首页 > 最新文献

2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)最新文献

英文 中文
Real time traffic density aware road based forwarding method for vehicular ad hoc networks 基于实时交通密度感知道路的车辆自组织网络转发方法
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248850
K. Qureshi, F. Bashir, A. Abdullah
Real time data dissemination is one of the significant requirement and also a challenge during data forwarding in Vehicular Ad hoc Networks (VANETs). High vehicular mobility causes various constraints in the shape of high scale of disconnections, packet dropping, delay in inter vehicle communication. Extensive investigation has been conducted to design reliable and efficient routing protocol for real time data dissemination in the network. However, still the existing routing protocols have suffered to handle high mobility, dynamic traffic patterns, traffic density estimation and other physical parameters in the network. This paper presents a Real time Forwarding Method (R-FM) for next hop selection by distance, direction, link quality and real time traffic density information. The proposed data forwarding method minimizes the generated communication overhead during data dissemination and ensures in time data delivery in the network. The experimental results show that proposed method improves the data forwarding as well as keeps high data delivery.
实时数据传播是车载自组网数据转发的重要要求之一,也是一项挑战。车辆的高移动性导致了各种各样的限制,如大规模的断开、丢包、车辆间通信的延迟等。为了在网络中实现数据的实时传播,人们对设计可靠、高效的路由协议进行了广泛的研究。然而,现有的路由协议在处理网络中的高移动性、动态流量模式、流量密度估计和其他物理参数方面仍然存在不足。提出了一种基于距离、方向、链路质量和实时流量密度信息选择下一跳的实时转发方法(R-FM)。所提出的数据转发方法最大限度地减少了数据传播过程中产生的通信开销,保证了数据在网络中的及时传递。实验结果表明,该方法在提高数据转发性能的同时,保持了较高的数据传输率。
{"title":"Real time traffic density aware road based forwarding method for vehicular ad hoc networks","authors":"K. Qureshi, F. Bashir, A. Abdullah","doi":"10.1109/WMNC.2017.8248850","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248850","url":null,"abstract":"Real time data dissemination is one of the significant requirement and also a challenge during data forwarding in Vehicular Ad hoc Networks (VANETs). High vehicular mobility causes various constraints in the shape of high scale of disconnections, packet dropping, delay in inter vehicle communication. Extensive investigation has been conducted to design reliable and efficient routing protocol for real time data dissemination in the network. However, still the existing routing protocols have suffered to handle high mobility, dynamic traffic patterns, traffic density estimation and other physical parameters in the network. This paper presents a Real time Forwarding Method (R-FM) for next hop selection by distance, direction, link quality and real time traffic density information. The proposed data forwarding method minimizes the generated communication overhead during data dissemination and ensures in time data delivery in the network. The experimental results show that proposed method improves the data forwarding as well as keeps high data delivery.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114711957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyzing the quality of service of heterogeneous radio networks using IP layer statistics 利用IP层统计分析异构无线网络的服务质量
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248844
Tobias Knappe, T. Michael, M. Dippold, Manfred Paul
This paper investigates how various radio channel interferences influence IP packet jitter and thus QoS in heterogeneous networks consisting of a serially connected LTE and WiFi segment. A lab environment was set up allowing to vary LTE channel models, received power and WiFi interference conditions independently. IP/UDP packets with fixed interpacket time were sent over an emulated network to a client, where IP packet jitter was analyzed allowing for an estimation of QoS. Investigation of the individual channels in comparison to a combination of both channels show that time distributions of received IP packets are quite typical for each network and interference case. Thus different issues in the network segments can be identified based on their typical behavior for a wide range of variations allowing to allocate QoS issues to the related segment with high probability.
