首页 > 最新文献

2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies最新文献

英文 中文
Load Adaptive Caching Points for a Content Distribution Network 为内容分发网络加载自适应缓存点
Samaneh Igder, Hamdi Idjmayyel, B. Qazi, S. Bhattacharya, J. Elmirghani
The unprecedented growth in content demand on smartphones has significantly increased the energy consumption of current cellular and backbone networks. Apart from achieving stringent carbon footprint targets, provisioning high data rates to city vehicular users while maintaining quality of service (QoS) remains a serious challenge. In previous work, to support content delivery at high data rates, the number and locations of caching points (CPs) within a content distribution network (CDN) were optimized while reducing the operational energy consumption compared to typical cellular networks. Further reduction in energy consumption may be possible through sleep cycles, which reduces transmission energy consumption. However, sleep cycles degrade the quality of service. Therefore, in this paper, we propose a novel load adaptation technique for a CP which not only enhances content download rate but also reduces transmission energy consumption through random sleep cycles. Unlike a non-load adaptive (deterministic) CP, the performance results reveal that the load adaptive CP achieves considerably lower average piece delay (approximately 60% on average during the day), leveraging the introduction of random sleep cycles to save transmission energy. The proposed CP saves up to 84% transmission energy during off-peak hours and 33% during the whole day while fulfilling content demand in a city vehicular environment.
智能手机内容需求的空前增长显著增加了当前蜂窝网络和骨干网络的能耗。除了实现严格的碳足迹目标外,向城市车辆用户提供高数据速率,同时保持服务质量(QoS)仍然是一个严峻的挑战。在之前的工作中,为了支持高数据速率的内容交付,内容分发网络(CDN)中的缓存点(CPs)的数量和位置进行了优化,同时与典型的蜂窝网络相比减少了操作能耗。通过睡眠周期可以进一步降低能量消耗,从而降低传输能量消耗。但是,睡眠周期会降低服务质量。因此,我们提出了一种新的CP负载自适应技术,该技术不仅可以提高内容下载速率,还可以通过随机睡眠周期降低传输能量消耗。与非负载自适应(确定性)CP不同,性能结果表明负载自适应CP实现了相当低的平均片延迟(白天平均约为60%),利用引入随机睡眠周期来节省传输能量。该方案在非高峰时段可节省高达84%的传输能量,全天可节省33%的传输能量,同时满足城市车辆环境下的内容需求。
{"title":"Load Adaptive Caching Points for a Content Distribution Network","authors":"Samaneh Igder, Hamdi Idjmayyel, B. Qazi, S. Bhattacharya, J. Elmirghani","doi":"10.1109/NGMAST.2015.24","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.24","url":null,"abstract":"The unprecedented growth in content demand on smartphones has significantly increased the energy consumption of current cellular and backbone networks. Apart from achieving stringent carbon footprint targets, provisioning high data rates to city vehicular users while maintaining quality of service (QoS) remains a serious challenge. In previous work, to support content delivery at high data rates, the number and locations of caching points (CPs) within a content distribution network (CDN) were optimized while reducing the operational energy consumption compared to typical cellular networks. Further reduction in energy consumption may be possible through sleep cycles, which reduces transmission energy consumption. However, sleep cycles degrade the quality of service. Therefore, in this paper, we propose a novel load adaptation technique for a CP which not only enhances content download rate but also reduces transmission energy consumption through random sleep cycles. Unlike a non-load adaptive (deterministic) CP, the performance results reveal that the load adaptive CP achieves considerably lower average piece delay (approximately 60% on average during the day), leveraging the introduction of random sleep cycles to save transmission energy. The proposed CP saves up to 84% transmission energy during off-peak hours and 33% during the whole day while fulfilling content demand in a city vehicular environment.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security for Future Software Defined Mobile Networks 未来软件定义移动网络的安全性
Madhusanka Liyanage, Ijaz Ahmed, M. Ylianttila, Jesus Llorente Santos, R. Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, C. Jimenez
5G constitutes the next revolution in mobile communications. It is expected to deliver ultra-fast, ultra-reliable network access supporting a massive increase of data traffic and connected nodes. Different technologies are emerging to address the requirements of future mobile networks, such as Software Defined Networking (SDN), Network Function Virtualization (NFV) and cloud computing concepts. In this paper, we introduce the security challenges these new technologies are facing, inherent to the new telecommunication paradigm. We also present a multitier approach to secure Software Defined Mobile Network (SDMN) by tackling security at different levels to protect the network itself and its users. First, we secure the communication channels between network elements by leveraging Host Identity Protocol (HIP) and IPSec tunnelling. Then, we restrict the unwanted access to the mobile backhaul network with policy based communications. It also protects the backhaul devices from source address spoofing and Denial of Service (DoS) attacks. Finally, we leverage Software Defined Monitoring (SDM) and data collection to detect, prevent and react to security threats.
