Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436643
Kyoungmin Kim, Youngin You, Mookyu Park, Kyungho Lee
Distributed Denial of Service (DDoS) attacks are intense and are targeted to major infrastructure, governments and military organizations in each country. There are a lot of mitigations about DDoS, and the concept of Content Delivery Network (CDN) has been able to avoid attacks on websites. However, since the existing CDN system is fundamentally centralized, it may be difficult to prevent DDoS. This paper describes the distributed CDN Schema using Private Blockchain which solves the problem of participation of existing transparent and unreliable nodes. This will explain DDoS mitigation that can be used by military and government agencies.
{"title":"DDoS Mitigation: Decentralized CDN Using Private Blockchain","authors":"Kyoungmin Kim, Youngin You, Mookyu Park, Kyungho Lee","doi":"10.1109/ICUFN.2018.8436643","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436643","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are intense and are targeted to major infrastructure, governments and military organizations in each country. There are a lot of mitigations about DDoS, and the concept of Content Delivery Network (CDN) has been able to avoid attacks on websites. However, since the existing CDN system is fundamentally centralized, it may be difficult to prevent DDoS. This paper describes the distributed CDN Schema using Private Blockchain which solves the problem of participation of existing transparent and unreliable nodes. This will explain DDoS mitigation that can be used by military and government agencies.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129980905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436785
T. Golubeva, Yevgeniy Zaitsev, S. Konshin, Inkar Duisenbek
The paper views in details a Wi-Fi radio signal passing throughout various construction obstacles in the experimental equipment which was specially developed and made by the authors. Based on study results the data of various materials influence on the radio signal distribution have been obtained. The comparative diagrams of the signal levels on the power and quality for various materials were constructed.
{"title":"A Study on the Wi-Fi Radio Signal Attenuation in Various Construction Materials (Obstacles)","authors":"T. Golubeva, Yevgeniy Zaitsev, S. Konshin, Inkar Duisenbek","doi":"10.1109/ICUFN.2018.8436785","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436785","url":null,"abstract":"The paper views in details a Wi-Fi radio signal passing throughout various construction obstacles in the experimental equipment which was specially developed and made by the authors. Based on study results the data of various materials influence on the radio signal distribution have been obtained. The comparative diagrams of the signal levels on the power and quality for various materials were constructed.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436693
Myungwhan Choi, Areeya Rubenecia, Hyohyun Choi
This paper presents a scheme for crossing an intersection with no traffic light where multiple autonomous vehicles coming from different lanes must travel without collision. The focus of this paper is on the design of the reservation-based scheduling algorithm that determines the trajectories of the vehicles at the intersection under the assumption that the vehicles move at a predetermined constant speed in the intersection. Simulation shows that our solution can effectively schedule the entrance of the vehicles to the intersection and maintain the minimum distance between vehicles while traveling in the intersection. It is also shown that our proposed algorithm is fast enough to be used in real time.
{"title":"Reservation-Based Cooperative Intersection Crossing Scheme for Autonomous Driving in the Intersection","authors":"Myungwhan Choi, Areeya Rubenecia, Hyohyun Choi","doi":"10.1109/ICUFN.2018.8436693","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436693","url":null,"abstract":"This paper presents a scheme for crossing an intersection with no traffic light where multiple autonomous vehicles coming from different lanes must travel without collision. The focus of this paper is on the design of the reservation-based scheduling algorithm that determines the trajectories of the vehicles at the intersection under the assumption that the vehicles move at a predetermined constant speed in the intersection. Simulation shows that our solution can effectively schedule the entrance of the vehicles to the intersection and maintain the minimum distance between vehicles while traveling in the intersection. It is also shown that our proposed algorithm is fast enough to be used in real time.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122823776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436666
Shin-Kyung Lee, Jeong-Woo Lee, H. Oh
In autonomous vehicles, many sensors such as camera, LIDAR, and radar are used to accurately identify situations. However, using information from only the on-board sensors can lead to errors in recognizing the environment around the vehicle. Therefore, vehicle communications and Internet of Things infrastructure serve as alternative channels for gathering integrated information. The purpose of this study is to develop a scheme for providing intersection situation and local dynamic map information to a vehicle entering an intersection. Using infrastructure sensor information in conjunction with vehicle communication extends the range of safe driving at intersections.