本文研究了各种无线电信道干扰如何影响由串行连接的LTE和WiFi段组成的异构网络中的IP数据包抖动,从而影响QoS。建立了一个实验室环境,允许不同的LTE信道模型,独立接收功率和WiFi干扰条件。具有固定包间时间的IP/UDP数据包通过模拟网络发送到客户端,在客户端分析IP数据包抖动,以便对QoS进行估计。与两个信道的组合相比,对单个信道的调查表明,接收到的IP数据包的时间分布对于每个网络和干扰情况都是非常典型的。因此,可以根据网段的典型行为识别网段中的不同问题,从而允许以高概率将QoS问题分配给相关网段。
{"title":"Analyzing the quality of service of heterogeneous radio networks using IP layer statistics","authors":"Tobias Knappe, T. Michael, M. Dippold, Manfred Paul","doi":"10.1109/WMNC.2017.8248844","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248844","url":null,"abstract":"This paper investigates how various radio channel interferences influence IP packet jitter and thus QoS in heterogeneous networks consisting of a serially connected LTE and WiFi segment. A lab environment was set up allowing to vary LTE channel models, received power and WiFi interference conditions independently. IP/UDP packets with fixed interpacket time were sent over an emulated network to a client, where IP packet jitter was analyzed allowing for an estimation of QoS. Investigation of the individual channels in comparison to a combination of both channels show that time distributions of received IP packets are quite typical for each network and interference case. Thus different issues in the network segments can be identified based on their typical behavior for a wide range of variations allowing to allocate QoS issues to the related segment with high probability.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125682606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing single sign-on impersonation attacks with a keyless signature scheme 使用无密钥签名方案防止单点登录模拟攻击
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248852
Amerah A. Alabrah, M. Bassiouni
The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.
目前许多Internet服务(如b谷歌)的多服务器环境以及单点登录(SSO)解决方案的可用性带来了有前途的技术。许多这样的应用程序和类似的应用程序为客户机提供了使用一组用户名和密码登录的功能,从而减轻了使用多个身份和多个密码的需要。尽管很有前途,但SSO机制需要非常健壮,并为用户提供最大程度的身份验证。由于单点登录中服务提供者和客户端之间的身份验证通道是单向的,并且缺乏最新的身份验证密钥,研究人员指出了这种方案存在的漏洞,导致了冒充攻击等攻击。在本文中,我们提出了一种解决上述问题的无密钥签名方案。通过使用Merkle散列树和散列日历的组合,SSO中的身份提供者可以定期创建客户端和服务提供者使用的身份验证密钥。后两者之间的通信由单向散列链保护,以实现双向身份验证。通过仿真实验对该方案进行了评价,并采用通信和计算代价进行了评价。分析验证了服务提供者和客户端之间的单向散列链的最佳长度。
{"title":"Preventing single sign-on impersonation attacks with a keyless signature scheme","authors":"Amerah A. Alabrah, M. Bassiouni","doi":"10.1109/WMNC.2017.8248852","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248852","url":null,"abstract":"The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127596484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient target detection through waveform selection for multi-sensor RF sensing based Internet of Things 基于多传感器射频传感的物联网中基于波形选择的高能效目标检测
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248856
Siva Karteek Bolisetti, M. Sharma, M. Patwary, A. Soliman, E. Benkhelifa, M. Maguid
In this paper, we explore multi-sensor Radio Frequency (RF) sensing based Internet of Things (IoT) for surveillance applications. RF sensing techniques are the next generation technologies which offer distinct advantages over traditional means of sensing. Traditionally, Energy detection (ED) has been used for surveillance applications due to its low computational complexity. However, ED is unreliable due to high false detection rates. There is a need to develop surveillance strategies which offer reliable target detection rates. In this paper, we have proposed a multi-sensor RF sensing based target detection architecture for IoT. To perform surveillance within IoT, multiple sensor nodes are required to co-exist while performing the desired tasks. Interfering waveforms from the neighbouring sensor nodes have a significant impact on the target detection reliability of IoT. In this paper, a waveform selection criterion has been proposed to optimise the target detection reliability and power consumption within IoT in the presence of interfering waveforms.
