Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8530963
Burak H. Çorak, F. Y. Okay, Metehan Guzel, Sahin Murt, S. Özdemir
With the proliferation of machine-to-machine communication, there are many communication protocols standardized for IoT applications. Performances of these protocols may significantly deviate from each other even under the same operating conditions. In this paper, we quantitatively compare the performances of a set of well-known IoT communication protocols, namely CoAP (Constrained Application Protocol), MQTT (Message Queuing Telemetry Transport) and XMPP (Extendible Message Persistent Protocol) in a real-world testbed. CoAP employs UDP packets for transmission while others use TCP. For this purpose, we design as small testbed that collects real-time environmental data. By designing such a system, we aim to reveal the differences among protocols in terms of packet creation time and packet transmission time. The obtained results show that XMPP is worse than other protocols in both metrics and MQTT and CoAP perform almost equally.
{"title":"Comparative Analysis of IoT Communication Protocols","authors":"Burak H. Çorak, F. Y. Okay, Metehan Guzel, Sahin Murt, S. Özdemir","doi":"10.1109/ISNCC.2018.8530963","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530963","url":null,"abstract":"With the proliferation of machine-to-machine communication, there are many communication protocols standardized for IoT applications. Performances of these protocols may significantly deviate from each other even under the same operating conditions. In this paper, we quantitatively compare the performances of a set of well-known IoT communication protocols, namely CoAP (Constrained Application Protocol), MQTT (Message Queuing Telemetry Transport) and XMPP (Extendible Message Persistent Protocol) in a real-world testbed. CoAP employs UDP packets for transmission while others use TCP. For this purpose, we design as small testbed that collects real-time environmental data. By designing such a system, we aim to reveal the differences among protocols in terms of packet creation time and packet transmission time. The obtained results show that XMPP is worse than other protocols in both metrics and MQTT and CoAP perform almost equally.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8531028
Cristian Cuerda-Gonzalez, J. A. Gallud, D. Alghazzawi
This article describes the user-centered design of a service-oriented application to help people with memory limitations called Forgettify. Forgettify is an Android app that consumes REST services, which are managed by means of a Web client. The app provides a set of video guides that are used by people with memory limitations. The Web client is the tool used by professionals and family to customize the Android app. This application has been designed and developed using a User-Centered Design process inspired in the Usability Engineering Lifecycle. The article includes a preliminary user evaluation that shows the benefits of the proposal.
{"title":"User-Centered Design of a Service-Oriented Application to Help People with Memory Limitations","authors":"Cristian Cuerda-Gonzalez, J. A. Gallud, D. Alghazzawi","doi":"10.1109/ISNCC.2018.8531028","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531028","url":null,"abstract":"This article describes the user-centered design of a service-oriented application to help people with memory limitations called Forgettify. Forgettify is an Android app that consumes REST services, which are managed by means of a Web client. The app provides a set of video guides that are used by people with memory limitations. The Web client is the tool used by professionals and family to customize the Android app. This application has been designed and developed using a User-Centered Design process inspired in the Usability Engineering Lifecycle. The article includes a preliminary user evaluation that shows the benefits of the proposal.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131178671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8530999
Mostafa M. Abdelhakam, M. M. Elmesalawy
In this paper, we consider the joint transmission coordinated multi-point (CoMP) technique in a downlink heterogeneous cloud radio access network (C-RAN). The joint beamforming design and baseband unit (BBU) computational resources allocation problem in Heterogenous C-RAN is investigated. This problem is formulated as an optimization problem to minimize the overall system power consumption under per-user quality-of-service (QoS), fronthaul capacity, per-antenna transmit power and per-remote radio head (RRH) total transmit power constraints. The considered problem is a non-convex optimization problem due to the presence of the binary indicator in the fronthaul constraints. To address this challenge, we use the re-weighted $boldsymbol{ell}_{1}$-norm technique and reformulate the problem into a tractable form. Then, we transform the problem to a weighted sum mean square error (MSE) minimization problem and propose a weighted minimum mean square error (WMMSE) algorithm to solve it. Simulation results are provided to verify the effectiveness of the proposed algorithm.
