首页 > 最新文献

2018 20th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
Obstacles effects on signal attenuation in line of sight for different environments in V2V communication V2V通信中不同环境下障碍物对视线信号衰减的影响
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323629
M. Al-Absi, A. Al-Absi, Young Jin Kang, Hoon-Jae Lee
In Vanet, Secure and Smart Intelligent Transport System (SSITS) support both safety and non-safety applications in terms of throughput and collision performance. In vehicle to vehicle (V2V) communication, the network should provide a good throughput and should reduce collision. To provide an efficient throughput for V2V communication under different environments (such as City, Highway, and Rural), a good radio propagation model is required in order to support the real-time implementation. The existing radio propagation path loss models for V2V network adopt mean additional attenuation sophisticated obstacle fading model such as Nakagami, Log normal and so on. These models do not consider the effects of the vehicle in modeling LOS among transmitter and receiver and also do not consider evaluation under different environments. The presence of Line of sight (LOS) component (such as reflection or diffraction) requires the amplification of signal or power. Due to this, here we present an efficient radio propagation path loss model considering the obstacle in LOS (vehicle) under different environmental conditions in the presence of LOS. The experiments are conducted to evaluate the performance of the proposed model in terms of throughput and collision considering a varied number of vehicles under City, Highway and rural environments. The result shows that the proposed model is efficient considering varied density.
在Vanet中,安全和智能交通系统(SSITS)在吞吐量和碰撞性能方面支持安全和非安全应用。在车对车(V2V)通信中,网络应提供良好的吞吐量,并应减少碰撞。为了在不同的环境下(如城市、公路和农村)提供高效的V2V通信吞吐量,需要一个良好的无线电传播模型来支持实时实现。现有的V2V网络无线电传播路径损耗模型采用平均附加衰减复杂障碍衰落模型,如Nakagami、Log normal等。这些模型没有考虑飞行器在模拟发射器和接收器之间的LOS时的影响,也没有考虑不同环境下的评估。视距分量(如反射或衍射)的存在需要信号或功率的放大。鉴于此,本文提出了一种考虑LOS(车辆)中障碍物在不同环境条件下的有效无线电传播路径损失模型。在城市、公路和农村环境下,考虑不同数量的车辆,进行了实验,以评估所提出模型在吞吐量和碰撞方面的性能。结果表明,考虑到密度的变化,该模型是有效的。
{"title":"Obstacles effects on signal attenuation in line of sight for different environments in V2V communication","authors":"M. Al-Absi, A. Al-Absi, Young Jin Kang, Hoon-Jae Lee","doi":"10.23919/ICACT.2018.8323629","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323629","url":null,"abstract":"In Vanet, Secure and Smart Intelligent Transport System (SSITS) support both safety and non-safety applications in terms of throughput and collision performance. In vehicle to vehicle (V2V) communication, the network should provide a good throughput and should reduce collision. To provide an efficient throughput for V2V communication under different environments (such as City, Highway, and Rural), a good radio propagation model is required in order to support the real-time implementation. The existing radio propagation path loss models for V2V network adopt mean additional attenuation sophisticated obstacle fading model such as Nakagami, Log normal and so on. These models do not consider the effects of the vehicle in modeling LOS among transmitter and receiver and also do not consider evaluation under different environments. The presence of Line of sight (LOS) component (such as reflection or diffraction) requires the amplification of signal or power. Due to this, here we present an efficient radio propagation path loss model considering the obstacle in LOS (vehicle) under different environmental conditions in the presence of LOS. The experiments are conducted to evaluate the performance of the proposed model in terms of throughput and collision considering a varied number of vehicles under City, Highway and rural environments. The result shows that the proposed model is efficient considering varied density.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123771737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Advanced LTE network deployment methodology: A case study for Dakar region 先进的LTE网络部署方法:达喀尔地区的案例研究
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323819
Antoine Gnansounou, S. Ouya, Raimy Abd. Toure
This work describes the dimensioning process of LTE access network for an ISP, its models, methods and the tool used to dimension the network. LTE is a system with larger bandwidths (up to 20 MHz), low latency and Packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink. Radio access technology for LTE is OFDM (Orthogonal frequency division multiplexing) that provides higher spectral efficiency and more robustness against mulitpath and fading, as compared to CDMA (Code division multiple access). In order to offer the operators increased flexibility in network deployment, the LTE system supports bandwidth scalability and both FDD and TDD duplexing methods. The main objectives of our research was the identification of LTE features relevant for the dimensioning, to define the basic models for Access Network Dimensioning to estimate Coverage needs of the infrastructure, the Network Element Count Estimation and the Capacity Evaluation.
