首页 > 最新文献

2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies最新文献

英文 中文
Enhancement in Homomorphic Encryption Scheme for Cloud Data Security 云数据安全同态加密方案的改进
Samjot Kaur, V. Wasson
Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there are some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user's behalf. There are different encryption techniques used for security purpose like FDE and FHE. To solve the problem of Key management, Key sharing various schemes have been proposed like third party auditing scheme but it will be failed, if the third party's security is compromised or if the third party is malicious. In this paper, we have used the symmetric key agreement algorithm named Diffie Hellman, it is key exchange algorithm which creates session key between two parties who want to communicate with each other and HMAC for the data integrity and OTP (One Time Password) is created which provides more security.
云计算是一种技术或分布式网络,用户可以在其中移动他们的数据和任何应用软件。但是云计算存在一些问题,主要是安全问题,因为每个用户都将他们的有用数据存储在网络上,所以他们希望他们的数据应该受到保护,免受任何未经授权的访问,任何不是以用户的名义进行的更改。有不同的加密技术用于安全目的,如FDE和FHE。为了解决密钥管理问题,人们提出了各种密钥共享方案,如第三方审计方案,但如果第三方的安全性受到损害或第三方恶意,则会失败。在本文中,我们使用了Diffie Hellman对称密钥协议算法,它是一种密钥交换算法,它在想要相互通信的双方之间创建会话密钥和HMAC,以保证数据的完整性,并创建了OTP (One Time Password),提供了更多的安全性。
{"title":"Enhancement in Homomorphic Encryption Scheme for Cloud Data Security","authors":"Samjot Kaur, V. Wasson","doi":"10.1109/NGMAST.2015.38","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.38","url":null,"abstract":"Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there are some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user's behalf. There are different encryption techniques used for security purpose like FDE and FHE. To solve the problem of Key management, Key sharing various schemes have been proposed like third party auditing scheme but it will be failed, if the third party's security is compromised or if the third party is malicious. In this paper, we have used the symmetric key agreement algorithm named Diffie Hellman, it is key exchange algorithm which creates session key between two parties who want to communicate with each other and HMAC for the data integrity and OTP (One Time Password) is created which provides more security.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129987927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive Broadcast Cancellation Query Mechanism for Unstructured Networks 非结构化网络自适应广播取消查询机制
Rui Lima, Carlos Baquero, Hugo M. Miranda
The availability of cheap wireless sensors boosted the emergence of unstructured networks using wireless technologies with decentralised administration. However, a simple task such as learning the temperature needs a discovery service to find a thermometer among all the sensors. In general, resource discovery relies on flooding mechanisms that waste energy and compromises system availability. Energy efficient strategies limit the exploration area, but with a significant impact on latency. The paper proposes ABC (Adaptive Broadcast Cancellation), a new algorithm that uses the knowledge acquired in previous discoveries to accelerate queries towards the resource. Knowledge is stored in a variation of Bloom filters, thus contributing for an efficient utilization of the sensors limited memory.
