Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994434
Hung T. Le, A. Pham, T. Thang
Advertisement is a crucial factor in business models of Internet video streaming. So far, most methods for advertisement video insertion are of server-based type. In this paper, we present an approach for client-based advertisement insertion in HTTP streaming, which has become a cost effective means for multimedia delivery. The advantages of our approach include client's unawareness of advertisement and smooth transition between content and advertisement.
{"title":"Client-based ad insertion for adaptive video streaming","authors":"Hung T. Le, A. Pham, T. Thang","doi":"10.1109/CCNC.2014.6994434","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994434","url":null,"abstract":"Advertisement is a crucial factor in business models of Internet video streaming. So far, most methods for advertisement video insertion are of server-based type. In this paper, we present an approach for client-based advertisement insertion in HTTP streaming, which has become a cost effective means for multimedia delivery. The advantages of our approach include client's unawareness of advertisement and smooth transition between content and advertisement.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994404
Mayssa Jemel, A. Serhrouchni
Storage is one of the main services that came with Cloud Computing. It offers to the client the possibility to externalize his data. In this work, we concentrate on the use of HTML5 standard in SaaS cloud Services. In particular, we focus on the local storage APIs that offer to Web application the possibility to store user's data and information in browsers. These APIs allow the user to work in offline mode. The problem with HTML5 local storage, besides the lack of security in storage, is the loss of data while moving from one machine to another. Based on the adoption of Digital Safe, the main contributions of our proposal are as follows. First, we add new secure mechanisms to enhance the security in HTML5 local storage APIs. Second, we propose an architecture that ensures a secure synchronization of local data stored with HTML5.
{"title":"Content protection and secure synchronization of HTML5 local storage data","authors":"Mayssa Jemel, A. Serhrouchni","doi":"10.1109/CCNC.2014.6994404","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994404","url":null,"abstract":"Storage is one of the main services that came with Cloud Computing. It offers to the client the possibility to externalize his data. In this work, we concentrate on the use of HTML5 standard in SaaS cloud Services. In particular, we focus on the local storage APIs that offer to Web application the possibility to store user's data and information in browsers. These APIs allow the user to work in offline mode. The problem with HTML5 local storage, besides the lack of security in storage, is the loss of data while moving from one machine to another. Based on the adoption of Digital Safe, the main contributions of our proposal are as follows. First, we add new secure mechanisms to enhance the security in HTML5 local storage APIs. Second, we propose an architecture that ensures a secure synchronization of local data stored with HTML5.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121849440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994421
Takaaki Kawai, Naoki Yusay, Hiroshi Minenoz
A system with which anyone can build a network easily anywhere is needed in disaster areas and developing countries where the communication infrastructure is unstable. Wireless mesh network can be cited as a way to build a network on the spot. However, radio interference, distance and obstacles cause the radio disturbance. In addition, to prevent the traffic load from being concentrated on one gateway node, it is necessary to use as many gateway nodes as possible based on the Internet connection status. In this paper, we propose Adaptive Multi- Gateway Mesh Network(AMGMN). AMGMN can use wired LAN and wireless LAN as links. The combination of these prevents radio interference and ensures ease of structuring the network. We implemented AMGMN inside bootable USB and it made it possible to build the network automatically.
{"title":"Demonstration of adaptive multi-gateway mesh network","authors":"Takaaki Kawai, Naoki Yusay, Hiroshi Minenoz","doi":"10.1109/CCNC.2014.6994421","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994421","url":null,"abstract":"A system with which anyone can build a network easily anywhere is needed in disaster areas and developing countries where the communication infrastructure is unstable. Wireless mesh network can be cited as a way to build a network on the spot. However, radio interference, distance and obstacles cause the radio disturbance. In addition, to prevent the traffic load from being concentrated on one gateway node, it is necessary to use as many gateway nodes as possible based on the Internet connection status. In this paper, we propose Adaptive Multi- Gateway Mesh Network(AMGMN). AMGMN can use wired LAN and wireless LAN as links. The combination of these prevents radio interference and ensures ease of structuring the network. We implemented AMGMN inside bootable USB and it made it possible to build the network automatically.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117279693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994395
Sangho Lee, Woosuk Kwon, Shiho Kim
We propose a Semantic Social Networking Service (SSNS) using Smart TV to provide an enhanced object-centered social communication during watching TV. In the proposed semantic social communication service, it supports not only 1 to N interaction but also provides N to N interactions. Additionally, real-time social survey system supports the viewers to participate in a survey by synchronizing with broadcasting TV program. To ensure safe message sharing, a symmetric key based cryptography algorithm is employed to decrypt incoming and encrypt outgoing messages among participants.
