Pub Date : 2017-07-31DOI: 10.1109/ICC.2017.7996339
C. Tselikis, C. Douligeris, S. Mitropoulos, N. Komninos, G. Tselikis
In this paper we review previous works done with respect to Conference Key Distribution Systems (CKDS). We focus on the system proposed by Kim et al. and we propose improvements on that scheme a) from the perspective of security and anonymity, b) from the perspective of efficient calculation of the Lagrange polynomial coefficients, and c) from the perspective of adaptation into the dynamic wireless ad hoc network. The security of the proposed scheme is based on the difficulty of computing discrete logarithms over elliptic curves, the intractability of inverting a one-way hash function and the pseudo-randomness of user coordinates. We demonstrate the effectiveness of the proposed scheme through the analysis of characteristic attack scenarios.
{"title":"Adaptation of a Conference Key Distribution System for the wireless ad hoc network","authors":"C. Tselikis, C. Douligeris, S. Mitropoulos, N. Komninos, G. Tselikis","doi":"10.1109/ICC.2017.7996339","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996339","url":null,"abstract":"In this paper we review previous works done with respect to Conference Key Distribution Systems (CKDS). We focus on the system proposed by Kim et al. and we propose improvements on that scheme a) from the perspective of security and anonymity, b) from the perspective of efficient calculation of the Lagrange polynomial coefficients, and c) from the perspective of adaptation into the dynamic wireless ad hoc network. The security of the proposed scheme is based on the difficulty of computing discrete logarithms over elliptic curves, the intractability of inverting a one-way hash function and the pseudo-randomness of user coordinates. We demonstrate the effectiveness of the proposed scheme through the analysis of characteristic attack scenarios.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81913198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-31DOI: 10.1109/ICC.2017.7996569
M. Iordache, Simon Jouet, Angelos K. Marnerides, D. Pezaros
Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, high-speed datacentre networks. In this paper, we present a two-level solution for anomaly detection leveraging independent execution and message passing semantics. We employ these constructs within a network-wide distributed anomaly detection framework that allows for greater detection accuracy and bandwidth cost saving through attack path reconstruction. Experimental results using real operational traffic traces and known network attacks generated through the Pytbull IDS evaluation framework, show that our approach is capable of detecting anomalies in a timely manner while allowing reconstruction of the attack path, hence further enabling the composition of advanced mitigation strategies. The resulting system shows high detection accuracy when compared to similar techniques, at least 20% better at detecting anomalies, and enables full path reconstruction even at small-to-moderate attack traffic intensities (as a fraction of the total traffic), saving up to 75% of bandwidth due to early attack detection.
{"title":"Distributed, multi-level network anomaly detection for datacentre networks","authors":"M. Iordache, Simon Jouet, Angelos K. Marnerides, D. Pezaros","doi":"10.1109/ICC.2017.7996569","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996569","url":null,"abstract":"Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, high-speed datacentre networks. In this paper, we present a two-level solution for anomaly detection leveraging independent execution and message passing semantics. We employ these constructs within a network-wide distributed anomaly detection framework that allows for greater detection accuracy and bandwidth cost saving through attack path reconstruction. Experimental results using real operational traffic traces and known network attacks generated through the Pytbull IDS evaluation framework, show that our approach is capable of detecting anomalies in a timely manner while allowing reconstruction of the attack path, hence further enabling the composition of advanced mitigation strategies. The resulting system shows high detection accuracy when compared to similar techniques, at least 20% better at detecting anomalies, and enables full path reconstruction even at small-to-moderate attack traffic intensities (as a fraction of the total traffic), saving up to 75% of bandwidth due to early attack detection.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"63 1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85385485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28DOI: 10.1109/ICC.2017.7997299
Shankar Lal, Sowmya Ravidas, Ian Oliver, T. Taleb
In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above-mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.
