Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381338
M. E. Ajjouri, S. Benhadou, H. Medromi
The Intrusion Detection System architectures used in commercial and research systems have a number of problems that limit their configurability. An important problem of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper a new architecture for intrusion detection based in multi agent systems adding a learning feature abnormal behaviors that correspond to new attack patterns. We present the motivation and description of the approach, for the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy separated into three layers. We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.
{"title":"New collaborative intrusion detection architecture based on multi agent systems","authors":"M. E. Ajjouri, S. Benhadou, H. Medromi","doi":"10.1109/WINCOM.2015.7381338","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381338","url":null,"abstract":"The Intrusion Detection System architectures used in commercial and research systems have a number of problems that limit their configurability. An important problem of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper a new architecture for intrusion detection based in multi agent systems adding a learning feature abnormal behaviors that correspond to new attack patterns. We present the motivation and description of the approach, for the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy separated into three layers. We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381340
Hind Khyati
Wireless technologies and services in emerging markets have been central to enabling the communications explosion over the last decade that has, in many ways, revolutionized the lives and the economies of the people living there. The nature of the markets and the competitive dynamics in these regions are undergoing some delicate but very important shifts. This white paper analyzes the leading opportunities and challenges facing service providers in the wireless sector of emerging markets. It provides a clear view of the strategic options and directions required of wireless service providers - both communications service providers (CSPs) and mobile network operators (MNOs) - in an increasingly demanding ecosystem and insights into how they can profitably unlock a larger share of the customer wallet.
{"title":"Wireless operator strategies in emerging markets: Strategic options and directions","authors":"Hind Khyati","doi":"10.1109/WINCOM.2015.7381340","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381340","url":null,"abstract":"Wireless technologies and services in emerging markets have been central to enabling the communications explosion over the last decade that has, in many ways, revolutionized the lives and the economies of the people living there. The nature of the markets and the competitive dynamics in these regions are undergoing some delicate but very important shifts. This white paper analyzes the leading opportunities and challenges facing service providers in the wireless sector of emerging markets. It provides a clear view of the strategic options and directions required of wireless service providers - both communications service providers (CSPs) and mobile network operators (MNOs) - in an increasingly demanding ecosystem and insights into how they can profitably unlock a larger share of the customer wallet.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381317
Najeh Jamali, L. Chaari
The convergence of telecommunication technologies and the miniaturization of the electromechanical allowed an evolution proved in the world of wireless networks. This evolution is characterized by the emergence of a new generation of wireless personnel networks termed wireless body area networks (WBAN) that manages the human body functions. However, this technology has many requirements yet to be resolved. Security is the main challenge for this type of networks. In this paper, we propose a secret key exchange protocol using physiological signals in wireless body area networks (SKEP). This scheme allows a secure inter-sensor communication basing on physiological signals of the human body using cubic spline interpolation technique. Security analysis prove that our protocol guarantee data confidentiality and integrity in comparison with the previous protocol termed an efficient and secure key agreement scheme using physiological signals in body area networks.
{"title":"SKEP: A secret key exchange protocol using physiological signals in wireless body area networks","authors":"Najeh Jamali, L. Chaari","doi":"10.1109/WINCOM.2015.7381317","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381317","url":null,"abstract":"The convergence of telecommunication technologies and the miniaturization of the electromechanical allowed an evolution proved in the world of wireless networks. This evolution is characterized by the emergence of a new generation of wireless personnel networks termed wireless body area networks (WBAN) that manages the human body functions. However, this technology has many requirements yet to be resolved. Security is the main challenge for this type of networks. In this paper, we propose a secret key exchange protocol using physiological signals in wireless body area networks (SKEP). This scheme allows a secure inter-sensor communication basing on physiological signals of the human body using cubic spline interpolation technique. Security analysis prove that our protocol guarantee data confidentiality and integrity in comparison with the previous protocol termed an efficient and secure key agreement scheme using physiological signals in body area networks.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381335
Mohamed Et-tolba, N. Tahiri, Nissrine Mahir
Error probability is the most popular metric for evaluating the performance of a digital communication system. It is often estimated using Monte-Carlo simulation method since analytical expressions of the error probabilities are not always available especially for advanced communication systems. In this paper, we propose a new semi-analytical method for fast performance evaluation. This method is based on estimating the probability density using orthogonal series. We show that the proposed technique requires a few numbers of observation samples for performance evaluation compared with Monte-Carlo simulation. Consequently, it provides a significant gain in terms of computing time.
