Pub Date : 2016-07-18DOI: 10.1109/NOTERE.2016.7745827
A. Chariete, V. Guillet, Jean-Yves Thiriet
In this paper, we propose an optimization approach for designing WLAN networks in an Indoor environment. This approach integrates all relevant parameters to find the optimal placement of access points, there optimum settings (transmission power, azimuth, radiation patterns, etc.) and the optimal allocation of channels while maximizing the coverage, minimizing the interference and minimizing the number of access points to install. Our approach was evaluated when planning a WLAN 802.11 an with a 5GHz band and 20MHz bandwidth on a 5-story building. The results show the effectiveness of our approach to quickly plan a high quality WLANs.
{"title":"Optimization of Wi-Fi access point placement in an indoor environment","authors":"A. Chariete, V. Guillet, Jean-Yves Thiriet","doi":"10.1109/NOTERE.2016.7745827","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745827","url":null,"abstract":"In this paper, we propose an optimization approach for designing WLAN networks in an Indoor environment. This approach integrates all relevant parameters to find the optimal placement of access points, there optimum settings (transmission power, azimuth, radiation patterns, etc.) and the optimal allocation of channels while maximizing the coverage, minimizing the interference and minimizing the number of access points to install. Our approach was evaluated when planning a WLAN 802.11 an with a 5GHz band and 20MHz bandwidth on a 5-story building. The results show the effectiveness of our approach to quickly plan a high quality WLANs.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-18DOI: 10.1109/NOTERE.2016.7745830
Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, P. Urien
This paper is a first attempt to define a set of security vulnerabilities for the Internet of Things (IoT), in a corporate environment, in order to classify various connected objects based on a taxonomy that was previously proposed. The IoT is a complex infrastructure that we divide in four parts (objects, transport, storage, interfaces). It needs protection and supervision. The object and its ecosystem are surrounded with other devices that can become entry points or targets of attacks, even if they are protected from the outer world but not from their local environment. We study the impact of attacks (such as OS reprogramming that has been recently published) on connected thermostats and their possible consequences on their environment, as a first approach to a threat analysis for the IoT.
{"title":"A new approach to investigate IoT threats based on a four layer model","authors":"Bruno Dorsemaine, Jean-Philippe Gaulier, Jean-Philippe Wary, Nizar Kheir, P. Urien","doi":"10.1109/NOTERE.2016.7745830","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745830","url":null,"abstract":"This paper is a first attempt to define a set of security vulnerabilities for the Internet of Things (IoT), in a corporate environment, in order to classify various connected objects based on a taxonomy that was previously proposed. The IoT is a complex infrastructure that we divide in four parts (objects, transport, storage, interfaces). It needs protection and supervision. The object and its ecosystem are surrounded with other devices that can become entry points or targets of attacks, even if they are protected from the outer world but not from their local environment. We study the impact of attacks (such as OS reprogramming that has been recently published) on connected thermostats and their possible consequences on their environment, as a first approach to a threat analysis for the IoT.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-18DOI: 10.1109/NOTERE.2016.7745824
Anis Ahmed-Nacer, Mehdi Ahmed-Nacer
Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly resolves men in the middle attack. This solution is inspired by the authentication algorithms studied in 3G (the 3rd Generation) and TLS (Transport Layer Security) to secure the data exchanged in the network. These algorithms ensure a strong authentication before stating the communication. However, a sensitive data in the network can also be exchanged during the communication. To ensure a strong authentication during a communication, the multi-scale Situation Identification from Context (muSIC) system is used to detect the suspect behavior of the users.
{"title":"Strong authentication for mobile cloud computing","authors":"Anis Ahmed-Nacer, Mehdi Ahmed-Nacer","doi":"10.1109/NOTERE.2016.7745824","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745824","url":null,"abstract":"Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly resolves men in the middle attack. This solution is inspired by the authentication algorithms studied in 3G (the 3rd Generation) and TLS (Transport Layer Security) to secure the data exchanged in the network. These algorithms ensure a strong authentication before stating the communication. However, a sensitive data in the network can also be exchanged during the communication. To ensure a strong authentication during a communication, the multi-scale Situation Identification from Context (muSIC) system is used to detect the suspect behavior of the users.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-18DOI: 10.1109/NOTERE.2016.7745823
Romuald Corbel, Emile Stephan, N. Omnès
The average Web Page size is constantly increasing: it doubled between January 2012 and January 2015 [1]. In such a context the transport of the Internet traffic becomes very challenging. To moderate the impact of the increase of traffic on end-users' Quality of Experience (QoE), the IETF specified the protocol HTTP2, which optimizes the transfer of the HTTP1 protocol. In this paper we provide a comparison of HTTP1 and HTTP2, both in terms of functionalities and in terms of Page Download Time (PDT). As end-to-end encryption is not always required, this comparison is provided in-the-clear. To avoid any bias in the comparison, our measurements are made with the same hardware, the same software and the same transport conditions (multiplexing over a single TCP connection per domain). Based on our measurement, we show that HTTP2 always highlights better performances that HTTP1. More precisely, we observe the HTTP2 PDT remains 15% lower than HTTP1 PDT as the network delay increases. Furthermore, we observe that the ratio of HTTP2 PDT to HTTP1 PDT decreases as the packet loss increases, showing that HTTP2 is more resilient to packet loss than HTTP1.