{"title":"Joint Beamforming Design and BBU Computational Resources Allocation in Heterogeneous C-RAN with QoS Guarantee","authors":"Mostafa M. Abdelhakam, M. M. Elmesalawy","doi":"10.1109/ISNCC.2018.8530999","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530999","url":null,"abstract":"In this paper, we consider the joint transmission coordinated multi-point (CoMP) technique in a downlink heterogeneous cloud radio access network (C-RAN). The joint beamforming design and baseband unit (BBU) computational resources allocation problem in Heterogenous C-RAN is investigated. This problem is formulated as an optimization problem to minimize the overall system power consumption under per-user quality-of-service (QoS), fronthaul capacity, per-antenna transmit power and per-remote radio head (RRH) total transmit power constraints. The considered problem is a non-convex optimization problem due to the presence of the binary indicator in the fronthaul constraints. To address this challenge, we use the re-weighted $boldsymbol{ell}_{1}$-norm technique and reformulate the problem into a tractable form. Then, we transform the problem to a weighted sum mean square error (MSE) minimization problem and propose a weighted minimum mean square error (WMMSE) algorithm to solve it. Simulation results are provided to verify the effectiveness of the proposed algorithm.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129716800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8530985
Salman Behboudi Amlashi, A. Araghi, G. Dadashzadeh
In the present paper, a photoconductive antenna is designed to work as both pulse-terahertz emitter and receiver. The proposed two-port antenna benefits from polarization diversity with high sensitivity of polarization detection. The antenna electrodes consist of three arms and two gaps that can be excited by laser illumination. An 800 nm wavelength laser beam with output power of 80 mW, 100 MHz repetition rate, and 100 fs laser pulse duration is considered as optical excitation. Each port stimulates a pulse that its polarization is orthogonal to that of the other one according to their arrangement. Along with GaAs as photoconductive substrate beneath the antenna electrodes, an anti-reflection coating of Taconic RF-35 is used for depreciating unwanted terahertz echoes. The simulated results clarify that the proposed antenna shows polarization diversity and also, proper broadband behavior.
{"title":"Design of a Photoconductive Antenna for Pulsed-Terahertz Spectroscopy with Polarization Diversity","authors":"Salman Behboudi Amlashi, A. Araghi, G. Dadashzadeh","doi":"10.1109/ISNCC.2018.8530985","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530985","url":null,"abstract":"In the present paper, a photoconductive antenna is designed to work as both pulse-terahertz emitter and receiver. The proposed two-port antenna benefits from polarization diversity with high sensitivity of polarization detection. The antenna electrodes consist of three arms and two gaps that can be excited by laser illumination. An 800 nm wavelength laser beam with output power of 80 mW, 100 MHz repetition rate, and 100 fs laser pulse duration is considered as optical excitation. Each port stimulates a pulse that its polarization is orthogonal to that of the other one according to their arrangement. Along with GaAs as photoconductive substrate beneath the antenna electrodes, an anti-reflection coating of Taconic RF-35 is used for depreciating unwanted terahertz echoes. The simulated results clarify that the proposed antenna shows polarization diversity and also, proper broadband behavior.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8531048
A. Salam, C. Roseti, F. Zampognaro
Contention Resolution Diversity Slotted ALOHA (CRDSA) random access scheme, introduced in the DVB-RCS2/NG standard, is specifically designed to support the transfer of a variety of traffic profiles that Machine to Machine (M2M) and Internet of Things (IoT) applications may generate. Protocols for M2M and IoT has recently receiver substantial upgrades, but still mainly designed with an underlying terrestrial network in mind. If clusters of sensor nodes exchange data via satellite terminals toward a sink via short-lived TCP/IP connections, many shortcomings may incur. This work aims at investigating in details the behavior for such data transfer in presence of a shared random access channel, and the advantages when using a new TCP version specifically designed for satellite links, namely TCP Wave. In particular, through a detailed simulation campaign based on the NS3 simulator, this work assesses the completion time of data delivery for M2M elastic traffic via CRDSA satellite random access, when standard TCP (NewReno) or dedicated satellite TCP (Wave) is adopted.