{"title":"Assuring virtual network function image integrity and host sealing in Telco cloue","authors":"Shankar Lal, Sowmya Ravidas, Ian Oliver, T. Taleb","doi":"10.1109/ICC.2017.7997299","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997299","url":null,"abstract":"In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above-mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89232487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28DOI: 10.1109/ICC.2017.7997387
Yu Xiao, Marius Noreikis, Antti Ylä-Jääski
An increasing number of online services are hosted on public clouds. However, since a centralized cloud architecture imposes high network latency, researchers suggested moving latency sensitive applications, such as virtual and augmented reality ones, to the edge of the network. Nevertheless, little has been done for edge layer capacity estimation resulting in a great need towards practical tools and techniques for initial capacity planning. In this work we provide a novel capacity planning solution for hierarchical edge cloud that considers QoS requirements in terms of response delay, and diverse demands for CPU, GPU and network resources. Our solution improves edge utilization by combining complementary resource demands while satisfying QoS requirements. We prove effectiveness of our solution through a case study where we plan edge capacity for deploying an AR navigation and information system.
{"title":"QoS-oriented capacity planning for edge computing","authors":"Yu Xiao, Marius Noreikis, Antti Ylä-Jääski","doi":"10.1109/ICC.2017.7997387","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997387","url":null,"abstract":"An increasing number of online services are hosted on public clouds. However, since a centralized cloud architecture imposes high network latency, researchers suggested moving latency sensitive applications, such as virtual and augmented reality ones, to the edge of the network. Nevertheless, little has been done for edge layer capacity estimation resulting in a great need towards practical tools and techniques for initial capacity planning. In this work we provide a novel capacity planning solution for hierarchical edge cloud that considers QoS requirements in terms of response delay, and diverse demands for CPU, GPU and network resources. Our solution improves edge utilization by combining complementary resource demands while satisfying QoS requirements. We prove effectiveness of our solution through a case study where we plan edge capacity for deploying an AR navigation and information system.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"130 1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81130177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28DOI: 10.1109/ICC.2017.7997432
A. Shaikh, Fereidoun H. Panahi, T. Ohtsuki, Kouhei Suzaki, Hirofumi Sasaki, Hideya So, T. Nakagawa
Superposed multicarrier transmission is a known method to improve frequency utilization efficiency when several wireless systems share the same spectrum. Obviously, an enhanced spectral efficiency comes at the expense of interference. To suppress the effect of interference, forward error correction (FEC) metric masking can be applied. In FEC, the corresponding log-likelihood (LLR) of the superposed band is set to zero or to other proper values determined by the other parameters such as the desired to undesired power ratio (DUR). To be able to apply the FEC metric masking, the information on the superposed band sub-carriers is required at the receiver side. Therefore, in this paper, we propose a novel method for detecting the superposed bands of multicarrier transmissions using Q-learning. We present the simulation results that show a higher rate of superposed band detection accuracy in lower DUR over the conventional method, as well as similar accuracy over other DUR.
{"title":"Q-learning based superposed band detection in multicarrier transmission","authors":"A. Shaikh, Fereidoun H. Panahi, T. Ohtsuki, Kouhei Suzaki, Hirofumi Sasaki, Hideya So, T. Nakagawa","doi":"10.1109/ICC.2017.7997432","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997432","url":null,"abstract":"Superposed multicarrier transmission is a known method to improve frequency utilization efficiency when several wireless systems share the same spectrum. Obviously, an enhanced spectral efficiency comes at the expense of interference. To suppress the effect of interference, forward error correction (FEC) metric masking can be applied. In FEC, the corresponding log-likelihood (LLR) of the superposed band is set to zero or to other proper values determined by the other parameters such as the desired to undesired power ratio (DUR). To be able to apply the FEC metric masking, the information on the superposed band sub-carriers is required at the receiver side. Therefore, in this paper, we propose a novel method for detecting the superposed bands of multicarrier transmissions using Q-learning. We present the simulation results that show a higher rate of superposed band detection accuracy in lower DUR over the conventional method, as well as similar accuracy over other DUR.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76129893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28DOI: 10.1109/ICC.2017.7997317
Liqin Shi, Liqiang Zhao, Kai Liang, Xiaoli Chu, Gang Wu, Hsiao-Hwa Chen
In this paper, we investigate profit maximization problem in wireless powered communication (WPC) systems, where the profit is defined as the difference between the revenue earned from uplink data transmission and total energy cost of the system. Since the efficiencies of energy harvesting (EH) circuits and battery storage are both non-linear, conventional linear models will lead to suboptimal resource allocation. In this paper, we propose to maximize the profit of a WPC system under nonlinear energy harvesting and storage models. In order to solve the non-convex optimization problem, we develop a piecewise linear EH model, which is more accurate than conventional linear EH models and existing non-linear EH models. Numerical results show that the power and time allocation design based on the non-linear energy harvesting and storage models outperforms that based on existing linear models in terms of the profit.
