Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024626
Yongfei Zhang, Yun Lin, Z. Dou, Meiyu Wang, Wenwen Li
WiFi is the adhesive in the Internet of Things(IoT), and most wireless devices use WiFi to access the IoT. Monitorization and identification of access WiFi devices are particularly important for the security of the IoT, especially, sensitive areas. In this context, we propose a classification framework for WiFi devices based on their Power Spectral Density(PSD) and Permutation Entropy(PE) of the preamble signal. Four WLAN cards are under test to verify our method. And the K-NN classification was used. The experimental results show that the two methods have a recognition rate of more than 90% with SNR is -5 dB.
{"title":"Monitoring and Identification of WiFi Devices for Internet of Things Security","authors":"Yongfei Zhang, Yun Lin, Z. Dou, Meiyu Wang, Wenwen Li","doi":"10.1109/GCWkshps45667.2019.9024626","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024626","url":null,"abstract":"WiFi is the adhesive in the Internet of Things(IoT), and most wireless devices use WiFi to access the IoT. Monitorization and identification of access WiFi devices are particularly important for the security of the IoT, especially, sensitive areas. In this context, we propose a classification framework for WiFi devices based on their Power Spectral Density(PSD) and Permutation Entropy(PE) of the preamble signal. Four WLAN cards are under test to verify our method. And the K-NN classification was used. The experimental results show that the two methods have a recognition rate of more than 90% with SNR is -5 dB.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115145676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024327
Xiaolong Yang, Shiming Wu, Mu Zhou, Liangbo Xie, Jiacheng Wang, Wei-jun He
Passive human target detection has a broad application prospect in security monitoring, intelligent home and humancomputer interaction. In through-the-wall scenario, due to the serious attenuation of signals caused by wall, the energy of target reflection signal decreases significantly and is submerged in the direct signal of the transceiver and the reflection signal of indoor static objects, making it difficult to be extracted. Therefore, the existing WiFi sensing system has some limitations in throughthe-wall scene, especially in detection of the stationary human target and the number of moving human targets. According to the above problem, we propose a detection system TWMD based on multidimensional signal features in this paper. Firstly, the received Channel State Information (CSI) data is preprocessed to eliminate the phase error and amplitude noise. Then, the multidimensional features are fully extracted from the correlation coefficient matrix by using time correlation and subcarrier correlation of CSI. Finally, the mapping between features and detection results is established by Back Propagation (BP) neural network. Our experimental results show that the recognition accuracy of TWMD in the environment with glass wall, brick wall and concrete wall are above 0.980, 0.900, 0.850, respectively. Compared with the existing detection system based on single signal feature, it improves about 0.450 in the detection of the number of moving targets.
{"title":"Indoor Through-the-Wall Passive Human Target Detection with WiFi","authors":"Xiaolong Yang, Shiming Wu, Mu Zhou, Liangbo Xie, Jiacheng Wang, Wei-jun He","doi":"10.1109/GCWkshps45667.2019.9024327","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024327","url":null,"abstract":"Passive human target detection has a broad application prospect in security monitoring, intelligent home and humancomputer interaction. In through-the-wall scenario, due to the serious attenuation of signals caused by wall, the energy of target reflection signal decreases significantly and is submerged in the direct signal of the transceiver and the reflection signal of indoor static objects, making it difficult to be extracted. Therefore, the existing WiFi sensing system has some limitations in throughthe-wall scene, especially in detection of the stationary human target and the number of moving human targets. According to the above problem, we propose a detection system TWMD based on multidimensional signal features in this paper. Firstly, the received Channel State Information (CSI) data is preprocessed to eliminate the phase error and amplitude noise. Then, the multidimensional features are fully extracted from the correlation coefficient matrix by using time correlation and subcarrier correlation of CSI. Finally, the mapping between features and detection results is established by Back Propagation (BP) neural network. Our experimental results show that the recognition accuracy of TWMD in the environment with glass wall, brick wall and concrete wall are above 0.980, 0.900, 0.850, respectively. Compared with the existing detection system based on single signal feature, it improves about 0.450 in the detection of the number of moving targets.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115314108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024407
A. Sahoo, N. E. Ouni, Vineet Shenoy
In the Citizens Broadband Radio Service (CBRS) band, the Federal Communications Commission (FCC) has set stringent timing constraints for the lower tier users to vacate the channel on which an incumbent shipborne radar appears. The standards body formulating various specifications for the CBRS operation has taken these timing constraints into consideration in the Spectrum Access System (SAS) - CBRS Device (CBSD) protocol. A transmitting CBSD continually heartbeats with its SAS. When required, the SAS sends commands to vacate a channel through these heartbeat messages. In this paper, we study the impact of the heartbeat interval on the CBRS system in terms of meeting the FCC timing constraints. We also study how the heartbeat interval can overload a SAS and how it can be used to determine the number of CBSDs a SAS can serve without causing unnecessary suspension of CBSD transmissions. We show the tradeoff between using a short heartbeat interval to meet the timing constraint early and the number of CBSDs that can be served by a SAS without causing unnecessary suspension of CBSD transmissions.