廉价无线传感器的出现促进了使用分散管理的无线技术的非结构化网络的出现。然而,像学习温度这样的简单任务需要一个发现服务来在所有传感器中找到一个温度计。一般来说,资源发现依赖于浪费能源和损害系统可用性的泛洪机制。节能策略限制了勘探面积,但对延迟有重大影响。本文提出了一种新的ABC (Adaptive Broadcast Cancellation)算法,该算法利用先前发现中获得的知识来加速对资源的查询。知识存储在一个变化的布隆过滤器,从而有助于有效利用传感器有限的内存。
{"title":"Adaptive Broadcast Cancellation Query Mechanism for Unstructured Networks","authors":"Rui Lima, Carlos Baquero, Hugo M. Miranda","doi":"10.1109/NGMAST.2015.41","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.41","url":null,"abstract":"The availability of cheap wireless sensors boosted the emergence of unstructured networks using wireless technologies with decentralised administration. However, a simple task such as learning the temperature needs a discovery service to find a thermometer among all the sensors. In general, resource discovery relies on flooding mechanisms that waste energy and compromises system availability. Energy efficient strategies limit the exploration area, but with a significant impact on latency. The paper proposes ABC (Adaptive Broadcast Cancellation), a new algorithm that uses the knowledge acquired in previous discoveries to accelerate queries towards the resource. Knowledge is stored in a variation of Bloom filters, thus contributing for an efficient utilization of the sensors limited memory.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
User Experience Study on Folktales Mobile Application for Children's Education 面向儿童教育的民间故事移动应用用户体验研究
Norshahila Ibrahim, Wan Fatimah, W. Ahmad, A. Shafie
Early exposure to devices such as smart phones and tablets among children as a learning tool has been very common nowadays. Learning using devices like iPads and tablets can stimulate children's motivation and concentration. Therefore, evaluation and measurement of user experience for mobile learning application become crucial. There were some studies have been done in order to get feedback from users in terms of comparing the application and getting perception rather than observing the quality of the application. This paper presented the study on evaluation of user experience for folktales mobile application called MFolktales by implementing user experience questionnaire tools. The objective of this study is to access the significance and impact of the MFolktales mobile application towards end users. The MFolktales mobile application has been developed based on a validated conceptual model, and the study includes the analysis and the definition of the design principles and requirements. This application contains an animation story module and several games modules which aim to promote Malay folk stories to children. This research is limited to children aged 5 to 7 years old. The prototype was tested on 15 kindergarten students from KEMAS (Community Development Department). As the results, the MFolktales got the positive impression in user perception and achieved as a good product in relative quality.
如今,儿童早期接触智能手机和平板电脑等设备作为学习工具已经非常普遍。使用ipad和平板电脑等设备学习可以激发孩子们的动力和注意力。因此,对移动学习应用的用户体验进行评估和测量变得至关重要。我们做了一些研究,目的是为了从用户那里获得反馈,比较应用程序并获得感知,而不是观察应用程序的质量。本文采用用户体验问卷调查工具,对民间故事手机应用MFolktales的用户体验评价进行了研究。本研究的目的是了解MFolktales移动应用程序对最终用户的意义和影响。基于一个经过验证的概念模型开发了MFolktales移动应用程序,研究包括对设计原则和需求的分析和定义。本应用程式包含一个动画故事模块和几个游戏模块,旨在向儿童推广马来民间故事。这项研究仅限于5至7岁的儿童。该原型在社区发展部的15名幼儿园学生身上进行了测试。结果,MFolktales在用户感知上获得了积极的印象,在相对质量上达到了良好的产品。
{"title":"User Experience Study on Folktales Mobile Application for Children's Education","authors":"Norshahila Ibrahim, Wan Fatimah, W. Ahmad, A. Shafie","doi":"10.1109/NGMAST.2015.73","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.73","url":null,"abstract":"Early exposure to devices such as smart phones and tablets among children as a learning tool has been very common nowadays. Learning using devices like iPads and tablets can stimulate children's motivation and concentration. Therefore, evaluation and measurement of user experience for mobile learning application become crucial. There were some studies have been done in order to get feedback from users in terms of comparing the application and getting perception rather than observing the quality of the application. This paper presented the study on evaluation of user experience for folktales mobile application called MFolktales by implementing user experience questionnaire tools. The objective of this study is to access the significance and impact of the MFolktales mobile application towards end users. The MFolktales mobile application has been developed based on a validated conceptual model, and the study includes the analysis and the definition of the design principles and requirements. This application contains an animation story module and several games modules which aim to promote Malay folk stories to children. This research is limited to children aged 5 to 7 years old. The prototype was tested on 15 kindergarten students from KEMAS (Community Development Department). As the results, the MFolktales got the positive impression in user perception and achieved as a good product in relative quality.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122605340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Event-Driven Implicit Authentication for Mobile Access Control 面向移动访问控制的事件驱动隐式身份验证
Feng Yao, S. Yerima, Boojoong Kang, S. Sezer
In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.
