Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365279
Zakaria M'rabet, F. Ayoub, Mostafa Belkasmi, Faissal El Bouanani
The finite Euclidean and Projective geometry codes are the most known among One-Step Majority-Logic Decodable codes that are Low-Density Parity-Check codes as well. Unfortunately, these codes are rare, and we do not have a great diversity when designing communication systems with a fixed code-length and code rate. Regarding the non-binary Euclidian and projective geometric Codes, each code is restricted to a unique alphabet. To offer a bigger range of possible alphabets for each code, we propose new construction by redefining the incidence vector of the lines of Euclidean and projective geometries over finite fields. This approach leads to an enrichment of the class of EG and PG codes. An error performance study of some new codes has been carried out and shows good results.
{"title":"Construction of New Finite Geometry Non-Binary LDPC Codes With Reduced Alphabets","authors":"Zakaria M'rabet, F. Ayoub, Mostafa Belkasmi, Faissal El Bouanani","doi":"10.1109/CommNet60167.2023.10365279","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365279","url":null,"abstract":"The finite Euclidean and Projective geometry codes are the most known among One-Step Majority-Logic Decodable codes that are Low-Density Parity-Check codes as well. Unfortunately, these codes are rare, and we do not have a great diversity when designing communication systems with a fixed code-length and code rate. Regarding the non-binary Euclidian and projective geometric Codes, each code is restricted to a unique alphabet. To offer a bigger range of possible alphabets for each code, we propose new construction by redefining the incidence vector of the lines of Euclidean and projective geometries over finite fields. This approach leads to an enrichment of the class of EG and PG codes. An error performance study of some new codes has been carried out and shows good results.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"386 4-6","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365304
M. Damasceno, J. A. Arnez, Walmir Acioli E Silva, Caio B. Bezerra De Souza, Renata K. Gomes Dos Reis, Lucas Beltrão Cavalcante Tribuzy
The emergency call (eCall) service is an important part of the mobile communication networks since helps mobile users to be able to communicate during alert circumstances. eCall services were already widely used by 3G networks and can be utilized by 4G Long-Term Evolution (LTE) networks as well as by Wireless Local Network (WLAN) networks, both of them using IP Multimedia Subsystem (IMS) core. The present paper provides a guideline about how eCall services are used in Voice over Long-Term Evolution (VoLTE) and Voice over Wi-Fi (VoWiFi) technologies over IMS. Furthermore, the work assesses the Quality of Service (QoS) of calls over VoLTE and VoWiFi. Additionally, using a packet analyzer software, there were analyzed in detail the Session Initiation Protocol (SIP) message headers, the way each technology collects the information of the user location and the signaling process for eCall over VoLTE and VoWiFi.
紧急呼叫(eCall)服务是移动通信网络的重要组成部分,可帮助移动用户在紧急情况下进行通信。eCall 服务已在 3G 网络中广泛使用,并可在 4G 长期演进(LTE)网络和无线局域网(WLAN)网络中使用,这两种网络都使用 IP 多媒体子系统(IMS)核心。本文就如何将 eCall 服务用于 IMS 上的长期演进语音(VoLTE)和 Wi-Fi 语音(VoWiFi)技术提供了指导。此外,本文还评估了 VoLTE 和 VoWiFi 通话的服务质量(QoS)。此外,还使用数据包分析软件详细分析了会话启动协议(SIP)信息头、每种技术收集用户位置信息的方式以及 VoLTE 和 VoWiFi eCall 的信令过程。
{"title":"Comparison between Emergency Calls over VoLTE and VoWiFi using IMS network","authors":"M. Damasceno, J. A. Arnez, Walmir Acioli E Silva, Caio B. Bezerra De Souza, Renata K. Gomes Dos Reis, Lucas Beltrão Cavalcante Tribuzy","doi":"10.1109/CommNet60167.2023.10365304","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365304","url":null,"abstract":"The emergency call (eCall) service is an important part of the mobile communication networks since helps mobile users to be able to communicate during alert circumstances. eCall services were already widely used by 3G networks and can be utilized by 4G Long-Term Evolution (LTE) networks as well as by Wireless Local Network (WLAN) networks, both of them using IP Multimedia Subsystem (IMS) core. The present paper provides a guideline about how eCall services are used in Voice over Long-Term Evolution (VoLTE) and Voice over Wi-Fi (VoWiFi) technologies over IMS. Furthermore, the work assesses the Quality of Service (QoS) of calls over VoLTE and VoWiFi. Additionally, using a packet analyzer software, there were analyzed in detail the Session Initiation Protocol (SIP) message headers, the way each technology collects the information of the user location and the signaling process for eCall over VoLTE and VoWiFi.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"50 9","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365272
Nadia El Ghabri, E. Belmekki, Mostafa Bellafkih
In recent years, Docker containers have become very popular due to their interesting properties that lie in isolation, portability, and scalability. Like any technology, Docker containers can be vulnerable to attacks. For this reason, attack simulation is a good practice for testing the security of a system, including Docker containers. In this paper, we show how this attack simulation can be executed using the hping3 tool to launch the attack and official Docker images to run containers. The results show that the Snort container can quickly identify and report the simulated attack.
