{"title":"Optimizing WSN lifetime based on a new centrality multi-criteria routing approach","authors":"E. H. Fouad, L. Cherkaoui, Douzi Khadija","doi":"10.1109/COMMNET.2018.8360275","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360275","url":null,"abstract":"Wireless sensor networks are provided to be the key technology for Internet of Things and a medium between physical infrastructure, information and communication technologies. This requires a constantly growing necessity for efficient energy and resource management of overall sensor network, in order to guarantee a reliable and efficient infrastructure for IoT systems. Routing approaches, especially conceived for wireless sensor networks, diversify according to the application requirements, applied mechanisms and network topology. In this article, a new adaptive and dynamic multi-constraint routing approach is presented. This approach provides a routing mechanism, which create the routing tree based on the evaluation of many criteria. These criteria are combination of two parts; those presented the global aspect of network like the topological metrics (centrality measures, distances) of nodes and those who formed a field representing local metrics like estimated power consumption to reach each directly neighbour and residual energy of each node. These criteria are controlled and supervised dynamically through a detection scheme. In addition, a dynamic selection mechanism based on multi attribute decision-making (MADM) methods is implemented to build and update the routing tree. In response to changes in the network state, criteria and application-defined goals, the elect mechanism provides the best routing neighbour between each node and the Sink.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125645071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New efficient decoding algorithm of the (17, 9, 5) quadratic residue code","authors":"Hamza Boualame, Idriss Chana, M. Belkasmi","doi":"10.1109/COMMNET.2018.8360258","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360258","url":null,"abstract":"In recent years, the decoding of quadratic residue (QR) codes has attracted a wide attention, considering their good properties in terms of minimal distance and special mathematic structure that make them one of the most known subclasses of codes in the family of cyclic codes. These codes are known for their complicated decoding procedure and the difficult hardware implementation. In this paper, we propose a new decoding method to decode the (17,9,5) quadratic residue code. This method does require neither the computation of the unknown syndromes nor the error-locator polynomial, instead, it decodes the discussed code by using a simple way to locate the position of the errors. To ensure the validity of the proposed method, we tested all the possible error patterns. and the results were very satisfying since the proposed decoder corrected all of them. So, we declare that this decoder can surely decode up to the to correcting capacity of this code.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132547180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Miniaturization of a printed dipole antenna using metamaterials for RFID UHF technology","authors":"El Yousfi Ahmed, Abdenacer Es-Salhi","doi":"10.1109/COMMNET.2018.8360260","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360260","url":null,"abstract":"In this paper, we propose a new antenna based on metamaterials destined for radio frequency identification (RFID) technology operating in the ultra high frequency band (UHF). This antenna is constituted by a dipole printed on an FR 4 substrate associated to a set of metamaterial cells composed by square split ring resonators (SRR). Thanks to the effect of the negative permeability of these cells around the resonance frequency of the studied antenna, we could improve the antenna performances (gain and directivity) and also reduce its size. In fact the printed dipole antenna initially resonates at 2.8 GHz (Wi MAX). Then by inserting 8 SRR cells in the vicinity of the dipole antenna, the resonance frequency is reduced to 2.45GHz, which corresponds to the UHF RFID applications, with a size reduction of about 13%. This reduction is very important for RFID technology that requires miniature antennas. The MWS CST simulation software is used to determine return loss, resonance frequency, bandwidth, directivity, gain, and radiation pattern.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132661273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A graph-based approach for composite infrastructure service deployment in multi-cloud environment","authors":"Driss Riane, Ahmed Ettalbi","doi":"10.1109/COMMNET.2018.8360254","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360254","url":null,"abstract":"Cloud computing technology offers on-demand access to different cloud services over the Internet. To benefit from the diversity of IaaS offers and pricing models, IaaS users are looking into solutions that minimize the overall infrastructure leasing cost without adversely affecting their customers. To solve the complexity of composite infrastructure service deployment across multiple Clouds, an automated approach is required to meet user requirements such as minimum deployment cost and high reliability. In this paper, we propose a new approach for composite infrastructure service deployment in multi-cloud environment. In our approach, we introduce the main phases of an efficient mapping of user requests to the most appropriate composition of cloud services while minimizing the total deployment cost.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"12 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132088902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical layer security of interference-limited land mobile satellite communication systems","authors":"Vinay Bankey, P. K. Upadhyay, D. B. D. Costa","doi":"10.1109/COMMNET.2018.8360285","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360285","url":null,"abstract":"In this paper, we investigate the secrecy performance of a downlink land mobile satellite (LMS) system, where a satellite transmits signal to a legitimate user in the presence of an eavesdropper at the ground. Herein, we consider that co-channel interference signals are present at the user destination node. By leveraging the statistics of underlying Shadowed-Rician fading channels for satellite links and Nakagami-m fading for interfering terrestrial links, we derive an accurate expression for secrecy outage probability (SOP) of the considered LMS system. To gain more insights, we derive an asymptotic expression for SOP at high signal-to-noise ratio regime and illustrate that system can attain a unity diversity order even under the influence of interferers. Subsequently, we also deduce the expression for probability of non-zero secrecy capacity. The analytical results are validated through Monte-Carlo simulations and utilized to reveal the impact of various key channel/system parameters in understanding the physical layer security aspects of LMS system.