Du Yang, Alireza Esfahani, G. Mantas, Jonathan Rodriguez
{"title":"Jointly padding for subspace orthogonality against tag pollution","authors":"Du Yang, Alireza Esfahani, G. Mantas, Jonathan Rodriguez","doi":"10.1109/CAMAD.2014.7033211","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033211","url":null,"abstract":"Homomorphic Message Authentication Code (HMAC) is a low-complexity low-delay scheme for pollution detection is a Random Linear Network Coding (RLNC) enabled network. However, HMAC is vulnerable to tag pollution, in which an adversary node merely randomly modifies some MAC tags appended at the end of data packets. Existing tag pollution resistant solutions cause either high computation efforts long delay at relay nodes or substantial communication burden, or additional requirements such as synchronization at all nodes. In this paper, we combine the core ideas of two pollution detection schemes: “padding for orthogonality” and “Null key”, and propose a new pollution detection method by “jointly padding for subspace orthogonality” that is immune to tag pollution, remains low-complexity low-delay, low communication overhead, and no timing requirements.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127714349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural network based anomaly detection","authors":"C. Callegari, S. Giordano, M. Pagano","doi":"10.1109/CAMAD.2014.7033256","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033256","url":null,"abstract":"Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks management. To this aim it is essential to distinguish between the natural variability of traffic due to its bursty nature and attack-related anomalous events. In this paper we investigate the applicability of neural networks for traffic prediction, focusing on the multilayer feedforward architecture and comparing the performance of different back-propagation algorithms. Prediction is carried out for different random aggregates (obtained through reversible sketches, introduced to improve the scalability of the solution) of traffic flows and, after comparing the prediction error with a threshold, a voting procedure is used to decide about the nature of the current data (with the additional possibility of identifying anomalous flows thanks to the features of reversible sketches). The performance analysis, presented in this paper, demonstrates the effectiveness of the proposed method (in terms of low false alarm rates and convergence speed) for an adequate choice of the learning algorithm.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121619023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Colony Optimization for resource sharing among D2D communications","authors":"Eirini Liotou, D. Tsolkas, N. Passas, L. Merakos","doi":"10.1109/CAMAD.2014.7033266","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033266","url":null,"abstract":"Device-to-Device (D2D) communication has been recently devised as a new paradigm that boosts spectrum reuse inside a cell, leading to enhanced quality of service and user experience. The design of proper D2D resource allocation schemes, which constitute the enablers towards this direction, is an open challenge. In this paper, we propose a D2D resource allocator based on the Ant Colony Optimization (ACO) theory. ACO is exploited towards identifying interference isolated D2D links that can safely share the same resources, consulting a graph representation of the network. Simulation studies demonstrate the self-learning nature of this method, which results to a comparable performance to that of an optimal resource allocator of significantly higher computational complexity.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122918694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Association control in millimeterWave wireless access networks","authors":"G. Athanasiou, C. Weeraddana, C. Fischione","doi":"10.1109/CAMAD.2014.7033246","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033246","url":null,"abstract":"The resource allocation problem of optimal assignment of the stations to the available access points in 60 GHz millimeterWave wireless access networks is investigated. The problem is posed as a multi-assignment optimization problem. The proposed solution method converts the initial problem to a minimum cost flow problem and allows to design an efficient algorithm by a combination of auction algorithms. The solution algorithm exploits the network optimization structure of the problem, and thus is much more powerful than computationally intensive general-purpose solvers. Theoretical and numerical results evince numerous properties, such as optimality, convergence, and scalability in comparison to existing approaches.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122208007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Kollias, F. Adelantado, J. Vardakas, K. Ramantas
{"title":"Handover performance in LTE-A HetNets through inter-site distance differentiation","authors":"G. Kollias, F. Adelantado, J. Vardakas, K. Ramantas","doi":"10.1109/CAMAD.2014.7033250","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033250","url":null,"abstract":"Mobility Management in future cellular networks is becoming more challenging due to transition from macro only to multi-tier deployments. In this framework, the massive use of small cells rendered traditional Handover algorithms inappropriate to deal effectively with frequent Handovers, especially for fast users, in dense urban scenarios. Studies in this area focus mainly on the adjustment of the Hysteresis Margin and on the Time-to-Trigger (TTT) selection in line with the Self-Organized Networks (SON), concept. In that sense, the ability of each node to adapt its parameters to the actual scenario is considered vital for the smooth operation of the network. This work contributes to the latter by analyzing the dependence of the Handover performance on the inter-site distance between the macro cell and the small cell. Specifically, the most common KPIs (i.e. Handover, Ping Pong and Radio Link Failure probabilities) are analyzed for different inter-site distances and TTT values to provide solid basis for the TTT selection.