{"title":"DoS Attack Detection with NIDS in Docker Environment","authors":"Nadia El Ghabri, E. Belmekki, Mostafa Bellafkih","doi":"10.1109/CommNet60167.2023.10365272","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365272","url":null,"abstract":"In recent years, Docker containers have become very popular due to their interesting properties that lie in isolation, portability, and scalability. Like any technology, Docker containers can be vulnerable to attacks. For this reason, attack simulation is a good practice for testing the security of a system, including Docker containers. In this paper, we show how this attack simulation can be executed using the hping3 tool to launch the attack and official Docker images to run containers. The results show that the Snort container can quickly identify and report the simulated attack.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"48 10","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365286
Cheng-Yen Lee, Kyler R. Scott, Sunil P. Khatri, Ali Ghrayeb
As the use of low-power Internet of Things (IoT) devices becomes widespread, the volume of data generated and transmitted is increasing rapidly. However, transmitting sensitive data over unreliable wireless networks gives rise to an increased attack surface due to the lack of secure communication. Accordingly, a lightweight and secure communication protocol is required for transmitting data between IoT devices. In this paper, we present results of experiments to conduct the hardware validation of a novel secure communication protocol which was introduced in [1]. This previously developed protocol utilizes multiple factors for authentication, which are updated after every protocol iteration. Ensuring that the same factors are not reused for authentication reduces the risk of potential attacks. Our implementation of this protocol utilizes a True Random Number Generator (TRNG) for factor updates to ensure that the factors are not based on a deterministic algorithm. In addition, our experiments validate the unicast and multicast communication features of the protocol. Our hardware platform is based on a network of Raspberry Pi boards and is designed to be both fast and computationally lightweight. We present results of experiments we conducted to assess the ability of our implementation to withstand network errors and delays. We also present an approach to choose the timeout value for a hardware implementation of the protocol. Our results demonstrate that our unicast and multicast implementations are scalable, while exhibiting good power, energy, and delay characteristics, thereby making our approach suitable for secure communication for smart IoT applications.
{"title":"A Hardware Validation Framework for a Networked Dynamic Multi-factor Security Protocol","authors":"Cheng-Yen Lee, Kyler R. Scott, Sunil P. Khatri, Ali Ghrayeb","doi":"10.1109/CommNet60167.2023.10365286","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365286","url":null,"abstract":"As the use of low-power Internet of Things (IoT) devices becomes widespread, the volume of data generated and transmitted is increasing rapidly. However, transmitting sensitive data over unreliable wireless networks gives rise to an increased attack surface due to the lack of secure communication. Accordingly, a lightweight and secure communication protocol is required for transmitting data between IoT devices. In this paper, we present results of experiments to conduct the hardware validation of a novel secure communication protocol which was introduced in [1]. This previously developed protocol utilizes multiple factors for authentication, which are updated after every protocol iteration. Ensuring that the same factors are not reused for authentication reduces the risk of potential attacks. Our implementation of this protocol utilizes a True Random Number Generator (TRNG) for factor updates to ensure that the factors are not based on a deterministic algorithm. In addition, our experiments validate the unicast and multicast communication features of the protocol. Our hardware platform is based on a network of Raspberry Pi boards and is designed to be both fast and computationally lightweight. We present results of experiments we conducted to assess the ability of our implementation to withstand network errors and delays. We also present an approach to choose the timeout value for a hardware implementation of the protocol. Our results demonstrate that our unicast and multicast implementations are scalable, while exhibiting good power, energy, and delay characteristics, thereby making our approach suitable for secure communication for smart IoT applications.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"3 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365292