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133632418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impacts of dynamic and static resource allocation in a wireless body area network","authors":"Said Lakhal, Z. Guennoun","doi":"10.1109/COMMNET.2018.8360257","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360257","url":null,"abstract":"The sensors of wireless body area network (WBAN) capture the vital signs, monitor the patient's health state, process data and communicate with the healthcare service. Sometimes, the transmitted information is urgent, requiring a real time arrival, to request an immediate intervention. In this work, we propose a hybrid approach between dynamic and static resource allocation, to minimize the response time and maximize the number of patients served. The results of the comparison show that this approach is effective in terms of response time, but not in terms of decision.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132568741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olivier Debauche, Saïd Mahmoudi, Mohammed Amin Belarbi, M. Adoui, S. Mahmoudi
{"title":"Internet of Things: Learning and practices. Application to smart home","authors":"Olivier Debauche, Saïd Mahmoudi, Mohammed Amin Belarbi, M. Adoui, S. Mahmoudi","doi":"10.1109/COMMNET.2018.8360247","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360247","url":null,"abstract":"Internet of Things is becoming widely present in our daily life. In fact, more and more devices able to interact together have been recently designed and launched in the market. Learning Internet of Things technologies is becoming unavoidable in education. In this paper, we propose a practical approach allowing to progressively learn, by practice the, essential concepts of Internet of Things applied to Smart Homes. From basic knowledge of C++ language and the use of Arduino or its derived, students can develop skills and also smart applications in the field of Internet of Things.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128787102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breaking LFSR using ant colony optimization","authors":"Hicham Grari, Ahmed Azouaoui, K. Zine-dine","doi":"10.1109/COMMNET.2018.8360270","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360270","url":null,"abstract":"Ant Colony Optimization is a search meta-heuristic inspired by the behavior of real ant colonies and shown their effectiveness, robustness to solve a wide variety of complex problems. In this paper, we present a novel Ant Colony Optimization (ACO) based attack for cryptanalysis of Linear Feedback Shift Registers (LFSR). A known plaintext attack is used to discover the primitive polynomial used in the LFSR. Moreover, our approach allows us to find a linear equivalence of a given key stream through finding the feedback function. Experimental results prove that ACO can be used as an effective tool to break LFSR.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124038283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samia Al Fallah, M. Arioua, A. Oualkadi, Jihane El Asri
{"title":"On the performance of piecewise linear approximation techniques in WSNs","authors":"Samia Al Fallah, M. Arioua, A. Oualkadi, Jihane El Asri","doi":"10.1109/COMMNET.2018.8360262","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360262","url":null,"abstract":"Energy consumption is the major constraint in the design and the deployment of Wireless Sensor Networks (WSNs). Since the transmission of data induces high energy costs in WSN device, many research efforts focus on reducing the transmission of the raw data by using lossy compression methods in order to improve energy efficiency with an acceptable data reconstruction tolerance. Thus, an intricate trade-off exists between energy saving using sampling compression, and the distortion of reconstructed data samples. In this paper, we present a survey on Piecewise Linear Approximation methods. A comparative analysis aims to evaluate the performance of the selected techniques in terms of energy consumption, compression ratio and distortion.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"44-46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132206881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sara Al Maeeni, P. Sofotasios, S. Muhaidat, G. Karagiannidis
{"title":"Analysis of differentially modulated cooperative communications over asymmetric fading channels","authors":"Sara Al Maeeni, P. Sofotasios, S. Muhaidat, G. Karagiannidis","doi":"10.1109/COMMNET.2018.8360284","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360284","url":null,"abstract":"Differential modulation has largely re-attracted the attention of academia and industry due to its advantages relating to simple implementation and no need for knowledge of channel state information. The present work analyzes the average bit error rate performance of dual-hop cooperative systems over generalized multipath fading conditions. The considered system is differentially modulated and is assumed to operate based on the amplify-and-forward relaying protocol. Therefore, the main advantage of the considered set up is that it does not require any channel state information neither at the relay nor at the destination nodes. Novel closed-form expressions are derived for the end-to-end error rate under asymmetric generalized multipath fading conditions, which are encountered in realistic wireless communication scenarios. These expressions are subsequently employed in quantifying the effect of generalized fading conditions on the achieved bit error rate performance. It is shown that the impact of multipath fading and shadowing effects is detrimental at both high and low signal-to-noise ratio regimes as the corresponding deviations are often close to an order of magnitude. The incurred difference is also significantly different than the conventional Rayleigh fading conditions, which verifies that accurate channel characterization is of paramount importance in the effective design of conventional and emerging wireless technologies. In addition, it indicates that differential modulation can be a suitable modulation scheme for relay systems, under certain conditions, since it can provide adequate performance at a reduced implementation complexity.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126841916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}