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129831865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic aware resource mapping for future internet experimental facilities","authors":"Mary Giatili, C. Papagianni, S. Papavassiliou","doi":"10.1109/CAMAD.2014.7033206","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033206","url":null,"abstract":"Over the last decade, research experimental infrastructures have been widely deployed, enabling Future Internet experimental validation in realistic testing environments. Addressing resource management issues, such as discovery, selection, allocation and provisioning of resources, is crucial for the infrastructure's operation and efficiency in providing researchers with the appropriate experimentation environment. In this study we propose a semantic-based approach for topology mapping in the case of wireless research infrastructures, while we adopt and extend a semantic-based information model to describe wireless resources. The efficiency of the proposed scheme is evaluated via emulation.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Louvros, Michalis Paraskevas, V. Triantafillou, A. Baltagiannis
{"title":"LTE uplink delay constraints for smart grid applications","authors":"S. Louvros, Michalis Paraskevas, V. Triantafillou, A. Baltagiannis","doi":"10.1109/CAMAD.2014.7033216","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033216","url":null,"abstract":"LTE cell planning requires special constraints in case of smart grid applications. Cell planners decide about the cell coverage mostly based on worst radio conditions (cell edge) acceptable level of minimum throughput, but not on delay constraints which are of extreme importance for smart grid solutions. In this paper a semi-analytical approach for uplink cell planning with delay constraints for smart grid applications is proposed, using theoretical outputs from analytical mathematical models combined with real measurements from drive test.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilayer communication network architecture for wind power farm","authors":"Shahid Hussain, Young-Chon Kim","doi":"10.1109/CAMAD.2014.7033215","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033215","url":null,"abstract":"Wind is a sustainable renewable energy source, which has recently gained high popularity among the renewable energy sources. The high maintenance and repair cost of wind turbine needs real-time monitoring and control through networks. Network communication infrastructures play important roles for the real-time monitoring and control of wind power farms because these farms are located at remote and harsh environment sites. This paper proposes multilayer communication network architecture for monitoring and controlling of wind power farms which consists of wind power farm layer, local control center layer, regional control center layer, central control center layer and neighbor control center layer. Based on the logical node concept of IEC 61400-25 standard, wind turbine is modeled and simulated by four different information including analogue measurements, status information, protection and control information, and meteorological mast information through OPNET modular. The performance of the proposed network architecture is evaluated in terms of link bandwidth and latency.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116532288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Pamukov, V. Poulkov, A. Mihovska, N. Prasad, R. Prasad
{"title":"Lightweight robust cryptographic combiner for mobile devices: Crypto roulette","authors":"M. Pamukov, V. Poulkov, A. Mihovska, N. Prasad, R. Prasad","doi":"10.1109/CAMAD.2014.7033232","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033232","url":null,"abstract":"The amount of data that requires secure transmission over heterogeneous networks has increased dramatically during the last decade and the trend is ongoing. This leads to increased performance and security demands on cryptographic systems. In this paper, a novel cryptographic system is proposed, named `Crypto Roulette', which improves secrecy and robustness. This is accomplished by combining multiple symmetric cryptographic algorithms to create a cryptographic combiner. The throughput of the Crypto Roulette is compared to modern symmetric algorithms and cascade encryption algorithms.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Yannuzzi, R. Milito, R. Serral-Gracià, D. Montero, M. Nemirovsky
{"title":"Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing","authors":"M. Yannuzzi, R. Milito, R. Serral-Gracià, D. Montero, M. Nemirovsky","doi":"10.1109/CAMAD.2014.7033259","DOIUrl":"https://doi.org/10.1109/CAMAD.2014.7033259","url":null,"abstract":"This paper examines some of the most promising and challenging scenarios in IoT, and shows why current compute and storage models confined to data centers will not be able to meet the requirements of many of the applications foreseen for those scenarios. Our analysis is particularly centered on three interrelated requirements: 1) mobility; 2) reliable control and actuation; and 3) scalability, especially, in IoT scenarios that span large geographical areas and require real-time decisions based on data analytics. Based on our analysis, we expose the reasons why Fog Computing is the natural platform for IoT, and discuss the unavoidable interplay of the Fog and the Cloud in the coming years. In the process, we review some of the technologies that will require considerable advances in order to support the applications that the IoT market will demand.","PeriodicalId":111472,"journal":{"name":"2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"164 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120872557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}