本文描述了ISP LTE接入网的量纲化过程、量纲化模型、量纲化方法和量纲化工具。LTE是一种具有更大带宽(高达20mhz)、低延迟和分组优化的无线接入技术的系统,下行链路的峰值数据速率为100mbps,上行链路的峰值数据速率为50mbps。LTE的无线接入技术是OFDM(正交频分复用),与CDMA(码分多址)相比,它提供了更高的频谱效率和更强的抗多径和衰落的鲁棒性。为了给运营商提供更大的网络部署灵活性,LTE系统支持带宽可扩展性以及FDD和TDD双工方法。我们研究的主要目标是确定与维度相关的LTE特征,定义接入网维度的基本模型,以估计基础设施的覆盖需求,网络元素计数估计和容量评估。
{"title":"Advanced LTE network deployment methodology: A case study for Dakar region","authors":"Antoine Gnansounou, S. Ouya, Raimy Abd. Toure","doi":"10.23919/ICACT.2018.8323819","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323819","url":null,"abstract":"This work describes the dimensioning process of LTE access network for an ISP, its models, methods and the tool used to dimension the network. LTE is a system with larger bandwidths (up to 20 MHz), low latency and Packet optimized radio access technology having peak data rates of 100 Mbps in downlink and 50 Mbps in the uplink. Radio access technology for LTE is OFDM (Orthogonal frequency division multiplexing) that provides higher spectral efficiency and more robustness against mulitpath and fading, as compared to CDMA (Code division multiple access). In order to offer the operators increased flexibility in network deployment, the LTE system supports bandwidth scalability and both FDD and TDD duplexing methods. The main objectives of our research was the identification of LTE features relevant for the dimensioning, to define the basic models for Access Network Dimensioning to estimate Coverage needs of the infrastructure, the Network Element Count Estimation and the Capacity Evaluation.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126994716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS MCPS中生物可识别模态欺骗认知检测的选择性模糊集成学习器
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323645
Nishat I. Mowla, Inshil Doh, K. Chae
Biometric features are widely used for user authentication and equally important to national and global technology systems. Various forms of biometric features, such as face, iris, fingerprint, are commonly used while more recently palm, vein and gait are also getting attention. Simultaneously various spoofing approaches have also been developed over time, which are capable of failing traditional biometric detection systems. Image synthesis with play-doh, gelatin, ecoflex etc. are some of the ways used in spoofing bio-identifiable property. Success of traditional detection systems are related to custom tailored solutions where feature engineering for each attack type must be developed. This is not a feasible process when we consider countless attack possibilities. Also, a slight change in the attack can cause the whole system to be redesigned and therefore becomes a limiting constraint. The recent success of machine learning inspires this paper to explore weak and strong learners with ensemble learning approaches using AdaBoost. Therefore, the paper proposes a selective ensemble fuzzy learner approach using Ada Boost, feature selection and combination of weak and strong learners to enhance the detection of bio-identifiable modality spoofing. Our proposal is verified on real dataset, LiveDet 2015, with a focus on fingerprint modality spoofing detection that can be used for authentication in Medical Cyber Physical Systems (MCPS).