F. Ghazil, A. Benkuider, F. Ayoub, M. Zraidi, K. Ibrahimi
Osteoporosis is a serious disease due to the fractures it causes which can lead to pain, impotence, loss of independence and excess mortality (femoral neck fractures). In addition, it is a disease with a high recurrence rate and is age-specific. Therefore, the impact of osteoporosis on the already sensitive healthcare system will increase, and thus several preventive measures can be taken to reduce its impact Based on texture analysis, which is crucial for image interpretation in the biomedical domain. We propose a fresh approach for classifying medical images in this context using bidimensional empirical multimodal decomposition (BEMD), this approach is based on the fractal analysis of BIMFs. BEMD is an extension of the one-dimensional case because it has proven to be an adaptive way to represent non-stationary and non-linear signals. Its application to image processing breaks down a image into the total of a number of hierarchical elements “bidimensional intrinsic mode functions (BIMFs)” and residues and the decomposition procedure is iterative. In order to objectively assess the effectiveness of the various BIMF modes and to characterize two states: osteoporotic and healthy, the fractal dimension was calculated for each BIMF using the DBC “Differential Box Counting” method. This novel strategy was applied on a database of CT-Scan medical images of bone textures which contains images of normal and pathological cases. Experimental results indicate that the third mode BIMF achieves higher separation rates compared to the other mode between normal and osteoporotic cases. We use classification rate evaluation criteria, such that the classification rate is given by KNN
{"title":"Fractal analysis to BEMD’s IMFs: Application CT-Scan","authors":"F. Ghazil, A. Benkuider, F. Ayoub, M. Zraidi, K. Ibrahimi","doi":"10.1109/CommNet60167.2023.10365292","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365292","url":null,"abstract":"Osteoporosis is a serious disease due to the fractures it causes which can lead to pain, impotence, loss of independence and excess mortality (femoral neck fractures). In addition, it is a disease with a high recurrence rate and is age-specific. Therefore, the impact of osteoporosis on the already sensitive healthcare system will increase, and thus several preventive measures can be taken to reduce its impact Based on texture analysis, which is crucial for image interpretation in the biomedical domain. We propose a fresh approach for classifying medical images in this context using bidimensional empirical multimodal decomposition (BEMD), this approach is based on the fractal analysis of BIMFs. BEMD is an extension of the one-dimensional case because it has proven to be an adaptive way to represent non-stationary and non-linear signals. Its application to image processing breaks down a image into the total of a number of hierarchical elements “bidimensional intrinsic mode functions (BIMFs)” and residues and the decomposition procedure is iterative. In order to objectively assess the effectiveness of the various BIMF modes and to characterize two states: osteoporotic and healthy, the fractal dimension was calculated for each BIMF using the DBC “Differential Box Counting” method. This novel strategy was applied on a database of CT-Scan medical images of bone textures which contains images of normal and pathological cases. Experimental results indicate that the third mode BIMF achieves higher separation rates compared to the other mode between normal and osteoporotic cases. We use classification rate evaluation criteria, such that the classification rate is given by KNN","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"256 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365263
Rachida Boufouss, A. Najid
In this article, an 8-port, 8-element dual-band multiple input and multiple output (MIMO) Planar Inverted F-Antenna (PIFA) having a height of 2.5 mm is proposed for the 5G/WLAN sub-6 GHz mobile terminal. For achieving dual-band operation with wide bandwidth, a parasitic element and L-slot are added to the PIFA, whereas a rectangular open-ended ring is printed on the top substrate next to the parasitic element. The results show that the proposed MIMO antenna system operates at 3.43–3.8 GHz and 5.15–5.85 GHz with −6dB impedance bandwidth condition. The minimum isolation achieved between two adjacent antenna elements is better than 12.1 dB in the lower band, while in the upper band is 16 dB without using any extra decoupling techniques. Moreover, radiation efficiency, radiation pattern, envelop correlation coefficient and diversity gain are all presented in this article, showing good MIMO performances of the proposed antenna which makes it promising for 5G sub-6 GHz mobile terminal.