{"title":"TCP performance for Satellite M2M applications over Random Access links","authors":"A. Salam, C. Roseti, F. Zampognaro","doi":"10.1109/ISNCC.2018.8531048","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531048","url":null,"abstract":"Contention Resolution Diversity Slotted ALOHA (CRDSA) random access scheme, introduced in the DVB-RCS2/NG standard, is specifically designed to support the transfer of a variety of traffic profiles that Machine to Machine (M2M) and Internet of Things (IoT) applications may generate. Protocols for M2M and IoT has recently receiver substantial upgrades, but still mainly designed with an underlying terrestrial network in mind. If clusters of sensor nodes exchange data via satellite terminals toward a sink via short-lived TCP/IP connections, many shortcomings may incur. This work aims at investigating in details the behavior for such data transfer in presence of a shared random access channel, and the advantages when using a new TCP version specifically designed for satellite links, namely TCP Wave. In particular, through a detailed simulation campaign based on the NS3 simulator, this work assesses the completion time of data delivery for M2M elastic traffic via CRDSA satellite random access, when standard TCP (NewReno) or dedicated satellite TCP (Wave) is adopted.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"147 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8531000
Ran Bi, Mingchuan Yang, G. Wang
There is an increasing interest to combine satellite and terrestrial components to form a single telecom network, this is called integrated satellite and terrestrial mobile system. In such systems, the ground component is controlled by the satellite resource and network management system. Further, the ground component uses the same portions of MSS (Mobile Satellite Service) frequency bands. However, frequency reuse between satellite and terrestrial components will inevitably generate co-channel interferences between satellite and terrestrial networks. It is one of the important factors that not only affect the user experience, but may even affect the normal operation of the network. This paper presents a model of an integrated mobile network consists of a multi-beam satellite, terrestrial base stations and dual satellite/terrestrial terminals. The types of interferences in the integrated system were analyzed, and some serious scenarios of interferences were simulated. The influence of several parameters such as the number of terrestrial station, the azimuth angle of the terrestrial station relative to the satellite beam center and the maximum transmitting power of the terrestrial station is then presented. The results have shown that the interferences due to terrestrial base station on satellite uplink are nonnegligible and can have a serious impact on the overall system performance.
{"title":"Interference and Link Budget Analysis in Integrated Satellite and Terrestrial Mobile System","authors":"Ran Bi, Mingchuan Yang, G. Wang","doi":"10.1109/ISNCC.2018.8531000","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531000","url":null,"abstract":"There is an increasing interest to combine satellite and terrestrial components to form a single telecom network, this is called integrated satellite and terrestrial mobile system. In such systems, the ground component is controlled by the satellite resource and network management system. Further, the ground component uses the same portions of MSS (Mobile Satellite Service) frequency bands. However, frequency reuse between satellite and terrestrial components will inevitably generate co-channel interferences between satellite and terrestrial networks. It is one of the important factors that not only affect the user experience, but may even affect the normal operation of the network. This paper presents a model of an integrated mobile network consists of a multi-beam satellite, terrestrial base stations and dual satellite/terrestrial terminals. The types of interferences in the integrated system were analyzed, and some serious scenarios of interferences were simulated. The influence of several parameters such as the number of terrestrial station, the azimuth angle of the terrestrial station relative to the satellite beam center and the maximum transmitting power of the terrestrial station is then presented. The results have shown that the interferences due to terrestrial base station on satellite uplink are nonnegligible and can have a serious impact on the overall system performance.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8530908
Yanping Xiao, Yue Xiao, Feng Yu, You Li, Yong Wang, Bin Fu
Hybrid analog-digital precoding is a class of efficient techniques for improving the performance of massive multiple-input multiple-output (MIMO) systems with reduced number of radio frequency (RF) chains. Meanwhile, for combating the frequency selective fading, orthogonal frequency-division multiplexing (OFDM) should be also combined in current wireless standards such as 5G. Therefore, for massive MIMO-OFDM, it is difficult to decide the best precoding matrix in the context of frequency selective fading. In this paper, for alleviating this problem, a novel hybrid analog-digital precoding algorithm is proposed for multi-user large-scale MIMO-OFDM systems when the frequency selective fading channel is considered. We show that the proposed algorithm offers a flexible precoding design as well as reducing the requirement of the number of RF chains. Finally, the performance results demonstrate that the proposed algorithm is capable of approaching the performance of optimal full-digital precoding with a low implemention complexity.
