2018 International Conference on Advanced Communication Technologies and Networking (CommNet)最新文献

筛选
英文 中文
Simulating worm propagation in interconnected peer-to-peer networks 模拟蠕虫在相互连接的点对点网络中的传播
M. Rguibi, N. Moussa
{"title":"Simulating worm propagation in interconnected peer-to-peer networks","authors":"M. Rguibi, N. Moussa","doi":"10.1109/COMMNET.2018.8360274","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360274","url":null,"abstract":"Peer-to-peer computing (P2P) refers to the famous technology that provides peers an equal spontaneous collaboration in the network by using appropriate information and communication systems without the need for a central server coordination. Today, the interconnection of several P2P networks has become a genuine solution for increasing system reliability, fault tolerance and resource availability. However, the existence of security threats in such networks, allows us to investigate the safety of users from P2P threats by studying the effects of competition between these interconnected networks. In this paper, we present an e-epidemic model to characterize the worm propagation in an interconnected peer-to-peer network. Here, we address this issue by introducing a model of network competition where an unprotected network is willing to partially weaken its own safety in order to more severely damage a more protected network. The unprotected network can infect all peers in the competitive networks after their non react against the passive worm propagation. Our model also evaluated the effect of an immunization strategies adopted by the protected network to resist against attacking networks. The launch time of immunization strategies in the protected network, the number of peers synapse connected to the both networks, and other effective parameters have also been investigated in this paper.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels 瑞利衰落信道下认知无线网络的保密中断概率
Mounia Bouabdellah, Faissal El Bouanani, H. Ben-Azza
{"title":"Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels","authors":"Mounia Bouabdellah, Faissal El Bouanani, H. Ben-Azza","doi":"10.1109/COMMNET.2018.8360281","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360281","url":null,"abstract":"Wireless communication systems are vulnerable to eavesdropping attack in which the attacker overhear the transmitted data in the network. Hence, the physical-layer security is of utmost importance to protect the wireless communications against the eavesdropping attack. In this paper, we study the physical-layer security of a two-hops cognitive radio-based communication system where the secondary user sends some confidential information to a destination through a relay. This relay is assumed to be equipped with multiple antennas for reception, applies the maximum-ratio combining technique for the received signals, and uses only one antenna to forward the combined signal to the destination. The transmission is performed under the eavesdropper's attempt to listen to the communication channel. The secrecy outage probability and the intercept probability are both derived based on the statistical characteristics of the channels and under the constraint of avoiding the communication outage of the primary user. All results have been validated using Monte Carlo method.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Virtualization of the smart grid using entity/relation model 使用实体/关系模型的智能电网虚拟化
Imane Worighi, A. Maach
{"title":"Virtualization of the smart grid using entity/relation model","authors":"Imane Worighi, A. Maach","doi":"10.1109/COMMNET.2018.8360263","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360263","url":null,"abstract":"Not far into the future, the Smart Grid is regarded as the next generation power grid. In fact, this system uses information, two-way cyber-secure communication technologies, and computational intelligence. It is an integrated fashion across electricity generation, transmission, distribution, storage and consumption. This will achieve a system that is clean, safe, secure, reliable, resilient, efficient, and sustainable. Therefore, the power grid needs to integrate reliable components, smart devices, distributed energy resources (DER), energy storage system (ESS) and advanced ICT. To do so, a virtualization of the system is primordial in order to test the implementation of such components and avoid costly operations. In this paper, we propose an object-oriented model to determine actors and highlight their roles and interactions. The effectiveness of the proposed modeling concept is shown through an entity/relation model. To validate our model, we focus on demand response and dynamic pricing programs. The objective is to explore the effect of a residential double-auction market, using transactive controllers and billing mode. Simulation results show that the association of automated bidding and demand response leads to utility demand reduction. Moreover, it helps customers to control their bill and use the electricity wisely.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115335969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信