{"title":"A Low-Profile Dual-Band Eight-Port MIMO PIFA Antenna for 5G/WLAN Sub-6 GHz Mobile Terminal","authors":"Rachida Boufouss, A. Najid","doi":"10.1109/CommNet60167.2023.10365263","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365263","url":null,"abstract":"In this article, an 8-port, 8-element dual-band multiple input and multiple output (MIMO) Planar Inverted F-Antenna (PIFA) having a height of 2.5 mm is proposed for the 5G/WLAN sub-6 GHz mobile terminal. For achieving dual-band operation with wide bandwidth, a parasitic element and L-slot are added to the PIFA, whereas a rectangular open-ended ring is printed on the top substrate next to the parasitic element. The results show that the proposed MIMO antenna system operates at 3.43–3.8 GHz and 5.15–5.85 GHz with −6dB impedance bandwidth condition. The minimum isolation achieved between two adjacent antenna elements is better than 12.1 dB in the lower band, while in the upper band is 16 dB without using any extra decoupling techniques. Moreover, radiation efficiency, radiation pattern, envelop correlation coefficient and diversity gain are all presented in this article, showing good MIMO performances of the proposed antenna which makes it promising for 5G sub-6 GHz mobile terminal.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"414 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365289
Khadija Sabri, O. E. Maguiri, A. Farchi
This paper solves the problem of controlling maximum power in photovoltaic systems connected to the grid in order to track changes and meet energy demand. Our work focuses on two crucial objectives: i. extracting the maximum available power (MPPT) in case of partial shading, ii. unifying the power factor (FPU). To accomplish this, we integrated a non-linear backstepping controller to extract the Maximum Power Point (MPP) using the Particle Swarming Algorithm (PSO), influencing the duty cycle of the DC/DC converter. Additionally, we applied this approach to the three-phase voltage-source inverter for achieving a unified power factor (FPU). We validated the efficacy of the introduced system through modeling and simulation in MATLAB/Simulink. The controlled system’s asymptotic stability is demonstrated mathematically, and simulation results show that the controller has successfully accomplished all of its goals with excellent dynamic performance even in the partial shading conditions. The suggested controller also exhibits excellent robustness against system disturbances, which is its primary advantage over alternative control systems.
{"title":"Backstepping Control of a Double-Stage Photovoltaic System Connected to the Tree-Phase Grid Under Partial Shading Conditions","authors":"Khadija Sabri, O. E. Maguiri, A. Farchi","doi":"10.1109/CommNet60167.2023.10365289","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365289","url":null,"abstract":"This paper solves the problem of controlling maximum power in photovoltaic systems connected to the grid in order to track changes and meet energy demand. Our work focuses on two crucial objectives: i. extracting the maximum available power (MPPT) in case of partial shading, ii. unifying the power factor (FPU). To accomplish this, we integrated a non-linear backstepping controller to extract the Maximum Power Point (MPP) using the Particle Swarming Algorithm (PSO), influencing the duty cycle of the DC/DC converter. Additionally, we applied this approach to the three-phase voltage-source inverter for achieving a unified power factor (FPU). We validated the efficacy of the introduced system through modeling and simulation in MATLAB/Simulink. The controlled system’s asymptotic stability is demonstrated mathematically, and simulation results show that the controller has successfully accomplished all of its goals with excellent dynamic performance even in the partial shading conditions. The suggested controller also exhibits excellent robustness against system disturbances, which is its primary advantage over alternative control systems.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"52 12","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365268
Youssra Baja, Khalid Chougdali, A. Kobbane
With the increasing use of Internet of Things (IoT) devices in various domains, including offices, homes, hospitals, cities, and transportation, cyberattacks using malicious attacks have become more frequent and complex, posing new challenges and risks. Therefore, it is crucial to enhance the speed and accuracy of security measures. In this paper, we propose an ensemble machine-learning model that utilizes various techniques, such as Stacking and Bagging, in combination with individual classifiers based on machine learning models to detect botnet attacks using the N-BaIoT dataset. Our results demonstrate the efficiency and efficacy of the proposed stacking model, which outperformed other techniques for every evaluation metric. We conclude that the selected model can achieve a very good accuracy rate.