5G构成了移动通信的下一次革命。预计它将提供超快速、超可靠的网络接入,支持大量增加的数据流量和连接节点。为了满足未来移动网络的需求,软件定义网络(SDN)、网络功能虚拟化(NFV)和云计算概念等不同的技术不断涌现。在本文中,我们介绍了这些新技术所面临的安全挑战,这些挑战是新的电信范式所固有的。我们还提出了一种多层方法来保护软件定义移动网络(SDMN),通过解决不同级别的安全问题来保护网络本身及其用户。首先,我们利用主机身份协议(Host Identity Protocol, HIP)和IPSec隧道来保护网络元素之间的通信通道。然后,我们使用基于策略的通信来限制对移动回程网络的不必要访问。它还可以保护回程设备免受源地址欺骗和拒绝服务(DoS)攻击。最后,我们利用软件定义监控(SDM)和数据收集来检测、预防和应对安全威胁。
{"title":"Security for Future Software Defined Mobile Networks","authors":"Madhusanka Liyanage, Ijaz Ahmed, M. Ylianttila, Jesus Llorente Santos, R. Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, C. Jimenez","doi":"10.1109/NGMAST.2015.43","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.43","url":null,"abstract":"5G constitutes the next revolution in mobile communications. It is expected to deliver ultra-fast, ultra-reliable network access supporting a massive increase of data traffic and connected nodes. Different technologies are emerging to address the requirements of future mobile networks, such as Software Defined Networking (SDN), Network Function Virtualization (NFV) and cloud computing concepts. In this paper, we introduce the security challenges these new technologies are facing, inherent to the new telecommunication paradigm. We also present a multitier approach to secure Software Defined Mobile Network (SDMN) by tackling security at different levels to protect the network itself and its users. First, we secure the communication channels between network elements by leveraging Host Identity Protocol (HIP) and IPSec tunnelling. Then, we restrict the unwanted access to the mobile backhaul network with policy based communications. It also protects the backhaul devices from source address spoofing and Denial of Service (DoS) attacks. Finally, we leverage Software Defined Monitoring (SDM) and data collection to detect, prevent and react to security threats.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1826 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Optimising QoE Distribution for Video Applications through LTE-WiFi Interworking 通过LTE-WiFi互联优化视频应用QoE分布
Mirghiasaldin Seyedebrahimi, Xiaohong Peng
Mobile WiFi devices are becoming increasingly popular in non-seamless and user-controlled mobile traffic offloading alongside the standard WiFi hotspots. Unlike the operator-controlled hotspots, a mobile WiFi device relies on the capacity of the macro-cell for the data rate allocated to it. This type of devices can help offloading data traffic from the macro-cell base station and serve the end users within a closer range, but will change the pattern of resource distributions operated by the base station. We propose a resource allocation scheme that aims to optimize user quality of experience (QoE) when accessing video services in the environment where traffic offloading is taking place through interworking between a mobile communication system and low range wireless LANs. In this scheme, a rate redistribution algorithm is derived to perform scheduling which is controlled by a no-reference quality assessment metric in order to achieve the desired trade-offs between efficiency and fairness. We show the performance of this algorithm in terms of the distribution of the allocated data rates throughout the macro-cell investigated and the service coverage offered by the WiFi access point.