{"title":"A novel semi-analytical performance evaluation for a digital communication system using orthogonal series","authors":"Mohamed Et-tolba, N. Tahiri, Nissrine Mahir","doi":"10.1109/WINCOM.2015.7381335","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381335","url":null,"abstract":"Error probability is the most popular metric for evaluating the performance of a digital communication system. It is often estimated using Monte-Carlo simulation method since analytical expressions of the error probabilities are not always available especially for advanced communication systems. In this paper, we propose a new semi-analytical method for fast performance evaluation. This method is based on estimating the probability density using orthogonal series. We show that the proposed technique requires a few numbers of observation samples for performance evaluation compared with Monte-Carlo simulation. Consequently, it provides a significant gain in terms of computing time.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121116590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381324
S. E. Hassani, A. Haidine
5G are being intensively studied in order to deliver systems by 2020. This paper presents technological challenges and perspectives beyond 4G systems. It addresses the research landscape of 5G systems and the requirements to be fullfilled. It also presents some key technologies driving 5G development in order to give form to the future generation mobile systems.
{"title":"Roadmap towards beyond 4G: Key technologies and challenges for 5G","authors":"S. E. Hassani, A. Haidine","doi":"10.1109/WINCOM.2015.7381324","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381324","url":null,"abstract":"5G are being intensively studied in order to deliver systems by 2020. This paper presents technological challenges and perspectives beyond 4G systems. It addresses the research landscape of 5G systems and the requirements to be fullfilled. It also presents some key technologies driving 5G development in order to give form to the future generation mobile systems.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381334
M. Lemoudden, B. E. Ouahidi
Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, massive growth in the scale of data generated through cloud computing has been observed. A large part of that data has been machine-generated log data; it is generated at every layer and component within the cloud information technology ecosystem that spans a range of IT functions from storage and computation to networking and application services. Log files are essential for enterprise-level monitoring, troubleshooting, security, debugging, compliance, etc. We argue that cloud computing is in need of a new methodology for recording, managing, storing and analyzing the log data that is generated by the cloud infrastructure, based on big data technologies, allowing for the access to a wealth of knowledge that can contribute to its own advancement. Our paper discusses and expands existing standard log management solutions to design new methods of exploiting the unstructured log data in order to gain unprecedented insights.
{"title":"Managing cloud-generated logs using big data technologies","authors":"M. Lemoudden, B. E. Ouahidi","doi":"10.1109/WINCOM.2015.7381334","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381334","url":null,"abstract":"Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, massive growth in the scale of data generated through cloud computing has been observed. A large part of that data has been machine-generated log data; it is generated at every layer and component within the cloud information technology ecosystem that spans a range of IT functions from storage and computation to networking and application services. Log files are essential for enterprise-level monitoring, troubleshooting, security, debugging, compliance, etc. We argue that cloud computing is in need of a new methodology for recording, managing, storing and analyzing the log data that is generated by the cloud infrastructure, based on big data technologies, allowing for the access to a wealth of knowledge that can contribute to its own advancement. Our paper discusses and expands existing standard log management solutions to design new methods of exploiting the unstructured log data in order to gain unprecedented insights.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128116332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381332
Imane Tamimi, Mohamed El-Kamili
In this paper, we realize a literature survey on the issue of community detection over time, first we present some basic concepts about networks modeled as graphs, then we state in an non exhaustive way the research fields arising from social networks. We present some of the existing models and methods to track communities over time. Community detection in networks is a prevailing subject in the area of social network analysis. There exist numerous methods and algorithms in the literature that have been dealing with that issue.
{"title":"Literature survey on dynamic community detection and models of social networks","authors":"Imane Tamimi, Mohamed El-Kamili","doi":"10.1109/WINCOM.2015.7381332","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381332","url":null,"abstract":"In this paper, we realize a literature survey on the issue of community detection over time, first we present some basic concepts about networks modeled as graphs, then we state in an non exhaustive way the research fields arising from social networks. We present some of the existing models and methods to track communities over time. Community detection in networks is a prevailing subject in the area of social network analysis. There exist numerous methods and algorithms in the literature that have been dealing with that issue.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"50 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120883709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381329
Hanane Lamaazi, N. Benamar, M. Imaduddin, A. Jara
RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) is proposed by the ROLL working group at IETF. This protocol used in the Internet of Things is optimal for Low power and Lossy Networks (LLNs). However, the RPL network has some limits when the network is dense. In this paper we evaluate the performance of RPL in three different scenarios. We first, evaluate the characteristics of RPL with fixed nodes, (one sink and others are senders). Then we add mobility, and we compare mobile nodes to fixed nodes in order to show how mobility can influence protocol parameters. Finally, we study the behavior of RPL when the network is dense in order to assess the protocol performances. In this study, we use Contiki OS and Cooja software for all simulations. The results show that RPL performances are greatly influenced by the number of nodes, type of mobility and the topology of the network. When the number of nodes increases, all metrics increase too, especially the power consumption which arrives until an augmentation of 52,85%. Furthermore, Random Waypoint Mobility Model (RWP) gives better metrics than Random Walk (RWK) Mobility Model in terms of number of hops and Expected Transmission (ETX) value. Also, in RWP model, nodes consume 10,73% of power than RWK. Our simulations show clearly that the power consumption is directly related to the number of sink nodes in the network. The more this type of node is present in the network the less power is consumed. The power reduction may occur till 5%.