在本文中,我们探索了基于多传感器射频(RF)传感的物联网(IoT)监控应用。射频传感技术是下一代技术,它比传统的传感手段具有明显的优势。传统上,能量检测(ED)由于其较低的计算复杂度而被用于监视应用。然而,由于高误检率,ED是不可靠的。有必要制定监测战略,提供可靠的目标检出率。在本文中,我们提出了一种基于多传感器射频传感的物联网目标检测架构。为了在物联网中执行监控,在执行所需任务时需要多个传感器节点共存。来自相邻传感器节点的干扰波形对物联网目标检测的可靠性有重要影响。在本文中,提出了一种波形选择准则,以优化物联网中存在干扰波形的目标检测可靠性和功耗。
{"title":"Energy efficient target detection through waveform selection for multi-sensor RF sensing based Internet of Things","authors":"Siva Karteek Bolisetti, M. Sharma, M. Patwary, A. Soliman, E. Benkhelifa, M. Maguid","doi":"10.1109/WMNC.2017.8248856","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248856","url":null,"abstract":"In this paper, we explore multi-sensor Radio Frequency (RF) sensing based Internet of Things (IoT) for surveillance applications. RF sensing techniques are the next generation technologies which offer distinct advantages over traditional means of sensing. Traditionally, Energy detection (ED) has been used for surveillance applications due to its low computational complexity. However, ED is unreliable due to high false detection rates. There is a need to develop surveillance strategies which offer reliable target detection rates. In this paper, we have proposed a multi-sensor RF sensing based target detection architecture for IoT. To perform surveillance within IoT, multiple sensor nodes are required to co-exist while performing the desired tasks. Interfering waveforms from the neighbouring sensor nodes have a significant impact on the target detection reliability of IoT. In this paper, a waveform selection criterion has been proposed to optimise the target detection reliability and power consumption within IoT in the presence of interfering waveforms.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128941381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low cost wireless sensor network for rodents detection 用于啮齿动物检测的低成本无线传感器网络
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248855
Carlos Cambra Baseca, S. Sendra, Laura García, Jaime Lloret
Wireless Sensor Networks (WSNs), Internet of things (IoT) and cloud data are nowadays being greatly used in our society. This challenge requires a new and smart wireless network topology for communicating devices. Problems like scalability and manageability are important issues when there are large amounts of devices. This paper presents the design of a smart IoT communication system for detecting rodents. The system is based on low energy consumption and low cost RF communication microcontrollers which costs around 1–2 $. A large number of devices connected in real time are deployed to monitor rodent pests mainly in food industries and agricultural activities. The movements of rodents and the trapping estimation for periodical dates (weekly, monthly or yearly) on each company or selected area can be remotely monitored by accessing to the multimedia platform through mobile phone or via computer. Finally, we have measured the bandwidth consumed for different configurations as well as the detection of rodents using a Passive Infrared (PIR) sensor. Our goal is the expansion of micro RF transceivers with a cost less than 5 $ on industries and ultra-low power wireless communications.
无线传感器网络(WSNs)、物联网(IoT)和云数据如今在我们的社会中得到了广泛的应用。这一挑战需要一种用于通信设备的新型智能无线网络拓扑结构。当存在大量设备时,可伸缩性和可管理性等问题是很重要的问题。本文介绍了一种用于检测啮齿动物的智能物联网通信系统的设计。该系统基于低能耗和低成本的射频通信微控制器,成本约为1-2美元。大量实时连接的设备主要用于监测食品工业和农业活动中的啮齿动物害虫。可通过移动电话或计算机访问多媒体平台,远程监测各公司或选定地区的鼠类活动和定期日期(每周、每月或每年)的捕鼠情况。最后,我们测量了不同配置所消耗的带宽,以及使用被动红外(PIR)传感器检测啮齿动物。我们的目标是在工业和超低功耗无线通信中扩展成本低于5美元的微型射频收发器。
{"title":"Low cost wireless sensor network for rodents detection","authors":"Carlos Cambra Baseca, S. Sendra, Laura García, Jaime Lloret","doi":"10.1109/WMNC.2017.8248855","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248855","url":null,"abstract":"Wireless Sensor Networks (WSNs), Internet of things (IoT) and cloud data are nowadays being greatly used in our society. This challenge requires a new and smart wireless network topology for communicating devices. Problems like scalability and manageability are important issues when there are large amounts of devices. This paper presents the design of a smart IoT communication system for detecting rodents. The system is based on low energy consumption and low cost RF communication microcontrollers which costs around 1–2 $. A large number of devices connected in real time are deployed to monitor rodent pests mainly in food industries and agricultural activities. The movements of rodents and the trapping estimation for periodical dates (weekly, monthly or yearly) on each company or selected area can be remotely monitored by accessing to the multimedia platform through mobile phone or via computer. Finally, we have measured the bandwidth consumed for different configurations as well as the detection of rodents using a Passive Infrared (PIR) sensor. Our goal is the expansion of micro RF transceivers with a cost less than 5 $ on industries and ultra-low power wireless communications.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129355712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Lightweight algorithm for protecting SDN controller against DDoS attacks 轻量级算法,保护SDN控制器免受DDoS攻击
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248858
Christos Gkountis, Miran Taha, Jaime Lloret, G. Kambourakis
It is without a doubt that both the controller and switch of an SDN are vulnerable to Distributed Denial of Service (DDoS) attacks. Typically, this ilk of attacks targets the flow table of the deployed network switches with the aim of producing overloading, high network delays, and consume bandwidth. Motivated by this fact, in this paper, we propose a lightweight scheme which is based on a set of rules to efficiently characterize packets send to a network switch as malicious or not. Through testbed experimentation and comparison with legacy DDoS protection schemes, we demonstrate that our solution performs significantly better when it comes to SDN ecosystem of mobile users.