{"title":"HTTP/1.1 pipelining vs HTTP2 in-the-clear: Performance comparison","authors":"Romuald Corbel, Emile Stephan, N. Omnès","doi":"10.1109/NOTERE.2016.7745823","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745823","url":null,"abstract":"The average Web Page size is constantly increasing: it doubled between January 2012 and January 2015 [1]. In such a context the transport of the Internet traffic becomes very challenging. To moderate the impact of the increase of traffic on end-users' Quality of Experience (QoE), the IETF specified the protocol HTTP2, which optimizes the transfer of the HTTP1 protocol. In this paper we provide a comparison of HTTP1 and HTTP2, both in terms of functionalities and in terms of Page Download Time (PDT). As end-to-end encryption is not always required, this comparison is provided in-the-clear. To avoid any bias in the comparison, our measurements are made with the same hardware, the same software and the same transport conditions (multiplexing over a single TCP connection per domain). Based on our measurement, we show that HTTP2 always highlights better performances that HTTP1. More precisely, we observe the HTTP2 PDT remains 15% lower than HTTP1 PDT as the network delay increases. Furthermore, we observe that the ratio of HTTP2 PDT to HTTP1 PDT decreases as the packet loss increases, showing that HTTP2 is more resilient to packet loss than HTTP1.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131122419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-18DOI: 10.1109/NOTERE.2016.7745831
Roya Golchay, Frédéric Le Mouël, Julien Ponge, N. Stouls
The explosive trend of smartphone usage as the most effective and convenient communication tools of human life in recent years make developers build ever more complex smartphone applications. Gaming, navigation, video editing, augmented reality, and speech recognition applications require considerable computational power and energy. Although smartphones have a wide range of capabilities - GPS, WiFi, cameras their inherent limitations - frequent disconnections, mobility - and significant constraints - size, lower weights, longer battery life make difficult to exploiting their full potential to run complex applications. Several research works have proposed solutions in application offloading domain, but few ones concerning the highly changing properties of the environment. To address these issues, we realize an automated application offloading middleware, ACOMMA, with dynamic and re-adaptable decision-making engine. The decision engine of ACOMMA is based on an ant-inspired algorithm.
{"title":"Automated application offloading through ant-inspired decision-making","authors":"Roya Golchay, Frédéric Le Mouël, Julien Ponge, N. Stouls","doi":"10.1109/NOTERE.2016.7745831","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745831","url":null,"abstract":"The explosive trend of smartphone usage as the most effective and convenient communication tools of human life in recent years make developers build ever more complex smartphone applications. Gaming, navigation, video editing, augmented reality, and speech recognition applications require considerable computational power and energy. Although smartphones have a wide range of capabilities - GPS, WiFi, cameras their inherent limitations - frequent disconnections, mobility - and significant constraints - size, lower weights, longer battery life make difficult to exploiting their full potential to run complex applications. Several research works have proposed solutions in application offloading domain, but few ones concerning the highly changing properties of the environment. To address these issues, we realize an automated application offloading middleware, ACOMMA, with dynamic and re-adaptable decision-making engine. The decision engine of ACOMMA is based on an ant-inspired algorithm.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-01DOI: 10.1109/NOTERE.2016.7745829
Zakaria Aarab, Walid El Haimouti, Hamza Idbenouakrim, Aissam Ouinou, Ayoub Ratbi, Philippe Maurant, A. Tchana
We present Acadoop, a lightweight MapReduce framework, which offers the main features of the Hadoop framework, and follows its architecture. The purpose of this lightening is mainly educational : it aims at enabling students to understand more easily the design of such frameworks, and to experiment with the behaviour of the applications that run on these frameworks. A further benefit of this lightening is that Acadoop provides a simple tool for prototyping and assessing scheduling policies for the MapReduce framework. We give a few simple examples of comparisons between scheduling policies, in order to illustrate Acadoop's possibilities with regard to both education and prototyping. In conclusion, we present the context in which Acadoop was developped, and present some lines for further improvement.