{"title":"A semantic social networking service using smart TV","authors":"Sangho Lee, Woosuk Kwon, Shiho Kim","doi":"10.1109/CCNC.2014.6994395","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994395","url":null,"abstract":"We propose a Semantic Social Networking Service (SSNS) using Smart TV to provide an enhanced object-centered social communication during watching TV. In the proposed semantic social communication service, it supports not only 1 to N interaction but also provides N to N interactions. Additionally, real-time social survey system supports the viewers to participate in a survey by synchronizing with broadcasting TV program. To ensure safe message sharing, a symmetric key based cryptography algorithm is employed to decrypt incoming and encrypt outgoing messages among participants.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994407
D. Touitou, E. Roch
In this paper, we propose Fast Path Offloading (FPO), a new framework that accelerates the performance of many virtual Network Functions. FPO enables the Network Functions to offload the majority of the traffic processing to the underlying network. We implemented FPO and used it to accelerate the performance of HA-proxy, an open source L7 load balancer.
{"title":"Accelerating NFV with fast path offloading","authors":"D. Touitou, E. Roch","doi":"10.1109/CCNC.2014.6994407","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994407","url":null,"abstract":"In this paper, we propose Fast Path Offloading (FPO), a new framework that accelerates the performance of many virtual Network Functions. FPO enables the Network Functions to offload the majority of the traffic processing to the underlying network. We implemented FPO and used it to accelerate the performance of HA-proxy, an open source L7 load balancer.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122524350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994425
Ari Hadiks, Yu Chen, Feng Li, Bingwei Liu
Wi-Fi Direct technology enriches local services that enables social interactions off the grid. Allowing purely local connections among mobile devices, Device-to-Device (D2D) networks support more versatile proximity-based applications and reduce dependence on central entity. While the D2D paradigm allows more convenient information exchanging or resource sharing, it also brought new challenges. Information assurance and system security are top concerns users have. In this paper, we studied the impacts of Denial-of-Service (DoS) attacks in a D2D underlaying network. Our experimental results show that malicious users can effectively force the victim mobile device drop off its Wi-Fi connection to the access point (AP) without being detected by the AP or the cellular network. We expect this preliminary results can inspire more research in this raising area.
{"title":"A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks","authors":"Ari Hadiks, Yu Chen, Feng Li, Bingwei Liu","doi":"10.1109/CCNC.2014.6994425","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994425","url":null,"abstract":"Wi-Fi Direct technology enriches local services that enables social interactions off the grid. Allowing purely local connections among mobile devices, Device-to-Device (D2D) networks support more versatile proximity-based applications and reduce dependence on central entity. While the D2D paradigm allows more convenient information exchanging or resource sharing, it also brought new challenges. Information assurance and system security are top concerns users have. In this paper, we studied the impacts of Denial-of-Service (DoS) attacks in a D2D underlaying network. Our experimental results show that malicious users can effectively force the victim mobile device drop off its Wi-Fi connection to the access point (AP) without being detected by the AP or the cellular network. We expect this preliminary results can inspire more research in this raising area.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133882274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994418
S. Narieda
This paper presents a novel antenna selection technique for cyclostationarity detection based spectrum sensing for cognitive radio networks. An antenna selection criterion, which can compute by some test statistics obtained the cyclic autocorrelation function of received signals at all receive antenna elements, is developed. The presented results are compared with some conventional results, and the presented techniques can improve the sensing performances in same sensing period as the conventional techniques.