{"title":"Design of Integrated LDM Information for Intersection Safety","authors":"Shin-Kyung Lee, Jeong-Woo Lee, H. Oh","doi":"10.1109/ICUFN.2018.8436666","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436666","url":null,"abstract":"In autonomous vehicles, many sensors such as camera, LIDAR, and radar are used to accurately identify situations. However, using information from only the on-board sensors can lead to errors in recognizing the environment around the vehicle. Therefore, vehicle communications and Internet of Things infrastructure serve as alternative channels for gathering integrated information. The purpose of this study is to develop a scheme for providing intersection situation and local dynamic map information to a vehicle entering an intersection. Using infrastructure sensor information in conjunction with vehicle communication extends the range of safe driving at intersections.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8437004
C. Bouras, N. Kanakis
Edge computing or edge networking is an architecture that uses one or more collaborative multitude of end-user clients or near-user edge devices to carry out a substantial amount of communication, control, management or other operations. Edge Computing for mobile networks is a new technology which is currently under standardization providing an IT service environment and cloud-computing capabilities at the edge of the mobile network in close proximity to the mobile end users. The aim of this technology is to reduce latency, ensure highly efficient network operation and service delivery, providing improved user experience. All of these can be translated into value and can create opportunities for operators, application and content providers enabling them to better utilize the mobile broadband capabilities. Furthermore, edge computing enables a new value chain for end users but also for industries allowing to efficient deliver their applications over the mobile network providing fresh business opportunities and new use cases. FEC is a feedback free error recovery method where the sender introduces redundant data in advance with the source data enabling the recipient to recover from different arbitrary packet losses. Recently, the adoption of FEC error control method has been boosted by the introduction of the powerful RaptorQ Application Layer FEC (AL-FEC) codes. In this work we propose the integration of AL-FEC error protection application at the edge layer. We propose a novel AL-FEC application architecture scheme based on RaptorQ codes and we analyze the performance enhancements such an error control architecture can introduce on Next Generation Mobile Networks (NGMN)-edge computing integrated systems.
{"title":"AL-FEC Application on NGMN-Edge Computing Integrated Systems","authors":"C. Bouras, N. Kanakis","doi":"10.1109/ICUFN.2018.8437004","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437004","url":null,"abstract":"Edge computing or edge networking is an architecture that uses one or more collaborative multitude of end-user clients or near-user edge devices to carry out a substantial amount of communication, control, management or other operations. Edge Computing for mobile networks is a new technology which is currently under standardization providing an IT service environment and cloud-computing capabilities at the edge of the mobile network in close proximity to the mobile end users. The aim of this technology is to reduce latency, ensure highly efficient network operation and service delivery, providing improved user experience. All of these can be translated into value and can create opportunities for operators, application and content providers enabling them to better utilize the mobile broadband capabilities. Furthermore, edge computing enables a new value chain for end users but also for industries allowing to efficient deliver their applications over the mobile network providing fresh business opportunities and new use cases. FEC is a feedback free error recovery method where the sender introduces redundant data in advance with the source data enabling the recipient to recover from different arbitrary packet losses. Recently, the adoption of FEC error control method has been boosted by the introduction of the powerful RaptorQ Application Layer FEC (AL-FEC) codes. In this work we propose the integration of AL-FEC error protection application at the edge layer. We propose a novel AL-FEC application architecture scheme based on RaptorQ codes and we analyze the performance enhancements such an error control architecture can introduce on Next Generation Mobile Networks (NGMN)-edge computing integrated systems.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127409282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436733
Li Wang, Sissi Xiaoxiao Wu, Shibing Zhang, Guodong Zhang, Zhihua Bao
Spectrum sensing is the key technology in cognitive radio networks. This paper focused on the spectrum sensing in cognitive cloud networks and proposed a cooperative spectrum sensing algorithm based on phase compensation to improve the spectrum sensing performance. In the algorithm, the received signals in the sensing nodes are sent to the cloud, compensated in phase and combined into one signal. Then, the combined signal is used to test the hypothesis, whether the primary user is present. It uses all available information of all sensing nodes and improves the performance of spectrum detection effectively. The simulation results show that the proposed algorithm has 2–4 dB advantage in signal-to-noise ratio over other algorithms.