移动WiFi设备在非无缝和用户控制的移动流量卸载与标准WiFi热点一起变得越来越流行。与运营商控制的热点不同,移动WiFi设备依赖于宏蜂窝的容量来分配给它的数据速率。这种类型的设备可以帮助从宏蜂窝基站卸载数据流量,并在更近的范围内为最终用户服务,但将改变基站操作的资源分配模式。我们提出了一种资源分配方案,旨在通过移动通信系统和低范围无线局域网之间的互连来优化用户访问视频业务时的体验质量(QoE)。在该方案中,提出了一种速率再分配算法来执行由无参考质量评估指标控制的调度,以实现效率和公平性之间的平衡。我们根据所调查的整个宏小区分配的数据速率分布和WiFi接入点提供的服务覆盖范围来展示该算法的性能。
{"title":"Optimising QoE Distribution for Video Applications through LTE-WiFi Interworking","authors":"Mirghiasaldin Seyedebrahimi, Xiaohong Peng","doi":"10.1109/NGMAST.2015.70","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.70","url":null,"abstract":"Mobile WiFi devices are becoming increasingly popular in non-seamless and user-controlled mobile traffic offloading alongside the standard WiFi hotspots. Unlike the operator-controlled hotspots, a mobile WiFi device relies on the capacity of the macro-cell for the data rate allocated to it. This type of devices can help offloading data traffic from the macro-cell base station and serve the end users within a closer range, but will change the pattern of resource distributions operated by the base station. We propose a resource allocation scheme that aims to optimize user quality of experience (QoE) when accessing video services in the environment where traffic offloading is taking place through interworking between a mobile communication system and low range wireless LANs. In this scheme, a rate redistribution algorithm is derived to perform scheduling which is controlled by a no-reference quality assessment metric in order to achieve the desired trade-offs between efficiency and fairness. We show the performance of this algorithm in terms of the distribution of the allocated data rates throughout the macro-cell investigated and the service coverage offered by the WiFi access point.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud 云环境下分布式拒绝服务攻击防范仿真研究
Wael Alosaimi, M. Alshamrani, K. Al-Begain
Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an economical version of such attack. This new form is known as Economical Denial of Sustainability (EDoS) attack. To counteract such attacks, traditional network security means are used. Specifically, the firewalls that are working as filters for the incoming packets to the targeted network according to designated rules by the administrators can mitigate the impacts of DDoS and EDoS attacks. In this paper, a new solution called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) is proposed to encounter these attacks by utilizing the firewall capabilities in controlling a verification process to protect the targeted system. These capabilities are evaluated in a simulation environment. The results proved that the firewall mitigates the DDoS impacts successfully by improving the provided services to the users in terms of the response time and server load under attack. The study also suggests following implementation for the proposed framework with an active testbed.
分布式拒绝服务(DDoS)攻击会影响网络的可用性。在云计算时代,这些攻击的危害更大,因为它们具有普遍的影响,而且通过利用云的可伸缩性和付费模式(按使用付费)而损害云的可持续性。因此,在云环境中引入了一种新的DDoS攻击形式,作为这种攻击的经济版本。这种新形式被称为经济可持续性拒绝(EDoS)攻击。为了抵御这类攻击,需要使用传统的网络安全手段。具体来说,防火墙按照管理员指定的规则对进入目标网络的报文进行过滤,可以减轻DDoS和DDoS攻击的影响。本文提出了一种新的解决方案,称为增强型ddos -缓解系统(Enhanced DDoS-MS),通过利用防火墙控制验证过程的功能来保护目标系统,以应对这些攻击。这些功能在模拟环境中进行评估。实验结果表明,该防火墙在响应时间和受攻击服务器负载方面改善了向用户提供的服务,成功缓解了DDoS攻击的影响。该研究还建议采用一个主动测试平台来实施所提议的框架。
{"title":"Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud","authors":"Wael Alosaimi, M. Alshamrani, K. Al-Begain","doi":"10.1109/NGMAST.2015.50","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.50","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an economical version of such attack. This new form is known as Economical Denial of Sustainability (EDoS) attack. To counteract such attacks, traditional network security means are used. Specifically, the firewalls that are working as filters for the incoming packets to the targeted network according to designated rules by the administrators can mitigate the impacts of DDoS and EDoS attacks. In this paper, a new solution called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) is proposed to encounter these attacks by utilizing the firewall capabilities in controlling a verification process to protect the targeted system. These capabilities are evaluated in a simulation environment. The results proved that the firewall mitigates the DDoS impacts successfully by improving the provided services to the users in terms of the response time and server load under attack. The study also suggests following implementation for the proposed framework with an active testbed.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Assessment of Personal Exposure to Wireless Communication Technologies in Different Microenvironments 不同微环境下个人无线通信技术暴露评估