{"title":"Hybrid Beamforming for Large-scale MIMO-OFDM in Frequency Selective Fading","authors":"Yanping Xiao, Yue Xiao, Feng Yu, You Li, Yong Wang, Bin Fu","doi":"10.1109/ISNCC.2018.8530908","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530908","url":null,"abstract":"Hybrid analog-digital precoding is a class of efficient techniques for improving the performance of massive multiple-input multiple-output (MIMO) systems with reduced number of radio frequency (RF) chains. Meanwhile, for combating the frequency selective fading, orthogonal frequency-division multiplexing (OFDM) should be also combined in current wireless standards such as 5G. Therefore, for massive MIMO-OFDM, it is difficult to decide the best precoding matrix in the context of frequency selective fading. In this paper, for alleviating this problem, a novel hybrid analog-digital precoding algorithm is proposed for multi-user large-scale MIMO-OFDM systems when the frequency selective fading channel is considered. We show that the proposed algorithm offers a flexible precoding design as well as reducing the requirement of the number of RF chains. Finally, the performance results demonstrate that the proposed algorithm is capable of approaching the performance of optimal full-digital precoding with a low implemention complexity.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8531059
M. S. Azzaz, N. Aissaoui, C. Tanougast
In this paper, a new design approach based on chaotic encryption technique and System on Programmable Chip SoPC to protect fingerprint templates against some attacks is presented. This approach is based on the co-design methodology hardware/software (HW/SW) performed by using Xilinx FPGA platform. The proposed stream cipher algorithm is based on chaotic sequences of the Lorenz system. Simulation and experimental results clearly demonstrate that the proposed approach for protecting biometric authentication system provide a good trade-off between security and performance requirements in terms of efficiency and cost. This system could therefore be integrated into a real time secure access control system.
{"title":"A Novel Fingerprint Protection Approach based on SoPC Chaotic Encryption","authors":"M. S. Azzaz, N. Aissaoui, C. Tanougast","doi":"10.1109/ISNCC.2018.8531059","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531059","url":null,"abstract":"In this paper, a new design approach based on chaotic encryption technique and System on Programmable Chip SoPC to protect fingerprint templates against some attacks is presented. This approach is based on the co-design methodology hardware/software (HW/SW) performed by using Xilinx FPGA platform. The proposed stream cipher algorithm is based on chaotic sequences of the Lorenz system. Simulation and experimental results clearly demonstrate that the proposed approach for protecting biometric authentication system provide a good trade-off between security and performance requirements in terms of efficiency and cost. This system could therefore be integrated into a real time secure access control system.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117274194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8530888
A. G. Leal, Igor C. Teixeira
With the transition from IPv4 IPv6 protocol to improve network communications, there are concerns about devices and applications' security that must be dealt at the beginning of implementation or during its lifecycle. Automate the vulnerability assessment process reduces management overhead, enabling better management of risks and control of the vulnerabilities. Consequently, it reduces the effort needed for each test and it allows the increase of the frequency of application, improving time management to perform all the other complicated tasks necessary to support a secure network. There are several researchers involved in tests of vulnerability in IPv6 networks, exploiting addressing mechanisms, extension headers, fragmentation, tunnelling or dual-stack networks (using both IPv4 and IPv6 at the same time). Most existing tools use the programming languages C, Java, and Python instead of a language designed specifically to create a suite of tests, which reduces maintainability and extensibility of the tests. This paper presents a solution for IPv6 vulnerabilities scan tests, based on attack simulations, combining passive analysis (observing the manifestation of behaviours of the system under test) and an active one (stimulating the system to become symptomatic). Also, it describes a prototype that simulates and detects denial-of-service attacks on the ICMPv6 Protocol from IPv6. Also, a detailed report is created with the identified vulnerability and the possible existing solutions to mitigate such a gap, thus assisting the process of vulnerability management.