{"title":"Profit maximization in wireless powered communications with improved non-linear energy conversion and storage efficiencies","authors":"Liqin Shi, Liqiang Zhao, Kai Liang, Xiaoli Chu, Gang Wu, Hsiao-Hwa Chen","doi":"10.1109/ICC.2017.7997317","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997317","url":null,"abstract":"In this paper, we investigate profit maximization problem in wireless powered communication (WPC) systems, where the profit is defined as the difference between the revenue earned from uplink data transmission and total energy cost of the system. Since the efficiencies of energy harvesting (EH) circuits and battery storage are both non-linear, conventional linear models will lead to suboptimal resource allocation. In this paper, we propose to maximize the profit of a WPC system under nonlinear energy harvesting and storage models. In order to solve the non-convex optimization problem, we develop a piecewise linear EH model, which is more accurate than conventional linear EH models and existing non-linear EH models. Numerical results show that the power and time allocation design based on the non-linear energy harvesting and storage models outperforms that based on existing linear models in terms of the profit.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88211073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28DOI: 10.1109/ICC.2017.7996377
Neerja Sahu, D. Peng, H. Sharif
In this paper, an innovative idea of secure and energy efficient electrocardiogram steganography based on Discrete Wavelet Transform (DWT) is proposed, in which different important ECG data are steganographed with variable embedding strengths so that the reconstructed ECG signal quality is preserved. Incorporating the proposed Unequal Steganography Embedding (USE) with Unequal Error Protection (UEP), the proposed scheme further improves transmission performance in terms of ECG signal quality, ensures the confidentiality as well as reliability of a user's data, and makes the transmission more energy efficient. Simulation results demonstrate that USE attains very low distortion (WWPRD less than 0.45 %). Furthermore, high correlation between host and stego ECG and ECG data remains diagnosable after steganography. Based on our literature reviews, the reliability, robustness, and energy efficiency of this proposed method are unmatched in comparison with any other published methods.
{"title":"Unequal steganography with unequal error protection for wireless physiological signal transmission","authors":"Neerja Sahu, D. Peng, H. Sharif","doi":"10.1109/ICC.2017.7996377","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996377","url":null,"abstract":"In this paper, an innovative idea of secure and energy efficient electrocardiogram steganography based on Discrete Wavelet Transform (DWT) is proposed, in which different important ECG data are steganographed with variable embedding strengths so that the reconstructed ECG signal quality is preserved. Incorporating the proposed Unequal Steganography Embedding (USE) with Unequal Error Protection (UEP), the proposed scheme further improves transmission performance in terms of ECG signal quality, ensures the confidentiality as well as reliability of a user's data, and makes the transmission more energy efficient. Simulation results demonstrate that USE attains very low distortion (WWPRD less than 0.45 %). Furthermore, high correlation between host and stego ECG and ECG data remains diagnosable after steganography. Based on our literature reviews, the reliability, robustness, and energy efficiency of this proposed method are unmatched in comparison with any other published methods.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"68 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85731216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28DOI: 10.1109/ICC.2017.7997362
Sihem Ouahouah, T. Taleb, Jaeseung Song, Chafika Benzaid
Unmanned Aerial Vehicles (UAVs) are expected to be used everywhere to provision different services and applications, impacting different aspects of our daily lives. Basically, UAVs are characterized by their high mobility. Some may remain motionless for a specific time to perform pre-programmed missions. Whilst UAVs would be used for specific applications, they could additionally offer numerous IoT (Internet of Things) value-added services (VAS) when they are equipped with suitable IoT devices. Many IoT VAS applications require high amount of resources and/or diverse IoT devices that cannot be offered by a single UAV. In order to overcome this limitation, this paper aims to explore, i) the diversity of IoT devices on-board UAVs, and ii) the mobility of UAVs for offering UAVs-based IoT VAS. Two solutions are proposed for carrying out different IoT VAS. Both solutions are modeled using linear integer programming. While the first solution aims to reduce the energy consumption, the second one aims to shorten the response time. The simulation results demonstrate the efficiency of both solutions in achieving their design goals.