{"title":"A Study of Timing Constraints and SAS Overload of SAS-CBSD Protocol in the CBRS Band","authors":"A. Sahoo, N. E. Ouni, Vineet Shenoy","doi":"10.1109/GCWkshps45667.2019.9024407","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024407","url":null,"abstract":"In the Citizens Broadband Radio Service (CBRS) band, the Federal Communications Commission (FCC) has set stringent timing constraints for the lower tier users to vacate the channel on which an incumbent shipborne radar appears. The standards body formulating various specifications for the CBRS operation has taken these timing constraints into consideration in the Spectrum Access System (SAS) - CBRS Device (CBSD) protocol. A transmitting CBSD continually heartbeats with its SAS. When required, the SAS sends commands to vacate a channel through these heartbeat messages. In this paper, we study the impact of the heartbeat interval on the CBRS system in terms of meeting the FCC timing constraints. We also study how the heartbeat interval can overload a SAS and how it can be used to determine the number of CBSDs a SAS can serve without causing unnecessary suspension of CBSD transmissions. We show the tradeoff between using a short heartbeat interval to meet the timing constraint early and the number of CBSDs that can be served by a SAS without causing unnecessary suspension of CBSD transmissions.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123155832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024431
R. Ravindran, A. Azgin, K. Ramakrishnan
Next generation mobile IoT systems such as autonomous vehicles, mobile robotic and drone systems demand new ways to integrate programmable edge compute and networking resources to manage and control them in real time. Current solutions to support real-time information delivery and sharing, handling mobility, multicasting and service migration need to evolve. In this paper, we look at the unique features of these IoT systems that take advantage of high bandwidth wireless communications and edge computing. To address these challenges, we examine the capabilities needed in a new transport architecture for edge networks (ETRA) to handle low latency (and high bandwidth) real-time data streams from mobile IoT systems that also require services to handle mobility, service migration, data replication and reliability. We exemplify ETRA's functionality considering the case for augmented vehicular reality, wherein autonomous vehicles share their sensors' point clouds with each other over a managed edge infrastructure.
{"title":"Edge Transport (ETRA): Edge Transport Protocol Architecture for Next Generation Mobile IoT Systems","authors":"R. Ravindran, A. Azgin, K. Ramakrishnan","doi":"10.1109/GCWkshps45667.2019.9024431","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024431","url":null,"abstract":"Next generation mobile IoT systems such as autonomous vehicles, mobile robotic and drone systems demand new ways to integrate programmable edge compute and networking resources to manage and control them in real time. Current solutions to support real-time information delivery and sharing, handling mobility, multicasting and service migration need to evolve. In this paper, we look at the unique features of these IoT systems that take advantage of high bandwidth wireless communications and edge computing. To address these challenges, we examine the capabilities needed in a new transport architecture for edge networks (ETRA) to handle low latency (and high bandwidth) real-time data streams from mobile IoT systems that also require services to handle mobility, service migration, data replication and reliability. We exemplify ETRA's functionality considering the case for augmented vehicular reality, wherein autonomous vehicles share their sensors' point clouds with each other over a managed edge infrastructure.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024476
G. Hu, Yi Ye, Yin Zhang, M. S. Hossain
Fund correlation analysis can guide investors' investment and wealth management, avoiding the selection of highly relevant funds in the investment process, which can make the risk sharing among funds. There is a strong dependence between the features of the fund data and a long-term dependence between the output of different time steps, which makes it difficult to obtain good performance in the fund data in the data analysis model used in the traditional intelligent investment system. This has brought difficulties to fund correlation analysis. In order to solve the above problems, this paper uses an encoder-decoder model combined with the attention mechanism--Improved RNN model. The Encoder-decoder model has made great strides in the application of financial time series analysis. And the attention mechanism can select specific feature inputs and previous time step outputs, both of which are highly correlated with the current output, making system predictions more efficient. This paper applies this model to the historical data set containing multiple public funds. The results show that the fund intelligent investment system proposed in this paper performs best.