{"title":"Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 language","authors":"A. G. Leal, Igor C. Teixeira","doi":"10.1109/ISNCC.2018.8530888","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530888","url":null,"abstract":"With the transition from IPv4 IPv6 protocol to improve network communications, there are concerns about devices and applications' security that must be dealt at the beginning of implementation or during its lifecycle. Automate the vulnerability assessment process reduces management overhead, enabling better management of risks and control of the vulnerabilities. Consequently, it reduces the effort needed for each test and it allows the increase of the frequency of application, improving time management to perform all the other complicated tasks necessary to support a secure network. There are several researchers involved in tests of vulnerability in IPv6 networks, exploiting addressing mechanisms, extension headers, fragmentation, tunnelling or dual-stack networks (using both IPv4 and IPv6 at the same time). Most existing tools use the programming languages C, Java, and Python instead of a language designed specifically to create a suite of tests, which reduces maintainability and extensibility of the tests. This paper presents a solution for IPv6 vulnerabilities scan tests, based on attack simulations, combining passive analysis (observing the manifestation of behaviours of the system under test) and an active one (stimulating the system to become symptomatic). Also, it describes a prototype that simulates and detects denial-of-service attacks on the ICMPv6 Protocol from IPv6. Also, a detailed report is created with the identified vulnerability and the possible existing solutions to mitigate such a gap, thus assisting the process of vulnerability management.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114618925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-01DOI: 10.1109/ISNCC.2018.8531019
Jihene Rezgui, Wiem Benrhaiem
The increasing electricity demand and the additional renewable power resources have created a transition from centralized supply side management to decentralized supply and demand side management. Unfortunately, power availability is expected to be unbalanced from one area to another mainly during peak times. Actual smart grid capabilities cannot easily redistribute the power outside of a fixed area. On the one hand, cloud computing services provide a dynamic allocation of power. On the other hand, two-way communication technology is becoming an essential part of the smart grid landscape, tying between all components, from power generation, to energy transmission. In this paper, we introduce a new initiative to bring together the following two areas: two-way communication and hierarchical cloud concepts. The proposed supply management and power distribution system called H2C-PDSM guarantees a balanced power allocation process and reduces query latency time in the grid.
{"title":"Hierarchical Cloud Communication for Supply Management and Power Distribution via Wireless Mesh Network into the Smart Grid","authors":"Jihene Rezgui, Wiem Benrhaiem","doi":"10.1109/ISNCC.2018.8531019","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531019","url":null,"abstract":"The increasing electricity demand and the additional renewable power resources have created a transition from centralized supply side management to decentralized supply and demand side management. Unfortunately, power availability is expected to be unbalanced from one area to another mainly during peak times. Actual smart grid capabilities cannot easily redistribute the power outside of a fixed area. On the one hand, cloud computing services provide a dynamic allocation of power. On the other hand, two-way communication technology is becoming an essential part of the smart grid landscape, tying between all components, from power generation, to energy transmission. In this paper, we introduce a new initiative to bring together the following two areas: two-way communication and hierarchical cloud concepts. The proposed supply management and power distribution system called H2C-PDSM guarantees a balanced power allocation process and reduces query latency time in the grid.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127446213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}