{"title":"Efficient offloading mechanism for UAVs-based value added services","authors":"Sihem Ouahouah, T. Taleb, Jaeseung Song, Chafika Benzaid","doi":"10.1109/ICC.2017.7997362","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997362","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are expected to be used everywhere to provision different services and applications, impacting different aspects of our daily lives. Basically, UAVs are characterized by their high mobility. Some may remain motionless for a specific time to perform pre-programmed missions. Whilst UAVs would be used for specific applications, they could additionally offer numerous IoT (Internet of Things) value-added services (VAS) when they are equipped with suitable IoT devices. Many IoT VAS applications require high amount of resources and/or diverse IoT devices that cannot be offered by a single UAV. In order to overcome this limitation, this paper aims to explore, i) the diversity of IoT devices on-board UAVs, and ii) the mobility of UAVs for offering UAVs-based IoT VAS. Two solutions are proposed for carrying out different IoT VAS. Both solutions are modeled using linear integer programming. While the first solution aims to reduce the energy consumption, the second one aims to shorten the response time. The simulation results demonstrate the efficiency of both solutions in achieving their design goals.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"29 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73883559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28DOI: 10.1109/ICC.2017.7996820
I. Chuang, Bing-Jie Guo, Jen-Sheng Tsai, Y. Kuo
Internet of Things (IoT) is an emerging network technology applied to provide various services in our daily life. Generally, IoT environments are composed of numerous heterogeneous devices with constrained resource. The limited capability of IoT devices makes it impractical to perform traditional security mechanisms, and thus IoT services are usually vulnerable to all kinds of security threats, such as impersonation and forgery attacks. Moreover, the inflexible protection provided by these security mechanisms leads to inefficiency because different services haves diverse requirements. To provide IoT services suitable security protection, Multi-graph Zero-knowledge-based Authentication System (M-ZAS), which is not only light-weight but also high-adaptive, is proposed. Compared to traditional authentication mechanisms as well as other Zero-knowledge-proof (ZKP) methods such as GMW-ZKP, M-ZAS provides higher performance and better security protection. In addition, M-ZAS has lower transmission overheads than GMW-ZKP does. Considering relevant contexts as parameters, M-ZAS provides adaptive protection to fulfill what users actually need. Experiment results show that M-ZAS is 3 times faster than GMW-ZKP and even 7 times than traditional authentication mechanisms in IoT devices. Also, M-ZAS reduces 3 times network traffic than GMW-ZKP. Thus, the proposed M-ZAS is the most practical authentication system in IoT environments.