E. Hamiti, M. Ibrani, Luan Ahma, Rreze Halili, Doruntine Berisha, Vlerar Shala
The use of mobile communication applications, services, and technologies has become an indispensable part of everyday life, a fact which has promoted research on the assessment of human exposure to radio-frequency electromagnetic fields and related health issues. To evaluate personal exposure to wireless technologies and broadcast transmitters in this study the personal exposure meters with triaxial E-field probe are used, enabling frequency selective measurements of electric field strength in 14 predefined frequency bands (80 MHz-6 GHz). The measurements were conducted in five microenvironments: home, office, coffee shops, transport vehicles and outdoor, resulting in 122 944 measurement samples. For each microenvironment the mean value of power density from different wireless technologies is presented, including the contribution of specific wireless technology to the total personal exposure. The obtained results are compared with the exposure limits given by the International Commission on Non-Ionizing Radiation Protection.
移动通信应用程序、服务和技术的使用已成为日常生活中不可或缺的一部分,这一事实促进了关于评估人体接触射频电磁场和相关健康问题的研究。为了评估个人对无线技术和广播发射机的暴露程度,本研究使用了带有三轴电场探头的个人暴露计,可以在14个预定义频段(80 MHz-6 GHz)内对电场强度进行频率选择测量。测量在五个微环境中进行:家庭,办公室,咖啡店,交通工具和室外,产生122,944个测量样本。对于每个微环境,给出了不同无线技术的功率密度平均值,包括特定无线技术对个人总暴露的贡献。所得结果与国际非电离辐射防护委员会给出的暴露限值进行了比较。
{"title":"Assessment of Personal Exposure to Wireless Communication Technologies in Different Microenvironments","authors":"E. Hamiti, M. Ibrani, Luan Ahma, Rreze Halili, Doruntine Berisha, Vlerar Shala","doi":"10.1109/NGMAST.2015.56","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.56","url":null,"abstract":"The use of mobile communication applications, services, and technologies has become an indispensable part of everyday life, a fact which has promoted research on the assessment of human exposure to radio-frequency electromagnetic fields and related health issues. To evaluate personal exposure to wireless technologies and broadcast transmitters in this study the personal exposure meters with triaxial E-field probe are used, enabling frequency selective measurements of electric field strength in 14 predefined frequency bands (80 MHz-6 GHz). The measurements were conducted in five microenvironments: home, office, coffee shops, transport vehicles and outdoor, resulting in 122 944 measurement samples. For each microenvironment the mean value of power density from different wireless technologies is presented, including the contribution of specific wireless technology to the total personal exposure. The obtained results are compared with the exposure limits given by the International Commission on Non-Ionizing Radiation Protection.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126812558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Denial of Service Attacks Mitigation in the Cloud 云中的拒绝服务攻击缓解
Wael Alosaimi, M. Zák, K. Al-Begain
Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability. In this case, it is called Economical Denial of Sustainability (EDoS) attack. This study introduces an effective solution that is designed to counteract such attacks and protect targeted networks. The proposed framework is called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS). This method is tested practically and the test's results proved the success of the framework in limiting the end-to-end response time and handling complex versions of these attacks on multiple layers.