为了保护移动设备上的用户隐私,本文提出了一种事件驱动的隐式身份验证方案。研究了几种利用该方案识别合法用户行为的方法。所研究的方法实时计算总分和阈值,以使用来自用户与设备交互的真实数据来确定当前用户的信任级别。该方案的设计目标是:完全在后台运行,所需的训练时间最短,对隐式认证的用户识别率高,能够及时检测到异常活动,从而触发显式认证的访问控制。在本文中,我们研究阈值计算通过标准差和EWMA(指数加权移动平均)的算法。对Android手机收集的用户数据进行了几周的广泛实验,结果表明,我们提出的方法对于移动智能手机上的轻量级实时隐式身份验证是可行和有效的。
{"title":"Event-Driven Implicit Authentication for Mobile Access Control","authors":"Feng Yao, S. Yerima, Boojoong Kang, S. Sezer","doi":"10.1109/NGMAST.2015.47","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.47","url":null,"abstract":"In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129700739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Evaluating SIP Signaling Performance for VoIP over LTE Based Mission-Critical Communication Systems 基于LTE关键任务通信系统的VoIP SIP信令性能评估
Ashraf Ali, M. Alshamrani, A. Kuwadekar, K. Al-Begain
Mission Critical Communications and Services are of a special nature that needs special requirements. Therefore, there are many challenges that face implementing mission critical communication system over commercial mobile communications networks. Signaling of SIP messages in the access technology domain and IMS domain needs enhancement to ensure meeting the mission critical service requirements. LTE, as a broadband technology that is widely deployed nowadays for providing 4G communication networking services, is facing a lot of challenges in terms of its ability to provide multimedia services. And due to the special nature of Mission Critical Systems (MCS) that have stringent requirements for SIP signaling specifically, the need for investigating the SIP signaling performance over LTE based MCS is of great importance. In this paper, the performance metrics for an SIP signaling over LTE-MCS will be defined, and the overall system performance measures were evaluated via discrete event simulator.
关键任务通信和服务具有特殊的性质,需要特殊的要求。因此,在商用移动通信网络上实现关键任务通信系统面临着许多挑战。接入技术域和IMS域的SIP信令需要增强,以满足关键业务需求。LTE作为目前广泛部署的用于提供4G通信网络服务的宽带技术,其提供多媒体业务的能力面临着许多挑战。由于关键任务系统(MCS)的特殊性,对SIP信令有严格的要求,因此研究基于LTE的MCS上的SIP信令性能具有重要意义。在本文中,将定义LTE-MCS上SIP信令的性能指标,并通过离散事件模拟器评估整体系统性能指标。
{"title":"Evaluating SIP Signaling Performance for VoIP over LTE Based Mission-Critical Communication Systems","authors":"Ashraf Ali, M. Alshamrani, A. Kuwadekar, K. Al-Begain","doi":"10.1109/NGMAST.2015.68","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.68","url":null,"abstract":"Mission Critical Communications and Services are of a special nature that needs special requirements. Therefore, there are many challenges that face implementing mission critical communication system over commercial mobile communications networks. Signaling of SIP messages in the access technology domain and IMS domain needs enhancement to ensure meeting the mission critical service requirements. LTE, as a broadband technology that is widely deployed nowadays for providing 4G communication networking services, is facing a lot of challenges in terms of its ability to provide multimedia services. And due to the special nature of Mission Critical Systems (MCS) that have stringent requirements for SIP signaling specifically, the need for investigating the SIP signaling performance over LTE based MCS is of great importance. In this paper, the performance metrics for an SIP signaling over LTE-MCS will be defined, and the overall system performance measures were evaluated via discrete event simulator.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Context-Sensitive Privacy-Aware Framework for Proactive Location-Based Services 主动位置服务的上下文敏感隐私感知框架
B. Deva, S. R. Garzon, Sarah Schunemann
The recent years have seen a vast growth of location-based services (LBS) usage with the ubiquity of smart mobile devices. While reactive LBS act on the user's request, proactive LBS notify the user proactively of relevant location-specific content in case a dedicated area is entered. The usage scenarios of proactive LBS vary from location-based reminders to location-based marketing. With the increasing popularity of LBS also privacy concerns are raised, reclaiming the whereabouts of a user worth protecting. This is especially true for proactive LBS as they constantly share the location of the mobile device with the service and hence continuously track the user's location in order to act proactively. This paper introduces a context-sensitive privacy-awareness framework for mobile devices which enables mobile device users to individually define different privacy preferences for different contexts. It is intended to give the user full control over her/his sensitive location information to allow the user to determine whenever and wherever the user's location is allowed to be shared with 3rd party applications or services. As a proof of concept, a prototypical implementation is presented which enforces the user's context-sensitive privacy settings on mobile devices during the use of proactive LBS.