物联网(Internet of Things, IoT)是一种新兴的网络技术,用于为我们的日常生活提供各种服务。通常,物联网环境由众多异构设备组成,资源受限。物联网设备的有限能力使得执行传统的安全机制变得不切实际,因此物联网服务通常容易受到各种安全威胁,例如冒充和伪造攻击。此外,这些安全机制提供的不灵活的保护导致效率低下,因为不同的服务有不同的需求。为了给物联网服务提供合适的安全保护,提出了轻量化、高自适应的多图零知识认证系统(M-ZAS)。与传统的认证机制以及GMW-ZKP等其他零知识证明(zero -knowledge proof)方法相比,M-ZAS提供了更高的性能和更好的安全保护。此外,M-ZAS的传动开销比GMW-ZKP要低。考虑到相关上下文作为参数,M-ZAS提供自适应保护,以满足用户的实际需要。实验结果表明,在物联网设备中,M-ZAS比GMW-ZKP快3倍,甚至比传统认证机制快7倍。此外,M-ZAS比GMW-ZKP减少了3倍的网络流量。因此,所提出的M-ZAS是物联网环境中最实用的认证系统。
{"title":"Multi-graph Zero-knowledge-based authentication system in Internet of Things","authors":"I. Chuang, Bing-Jie Guo, Jen-Sheng Tsai, Y. Kuo","doi":"10.1109/ICC.2017.7996820","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996820","url":null,"abstract":"Internet of Things (IoT) is an emerging network technology applied to provide various services in our daily life. Generally, IoT environments are composed of numerous heterogeneous devices with constrained resource. The limited capability of IoT devices makes it impractical to perform traditional security mechanisms, and thus IoT services are usually vulnerable to all kinds of security threats, such as impersonation and forgery attacks. Moreover, the inflexible protection provided by these security mechanisms leads to inefficiency because different services haves diverse requirements. To provide IoT services suitable security protection, Multi-graph Zero-knowledge-based Authentication System (M-ZAS), which is not only light-weight but also high-adaptive, is proposed. Compared to traditional authentication mechanisms as well as other Zero-knowledge-proof (ZKP) methods such as GMW-ZKP, M-ZAS provides higher performance and better security protection. In addition, M-ZAS has lower transmission overheads than GMW-ZKP does. Considering relevant contexts as parameters, M-ZAS provides adaptive protection to fulfill what users actually need. Experiment results show that M-ZAS is 3 times faster than GMW-ZKP and even 7 times than traditional authentication mechanisms in IoT devices. Also, M-ZAS reduces 3 times network traffic than GMW-ZKP. Thus, the proposed M-ZAS is the most practical authentication system in IoT environments.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90569662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-28DOI: 10.1109/ICC.2017.7997383
A. Wiśniewska, Bilal Khan, Ala Al-Fuqaha, K. Dombrowski, M. A. Shattal
As wireless devices continue to proliferate, spectrum management is essential to a healthy and functioning digital ecosystem. Here we present an evolutionary analysis of how interbrand relationships can be expected to evolve in the cognitive radio domain over long time scales. We find that a range of trajectories are possible, and that the eventual outcomes depend on a variety of system parameters including the number of users and transmission band switching costs. Starting from previous bio-socially inspired fair spectrum sharing protocols, we put forward an extended model of secondary user etiquette that allows for a range of inter-group dynamics to arise in the natural course of competition over and co-use of spectrum resources. We show that as populations grow, increases in transmission switching costs lead to evolutionary pressures toward increasing antagonism between brands, and that in such scenarios devices tend to segregate by brand across bands. Understanding the drivers behind emerging inter-brand dynamics from an evolutionary perspective is an important input to the long term view of the successful application of distributed spectrum access and cognitive radio.
{"title":"When brands fight over bands: Sociality in the cognitive radio ecosystem","authors":"A. Wiśniewska, Bilal Khan, Ala Al-Fuqaha, K. Dombrowski, M. A. Shattal","doi":"10.1109/ICC.2017.7997383","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997383","url":null,"abstract":"As wireless devices continue to proliferate, spectrum management is essential to a healthy and functioning digital ecosystem. Here we present an evolutionary analysis of how interbrand relationships can be expected to evolve in the cognitive radio domain over long time scales. We find that a range of trajectories are possible, and that the eventual outcomes depend on a variety of system parameters including the number of users and transmission band switching costs. Starting from previous bio-socially inspired fair spectrum sharing protocols, we put forward an extended model of secondary user etiquette that allows for a range of inter-group dynamics to arise in the natural course of competition over and co-use of spectrum resources. We show that as populations grow, increases in transmission switching costs lead to evolutionary pressures toward increasing antagonism between brands, and that in such scenarios devices tend to segregate by brand across bands. Understanding the drivers behind emerging inter-brand dynamics from an evolutionary perspective is an important input to the long term view of the successful application of distributed spectrum access and cognitive radio.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76807593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}