生物特征被广泛用于用户认证,对国家和全球技术系统同样重要。各种形式的生物特征,如面部、虹膜、指纹,是常用的,最近手掌、静脉和步态也受到关注。同时,随着时间的推移,各种欺骗方法也被开发出来,这些方法可能会失败传统的生物识别检测系统。用橡皮泥、明胶、ecooflex等合成图像是一些用于欺骗生物可识别特性的方法。传统检测系统的成功与定制解决方案有关,必须为每种攻击类型开发特征工程。当我们考虑到无数的攻击可能性时,这不是一个可行的过程。此外,攻击中的一个微小变化可能导致整个系统被重新设计,从而成为一个限制性约束。最近机器学习的成功激发了本文使用AdaBoost探索集成学习方法的弱学习器和强学习器。因此,本文提出了一种采用Ada Boost、特征选择和弱学习器与强学习器相结合的选择性集成模糊学习器方法来增强对生物可识别模态欺骗的检测。我们的建议在真实数据集LiveDet 2015上进行了验证,重点是指纹模态欺骗检测,可用于医疗网络物理系统(MCPS)的身份验证。
{"title":"Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS","authors":"Nishat I. Mowla, Inshil Doh, K. Chae","doi":"10.23919/ICACT.2018.8323645","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323645","url":null,"abstract":"Biometric features are widely used for user authentication and equally important to national and global technology systems. Various forms of biometric features, such as face, iris, fingerprint, are commonly used while more recently palm, vein and gait are also getting attention. Simultaneously various spoofing approaches have also been developed over time, which are capable of failing traditional biometric detection systems. Image synthesis with play-doh, gelatin, ecoflex etc. are some of the ways used in spoofing bio-identifiable property. Success of traditional detection systems are related to custom tailored solutions where feature engineering for each attack type must be developed. This is not a feasible process when we consider countless attack possibilities. Also, a slight change in the attack can cause the whole system to be redesigned and therefore becomes a limiting constraint. The recent success of machine learning inspires this paper to explore weak and strong learners with ensemble learning approaches using AdaBoost. Therefore, the paper proposes a selective ensemble fuzzy learner approach using Ada Boost, feature selection and combination of weak and strong learners to enhance the detection of bio-identifiable modality spoofing. Our proposal is verified on real dataset, LiveDet 2015, with a focus on fingerprint modality spoofing detection that can be used for authentication in Medical Cyber Physical Systems (MCPS).","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127625015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
5G framework based on multi-level edge computing with D2D enabled communication 基于多层次边缘计算的5G框架,支持D2D通信
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323811
Abdelhamied A. Ateya, A. Muthanna, A. Koucheryavy
There is no doubt that the release of the fifth generation of the mobile cellular system (5G) becomes a great demand year by year, especially with the massive increase of heterogeneous Wireless devices. The 5G network will be a platform for wide variety of industries. Designing of 5G cellular system faces various challenges related to the capacity and traffic. One way to solve these challenges is to employ device-to-device (D2D) communication and mobile edge computing (MEC). Employing these technologies offload the core network and increase the capacity of the system. In this work, we propose a frame work for the 5G cellular system based on D2D communication and multi-level cloud units employed at the edge of the cellular network. The system employs four levels of cloud units with various hardware capabilities. The D2D communication is used as the communication technology in the first level of clouds. Employing D2D together with multi-level edge cloud units achieves varies benefits to the system as the system level simulation provides.
