{"title":"Simulating worm propagation in interconnected peer-to-peer networks","authors":"M. Rguibi, N. Moussa","doi":"10.1109/COMMNET.2018.8360274","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360274","url":null,"abstract":"Peer-to-peer computing (P2P) refers to the famous technology that provides peers an equal spontaneous collaboration in the network by using appropriate information and communication systems without the need for a central server coordination. Today, the interconnection of several P2P networks has become a genuine solution for increasing system reliability, fault tolerance and resource availability. However, the existence of security threats in such networks, allows us to investigate the safety of users from P2P threats by studying the effects of competition between these interconnected networks. In this paper, we present an e-epidemic model to characterize the worm propagation in an interconnected peer-to-peer network. Here, we address this issue by introducing a model of network competition where an unprotected network is willing to partially weaken its own safety in order to more severely damage a more protected network. The unprotected network can infect all peers in the competitive networks after their non react against the passive worm propagation. Our model also evaluated the effect of an immunization strategies adopted by the protected network to resist against attacking networks. The launch time of immunization strategies in the protected network, the number of peers synapse connected to the both networks, and other effective parameters have also been investigated in this paper.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mounia Bouabdellah, Faissal El Bouanani, H. Ben-Azza
{"title":"Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels","authors":"Mounia Bouabdellah, Faissal El Bouanani, H. Ben-Azza","doi":"10.1109/COMMNET.2018.8360281","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360281","url":null,"abstract":"Wireless communication systems are vulnerable to eavesdropping attack in which the attacker overhear the transmitted data in the network. Hence, the physical-layer security is of utmost importance to protect the wireless communications against the eavesdropping attack. In this paper, we study the physical-layer security of a two-hops cognitive radio-based communication system where the secondary user sends some confidential information to a destination through a relay. This relay is assumed to be equipped with multiple antennas for reception, applies the maximum-ratio combining technique for the received signals, and uses only one antenna to forward the combined signal to the destination. The transmission is performed under the eavesdropper's attempt to listen to the communication channel. The secrecy outage probability and the intercept probability are both derived based on the statistical characteristics of the channels and under the constraint of avoiding the communication outage of the primary user. All results have been validated using Monte Carlo method.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125797785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualization of the smart grid using entity/relation model","authors":"Imane Worighi, A. Maach","doi":"10.1109/COMMNET.2018.8360263","DOIUrl":"https://doi.org/10.1109/COMMNET.2018.8360263","url":null,"abstract":"Not far into the future, the Smart Grid is regarded as the next generation power grid. In fact, this system uses information, two-way cyber-secure communication technologies, and computational intelligence. It is an integrated fashion across electricity generation, transmission, distribution, storage and consumption. This will achieve a system that is clean, safe, secure, reliable, resilient, efficient, and sustainable. Therefore, the power grid needs to integrate reliable components, smart devices, distributed energy resources (DER), energy storage system (ESS) and advanced ICT. To do so, a virtualization of the system is primordial in order to test the implementation of such components and avoid costly operations. In this paper, we propose an object-oriented model to determine actors and highlight their roles and interactions. The effectiveness of the proposed modeling concept is shown through an entity/relation model. To validate our model, we focus on demand response and dynamic pricing programs. The objective is to explore the effect of a residential double-auction market, using transactive controllers and billing mode. Simulation results show that the association of automated bidding and demand response leads to utility demand reduction. Moreover, it helps customers to control their bill and use the electricity wisely.","PeriodicalId":103830,"journal":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115335969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}