近年来,随着智能移动设备的普及,基于位置的服务(LBS)的使用出现了巨大的增长。响应式LBS根据用户的请求进行操作,而主动式LBS则在用户进入专用区域时主动通知用户相关的特定位置内容。从基于位置的提醒到基于位置的营销,主动定位的使用场景各不相同。随着LBS的日益普及,隐私问题也被提出,用户的行踪值得保护。对于主动定位服务来说尤其如此,因为它们会不断地与服务共享移动设备的位置,从而持续跟踪用户的位置,以便主动采取行动。本文介绍了一个上下文敏感的移动设备隐私感知框架,该框架使移动设备用户能够针对不同的上下文单独定义不同的隐私偏好。它的目的是让用户完全控制她/他的敏感位置信息,允许用户决定何时何地允许与第三方应用程序或服务共享用户的位置。作为概念证明,提出了一个原型实现,该实现在使用主动LBS期间在移动设备上强制用户的上下文敏感隐私设置。
{"title":"A Context-Sensitive Privacy-Aware Framework for Proactive Location-Based Services","authors":"B. Deva, S. R. Garzon, Sarah Schunemann","doi":"10.1109/NGMAST.2015.27","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.27","url":null,"abstract":"The recent years have seen a vast growth of location-based services (LBS) usage with the ubiquity of smart mobile devices. While reactive LBS act on the user's request, proactive LBS notify the user proactively of relevant location-specific content in case a dedicated area is entered. The usage scenarios of proactive LBS vary from location-based reminders to location-based marketing. With the increasing popularity of LBS also privacy concerns are raised, reclaiming the whereabouts of a user worth protecting. This is especially true for proactive LBS as they constantly share the location of the mobile device with the service and hence continuously track the user's location in order to act proactively. This paper introduces a context-sensitive privacy-awareness framework for mobile devices which enables mobile device users to individually define different privacy preferences for different contexts. It is intended to give the user full control over her/his sensitive location information to allow the user to determine whenever and wherever the user's location is allowed to be shared with 3rd party applications or services. As a proof of concept, a prototypical implementation is presented which enforces the user's context-sensitive privacy settings on mobile devices during the use of proactive LBS.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Device-Controlled Traffic Steering in Mobile Networks 移动网络中设备控制的流量控制
Menglan Jiang
User equipments (UEs) such as smartphones and tablets are widely used in heterogeneous wireless networks which include different technologies like WiFi and Long Term Evolution (LTE) systems. Implementing traffic steering effectively for user equipments to maximize their quality of service has become a key challenge these years. Therefore, in this paper, we propose a device controlled mechanism. We mainly focus on history records of each available networks and distributively consider multi-criteria like Received Signal Strength (RSS) and energy consumption of battery as our performance matrics from UE side. Device controlled mechanism is a fully distributed traffic steering approach that runs at user equipments. At the same time, to benefit from the network knowledge, we propose to use network analytic mechanism to further enhance certain performance metrics. Our proposed approach and analytic mechanism can help user equipments to make efficient decisions and minimize battery power consumption. This is particularly important to distribute traffic load across different radio access with less energy consumption for user equipments. The traffic steering of radio accesses in this paper is modelled based on Reinforcement Learning (RL) mechanism which considers past experiences of user equipements and help them to improve their quality of satisfactions. Through extensive simulation scenarios, we demonstrate how such device controlled mechanism with multi-criteria metrics can improve received throughput values of user equipments and reduce energy consumption of equipments' batteries.