毫无疑问,第五代移动蜂窝系统(5G)的发布是一个逐年增长的巨大需求,特别是随着异构无线设备的大量增加。5G网络将成为各种行业的平台。5G蜂窝系统的设计面临着与容量和流量相关的各种挑战。解决这些挑战的一种方法是采用设备对设备(D2D)通信和移动边缘计算(MEC)。采用这些技术可以减轻核心网的负担,提高系统的容量。在这项工作中,我们提出了一种基于D2D通信和蜂窝网络边缘采用的多级云单元的5G蜂窝系统框架。该系统采用具有不同硬件能力的四层云单元。采用D2D通信作为云第一层的通信技术。将D2D与多级边缘云单元结合使用,可以实现系统级仿真所提供的各种好处。
{"title":"5G framework based on multi-level edge computing with D2D enabled communication","authors":"Abdelhamied A. Ateya, A. Muthanna, A. Koucheryavy","doi":"10.23919/ICACT.2018.8323811","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323811","url":null,"abstract":"There is no doubt that the release of the fifth generation of the mobile cellular system (5G) becomes a great demand year by year, especially with the massive increase of heterogeneous Wireless devices. The 5G network will be a platform for wide variety of industries. Designing of 5G cellular system faces various challenges related to the capacity and traffic. One way to solve these challenges is to employ device-to-device (D2D) communication and mobile edge computing (MEC). Employing these technologies offload the core network and increase the capacity of the system. In this work, we propose a frame work for the 5G cellular system based on D2D communication and multi-level cloud units employed at the edge of the cellular network. The system employs four levels of cloud units with various hardware capabilities. The D2D communication is used as the communication technology in the first level of clouds. Employing D2D together with multi-level edge cloud units achieves varies benefits to the system as the system level simulation provides.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133675619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
General labelled data generator framework for network machine learning 用于网络机器学习的通用标记数据生成器框架
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323669
Kwihoon Kim, Yong-Geun Hong, Youn-Hee Han
Artificial Intelligence (AI) technology has made remarkable achievements in various fields. Especially, deep learning technology that is the representative technology of AI, showed high accuracy in speech recognition, image recognition, pattern recognition, natural language processing and translation. In addition, there are many interesting research results such as art, literature and music that cannot be distinguished whether it was made by human or AI. In the field of networks, attempts to solve problems that have not been able to be solved or complex problems using AI have started to become a global trend. However, there is a lack of data sets to apply machine learning to the network and it is difficult to know network problem to solve. So far, there have been a lot of efforts to study network machine learning, but there are few studies to make a necessary dataset. In this paper, we introduce basic network machine learning technology and propose a method to easily generate data for network machine learning. Based on the data generation framework proposed in this paper, the results of automatic generation of labelled data and the results of learning and inferencing from the corresponding dataset are also provided.
人工智能(AI)技术在各个领域取得了令人瞩目的成就。特别是作为人工智能代表技术的深度学习技术,在语音识别、图像识别、模式识别、自然语言处理和翻译等方面表现出了较高的准确率。此外,还有许多有趣的研究成果,如艺术,文学和音乐,无法区分它是由人类还是人工智能制作的。在网络领域,尝试用人工智能解决无法解决的问题或复杂的问题已经开始成为一种全球趋势。然而,缺乏将机器学习应用于网络的数据集,并且很难知道要解决的网络问题。到目前为止,已经有很多研究网络机器学习的努力,但很少有研究可以制作必要的数据集。本文介绍了网络机器学习的基本技术,并提出了一种易于生成网络机器学习数据的方法。在本文提出的数据生成框架的基础上,给出了标注数据的自动生成结果以及相应数据集的学习和推理结果。
{"title":"General labelled data generator framework for network machine learning","authors":"Kwihoon Kim, Yong-Geun Hong, Youn-Hee Han","doi":"10.23919/ICACT.2018.8323669","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323669","url":null,"abstract":"Artificial Intelligence (AI) technology has made remarkable achievements in various fields. Especially, deep learning technology that is the representative technology of AI, showed high accuracy in speech recognition, image recognition, pattern recognition, natural language processing and translation. In addition, there are many interesting research results such as art, literature and music that cannot be distinguished whether it was made by human or AI. In the field of networks, attempts to solve problems that have not been able to be solved or complex problems using AI have started to become a global trend. However, there is a lack of data sets to apply machine learning to the network and it is difficult to know network problem to solve. So far, there have been a lot of efforts to study network machine learning, but there are few studies to make a necessary dataset. In this paper, we introduce basic network machine learning technology and propose a method to easily generate data for network machine learning. Based on the data generation framework proposed in this paper, the results of automatic generation of labelled data and the results of learning and inferencing from the corresponding dataset are also provided.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"5 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development trend of insider anomaly detection system 内部异常检测系统的发展趋势
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323761
Minkyu Kim, Kihwan Kim, Hoonjae Lee
Recently, industrial and national infrastructure suffered economic losses due to internal leaks caused by insider leaks and key data leaks. As a result, many companies applying not only physical external and internal penetration methods, but also software, machine learning, and other methods to detect people's abnormal behaviour. This paper surveys trends and forecasts of the intrusion detection techniques by categorizing into basic software and machine learning technique.