{"title":"Improved Recurrent Neural Networks (RNN) Based Intelligent Fund Transaction Model","authors":"G. Hu, Yi Ye, Yin Zhang, M. S. Hossain","doi":"10.1109/GCWkshps45667.2019.9024476","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024476","url":null,"abstract":"Fund correlation analysis can guide investors' investment and wealth management, avoiding the selection of highly relevant funds in the investment process, which can make the risk sharing among funds. There is a strong dependence between the features of the fund data and a long-term dependence between the output of different time steps, which makes it difficult to obtain good performance in the fund data in the data analysis model used in the traditional intelligent investment system. This has brought difficulties to fund correlation analysis. In order to solve the above problems, this paper uses an encoder-decoder model combined with the attention mechanism--Improved RNN model. The Encoder-decoder model has made great strides in the application of financial time series analysis. And the attention mechanism can select specific feature inputs and previous time step outputs, both of which are highly correlated with the current output, making system predictions more efficient. This paper applies this model to the historical data set containing multiple public funds. The results show that the fund intelligent investment system proposed in this paper performs best.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127302354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024580
Purui Wang, Zuyao Ni, Chunxiao Jiang, Linling Kuang, W. Feng
In the multi-antenna satellite communication system, beamforming and artificial noise are usually adopted to enhance physical layer security. However, due to the long distance between the satellite and the terrestrial terminal, the coverage of the main lobe in the satellite downlink is so large that the eavesdropper can get into the coverage easily despite of using spot beams. When the eavesdropper is close to the legitimate user, the difference between the main channel and the wiretap channel is small, which makes the secrecy capacity decrease rapidly. This paper proposes a novel scheme to solve this problem by using two different beams which work on different frequencies to transmit the same signal to the legitimate user. This dual-beam dual- frequency scheme can enlarge the difference between the desired channel and the wiretap channel. Then, if we add some artificial noise set the proper beamforming vectors, the secrecy capacity will remain high when the eavesdropper is in the small zone near the legitimate user. In order to derive the artificial noise and the beamforming vectors, we transform the problem into a semidefinite problem and use CVX tools to solve the problem. Simulation results prove that this scheme can achieve high secrecy capacity even when the eavesdropper is very close to the legitimate user.
{"title":"Dual-Beam Dual-Frequency Secure Transmission for Downlink Satellite Communication Systems","authors":"Purui Wang, Zuyao Ni, Chunxiao Jiang, Linling Kuang, W. Feng","doi":"10.1109/GCWkshps45667.2019.9024580","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024580","url":null,"abstract":"In the multi-antenna satellite communication system, beamforming and artificial noise are usually adopted to enhance physical layer security. However, due to the long distance between the satellite and the terrestrial terminal, the coverage of the main lobe in the satellite downlink is so large that the eavesdropper can get into the coverage easily despite of using spot beams. When the eavesdropper is close to the legitimate user, the difference between the main channel and the wiretap channel is small, which makes the secrecy capacity decrease rapidly. This paper proposes a novel scheme to solve this problem by using two different beams which work on different frequencies to transmit the same signal to the legitimate user. This dual-beam dual- frequency scheme can enlarge the difference between the desired channel and the wiretap channel. Then, if we add some artificial noise set the proper beamforming vectors, the secrecy capacity will remain high when the eavesdropper is in the small zone near the legitimate user. In order to derive the artificial noise and the beamforming vectors, we transform the problem into a semidefinite problem and use CVX tools to solve the problem. Simulation results prove that this scheme can achieve high secrecy capacity even when the eavesdropper is very close to the legitimate user.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024645
P. Dat, A. Kanno, N. Yamamoto, T. Kawanishi
We present a high-speed integrated fiber-wireless system in the W band for transmission of high- frequency radio signals to ultra-dense small cells and moving cells. The system utilizes a wavelength-division-multiplexing intermediate- frequency-over-fiber system and a remote generation and transmission of local oscillator signals. We experimentally confirmed satisfactory performance for the transmission of 4 Ã- 25-Gb/s and 20-Gb/s OFDM signals over a fixed and a switchable system, respectively. The system is highly spectral efficiency and scalable for signal transmission in future mobile networks.
{"title":"Integrated Fiber-Wireless System in W Band for Ultra-Dense Small-Cell and Moving-Cell Network","authors":"P. Dat, A. Kanno, N. Yamamoto, T. Kawanishi","doi":"10.1109/GCWkshps45667.2019.9024645","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024645","url":null,"abstract":"We present a high-speed integrated fiber-wireless system in the W band for transmission of high- frequency radio signals to ultra-dense small cells and moving cells. The system utilizes a wavelength-division-multiplexing intermediate- frequency-over-fiber system and a remote generation and transmission of local oscillator signals. We experimentally confirmed satisfactory performance for the transmission of 4 Ã- 25-Gb/s and 20-Gb/s OFDM signals over a fixed and a switchable system, respectively. The system is highly spectral efficiency and scalable for signal transmission in future mobile networks.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024500
Y. Koizumi, Yoji Yamamoto, T. Hasegawa
During a disaster or a catastrophic accident, it is difficult to keep providing circuit-switching based emergency communication, such as the 911 calls in the US and the 119 calls in Japan, due to heavy congestion or network failures. In order to provide stable emergency message delivery, we proposed the architecture that provides packet-switching based emergency message delivery on top of NDN (Named Data Networking) networks. The architecture, however, assumes that devices in the architecture are honest. In contrast, the paper re-designs the architecture, assuming that end devices are dishonest. That is, an end device is either malicious or compromised by an attacker and tries to report a fake location to disturb the emergency message delivery service. We first define security requirements for emergency message delivery and next re-design the architecture so that it satisfies the security requirements by carefully combining an authentication mechanism, a digital signature and a location verification protocol.