用户设备(ue),如智能手机和平板电脑,广泛应用于异构无线网络,包括不同的技术,如WiFi和长期演进(LTE)系统。有效地对用户设备进行流量导向,使其服务质量最大化,已成为近年来面临的关键挑战。因此,在本文中,我们提出了一种设备控制机制。我们主要关注每个可用网络的历史记录,并从用户端分布式考虑接收信号强度(RSS)和电池能耗等多标准作为我们的性能矩阵。设备控制机制是一种运行在用户设备上的全分布式流量控制方法。同时,为了从网络知识中获益,我们建议使用网络分析机制来进一步提高某些性能指标。我们提出的方法和分析机制可以帮助用户设备做出有效的决策,最大限度地减少电池功耗。这对于在不同的无线接入中分配流量负载并减少用户设备的能耗尤为重要。本文基于强化学习(RL)机制对无线接入的流量转向进行建模,该机制考虑了用户设备的过去经验,并帮助他们提高满意度。通过广泛的仿真场景,我们展示了这种多准则度量的设备控制机制如何提高用户设备的接收吞吐量值并降低设备电池的能耗。
{"title":"Device-Controlled Traffic Steering in Mobile Networks","authors":"Menglan Jiang","doi":"10.1109/NGMAST.2015.13","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.13","url":null,"abstract":"User equipments (UEs) such as smartphones and tablets are widely used in heterogeneous wireless networks which include different technologies like WiFi and Long Term Evolution (LTE) systems. Implementing traffic steering effectively for user equipments to maximize their quality of service has become a key challenge these years. Therefore, in this paper, we propose a device controlled mechanism. We mainly focus on history records of each available networks and distributively consider multi-criteria like Received Signal Strength (RSS) and energy consumption of battery as our performance matrics from UE side. Device controlled mechanism is a fully distributed traffic steering approach that runs at user equipments. At the same time, to benefit from the network knowledge, we propose to use network analytic mechanism to further enhance certain performance metrics. Our proposed approach and analytic mechanism can help user equipments to make efficient decisions and minimize battery power consumption. This is particularly important to distribute traffic load across different radio access with less energy consumption for user equipments. The traffic steering of radio accesses in this paper is modelled based on Reinforcement Learning (RL) mechanism which considers past experiences of user equipements and help them to improve their quality of satisfactions. Through extensive simulation scenarios, we demonstrate how such device controlled mechanism with multi-criteria metrics can improve received throughput values of user equipments and reduce energy consumption of equipments' batteries.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of DoS Attacks in Delay Tolerant Networks for Emergency Evacuation 面向紧急疏散的容延迟网络DoS攻击分析
P. Asuquo, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran
In the event of a disaster, there is a severe damage/destruction to physical infrastructures such as telecommunication and power lines which result in the disruption of communication in this areas. For such scenarios, Delay Tolerant Network (DTN) provides an alternative means of communication. In Delay Tolerant Networks (DTNs), a message from a source node may be delivered to the destination node despite the non-existence of an infrastructure and an end-to-end connectivity. However DTNs are susceptible to security threats such as DoS attacks targeted at disrupting relayed packets or dropping critical packets during a disaster rescue operation. DoS attacks consist of blackhole, grayhole, wormhole, packet flooding attacks etc. The scope of this paper is to study the impacts of blackhole and packet flooding attacks in a post disaster communication network using DTN. Various performance metrics in DTN have been used to study the impacts of different DoS attacks in DTN and a comprehensive analysis is presented.