近期,行业和国家基础设施因内部泄露和关键数据泄露而遭受经济损失。因此,许多公司不仅采用物理的外部和内部渗透方法,还采用软件、机器学习等方法来检测人们的异常行为。本文将入侵检测技术分为基础软件技术和机器学习技术,概述了入侵检测技术的发展趋势和预测。
{"title":"Development trend of insider anomaly detection system","authors":"Minkyu Kim, Kihwan Kim, Hoonjae Lee","doi":"10.23919/ICACT.2018.8323761","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323761","url":null,"abstract":"Recently, industrial and national infrastructure suffered economic losses due to internal leaks caused by insider leaks and key data leaks. As a result, many companies applying not only physical external and internal penetration methods, but also software, machine learning, and other methods to detect people's abnormal behaviour. This paper surveys trends and forecasts of the intrusion detection techniques by categorizing into basic software and machine learning technique.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Protecting end-device from replay attack on LoRaWAN 保护终端设备免受LoRaWAN重放攻击
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323683
WooNam Sung, Hyeong-Geun Ahn, Jong-Beom Kim, S. Choi
In this paper, we propose a method to protect end-device by using RSSI and Hand-Shaking technique using Proprietary Message. One of the frequently used attacks in LoRaWAN is replay attack. It is so easy to sniff packets in a wireless network environment. If an attacker intrudes a service provided by LoRaWAN, the usage pattern of the end-device may be exposed, or a replay attack may cause a problem in connection with the user. To prevent replay attack, LoRaWAN standard uses user identification method by using the value known as DevNonce, but this is not a complete countermeasure. In order to complement these vulnerabilities, we propose a method to protect users by using the physical characteristics of a network called RSSI and a new technique called Proprietary Hand-Shaking.
在本文中,我们提出了一种使用专有消息的RSSI和握手技术来保护终端设备的方法。重放攻击是LoRaWAN中常用的一种攻击方式。在无线网络环境中嗅探数据包是很容易的。如果攻击者入侵LoRaWAN提供的服务,则可能暴露终端设备的使用模式,或者重播攻击可能导致与用户的连接出现问题。为了防止重放攻击,LoRaWAN标准使用了用户识别方法,即使用DevNonce值,但这并不是一个完整的对策。为了弥补这些漏洞,我们提出了一种通过使用称为RSSI的网络物理特性和称为专有握手的新技术来保护用户的方法。
{"title":"Protecting end-device from replay attack on LoRaWAN","authors":"WooNam Sung, Hyeong-Geun Ahn, Jong-Beom Kim, S. Choi","doi":"10.23919/ICACT.2018.8323683","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323683","url":null,"abstract":"In this paper, we propose a method to protect end-device by using RSSI and Hand-Shaking technique using Proprietary Message. One of the frequently used attacks in LoRaWAN is replay attack. It is so easy to sniff packets in a wireless network environment. If an attacker intrudes a service provided by LoRaWAN, the usage pattern of the end-device may be exposed, or a replay attack may cause a problem in connection with the user. To prevent replay attack, LoRaWAN standard uses user identification method by using the value known as DevNonce, but this is not a complete countermeasure. In order to complement these vulnerabilities, we propose a method to protect users by using the physical characteristics of a network called RSSI and a new technique called Proprietary Hand-Shaking.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Study on multi-network traffic modeling in distribution communication network access service 配电网接入业务中多网络流量建模研究
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323895
Weidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang
Network traffic model is the basis for network performance analysis, dynamic allocation of network bandwidth and network planning and construction. A good traffic model and prediction method is great significance for the design of a new generation of network protocols, network management and diagnosis, design of high performance routers, load balancers Network hardware equipment and improving the quality of the network services. With the construction of energy smart grid, especially in the distribution network is particularly evident. Increasing the variety of electrical equipment, which make distribution and communication network structure more complex and changeable, including a variety of communication systems, more Equipment, a larger scale and communication traffic characteristics. It can cause a great impact on the backbone network capacity. Considering the reliability and security of the power grid, this paper analyzes the characteristics of conventional traffic model based on the traffic characteristics of the distribution network and establishes a multi-convergence traffic prediction model to be used in the distribution network to improve the accuracy of network traffic prediction. Provide a reliable theoretical basis.