{"title":"Antenna selection for cyclostationarity detection based spectrum sensing in cognitive radio","authors":"S. Narieda","doi":"10.1109/CCNC.2014.6994418","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994418","url":null,"abstract":"This paper presents a novel antenna selection technique for cyclostationarity detection based spectrum sensing for cognitive radio networks. An antenna selection criterion, which can compute by some test statistics obtained the cyclic autocorrelation function of received signals at all receive antenna elements, is developed. The presented results are compared with some conventional results, and the presented techniques can improve the sensing performances in same sensing period as the conventional techniques.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122387500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994409
Gianluca Verin
Guaranteed and reliable access to mobile communications is important for consumers but it is fundamental for mission-critical business applications and in disaster recovery scenarios. During emergencies and events that gather many people in the same place, mobile networks typically become congested or even unavailable. Technologies such as WiFi, that operate on an unlicensed frequency spectrum, are affected by congestion and are susceptible to external interference that can make the technology unusable. Licensed frequencies are not subjected to interference but current solutions based on trasportable base stations (e.g. cells-on-wheels) that are dependent on backhaul connectivity cannot adequately serve the needs of mission critical communications. Mobile operator networks lack disaster recovery and congestion control mechanisms that allow the system to work even in case of a failure of key backhaul network links. Instead a private mobile network based on the latest cellular technology can deliver IP connectivity efficiently during emergencies, events and in general for mission critical communications. This demo shows how a private LTE network can offer privileged access to voice and video services for enterprise and government using standardized cellular technology.
{"title":"Demonstration of an LTE portable network for private and emergency use - Introducing a fully distributed LTE network architecture","authors":"Gianluca Verin","doi":"10.1109/CCNC.2014.6994409","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994409","url":null,"abstract":"Guaranteed and reliable access to mobile communications is important for consumers but it is fundamental for mission-critical business applications and in disaster recovery scenarios. During emergencies and events that gather many people in the same place, mobile networks typically become congested or even unavailable. Technologies such as WiFi, that operate on an unlicensed frequency spectrum, are affected by congestion and are susceptible to external interference that can make the technology unusable. Licensed frequencies are not subjected to interference but current solutions based on trasportable base stations (e.g. cells-on-wheels) that are dependent on backhaul connectivity cannot adequately serve the needs of mission critical communications. Mobile operator networks lack disaster recovery and congestion control mechanisms that allow the system to work even in case of a failure of key backhaul network links. Instead a private mobile network based on the latest cellular technology can deliver IP connectivity efficiently during emergencies, events and in general for mission critical communications. This demo shows how a private LTE network can offer privileged access to voice and video services for enterprise and government using standardized cellular technology.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994390
Sanghong An, Hyeontaek Oh, Sangmin Park, Jinhong Yang, Jun Choi
Browser-based Web content sharing system is designed for users to share and distribute what they're watching Web contents to other users or system via Web browser. The demonstration will show the novel method to distribute partial Web contents on browsers to other screens in Web browsing environment, especially for e-learning situations.
{"title":"Browser-based web content sharing system","authors":"Sanghong An, Hyeontaek Oh, Sangmin Park, Jinhong Yang, Jun Choi","doi":"10.1109/CCNC.2014.6994390","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994390","url":null,"abstract":"Browser-based Web content sharing system is designed for users to share and distribute what they're watching Web contents to other users or system via Web browser. The demonstration will show the novel method to distribute partial Web contents on browsers to other screens in Web browsing environment, especially for e-learning situations.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-22DOI: 10.1109/CCNC.2014.6994396
Jose Aelio de Oliveira, L. Lima, Gil Eduardo de Andrade, G. Michelon
The typical low rate of unicast message delivery in DTNs (Delay Tolerant Networks) makes this kind of network unfit for many real-world applications. However, when it is sufficient to deliver a message to at least one node within a set of multiple potential destinations - which is called anycasting - then DTN's message delivery rate become acceptable. This paper presents an adaptation of the Virtual Magnetic Fields algorithm for routing anycast messages in DTNs. The algorithm performs routing through message attraction rather than the traditional approach of message forwarding.
{"title":"Anycasting in DTNs using virtual magnetic fields","authors":"Jose Aelio de Oliveira, L. Lima, Gil Eduardo de Andrade, G. Michelon","doi":"10.1109/CCNC.2014.6994396","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6994396","url":null,"abstract":"The typical low rate of unicast message delivery in DTNs (Delay Tolerant Networks) makes this kind of network unfit for many real-world applications. However, when it is sufficient to deliver a message to at least one node within a set of multiple potential destinations - which is called anycasting - then DTN's message delivery rate become acceptable. This paper presents an adaptation of the Virtual Magnetic Fields algorithm for routing anycast messages in DTNs. The algorithm performs routing through message attraction rather than the traditional approach of message forwarding.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124612933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}