the transmitted information can be accessed by multiple users as in public areas, meeting rooms, laboratories, and libraries. That means potential eavesdroppers may be existing to gather confidential messages. This paper reviews all the conducted work on physical layer security (PLS) in two types of OWC networks, which are the VLC and free space optical (FSO) networks. Furthermore, the paper proposes several open problems in these networks to optimize and enhance the security performance.
由于现有的射频(RF)网络无法满足日益增长的数据速率需求,利用广泛未开发的非规范频谱的光无线通信(OWC)被提出作为一种有前途的技术来克服射频频谱的限制。另一方面,随着高数据速率需求的增加和广播型网络的普及,研究人员最近提出了利用物理层技术提高安全通信的新机制。与RF网络相比,OWC网络更安全,更不易受到拦截,因为led提供的覆盖范围很小,而且它们只有在视距(LoS)组件存在的情况下才能正常工作。然而,OWC网络的安全性仍然是一个问题,特别是在可见光通信(VLC)中,当传输的信息可以被多个用户访问时,如公共区域、会议室、实验室和图书馆。这意味着可能存在潜在的窃听者来收集机密信息。本文综述了两种OWC网络(VLC和FSO)在物理层安全方面所做的所有工作。此外,本文还提出了这些网络中存在的一些开放性问题,以优化和提高安全性能。
{"title":"Survey on Physical Layer Security in Optical Wireless Communication Systems","authors":"Mohanad Obeed, A. Salhab, Mohamed-Slim Alouini, S. Zummo","doi":"10.1109/COMNET.2018.8622294","DOIUrl":"https://doi.org/10.1109/COMNET.2018.8622294","url":null,"abstract":"As the existing radio-frequency (RF) networks cannot meet the ever-increasing data rate demand, the optical wireless communication (OWC), which uses a wide untapped unregulated spectrum, has been proposed as a promising technology to overcome the RF spectrum limitations. On the other hand, with the increasing demand for high data rate and the prevalence of the broadcast-nature networks, researchers have recently come up with new mechanisms to improve secure communication using physical layer techniques. Compared to RF networks, the OWC networks are more secure and less susceptible to the interception because of the small coverage provided by LEDs, and because they work properly only in the presence of the line-of-sight (LoS) components. However, the security in OWC networks is still an issue, especially in visible light communication (VLC) when the transmitted information can be accessed by multiple users as in public areas, meeting rooms, laboratories, and libraries. That means potential eavesdroppers may be existing to gather confidential messages. This paper reviews all the conducted work on physical layer security (PLS) in two types of OWC networks, which are the VLC and free space optical (FSO) networks. Furthermore, the paper proposes several open problems in these networks to optimize and enhance the security performance.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127273772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Handover Decision Algorithm in Femtocell Long Term Evolution Networks Femtocell长期进化网络中的切换决策算法
Pub Date : 2018-11-01 DOI: 10.1109/COMNET.2018.8622167
Maroua Ben Gharbia, R. Bouallègue
Nowadays the deployment of Femtocell as the emerging wireless technology becomes a promising solution to improve indoor coverage and system capacity and lower transmit power. However, Femtocells deployment may cause the unnecessary Handover due to the movement of the UE. As Femtocells coverage area is very small, there are many targets Femtocells. In this paper, we propose a new Handover decision algorithm between Femtocell and Macrocell for LTE (Long Term Evolution) network based on multiple parameters instead of some parameters as in the vertical Handover algorithm. The proposed algorithm can avoid unnecessary Handover and reduce number of Handover. Simulation results show that the system performance has been improved for medium and high UE’s speed.