网络流量模型是网络性能分析、网络带宽动态分配和网络规划建设的基础。良好的流量模型和预测方法对于设计新一代网络协议、网络管理和诊断、设计高性能路由器、负载均衡器等网络硬件设备以及提高网络服务质量具有重要意义。随着能源智能电网的建设,特别是在配电网中显得尤为明显。电气设备的种类不断增加,这使得配电网和通信网的结构更加复杂多变,包括各种通信系统、更多的设备、更大的规模和通信流量等特点。这会对骨干网的容量造成很大的影响。考虑到电网的可靠性和安全性,本文基于配电网的流量特性,分析了传统流量模型的特点,建立了一种多收敛的配电网流量预测模型,以提高配电网流量预测的准确性。提供可靠的理论依据。
{"title":"Study on multi-network traffic modeling in distribution communication network access service","authors":"Weidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang","doi":"10.23919/ICACT.2018.8323895","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323895","url":null,"abstract":"Network traffic model is the basis for network performance analysis, dynamic allocation of network bandwidth and network planning and construction. A good traffic model and prediction method is great significance for the design of a new generation of network protocols, network management and diagnosis, design of high performance routers, load balancers Network hardware equipment and improving the quality of the network services. With the construction of energy smart grid, especially in the distribution network is particularly evident. Increasing the variety of electrical equipment, which make distribution and communication network structure more complex and changeable, including a variety of communication systems, more Equipment, a larger scale and communication traffic characteristics. It can cause a great impact on the backbone network capacity. Considering the reliability and security of the power grid, this paper analyzes the characteristics of conventional traffic model based on the traffic characteristics of the distribution network and establishes a multi-convergence traffic prediction model to be used in the distribution network to improve the accuracy of network traffic prediction. Provide a reliable theoretical basis.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The dynamic analysis of WannaCry ransomware WannaCry勒索软件的动态分析
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323679
Da-Yu Kao, Shou-Ching Hsiao
The global ransomware cyberattacks cripples the national hospital system across the United Kingdom, and causes waves of appointments and operations to be cancelled. Similar attacking methods have come to sweep over the world. Such trend of highprofile cyberattack sheds the lights on rapid defence through the malware information sharing platform. A complete malware analysis process is quite a time-consuming campaign. The dynamic analysis of WannaCry ransomware explores behavioural indicators and extracts important IOCs (Indicators of Compromise). Utilizing Yara tool to create customized patterns is useful for malware information sharing mechanism. Also, such mechanism help reduce time and human resource spent on detecting or finding similar malware families. We aim to generate effective cyber threat intelligence by formulating collected IOCs into structured formations. The positive effects show on immediate defensive response to security breaches, and meanwhile the integrated information security protection is consolidated.