拒绝服务攻击(DoS)对传统网络和云环境构成了永久性的风险。这种恶意攻击可以被分布式拒绝服务(DDoS)攻击放大。此外,这种利用云可扩展性的攻击可能会影响云支付模型。在这种情况下,它被称为经济可持续性拒绝(EDoS)攻击。本研究介绍了一种有效的解决方案,旨在对抗此类攻击并保护目标网络。该框架被称为增强型ddos -缓解系统(Enhanced DDoS-MS)。对该方法进行了实际测试,测试结果证明该框架在限制端到端响应时间和处理多层复杂版本攻击方面取得了成功。
{"title":"Denial of Service Attacks Mitigation in the Cloud","authors":"Wael Alosaimi, M. Zák, K. Al-Begain","doi":"10.1109/NGMAST.2015.48","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.48","url":null,"abstract":"Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability. In this case, it is called Economical Denial of Sustainability (EDoS) attack. This study introduces an effective solution that is designed to counteract such attacks and protect targeted networks. The proposed framework is called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS). This method is tested practically and the test's results proved the success of the framework in limiting the end-to-end response time and handling complex versions of these attacks on multiple layers.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy-Enhanced Group Communication for Vehicular Delay Tolerant Networks 车载容延迟网络的隐私增强组通信
C. P. A. Ogah, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran, Yue Cao, P. Asuquo, Masoud Al Tawqi
Vehicular Delay Tolerant Networking (VDTN) is a special instance of Vehicular Ad hoc Networking (VANET) and in particular Delay Tolerant Networking (DTN) that utilizes infrastructure to enhance connectivity in challenged environments. While VANETs assume end-to-end connectivity, DTNs and VDTNs do not. Such networks are characterized by dynamic topology, partitioning due to lack of end-to-end connectivity, and opportunistic encounters between nodes. Notably, VDTNs enhances the capabilities DTNs to provide support for delay and intermittent connectivity. Hence, they can easily find applicability in the early stages of the deployment of vehicular networks characterized by low infrastructure deployment as is obtainable in rural areas and in military communications. Privacy implementation and evaluation is a major challenge in VDTNs. Group communication has become one of the well discussed means for achieving effective privacy and packet routing in ad hoc networks including VDTNs. However, most existing privacy schemes lack flexibility in terms of the dynamics of group formation and the level of privacy achievable. Again, it is difficult to evaluate privacy for sparse VDTNs for rural area and early stages of deployment. This paper reports on an improved privacy scheme based on group communication scheme in VDTNs. We analyze the performance of our model in terms of trade-off between privacy and performance based on delivery overhead and message delivery ratio using simulations. While this is a work in progress, we report that our scheme has considerable improvement compared to other similar schemes described in literature.
车辆容忍延迟网络(VDTN)是车辆自组织网络(VANET)的一个特殊实例,特别是容忍延迟网络(DTN),它利用基础设施来增强挑战环境中的连通性。虽然vanet假设端到端连接,但dtn和vdtn不这样做。这种网络的特点是动态拓扑结构、由于缺乏端到端连接而产生的分区以及节点之间的偶遇。值得注意的是,VDTNs增强了DTNs的能力,以提供对延迟和间歇连接的支持。因此,它们可以很容易地在车辆网络部署的早期阶段找到适用性,其特点是在农村地区和军事通信中可以获得低基础设施部署。隐私实现和评估是vddn的主要挑战。在包括vddn在内的自组织网络中,群通信已成为实现有效隐私和分组路由的一种被广泛讨论的手段。然而,大多数现有的隐私方案在群体形成的动态和可实现的隐私水平方面缺乏灵活性。同样,对于农村地区和早期部署阶段的稀疏vddn,很难评估其隐私性。提出了一种改进的VDTNs组通信保密方案。我们根据传递开销和消息传递比率的模拟,从隐私和性能之间的权衡角度分析了模型的性能。虽然这是一项正在进行的工作,但我们报告说,与文献中描述的其他类似方案相比,我们的方案有相当大的改进。
{"title":"Privacy-Enhanced Group Communication for Vehicular Delay Tolerant Networks","authors":"C. P. A. Ogah, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran, Yue Cao, P. Asuquo, Masoud Al Tawqi","doi":"10.1109/NGMAST.2015.67","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.67","url":null,"abstract":"Vehicular Delay Tolerant Networking (VDTN) is a special instance of Vehicular Ad hoc Networking (VANET) and in particular Delay Tolerant Networking (DTN) that utilizes infrastructure to enhance connectivity in challenged environments. While VANETs assume end-to-end connectivity, DTNs and VDTNs do not. Such networks are characterized by dynamic topology, partitioning due to lack of end-to-end connectivity, and opportunistic encounters between nodes. Notably, VDTNs enhances the capabilities DTNs to provide support for delay and intermittent connectivity. Hence, they can easily find applicability in the early stages of the deployment of vehicular networks