{"title":"Cooperative Spectrum Sensing Algorithm Based on Phase Compensation in Cognitive Cloud Networks","authors":"Li Wang, Sissi Xiaoxiao Wu, Shibing Zhang, Guodong Zhang, Zhihua Bao","doi":"10.1109/ICUFN.2018.8436733","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436733","url":null,"abstract":"Spectrum sensing is the key technology in cognitive radio networks. This paper focused on the spectrum sensing in cognitive cloud networks and proposed a cooperative spectrum sensing algorithm based on phase compensation to improve the spectrum sensing performance. In the algorithm, the received signals in the sensing nodes are sent to the cloud, compensated in phase and combined into one signal. Then, the combined signal is used to test the hypothesis, whether the primary user is present. It uses all available information of all sensing nodes and improves the performance of spectrum detection effectively. The simulation results show that the proposed algorithm has 2–4 dB advantage in signal-to-noise ratio over other algorithms.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121629843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8437023
Eulhyeon Go, Soyi Kim, Yoonseok Song, Junghwan Kim, M. Rim
Device-to-device (D2D) communication is a way to communicate directly between devices without going through the base station or other infrastructure. In many D2D communication systems, orthogonal frequency division multiple access (OFDMA) is used in order to maintain the similarity with the mobile communication systems and to secure a sufficient transmission distance. In OFDMA systems, sub-channels, consisting of multiple subcarriers, are used to concurrently support multiple users. Although sub-channels in OFDMA systems are theoretically orthogonal, there is non-negligible interference from other sub-channels due to in-band emission. This paper considers a D2D group-casting system with a relay focusing on the effect of the interference from other subchannels, and calculates the outage probabilities according to the relay position.
{"title":"Relay Position Considering Interference from Other Sub-Channels in D2D Group-casting Systems","authors":"Eulhyeon Go, Soyi Kim, Yoonseok Song, Junghwan Kim, M. Rim","doi":"10.1109/ICUFN.2018.8437023","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437023","url":null,"abstract":"Device-to-device (D2D) communication is a way to communicate directly between devices without going through the base station or other infrastructure. In many D2D communication systems, orthogonal frequency division multiple access (OFDMA) is used in order to maintain the similarity with the mobile communication systems and to secure a sufficient transmission distance. In OFDMA systems, sub-channels, consisting of multiple subcarriers, are used to concurrently support multiple users. Although sub-channels in OFDMA systems are theoretically orthogonal, there is non-negligible interference from other sub-channels due to in-band emission. This paper considers a D2D group-casting system with a relay focusing on the effect of the interference from other subchannels, and calculates the outage probabilities according to the relay position.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127652173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436667
Jae-Kook Lee, Sungjun Kim, Taeyoung Hong, M. Joh, Huiseung Chae
Many researchers often use the HPC (High Performance Computing) service at KISTI via advanced high-speed network technology. In particular, the 4th Supercomputer at KISTI provides HPC services through an internet connection via 10-Gbps high-speed networks. However, there has been an increasing number of cyberattacks targeting the supercomputing services every year. In this study, based on the collected data, we show that the number of cyberattacks against KISTI supercomputing services is increasing every year. In addition, we show that this malicious activity appears to follow a power-law distribution by categorizing the source IP addresses of these attacks based on the originating country and analyzing the frequency of these attacks.