毫无疑问,SDN的控制器和交换机都容易受到DDoS (Distributed Denial of Service)攻击。通常,这类攻击的目标是已部署网络交换机的流表,目的是产生过载、高网络延迟和消耗带宽。基于这一事实,本文提出了一种基于一组规则的轻量级方案,以有效地表征发送到网络交换机的数据包是否为恶意数据包。通过试验台实验和与传统DDoS保护方案的比较,我们证明了我们的解决方案在移动用户的SDN生态系统中表现得更好。
{"title":"Lightweight algorithm for protecting SDN controller against DDoS attacks","authors":"Christos Gkountis, Miran Taha, Jaime Lloret, G. Kambourakis","doi":"10.1109/WMNC.2017.8248858","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248858","url":null,"abstract":"It is without a doubt that both the controller and switch of an SDN are vulnerable to Distributed Denial of Service (DDoS) attacks. Typically, this ilk of attacks targets the flow table of the deployed network switches with the aim of producing overloading, high network delays, and consume bandwidth. Motivated by this fact, in this paper, we propose a lightweight scheme which is based on a set of rules to efficiently characterize packets send to a network switch as malicious or not. Through testbed experimentation and comparison with legacy DDoS protection schemes, we demonstrate that our solution performs significantly better when it comes to SDN ecosystem of mobile users.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Hybrid power control for multi-carrier systems 多载波系统的混合动力控制
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248848
Osama Elgarhy, L. Reggiani, Riccardo Ferrari
Uplink conventional power control techniques in systems with frequency reuse one have some limitations, typically regarding the tradeoff between the average throughput of users at cell center and cell edge. Moreover, one of the main drawbacks is the excess use of power. From our point of view, one of the reasons for this waste of power is the practice of giving all the users in the cell the same target SINR in the power control process. Since there exists a rate limit for users in the cell, depending on their positions, a Hybrid Power Control (HPC) technique is introduced here in order to overcome these limitations and provide a more flexible solution. The HPC uses power control with at least two different types of setup and the rate limit of the cell users is respected. Moreover, this HPC method shows a significant reduction in the average cell transmission power, satisfactory cell edge users performance and an improvement in the overall cell rate, around 25%. Moreover, the average transmitted power is reduced by more than 20 dB.