characterized by low infrastructure deployment as is obtainable in rural areas and in military communications. Privacy implementation and evaluation is a major challenge in VDTNs. Group communication has become one of the well discussed means for achieving effective privacy and packet routing in ad hoc networks including VDTNs. However, most existing privacy schemes lack flexibility in terms of the dynamics of group formation and the level of privacy achievable. Again, it is difficult to evaluate privacy for sparse VDTNs for rural area and early stages of deployment. This paper reports on an improved privacy scheme based on group communication scheme in VDTNs. We analyze the performance of our model in terms of trade-off between privacy and performance based on delivery overhead and message delivery ratio using simulations. While this is a work in progress, we report that our scheme has considerable improvement compared to other similar schemes described in literature.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Q-learning Based Random Access with Collision free RACH Interactions for Cellular M2M 基于q学习的无碰撞RACH交互随机存取蜂窝M2M
L. Bello, P. Mitchell, D. Grace, Tautvydas Mickus
This paper investigates the coexistence of M2M and H2H based traffic sharing the RACH of an existing cellular network. Q-learning is applied to control the RACH access of the M2M devices which enables collision free access amongst the M2M user group. Frame ALOHA for a Q-learning RACH access (FA-QL-RACH) is proposed to realise a collision free RACH access between the H2H and M2M user groups. The scheme introduces a separate frame for H2H and M2M to use in the RACH access. Simulation results show that applying Q-learning to realise the proposed FA-QL-RACH scheme resolves the RACH overload problem and improves the RACH-throughput. Finally the improved RACH-throughput performance indicates that the FA-QL-RACH scheme has eliminated the collision between the H2H and M2M user groups.
本文研究了基于M2M和H2H的业务共存,共享现有蜂窝网络的RACH。通过Q-learning控制M2M设备的RACH访问,实现M2M用户组间的无冲突访问。为了实现H2H和M2M用户组之间的无冲突RACH访问,提出了Q-learning RACH访问的帧ALOHA (FA-QL-RACH)。该方案为H2H和M2M引入了一个单独的帧,用于RACH访问。仿真结果表明,采用Q-learning实现FA-QL-RACH方案解决了RACH过载问题,提高了RACH吞吐量。最后,改进的rach吞吐量性能表明,FA-QL-RACH方案消除了H2H和M2M用户组之间的冲突。
{"title":"Q-learning Based Random Access with Collision free RACH Interactions for Cellular M2M","authors":"L. Bello, P. Mitchell, D. Grace, Tautvydas Mickus","doi":"10.1109/NGMAST.2015.22","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.22","url":null,"abstract":"This paper investigates the coexistence of M2M and H2H based traffic sharing the RACH of an existing cellular network. Q-learning is applied to control the RACH access of the M2M devices which enables collision free access amongst the M2M user group. Frame ALOHA for a Q-learning RACH access (FA-QL-RACH) is proposed to realise a collision free RACH access between the H2H and M2M user groups. The scheme introduces a separate frame for H2H and M2M to use in the RACH access. Simulation results show that applying Q-learning to realise the proposed FA-QL-RACH scheme resolves the RACH overload problem and improves the RACH-throughput. Finally the improved RACH-throughput performance indicates that the FA-QL-RACH scheme has eliminated the collision between the H2H and M2M user groups.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114689204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Communication Channels Dynamic Switching Model for Always-Connected Availability of Service Oriented Mobile Applications 面向服务的移动应用始终连接可用性的通信通道动态交换模型
Diogo Azevedo, H. Paredes, Benjamim Fonseca
In the current technological landscape, companies face problems associated with the development of mobile applications and rapid integration with their enterprise systems to ensure the availability of value-added services for its customers in pervasive environment. To fill this gap, a generic model for dynamic switching of communication channels to ensure the principles of transparency in distributed environments is proposed, by: (1) designing an interchangeable communication layer for mobile applications, (2) ensuring the transparency of the communication channels, (3) proposing a framework for the development of mobile applications in distributed environment to guarantee the mentioned above communication transparency.