{"title":"Malicious Activity Against an HPC Service Environment Exhibits a Power-Law-Like Frequency Distribution","authors":"Jae-Kook Lee, Sungjun Kim, Taeyoung Hong, M. Joh, Huiseung Chae","doi":"10.1109/ICUFN.2018.8436667","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436667","url":null,"abstract":"Many researchers often use the HPC (High Performance Computing) service at KISTI via advanced high-speed network technology. In particular, the 4th Supercomputer at KISTI provides HPC services through an internet connection via 10-Gbps high-speed networks. However, there has been an increasing number of cyberattacks targeting the supercomputing services every year. In this study, based on the collected data, we show that the number of cyberattacks against KISTI supercomputing services is increasing every year. In addition, we show that this malicious activity appears to follow a power-law distribution by categorizing the source IP addresses of these attacks based on the originating country and analyzing the frequency of these attacks.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121189977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436628
Kwang-Yul Kim, Y. Shin
The magnetic field whose intensity is changed by the magnetic permeability of the medium can be considered as a new underwater communication method. However, the magnetometer in the base station must compensate for the geomagnetic field to detect the underwater moving node for the communication and the localization. Therefore, this paper proposes a magnetic field detection and a localization scheme based on the exponential smoothing method. Simulation results show that the proposed scheme can extend the detection range and improve the localization accuracy by considering the trend of the geomagnetic field.
{"title":"A Magnetic Field Detection and Localization Scheme for Internet of Underwater Things","authors":"Kwang-Yul Kim, Y. Shin","doi":"10.1109/ICUFN.2018.8436628","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436628","url":null,"abstract":"The magnetic field whose intensity is changed by the magnetic permeability of the medium can be considered as a new underwater communication method. However, the magnetometer in the base station must compensate for the geomagnetic field to detect the underwater moving node for the communication and the localization. Therefore, this paper proposes a magnetic field detection and a localization scheme based on the exponential smoothing method. Simulation results show that the proposed scheme can extend the detection range and improve the localization accuracy by considering the trend of the geomagnetic field.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121264496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436705
Gregor Frick, A. Tchinda, U. Trick, A. Lehmann, B. Ghita
This publication deals with distributed NFV orchestration in a WMN-based disaster network. The NFV orchestrator defined by ETSI is designed as a central unit and therefore includes the possibility of a single point of failure. Due to the environment of a disaster, a WMN node hosting this centralized orchestrator might get destroyed at events such as aftershocks resulting in a breakdown of the NFV infrastructure as it cannot be maintained and orchestrated anymore. To eliminate this aspect, requirements for a distributed NFV orchestration are defined. The requirements are categorized into architectural and orchestration specific aspects and are derived from the characteristics of a WMN and the conditions of a disaster environment. A concept for realizing a distributed NFV orchestration in a WMN-based disaster network according to the defined requirements is presented. The architecture consists of five logical layers with each layer fulfilling a specific functionality.
{"title":"Distributed NFV Orchestration in a WMN-Based Disaster Network","authors":"Gregor Frick, A. Tchinda, U. Trick, A. Lehmann, B. Ghita","doi":"10.1109/ICUFN.2018.8436705","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436705","url":null,"abstract":"This publication deals with distributed NFV orchestration in a WMN-based disaster network. The NFV orchestrator defined by ETSI is designed as a central unit and therefore includes the possibility of a single point of failure. Due to the environment of a disaster, a WMN node hosting this centralized orchestrator might get destroyed at events such as aftershocks resulting in a breakdown of the NFV infrastructure as it cannot be maintained and orchestrated anymore. To eliminate this aspect, requirements for a distributed NFV orchestration are defined. The requirements are categorized into architectural and orchestration specific aspects and are derived from the characteristics of a WMN and the conditions of a disaster environment. A concept for realizing a distributed NFV orchestration in a WMN-based disaster network according to the defined requirements is presented. The architecture consists of five logical layers with each layer fulfilling a specific functionality.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121318693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}