目前,Femtocell作为一种新兴的无线技术,在提高室内覆盖、提高系统容量、降低发射功率等方面已成为一种很有前景的解决方案。但是,部署Femtocells可能会由于终端的移动而导致不必要的切换。由于飞蜂窝的覆盖面积很小,因此目标多。本文提出了一种新的LTE (Long Term Evolution)网络中基于多个参数的Femtocell和Macrocell切换决策算法,而不是垂直切换算法中的某些参数。该算法可以避免不必要的切换,减少切换次数。仿真结果表明,在中高UE速度下,系统性能得到了改善。
{"title":"Handover Decision Algorithm in Femtocell Long Term Evolution Networks","authors":"Maroua Ben Gharbia, R. Bouallègue","doi":"10.1109/COMNET.2018.8622167","DOIUrl":"https://doi.org/10.1109/COMNET.2018.8622167","url":null,"abstract":"Nowadays the deployment of Femtocell as the emerging wireless technology becomes a promising solution to improve indoor coverage and system capacity and lower transmit power. However, Femtocells deployment may cause the unnecessary Handover due to the movement of the UE. As Femtocells coverage area is very small, there are many targets Femtocells. In this paper, we propose a new Handover decision algorithm between Femtocell and Macrocell for LTE (Long Term Evolution) network based on multiple parameters instead of some parameters as in the vertical Handover algorithm. The proposed algorithm can avoid unnecessary Handover and reduce number of Handover. Simulation results show that the system performance has been improved for medium and high UE’s speed.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IMS Predictive Collaborative Service Discovery Approach IMS预测协同服务发现方法
Pub Date : 2018-11-01 DOI: 10.1109/COMNET.2018.8622179
Armielle Noulapeu Ngaffo, Walid El Ayeb, Z. Choukair
The increasing number of services gives the telecommunication operators a great opportunity to fulfil the demand of their subscribers. Indeed, since various practically comparative services are promptly accessible, to offer a service that is relevant to the subscriber is at the centre of the operator's concerns. This is the case of IMS (IP Multimedia Subsystem), which is this platform that effectively allows access to a range of varied services regardless of the underlying access networks. By this way, to offer services fitting the needs of the subscriber within the IMS remains a challenging issue. The service discovery approach by exploiting only the information associated with the user's profile has poor performance when the usage history of the target subscriber is not provided. This restricts the relevance of the proposed service. Therefore, in addition to the information associated with the target subscriber's profile, we are interested in the information associated with the profiles of other subscribers similar to that of the target subscriber to improve the accuracy of the service targeting. In this paper we present a collaborative approach applied to service discovery that is based on taking into account the degree of satisfaction of the user. By the end we demonstrate through our results a clear improvement in service targeting accuracy.
业务数量的增加为电信运营商提供了满足用户需求的大好机会。事实上,由于各种实际的比较服务都可以迅速获得,因此提供与用户相关的服务是运营商关注的中心。这就是IMS (IP多媒体子系统)的情况,这个平台有效地允许访问一系列不同的服务,而不管底层的访问网络是什么。通过这种方式,在IMS中提供适合订户需求的服务仍然是一个具有挑战性的问题。当不提供目标订阅者的使用历史记录时,仅利用与用户配置文件相关联的信息的服务发现方法的性能很差。这限制了所提议服务的相关性。因此,除了与目标订阅者的个人资料相关联的信息外,我们还对与目标订阅者相似的其他订阅者的个人资料相关联的信息感兴趣,以提高服务定位的准确性。在本文中,我们提出了一种应用于服务发现的协作方法,该方法基于考虑用户的满意度。最后,我们通过我们的结果证明了服务定位准确性的明显提高。
{"title":"IMS Predictive Collaborative Service Discovery Approach","authors":"Armielle Noulapeu Ngaffo, Walid El Ayeb, Z. Choukair","doi":"10.1109/COMNET.2018.8622179","DOIUrl":"https://doi.org/10.1109/COMNET.2018.8622179","url":null,"abstract":"The increasing number of services gives the telecommunication operators a great opportunity to fulfil the demand of their subscribers. Indeed, since various practically comparative services are promptly accessible, to offer a service that is relevant to the subscriber is at the centre of the operator's concerns. This is the case of IMS (IP Multimedia Subsystem), which is this platform that effectively allows access to a range of varied services regardless of the underlying access networks. By this way, to offer services fitting the needs of the subscriber within the IMS