在当前的技术环境中,公司面临着与移动应用程序的开发和与企业系统的快速集成相关的问题,以确保在无处不在的环境中为客户提供增值服务。为了填补这一空白,本文提出了一种保证分布式环境下透明原则的通信通道动态切换通用模型,该模型包括:(1)为移动应用程序设计一个可互换的通信层;(2)保证通信通道的透明性;(3)为分布式环境下的移动应用程序开发提供一个框架,以保证上述通信的透明性。
{"title":"A Communication Channels Dynamic Switching Model for Always-Connected Availability of Service Oriented Mobile Applications","authors":"Diogo Azevedo, H. Paredes, Benjamim Fonseca","doi":"10.1109/NGMAST.2015.51","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.51","url":null,"abstract":"In the current technological landscape, companies face problems associated with the development of mobile applications and rapid integration with their enterprise systems to ensure the availability of value-added services for its customers in pervasive environment. To fill this gap, a generic model for dynamic switching of communication channels to ensure the principles of transparency in distributed environments is proposed, by: (1) designing an interchangeable communication layer for mobile applications, (2) ensuring the transparency of the communication channels, (3) proposing a framework for the development of mobile applications in distributed environment to guarantee the mentioned above communication transparency.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things and M2M Communications as Enablers of Smart City Initiatives 物联网和M2M通信是智慧城市计划的推动者
S. K. Datta, C. Bonnet
This paper describes Internet of Things (IoT) and Machine-to-Machine (M2M) communications as the enablers of smart city initiatives. The challenges in modern cities are briefly identified. Utilization of IoT based applications and services could mitigate these challenges. The paper then introduces an architecture based on oneM2M standards for smart cities. The key elements of the architecture are described along with the common service functions. The main contributions of the work are -- (i) uniform metadata exchange with things using Sensor Markup Language and its extensions, (ii) uniform description of heterogeneous things for configuration management, (iii) OMA Lightweight M2M based device management framework, (iv) resource discovery framework and (v) Machine-to-Machine Measurement framework based M2M data processing and analytics. The core functionalities of these frameworks are exposed to the consumers through RESTful web services. An application scenario on crowdsourcing in the smart cities is highlighted. Finally the paper concludes with future research directions.
本文将物联网(IoT)和机器对机器(M2M)通信描述为智慧城市计划的推动者。简要地指出了现代城市面临的挑战。利用基于物联网的应用程序和服务可以缓解这些挑战。然后介绍了一种基于oneM2M标准的智慧城市体系结构。该体系结构的关键元素与公共服务功能一起进行了描述。这项工作的主要贡献是(i)使用传感器标记语言及其扩展与事物进行统一的元数据交换,(ii)用于配置管理的异构事物的统一描述,(iii)基于OMA轻量级M2M的设备管理框架,(iv)资源发现框架和(v)基于M2M数据处理和分析的机器对机器测量框架。这些框架的核心功能通过RESTful web服务向消费者公开。重点介绍了众包在智慧城市中的应用场景。最后,对今后的研究方向进行了总结。
{"title":"Internet of Things and M2M Communications as Enablers of Smart City Initiatives","authors":"S. K. Datta, C. Bonnet","doi":"10.1109/NGMAST.2015.10","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.10","url":null,"abstract":"This paper describes Internet of Things (IoT) and Machine-to-Machine (M2M) communications as the enablers of smart city initiatives. The challenges in modern cities are briefly identified. Utilization of IoT based applications and services could mitigate these challenges. The paper then introduces an architecture based on oneM2M standards for smart cities. The key elements of the architecture are described along with the common service functions. The main contributions of the work are -- (i) uniform metadata exchange with things using Sensor Markup Language and its extensions, (ii) uniform description of heterogeneous things for configuration management, (iii) OMA Lightweight M2M based device management framework, (iv) resource discovery framework and (v) Machine-to-Machine Measurement framework based M2M data processing and analytics. The core functionalities of these frameworks are exposed to the consumers through RESTful web services. An application scenario on crowdsourcing in the smart cities is highlighted. Finally the paper concludes with future research directions.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124987762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1