{"title":"Improving IoT Botnet Detection Using Ensemble Learning","authors":"Youssra Baja, Khalid Chougdali, A. Kobbane","doi":"10.1109/CommNet60167.2023.10365268","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365268","url":null,"abstract":"With the increasing use of Internet of Things (IoT) devices in various domains, including offices, homes, hospitals, cities, and transportation, cyberattacks using malicious attacks have become more frequent and complex, posing new challenges and risks. Therefore, it is crucial to enhance the speed and accuracy of security measures. In this paper, we propose an ensemble machine-learning model that utilizes various techniques, such as Stacking and Bagging, in combination with individual classifiers based on machine learning models to detect botnet attacks using the N-BaIoT dataset. Our results demonstrate the efficiency and efficacy of the proposed stacking model, which outperformed other techniques for every evaluation metric. We conclude that the selected model can achieve a very good accuracy rate.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"71 4","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365256
Ekaterina Sedunova, N. Maletic, D. Cvetkovski, E. Grass
This work focuses on object localization algorithms using channel impulse responses (CIR) of beamsteering millimeter wave (mmWave) communication systems. Without limiting generality, the transmitter and receiver are considered to reside in the two focal points of ellipses, while objects are positioned at the perimeter of those ellipses. The idea is inspired by bistatic RADAR systems, using a communication link that can simultaneously serve for sensing in a joint communication and sensing (JCAS) scenario. For experimental verification, we performed the channel measurements in an anechoic chamber. The main contribution of this work is developing an approach for enhancing object identification using antenna pattern deconvolution and improving the visual representation of the obtained data. Furthermore, the paper investigates the impact of the angular step size on the resolution of found objects for a fixed beam width. Our proposed method enhances object identification and reconstruction compared to prior research.
{"title":"Enhanced Object Localization Using a Beamsteering mmWave Communication System","authors":"Ekaterina Sedunova, N. Maletic, D. Cvetkovski, E. Grass","doi":"10.1109/CommNet60167.2023.10365256","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365256","url":null,"abstract":"This work focuses on object localization algorithms using channel impulse responses (CIR) of beamsteering millimeter wave (mmWave) communication systems. Without limiting generality, the transmitter and receiver are considered to reside in the two focal points of ellipses, while objects are positioned at the perimeter of those ellipses. The idea is inspired by bistatic RADAR systems, using a communication link that can simultaneously serve for sensing in a joint communication and sensing (JCAS) scenario. For experimental verification, we performed the channel measurements in an anechoic chamber. The main contribution of this work is developing an approach for enhancing object identification using antenna pattern deconvolution and improving the visual representation of the obtained data. Furthermore, the paper investigates the impact of the angular step size on the resolution of found objects for a fixed beam width. Our proposed method enhances object identification and reconstruction compared to prior research.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"61 6","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365266
El-Mehdi Makhroute, Mohammed-Ayoub Elharti, Vincent Brouillard, Yvon Savaria, Tarek Ould-Bachir
This paper introduces an Access Gate Function (AGF) that has been implemented using the P4 language and evaluates its performance when running on a Tofino switch. Through the process of translating specifications from the Broadband Forum (BBF) for Fixed Mobile Convergence in the 5G Core into a P4 code and by conducting data plane simulations on software switch models, we provide evidence that the AGF solution conforms to industry standards and exhibits efficient and scalable performance characteristics. Subsequently, we assess the prototype’s implementation on a Tofino switch, analyzing its capabilities and limitations. The reported results demonstrate that the programmable P4 Tofino switch efficiently handles a significant number of sessions, further reinforcing the potential and practicality of the proposed solution for industrial deployment in fixed-mobile convergence scenarios.
{"title":"Implementing and Evaluating a P4-based Access Gateway Function on a Tofino Switch","authors":"El-Mehdi Makhroute, Mohammed-Ayoub Elharti, Vincent Brouillard, Yvon Savaria, Tarek Ould-Bachir","doi":"10.1109/CommNet60167.2023.10365266","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365266","url":null,"abstract":"This paper introduces an Access Gate Function (AGF) that has been implemented using the P4 language and evaluates its performance when running on a Tofino switch. Through the process of translating specifications from the Broadband Forum (BBF) for Fixed Mobile Convergence in the 5G Core into a P4 code and by conducting data plane simulations on software switch models, we provide evidence that the AGF solution conforms to industry standards and exhibits efficient and scalable performance characteristics. Subsequently, we assess the prototype’s implementation on a Tofino switch, analyzing its capabilities and limitations. The reported results demonstrate that the programmable P4 Tofino switch efficiently handles a significant number of sessions, further reinforcing the potential and practicality of the proposed solution for industrial deployment in fixed-mobile convergence scenarios.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"30 2","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}