remains a challenging issue. The service discovery approach by exploiting only the information associated with the user's profile has poor performance when the usage history of the target subscriber is not provided. This restricts the relevance of the proposed service. Therefore, in addition to the information associated with the target subscriber's profile, we are interested in the information associated with the profiles of other subscribers similar to that of the target subscriber to improve the accuracy of the service targeting. In this paper we present a collaborative approach applied to service discovery that is based on taking into account the degree of satisfaction of the user. By the end we demonstrate through our results a clear improvement in service targeting accuracy.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129677182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Overview on RPL Objective Function Enhancement Approaches RPL目标函数增强方法综述
Pub Date : 2018-11-01 DOI: 10.1109/COMNET.2018.8622132
Inès Kechiche, Inès Bousnina, A. Samet
RPL is an IPv6 routing protocol for Low-Power and Lossy Networks (LLNs) designed by the ROLL working group to fit challenging routing requirements of LLNS network. RPL relies on Objective Function (OF) to select best parents and then construct paths. Considering the vast areas of applications for RPL, the routing protocol was designed with a great deal of flexibility. In fact RPL does not specify any particular routing metric/constraint to be used for DAG rank computation. In this paper, we give an overview of the different approaches considered to optimize RPL OF and classify them. More specifically, we specify which metrics are considered for OF enhancement and optimal parent selection. After a comparative study, we finally discuss the proposed enhancement schemes and highlight some limitations of the existing strategies.
RPL是一种针对低功耗和有损网络(LLNs)的IPv6路由协议,由ROLL工作组设计,以适应LLNs网络具有挑战性的路由需求。RPL依赖于目标函数(OF)来选择最优父母,然后构建路径。考虑到RPL应用的广泛领域,路由协议的设计具有很大的灵活性。事实上,RPL并没有指定用于DAG等级计算的任何特定路由度量/约束。本文概述了优化RPL的不同方法,并对它们进行了分类。更具体地说,我们指定了哪些指标被认为是增强和最佳亲本选择。在比较研究之后,我们最后讨论了提出的增强方案,并强调了现有策略的一些局限性。
{"title":"An Overview on RPL Objective Function Enhancement Approaches","authors":"Inès Kechiche, Inès Bousnina, A. Samet","doi":"10.1109/COMNET.2018.8622132","DOIUrl":"https://doi.org/10.1109/COMNET.2018.8622132","url":null,"abstract":"RPL is an IPv6 routing protocol for Low-Power and Lossy Networks (LLNs) designed by the ROLL working group to fit challenging routing requirements of LLNS network. RPL relies on Objective Function (OF) to select best parents and then construct paths. Considering the vast areas of applications for RPL, the routing protocol was designed with a great deal of flexibility. In fact RPL does not specify any particular routing metric/constraint to be used for DAG rank computation. In this paper, we give an overview of the different approaches considered to optimize RPL OF and classify them. More specifically, we specify which metrics are considered for OF enhancement and optimal parent selection. After a comparative study, we finally discuss the proposed enhancement schemes and highlight some limitations of the existing strategies.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127916591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Trust based Routing Protocol for VANETs 一种新的基于信任的vanet路由协议
Pub Date : 2018-11-01 DOI: 10.1109/COMNET.2018.8621921
Amira Kchaou, Ryma Abassi, S. Fatmi
Vehicular communications are expected to share different kinds of information between vehicles. However, the presence of dishonest vehicles in the route may lead to the drop or modification of the content of the exchanged messages. Thus, it is a challenge to find and maintain an efficient route for transmitting reliable information.In this paper, we propose a new routing protocol for Vehicular Ad-hoc NETworks (VANETs) based on trust. This protocol uses the trustworthiness of the path and the number of hops in order to find the optimal route.