在灾难或灾难性事故期间,由于严重拥塞或网络故障,很难继续提供基于电路交换的紧急通信,例如美国的911呼叫和日本的119呼叫。为了提供稳定的应急消息传递,我们提出了基于分组交换的NDN (Named Data Networking)网络应急消息传递体系结构。然而,该体系结构假定体系结构中的设备是诚实的。相反,本文重新设计了架构,假设终端设备是不诚实的。也就是说,终端设备要么是恶意的,要么被攻击者攻破,并试图报告一个虚假的位置,以干扰紧急消息传递服务。我们首先定义紧急消息传递的安全需求,然后重新设计体系结构,以便通过仔细组合身份验证机制、数字签名和位置验证协议来满足安全需求。
{"title":"Emergency Message Delivery in NDN Networks with Source Location Verification","authors":"Y. Koizumi, Yoji Yamamoto, T. Hasegawa","doi":"10.1109/GCWkshps45667.2019.9024500","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024500","url":null,"abstract":"During a disaster or a catastrophic accident, it is difficult to keep providing circuit-switching based emergency communication, such as the 911 calls in the US and the 119 calls in Japan, due to heavy congestion or network failures. In order to provide stable emergency message delivery, we proposed the architecture that provides packet-switching based emergency message delivery on top of NDN (Named Data Networking) networks. The architecture, however, assumes that devices in the architecture are honest. In contrast, the paper re-designs the architecture, assuming that end devices are dishonest. That is, an end device is either malicious or compromised by an attacker and tries to report a fake location to disturb the emergency message delivery service. We first define security requirements for emergency message delivery and next re-design the architecture so that it satisfies the security requirements by carefully combining an authentication mechanism, a digital signature and a location verification protocol.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116043818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/GCWkshps45667.2019.9024511
Farwa Ansari, R. A. Rehman, Byung-Seo Kim
Software Defined Networking (SDN) is the more reliable and flexible networking architecture. Due to its programmable nature, it is getting more popular in every research domain of Computing. Moreover, Named Data Networking (NDN) architecture is also more beneficial and emerging technology of Internet. NDN focuses on the content name instead of its location and replaces the usage of IP addresses. Lot of research has been made to integrate SDN and NDN due to their benefits of better management-ability, flexibility, less complexity, centralized control, decoupled control and data planes etc. Mobile Ad Hoc Network (MANET) is also getting more popular due to huge advancement in Mobile communication devices. Combining SDN and NDN in MANET will resolve lots of problems (i.e. forwarding, mobility, management etc.) which are difficult to tackle with single architecture. Broadcast Storm is always a challenging issue in Ad Hoc networks like MANET. In this paper, we proposed a Controller based Selective Forwarding (CSF) scheme by merging SDN, NDN and MANET to overcome the Broadcast Storm Problem (BSP) and other issues caused by BSP. CSF is evaluated using different simulation parameters which shows superiority over the Native ND-MANET in reference to BSP.
{"title":"CSF: Controller Based Selective Forwarding in Software Defined Named Data Based MANETs","authors":"Farwa Ansari, R. A. Rehman, Byung-Seo Kim","doi":"10.1109/GCWkshps45667.2019.9024511","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024511","url":null,"abstract":"Software Defined Networking (SDN) is the more reliable and flexible networking architecture. Due to its programmable nature, it is getting more popular in every research domain of Computing. Moreover, Named Data Networking (NDN) architecture is also more beneficial and emerging technology of Internet. NDN focuses on the content name instead of its location and replaces the usage of IP addresses. Lot of research has been made to integrate SDN and NDN due to their benefits of better management-ability, flexibility, less complexity, centralized control, decoupled control and data planes etc. Mobile Ad Hoc Network (MANET) is also getting more popular due to huge advancement in Mobile communication devices. Combining SDN and NDN in MANET will resolve lots of problems (i.e. forwarding, mobility, management etc.) which are difficult to tackle with single architecture. Broadcast Storm is always a challenging issue in Ad Hoc networks like MANET. In this paper, we proposed a Controller based Selective Forwarding (CSF) scheme by merging SDN, NDN and MANET to overcome the Broadcast Storm Problem (BSP) and other issues caused by BSP. CSF is evaluated using different simulation parameters which shows superiority over the Native ND-MANET in reference to BSP.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116466381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}