全球勒索软件网络攻击使英国的国家医院系统瘫痪,并导致一波又一波的预约和手术被取消。类似的攻击方法已经席卷全球。这种网络攻击的高发趋势,揭示了通过恶意软件信息共享平台进行快速防御的必要性。一个完整的恶意软件分析过程是相当耗时的。对WannaCry勒索软件的动态分析探索了行为指标并提取了重要的ioc(妥协指标)。利用Yara工具创建自定义模式对恶意软件信息共享机制非常有用。此外,这种机制有助于减少在检测或查找类似恶意软件家族上花费的时间和人力资源。我们的目标是通过将收集到的ioc形成结构化的编队来生成有效的网络威胁情报。对安全漏洞的即时防御反应显示出积极的效果,同时也巩固了信息安全的综合防护。
{"title":"The dynamic analysis of WannaCry ransomware","authors":"Da-Yu Kao, Shou-Ching Hsiao","doi":"10.23919/ICACT.2018.8323679","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323679","url":null,"abstract":"The global ransomware cyberattacks cripples the national hospital system across the United Kingdom, and causes waves of appointments and operations to be cancelled. Similar attacking methods have come to sweep over the world. Such trend of highprofile cyberattack sheds the lights on rapid defence through the malware information sharing platform. A complete malware analysis process is quite a time-consuming campaign. The dynamic analysis of WannaCry ransomware explores behavioural indicators and extracts important IOCs (Indicators of Compromise). Utilizing Yara tool to create customized patterns is useful for malware information sharing mechanism. Also, such mechanism help reduce time and human resource spent on detecting or finding similar malware families. We aim to generate effective cyber threat intelligence by formulating collected IOCs into structured formations. The positive effects show on immediate defensive response to security breaches, and meanwhile the integrated information security protection is consolidated.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"646 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122957849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sink 基于模糊逻辑的聚类与移动sink相结合提高无线传感器网络的网络寿命
Pub Date : 2018-02-01 DOI: 10.23919/ICACT.2018.8323665
Phan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam
The issues related to energy consumption and prolonging the lifetime of wireless sensor networks(WSNs) have been studied. The deployment of a transceiver station in a WSN is a major concern. Supposing the base stations are static (fixed), however they are capable of moving in some situations to collect data from sensor nodes. In order to achieve higher energy efficiency results, the mobility of the base station to increase the lifetime of the WSN is considered in this article. We propose a strategy that combines moving sinks by fixed-path sink with fuzzy clustering algorithm that results the proposed algorithm has better performance in terms of network life, stability and packet delivery compared to Leach, Cluster Head Election mechanism using Fuzzy logic (CHEF) in performance evaluation through simulation software MATLAB.
对无线传感器网络的能量消耗和寿命延长等问题进行了研究。无线传感器网络中收发站的部署是一个主要问题。假设基站是静态的(固定的),但是它们能够在某些情况下移动以从传感器节点收集数据。为了达到更高的能效效果,本文考虑了基站的移动性来增加无线传感器网络的寿命。我们提出了一种将固定路径sink移动sink与模糊聚类算法相结合的策略,通过仿真软件MATLAB进行性能评价,结果表明所提出的算法在网络寿命、稳定性和数据包传输方面都优于采用模糊逻辑(CHEF)的Leach、Cluster Head Election机制。
{"title":"Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sink","authors":"Phan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam","doi":"10.23919/ICACT.2018.8323665","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323665","url":null,"abstract":"The issues related to energy consumption and prolonging the lifetime of wireless sensor networks(WSNs) have been studied. The deployment of a transceiver station in a WSN is a major concern. Supposing the base stations are static (fixed), however they are capable of moving in some situations to collect data from sensor nodes. In order to achieve higher energy efficiency results, the mobility of the base station to increase the lifetime of the WSN is considered in this article. We propose a strategy that combines moving sinks by fixed-path sink with fuzzy clustering algorithm that results the proposed algorithm has better performance in terms of network life, stability and packet delivery compared to Leach, Cluster Head Election mechanism using Fuzzy logic (CHEF) in performance evaluation through simulation software MATLAB.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"55 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115977814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2018 20th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1