车辆通信有望在车辆之间共享不同类型的信息。然而,路线中存在不诚实的车辆可能导致交换信息的内容丢失或修改。因此,寻找和维护有效的途径来传递可靠的信息是一项挑战。本文提出了一种基于信任的车载自组网路由协议。该协议利用路径的可信度和跳数来寻找最优路由。
{"title":"A New Trust based Routing Protocol for VANETs","authors":"Amira Kchaou, Ryma Abassi, S. Fatmi","doi":"10.1109/COMNET.2018.8621921","DOIUrl":"https://doi.org/10.1109/COMNET.2018.8621921","url":null,"abstract":"Vehicular communications are expected to share different kinds of information between vehicles. However, the presence of dishonest vehicles in the route may lead to the drop or modification of the content of the exchanged messages. Thus, it is a challenge to find and maintain an efficient route for transmitting reliable information.In this paper, we propose a new routing protocol for Vehicular Ad-hoc NETworks (VANETs) based on trust. This protocol uses the trustworthiness of the path and the number of hops in order to find the optimal route.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128017782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blockchain Challenges and Security Schemes: A Survey 区块链挑战和安全方案:调查
Pub Date : 2018-11-01 DOI: 10.1109/comnet.2018.8621944
Sirine Sayadi, S. Rejeb, Z. Choukair
With the increasing number of connected devices and the number of online transactions today, managing all these transactions and devices and maintaining network security is a research issue. Current solutions are mainly based on cloud computing infrastructures, which require servers high-end and broadband networks to provide data storage and computing services. These solutions have a number of significant disadvantages, such as high maintenance costs of centralized servers, critical weakness of Internet Of Things applications, security and trust issues, etc. The blockchain is seen as a promising technique for addressing the mentioned security issues and design new decentralization frameworks. However, this new technology has a great potential in the most diverse technological fields. In this paper, we focus on presenting an overview of blockchain technology, highlighting its advantages, limitations and areas of application.The originality of this work resides in the comparison between the different blockchain systems and their security schemes and the perspective of integrating this technology into secured systems models for our comfort and our private life.
在连接设备和在线交易数量不断增加的今天,管理所有这些交易和设备并维护网络安全是一个研究问题。目前的解决方案主要基于云计算基础设施,需要高端服务器和宽带网络来提供数据存储和计算服务。这些解决方案有许多明显的缺点,例如集中式服务器的高维护成本,物联网应用的关键弱点,安全和信任问题等。区块链被视为解决上述安全问题和设计新的去中心化框架的一种有前途的技术。然而,这项新技术在最多样化的技术领域具有巨大的潜力。在本文中,我们将重点介绍区块链技术的概述,突出其优势,局限性和应用领域。这项工作的独创性在于对不同区块链系统及其安全方案的比较,以及将这项技术集成到安全系统模型中的观点,以使我们的舒适和私人生活。
{"title":"Blockchain Challenges and Security Schemes: A Survey","authors":"Sirine Sayadi, S. Rejeb, Z. Choukair","doi":"10.1109/comnet.2018.8621944","DOIUrl":"https://doi.org/10.1109/comnet.2018.8621944","url":null,"abstract":"With the increasing number of connected devices and the number of online transactions today, managing all these transactions and devices and maintaining network security is a research issue. Current solutions are mainly based on cloud computing infrastructures, which require servers high-end and broadband networks to provide data storage and computing services. These solutions have a number of significant disadvantages, such as high maintenance costs of centralized servers, critical weakness of Internet Of Things applications, security and trust issues, etc. The blockchain is seen as a promising technique for addressing the mentioned security issues and design new decentralization frameworks. However, this new technology has a great potential in the most diverse technological fields. In this paper, we focus on presenting an overview of blockchain technology, highlighting its advantages, limitations and areas of application.The originality of this work resides in the comparison between the different blockchain systems and their security schemes and the perspective of integrating this technology into secured systems models for our comfort and our private life.","PeriodicalId":177399,"journal":{"name":"2018 Seventh International Conference on Communications and Networking (ComNet)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123489214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2018 Seventh International Conference on Communications and Networking (ComNet)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1