RPL (IPv6 Routing Protocol for Low Power and Lossy Networks)是由IETF的ROLL工作组提出的。物联网中使用的该协议最适合低功耗和有损网络(lln)。但是,在网络密度较大的情况下,RPL网络存在一定的局限性。在本文中,我们评估了RPL在三种不同场景下的性能。首先,我们评估了具有固定节点的RPL的特性(一个接收节点和其他发送节点)。然后我们加入移动性,并将移动节点与固定节点进行比较,以显示移动性如何影响协议参数。最后,我们研究了RPL在网络密度较大时的行为,以评估协议的性能。在本研究中,我们使用Contiki OS和Cooja软件进行所有模拟。结果表明,RPL性能受节点数量、移动类型和网络拓扑结构的影响较大。当节点数量增加时,所有指标也会增加,特别是功耗,直到增加52,85%。此外,随机路径点移动模型(RWP)在跳数和期望传输(ETX)值方面提供了比随机行走(RWK)移动模型更好的指标。在RWP模型中,节点功耗比RWK模型低10.73%。我们的模拟清楚地表明,功耗与网络中汇聚节点的数量直接相关。这种类型的节点在网络中出现的越多,所消耗的功率就越少。功率下降可能会持续到5%。
{"title":"Performance assessment of the routing protocol for low power and lossy networks","authors":"Hanane Lamaazi, N. Benamar, M. Imaduddin, A. Jara","doi":"10.1109/WINCOM.2015.7381329","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381329","url":null,"abstract":"RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) is proposed by the ROLL working group at IETF. This protocol used in the Internet of Things is optimal for Low power and Lossy Networks (LLNs). However, the RPL network has some limits when the network is dense. In this paper we evaluate the performance of RPL in three different scenarios. We first, evaluate the characteristics of RPL with fixed nodes, (one sink and others are senders). Then we add mobility, and we compare mobile nodes to fixed nodes in order to show how mobility can influence protocol parameters. Finally, we study the behavior of RPL when the network is dense in order to assess the protocol performances. In this study, we use Contiki OS and Cooja software for all simulations. The results show that RPL performances are greatly influenced by the number of nodes, type of mobility and the topology of the network. When the number of nodes increases, all metrics increase too, especially the power consumption which arrives until an augmentation of 52,85%. Furthermore, Random Waypoint Mobility Model (RWP) gives better metrics than Random Walk (RWK) Mobility Model in terms of number of hops and Expected Transmission (ETX) value. Also, in RWP model, nodes consume 10,73% of power than RWK. Our simulations show clearly that the power consumption is directly related to the number of sink nodes in the network. The more this type of node is present in the network the less power is consumed. The power reduction may occur till 5%.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381309
A. Soulimani, M. Benjillali
In this paper, we present a closed-form performance analysis of multihop cooperative schemes in the context of the global effort towards the design of future 5G systems. We adopt the advocated Weibull channel fading model for its flexible ability to cover different channel conditions, and supported by many recent measurement campaigns in various emerging 5G scenarios. The analyzed scheme consists of multiple "Detect-and-Forward" relays with generalized high-order M-QAM transmissions. The end-to-end performance of the multihop communication is evaluated in terms of the outage probability, bit error rate, and ergodic capacity. For all these metrics, we present exact closed-form expressions, some in terms of the Meijer's G-function. Numerical results illustrate the analysis, and Monte-Carlo simulations assess the accuracy of our obtained results for different system and channel parameters.
{"title":"Closed-form performance analysis of generalized M-QAM over multihop weibull fading channels","authors":"A. Soulimani, M. Benjillali","doi":"10.1109/WINCOM.2015.7381309","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381309","url":null,"abstract":"In this paper, we present a closed-form performance analysis of multihop cooperative schemes in the context of the global effort towards the design of future 5G systems. We adopt the advocated Weibull channel fading model for its flexible ability to cover different channel conditions, and supported by many recent measurement campaigns in various emerging 5G scenarios. The analyzed scheme consists of multiple \"Detect-and-Forward\" relays with generalized high-order M-QAM transmissions. The end-to-end performance of the multihop communication is evaluated in terms of the outage probability, bit error rate, and ergodic capacity. For all these metrics, we present exact closed-form expressions, some in terms of the Meijer's G-function. Numerical results illustrate the analysis, and Monte-Carlo simulations assess the accuracy of our obtained results for different system and channel parameters.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/WINCOM.2015.7381307
Ridouane El Mezouary, Abdellah Houmz, Jamila Jalil, M. Elkoutbi
Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.
{"title":"PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks","authors":"Ridouane El Mezouary, Abdellah Houmz, Jamila Jalil, M. Elkoutbi","doi":"10.1109/WINCOM.2015.7381307","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381307","url":null,"abstract":"Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114996675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}