{"title":"Acadoop, a lightweight MapReduce framework for education and prototyping","authors":"Zakaria Aarab, Walid El Haimouti, Hamza Idbenouakrim, Aissam Ouinou, Ayoub Ratbi, Philippe Maurant, A. Tchana","doi":"10.1109/NOTERE.2016.7745829","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745829","url":null,"abstract":"We present Acadoop, a lightweight MapReduce framework, which offers the main features of the Hadoop framework, and follows its architecture. The purpose of this lightening is mainly educational : it aims at enabling students to understand more easily the design of such frameworks, and to experiment with the behaviour of the applications that run on these frameworks. A further benefit of this lightening is that Acadoop provides a simple tool for prototyping and assessing scheduling policies for the MapReduce framework. We give a few simple examples of comparisons between scheduling policies, in order to illustrate Acadoop's possibilities with regard to both education and prototyping. In conclusion, we present the context in which Acadoop was developped, and present some lines for further improvement.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131555565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-01DOI: 10.1109/NOTERE.2016.7745822
F. Grandhomme, Gilles Guette, A. Ksentini, T. Plesse
Nowadays, thanks to the increasing technologies, soldiers and vehicles are equiped with wireless technology to communicate on the battlefield. They form adhoc network and particularly Mobile Ad hoc Network (MANET). Since the battlefield is organized as a coalition, we are in front of a situation where several groups (nations mainly) want to connect to others and establish interMANET communication. Inter-MANET (or interdomainMANET) communication should allow exchange, but maintain a supervision on the exchanged information. Several protocols have been designed in order to handle inter-domain routing for tactical MANETs. In this article, we describe these protocols and focus on the general issues they solve. Then, we compare the results of a simulator (NS3), an emulator (CORE) and a real platform (laptops) on simple network characteristics on Network and Data Link layers. We highlight behavioral differences between the three candidates and particularly softwares (NS3 and CORE). They create problems that do not exist in reality. Consequently, most existing protocols proposed in the litterature are more complex than they should be. Based on this comparison, we propose some guidelines to design Inter-domain routing protocols for MANET.
{"title":"Comparison of Inter-MANET routing protocol evaluation tools","authors":"F. Grandhomme, Gilles Guette, A. Ksentini, T. Plesse","doi":"10.1109/NOTERE.2016.7745822","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745822","url":null,"abstract":"Nowadays, thanks to the increasing technologies, soldiers and vehicles are equiped with wireless technology to communicate on the battlefield. They form adhoc network and particularly Mobile Ad hoc Network (MANET). Since the battlefield is organized as a coalition, we are in front of a situation where several groups (nations mainly) want to connect to others and establish interMANET communication. Inter-MANET (or interdomainMANET) communication should allow exchange, but maintain a supervision on the exchanged information. Several protocols have been designed in order to handle inter-domain routing for tactical MANETs. In this article, we describe these protocols and focus on the general issues they solve. Then, we compare the results of a simulator (NS3), an emulator (CORE) and a real platform (laptops) on simple network characteristics on Network and Data Link layers. We highlight behavioral differences between the three candidates and particularly softwares (NS3 and CORE). They create problems that do not exist in reality. Consequently, most existing protocols proposed in the litterature are more complex than they should be. Based on this comparison, we propose some guidelines to design Inter-domain routing protocols for MANET.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133327469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-31DOI: 10.1109/NOTERE.2016.7745826
Neji Kouka, Adel Thalajoui, A. Meddeb
6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has been granted and this QoS feature and there are no implementations of such feature in real networks. In this paper, we evaluate the effectiveness of these priority bits in various scenarios. We show that under very heavy or very low network load, these bits have a limited effect on the delay.
{"title":"QoS LowPAN for Internet of Things","authors":"Neji Kouka, Adel Thalajoui, A. Meddeb","doi":"10.1109/NOTERE.2016.7745826","DOIUrl":"https://doi.org/10.1109/NOTERE.2016.7745826","url":null,"abstract":"6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has been granted and this QoS feature and there are no implementations of such feature in real networks. In this paper, we evaluate the effectiveness of these priority bits in various scenarios. We show that under very heavy or very low network load, these bits have a limited effect on the delay.","PeriodicalId":225694,"journal":{"name":"2016 13th International Conference on New Technologies for Distributed Systems (NOTERE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134462194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}