在发生灾难时,有形基础设施如电信和电力线会受到严重破坏/破坏,从而导致该地区的通信中断。对于这种情况,延迟容忍网络(DTN)提供了另一种通信方式。在容忍延迟网络(dtn)中,尽管不存在基础设施和端到端连接,来自源节点的消息仍可以传递到目标节点。然而,ddn容易受到安全威胁,例如在灾难救援行动中针对中断中继数据包或丢弃关键数据包的DoS攻击。DoS攻击包括黑洞攻击、灰洞攻击、虫洞攻击、包洪攻击等。本文研究了黑洞攻击和包洪攻击对灾后DTN通信网络的影响。利用DTN的各种性能指标研究了不同DoS攻击对DTN的影响,并进行了综合分析。
{"title":"Analysis of DoS Attacks in Delay Tolerant Networks for Emergency Evacuation","authors":"P. Asuquo, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran","doi":"10.1109/NGMAST.2015.65","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.65","url":null,"abstract":"In the event of a disaster, there is a severe damage/destruction to physical infrastructures such as telecommunication and power lines which result in the disruption of communication in this areas. For such scenarios, Delay Tolerant Network (DTN) provides an alternative means of communication. In Delay Tolerant Networks (DTNs), a message from a source node may be delivered to the destination node despite the non-existence of an infrastructure and an end-to-end connectivity. However DTNs are susceptible to security threats such as DoS attacks targeted at disrupting relayed packets or dropping critical packets during a disaster rescue operation. DoS attacks consist of blackhole, grayhole, wormhole, packet flooding attacks etc. The scope of this paper is to study the impacts of blackhole and packet flooding attacks in a post disaster communication network using DTN. Various performance metrics in DTN have been used to study the impacts of different DoS attacks in DTN and a comprehensive analysis is presented.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133059307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Spheres: A Web Services Framework for Smartphone Sensing as a Service 领域:智能手机感知即服务的Web服务框架
M. Gray
Smartphones are mobile phones that execute application programs. Smartphones are practically everywhere, in every country and culture. Smartphones can tell where they are by GPS, a spatial sense, and what time it is, a temporal sense, relative to their GPS location. Groups of smartphone users form communities, creating a social sense. Smartphones often contain built-in sensors including temperature, proximity, accelerometer, gyroscope, magnetometer, barometric pressure, ambient light, camera, microphone, etc., as well as the ability to connect to external sensors over their wireless interfaces forming wireless sensor networks. Smartphones are connected to the Internet through their cellular data connections providing a globally established deployment of "things" on the Internet of Things (IoT). People carrying their smartphones represent a global source of continuous mobile Internet-connected sensor data. The resulting human, social, and environmental data represents an untapped global information resource of epic proportion. This paper explores the current research related to smartphone sensing as a service (S2aaS) and proposes an architecture for a web services framework for S2aaS called Spheres. Spheres will integrate wireless sensor network, mobile Internet, and cloud technologies into an open-source service-oriented architecture (SOA) providing crowdsourced smartphone sensor data aggregation and sharing in secure cloud deployments for private and public consumption. Spheres collected data can be overlaid visually on maps or incorporated into applications that require the data from sensors embedded in, or connected to, smartphones over specific regions and times of interest. In addition to specifying an architecture, this paper will identify the challenges expected to implement and demonstrate a prototype of Spheres on at least one smartphone platform with the cloud platform and web services deployed on the UMBC BlueWave high performance computing system.
智能手机是执行应用程序的移动电话。智能手机几乎无处不在,在每个国家和文化中。智能手机可以通过GPS定位系统(一种空间感知)和时间感知(一种相对于GPS位置的时间感知)来判断自己的位置。智能手机用户群体形成了社区,创造了一种社交感。智能手机通常包含内置传感器,包括温度、接近度、加速度计、陀螺仪、磁力计、气压、环境光、摄像头、麦克风等,以及通过无线接口连接外部传感器形成无线传感器网络的能力。智能手机通过蜂窝数据连接连接到互联网,在物联网(IoT)上提供全球建立的“事物”部署。随身携带智能手机的人代表着全球持续移动互联网传感器数据的来源。由此产生的人类、社会和环境数据代表了一个未开发的全球信息资源。本文探讨了当前与智能手机感知即服务(S2aaS)相关的研究,并提出了一种名为Spheres的S2aaS web服务框架架构。Spheres将把无线传感器网络、移动互联网和云技术集成到一个开源的面向服务的架构(SOA)中,在安全的云部署中为私人和公共消费提供众包智能手机传感器数据聚合和共享。球体收集的数据可以可视化地叠加在地图上,也可以整合到应用程序中,这些应用程序需要在特定地区和时间内从智能手机中嵌入或连接的传感器获取数据。除了指定架构之外,本文还将确定在至少一个智能手机平台上实现和演示Spheres原型的挑战,并在UMBC BlueWave高性能计算系统上部署云平台和web服务。