在频率复用系统中,传统的功率控制技术存在一定的局限性,特别是考虑到在小区中心和小区边缘用户的平均吞吐量之间的权衡。此外,一个主要的缺点是过度使用电力。从我们的观点来看,这种功率浪费的原因之一是在功率控制过程中为单元中的所有用户提供相同目标SINR的做法。由于蜂窝中用户的位置存在速率限制,因此本文介绍了混合功率控制(HPC)技术,以克服这些限制并提供更灵活的解决方案。HPC使用至少两种不同类型设置的功率控制,并且尊重小区用户的速率限制。此外,该HPC方法显示平均小区传输功率显著降低,小区边缘用户性能令人满意,总体小区速率提高约25%。平均发射功率降低了20 dB以上。
{"title":"Hybrid power control for multi-carrier systems","authors":"Osama Elgarhy, L. Reggiani, Riccardo Ferrari","doi":"10.1109/WMNC.2017.8248848","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248848","url":null,"abstract":"Uplink conventional power control techniques in systems with frequency reuse one have some limitations, typically regarding the tradeoff between the average throughput of users at cell center and cell edge. Moreover, one of the main drawbacks is the excess use of power. From our point of view, one of the reasons for this waste of power is the practice of giving all the users in the cell the same target SINR in the power control process. Since there exists a rate limit for users in the cell, depending on their positions, a Hybrid Power Control (HPC) technique is introduced here in order to overcome these limitations and provide a more flexible solution. The HPC uses power control with at least two different types of setup and the rate limit of the cell users is respected. Moreover, this HPC method shows a significant reduction in the average cell transmission power, satisfactory cell edge users performance and an improvement in the overall cell rate, around 25%. Moreover, the average transmitted power is reduced by more than 20 dB.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116594899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reputation-aware energy-efficient solution for FANET monitoring FANET监控的信誉感知节能解决方案
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248851
Kerrache Chaker Abdelaziz, E. Barka, N. Lagraa, Abderrahmane Lakas
Ensuring the desired security is an important issue in all communicating systems and it becomes more challenging in open medium networks. Furthermore, the majority of the wireless and mobile networks including Flying Adhoc NETworks (FANETs) are built over energy-restricted devices. Hence, communication interface and computation complexity are additional factors to consider when designing secure protocols. as an alternative solution to cryptography, trust and reputation management solutions are able to sustain high security levels with less energy consumption. In this paper, we propose a new reputation-aware energy-efficient FANET monitoring technique, in which we first establish trust among different peers and then thanks to the trust and links duration combination, we distribute the network monitoring period between those trusting each other moving with similar mobility patterns. Simulations conducted using NS2 simulator show the efficiency of our proposal at both ensuring high detection rations (> 80%) and reducing by more than two times the average consumed energy.
确保期望的安全性是所有通信系统中的一个重要问题,在开放介质网络中变得更具挑战性。此外,大多数无线和移动网络,包括飞行自组织网络(fanet),都是建立在能量限制设备上的。因此,通信接口和计算复杂度是设计安全协议时需要考虑的额外因素。作为加密的替代解决方案,信任和声誉管理解决方案能够以更少的能耗维持高安全级别。本文提出了一种新的基于信誉感知的节能FANET监控技术,该技术首先在不同的对等体之间建立信任,然后通过信任和链路持续时间的组合,将网络监控周期分配给具有相似移动模式的相互信任的对等体。使用NS2模拟器进行的仿真表明,我们的建议在确保高检测比率(> 80%)和减少平均消耗能量的两倍以上的效率。
{"title":"Reputation-aware energy-efficient solution for FANET monitoring","authors":"Kerrache Chaker Abdelaziz, E. Barka, N. Lagraa, Abderrahmane Lakas","doi":"10.1109/WMNC.2017.8248851","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248851","url":null,"abstract":"Ensuring the desired security is an important issue in all communicating systems and it becomes more challenging in open medium networks. Furthermore, the majority of the wireless and mobile networks including Flying Adhoc NETworks (FANETs) are built over energy-restricted devices. Hence, communication interface and computation complexity are additional factors to consider when designing secure protocols. as an alternative solution to cryptography, trust and reputation management solutions are able to sustain high security levels with less energy consumption. In this paper, we propose a new reputation-aware energy-efficient FANET monitoring technique, in which we first establish trust among different peers and then thanks to the trust and links duration combination, we distribute the network monitoring period between those trusting each other moving with similar mobility patterns. Simulations conducted using NS2 simulator show the efficiency of our proposal at both ensuring high detection rations (> 80%) and reducing by more than two times the average consumed energy.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114976002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
MultiPath TCP to support user's mobility in future LTE network 支持未来LTE网络中用户移动性的多路径TCP
Pub Date : 2017-09-01 DOI: 10.1109/WMNC.2017.8248845
M. Karimzadeh, Luca Valtulina, H. V. D. Berg, A. Pras, P. Ortiz, R. Sadre
Mobile networks have achieved a high-level of acceptance, mainly due to the ubiquitously deployment and ever growing connectivity through various wireless access technologies for new services, being available to mobile users. The core architecture of existing mobile networks does not scale well to accommodate future traffic demands owing to its highly centralized and hierarchical composition. Decentralization of the network architecture, is believed to be a sustainable trend against to the constantly growing of mobile data traffic. Given that LTE will handle substantial part of the worldwide mobile data traffic in the coming 5–10 years, in this paper we discuss an approach for realizing a decentralized LTE architecture. Next, we present a novel scheme to support user's mobility in this architecture. The proposed solution can handle seamless data traffic steering and session continuity for the users moving among the distributed anchor points, in a resource-efficient manner and with a minimal impact on the existing network implementation. Our approach is based on the MPTCP (Multipath TCP) which is also one of the most important candidate protocols to enhance end-to-end communication reliability, resiliency and bandwidth efficiency in the future mobile networks (5G). We used the NS3-LENA simulation software to implement a decentralized LTE network as well as the proposed mobility management scheme. The evaluation results show that the proposed solution efficiently fulfill the functionality and performance requirements related to mobility management.
移动网络已经获得了高度的接受,这主要是由于无处不在的部署和不断增长的连接,通过各种无线接入技术为移动用户提供新的服务。现有移动网络的核心架构由于其高度集中和分层的构成,不能很好地适应未来的流量需求。随着移动数据流量的不断增长,网络架构的分散化被认为是一个可持续发展的趋势。鉴于LTE将在未来5-10年内处理全球移动数据流量的很大一部分,在本文中,我们讨论了实现分散式LTE架构的方法。接下来,我们提出了一种新的方案来支持该体系结构中的用户移动性。提出的解决方案可以以资源高效的方式处理用户在分布式锚点之间移动的无缝数据流量转向和会话连续性,并且对现有网络实现的影响最小。我们的方法基于MPTCP(多路径TCP),这也是未来移动网络(5G)中增强端到端通信可靠性、弹性和带宽效率的最重要候选协议之一。我们使用NS3-LENA仿真软件来实现分散式LTE网络以及所提出的移动性管理方案。评估结果表明,该方案有效地满足了移动性管理的功能和性能要求。
{"title":"MultiPath TCP to support user's mobility in future LTE network","authors":"M. Karimzadeh, Luca Valtulina, H. V. D. Berg, A. Pras, P. Ortiz, R. Sadre","doi":"10.1109/WMNC.2017.8248845","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248845","url":null,"abstract":"Mobile networks have achieved a high-level of acceptance, mainly due to the ubiquitously deployment and ever growing connectivity through various wireless access technologies for new services, being available to mobile users. The core architecture of existing mobile networks does not scale well to accommodate future traffic demands owing to its highly centralized and hierarchical composition. Decentralization of the network architecture, is believed to be a sustainable trend against to the constantly growing of mobile data traffic. Given that LTE will handle substantial part of the worldwide mobile data traffic in the coming 5–10 years, in this paper we discuss an approach for realizing a decentralized LTE architecture. Next, we present a novel scheme to support user's mobility in this architecture. The proposed solution can handle seamless data traffic steering and session continuity for the users moving among the distributed anchor points, in a resource-efficient manner and with a minimal impact on the existing network implementation. Our approach is based on the MPTCP (Multipath TCP) which is also one of the most important candidate protocols to enhance end-to-end communication reliability, resiliency and bandwidth efficiency in the future mobile networks (5G). We used the NS3-LENA simulation software to implement a decentralized LTE network as well as the proposed mobility management scheme. The evaluation results show that the proposed solution efficiently fulfill the functionality and performance requirements related to mobility management.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Copyright page 版权页
Pub Date : 1963-11-01 DOI: 10.1109/hri.2016.7451720
Jaime Lloret, J. M. Jiménez
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than IFIP must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
允许制作部分或全部作品的数字或硬拷贝供个人或课堂使用,但不收取任何费用,前提是制作或分发副本不是为了盈利或商业利益,并且副本在第一页上带有本通知和完整的引用。非IFIP所拥有的本作品组成部分的版权必须得到尊重。允许有信用的摘要。以其他方式复制,重新发布,在服务器上发布或重新分发到列表,需要事先获得特定许可和/或付费。
{"title":"Copyright page","authors":"Jaime Lloret, J. M. Jiménez","doi":"10.1109/hri.2016.7451720","DOIUrl":"https://doi.org/10.1109/hri.2016.7451720","url":null,"abstract":"Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than IFIP must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1963-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1