{"title":"Spheres: A Web Services Framework for Smartphone Sensing as a Service","authors":"M. Gray","doi":"10.1109/NGMAST.2015.36","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.36","url":null,"abstract":"Smartphones are mobile phones that execute application programs. Smartphones are practically everywhere, in every country and culture. Smartphones can tell where they are by GPS, a spatial sense, and what time it is, a temporal sense, relative to their GPS location. Groups of smartphone users form communities, creating a social sense. Smartphones often contain built-in sensors including temperature, proximity, accelerometer, gyroscope, magnetometer, barometric pressure, ambient light, camera, microphone, etc., as well as the ability to connect to external sensors over their wireless interfaces forming wireless sensor networks. Smartphones are connected to the Internet through their cellular data connections providing a globally established deployment of \"things\" on the Internet of Things (IoT). People carrying their smartphones represent a global source of continuous mobile Internet-connected sensor data. The resulting human, social, and environmental data represents an untapped global information resource of epic proportion. This paper explores the current research related to smartphone sensing as a service (S2aaS) and proposes an architecture for a web services framework for S2aaS called Spheres. Spheres will integrate wireless sensor network, mobile Internet, and cloud technologies into an open-source service-oriented architecture (SOA) providing crowdsourced smartphone sensor data aggregation and sharing in secure cloud deployments for private and public consumption. Spheres collected data can be overlaid visually on maps or incorporated into applications that require the data from sensors embedded in, or connected to, smartphones over specific regions and times of interest. In addition to specifying an architecture, this paper will identify the challenges expected to implement and demonstrate a prototype of Spheres on at least one smartphone platform with the cloud platform and web services deployed on the UMBC BlueWave high performance computing system.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116018176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wind Energy Dependent Rate Adaptation for Roadside Units 路边装置的风能依赖率适应
G. A. Audu, S. Bhattacharya, J. Elmirghani
In this paper, we propose a rate adaptive technique for wind powered standalone (off-grid) roadside units (RSUs) in a motorway environment. In a non-rate adaptive system, the transient nature of renewable wind energy causes the RSUs to either transmit at full data rate or not transmit at all based on the availability of sufficient energy. In rate adaptation, the data rate of an RSU adapts according to the available energy. Further, the RSU saves transmission energy by operating at a lower data rate, even when enough energy is available. The saved energy, in turn, is used to maintain the data rate during energy deficiency, thereby minimizing outage and improving the quality of service (QoS). The performance analysis shows that the wind energy dependent rate adaptive RSU delivers a more energy efficient service with acceptable quality compared to a non-rate adaptive deployment in a renewable energy solely powered RSU. The proposed rate adaptive algorithm can be as well deployed to wind-powered communication base stations (BSs) and sensor networks.
在本文中,我们提出了一种高速公路环境中风力独立(离网)路边单元(rsu)的速率自适应技术。在非速率自适应系统中,可再生风能的暂态特性导致rsu要么以全速率传输数据,要么基于足够能量的可用性根本不传输数据。在速率自适应中,RSU的数据速率根据可用能量进行自适应。此外,即使有足够的能量可用,RSU也可以通过以较低的数据速率运行来节省传输能量。节省下来的电能可用于在电能不足时保持数据速率,从而最大限度地减少停电,提高服务质量。性能分析表明,与仅可再生能源供电的RSU中的非速率自适应部署相比,依赖风能的速率自适应RSU提供了更节能的服务,并且质量可接受。所提出的速率自适应算法也可应用于风力通信基站和传感器网络。
{"title":"Wind Energy Dependent Rate Adaptation for Roadside Units","authors":"G. A. Audu, S. Bhattacharya, J. Elmirghani","doi":"10.1109/NGMAST.2015.26","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.26","url":null,"abstract":"In this paper, we propose a rate adaptive technique for wind powered standalone (off-grid) roadside units (RSUs) in a motorway environment. In a non-rate adaptive system, the transient nature of renewable wind energy causes the RSUs to either transmit at full data rate or not transmit at all based on the availability of sufficient energy. In rate adaptation, the data rate of an RSU adapts according to the available energy. Further, the RSU saves transmission energy by operating at a lower data rate, even when enough energy is available. The saved energy, in turn, is used to maintain the data rate during energy deficiency, thereby minimizing outage and improving the quality of service (QoS). The performance analysis shows that the wind energy dependent rate adaptive RSU delivers a more energy efficient service with acceptable quality compared to a non-rate adaptive deployment in a renewable energy solely powered RSU. The proposed rate adaptive algorithm can be as well deployed to wind-powered communication base stations (BSs) and sensor networks.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1