{"title":"Monte Carlo simulation based algorithm design for automatic learning machine performance analysis","authors":"Smail Tigani, M. Ouzzif, A. Hasbi","doi":"10.1109/NGNS.2014.6990221","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990221","url":null,"abstract":"This paper proposes advanced key performance indicators dedicated to learning machines and auto-adaptive systems performance analysis. This work introduces an algorithm implementing designed key performance indicators for automatic learning capacity checking. The algorithm simulates the supervised environment to stimulate the tested auto-adaptive machine and then study its adaption capacity based on indicators statistically designed.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123847342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Essaid Sabir, Mohamed Nabil Saidi, M. Boutabia, Mohammed Sadik
{"title":"An information-jamming-based incentive mechanism for channel selection","authors":"Essaid Sabir, Mohamed Nabil Saidi, M. Boutabia, Mohammed Sadik","doi":"10.1109/NGNS.2014.6990223","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990223","url":null,"abstract":"We consider a radio cell composed of one single Base Station (BS) and possibly several users. We are particularly interested in analyzing the behavior of two special users. On one hand, the first user (called the sender) has access to multiple channels and has to choose a channel to transmit its data. Obviously, the sender seeks to transmit using the best channel among the L available channels in the system. Indeed, he/she “senses” each channel by sending probes to the BS. Then, the base station sends back the global interference (interference plus noise) on each channel. On the other hand, the second user (called the jammer) blocks the information sent by the BS to the user for some channels. We formulate this interaction as a zero-sum non-cooperative game. Then, we discuss the optimal strategy for each user and analyze the equilibrium point of the game for pure and mixed strategies. Many results are drawn such as characterization of pure strategies and derivation of saddle point policies for both players. Next, we provide a discussion on how our proposal could be implemented for cooperative sensing in cognitive radio networks. Our solution has the benefit of being completely distributed and near optimal channel assignment is met without coordination/signaling. We finally show, by solving the derived dynamic programs, that setting a transmission cost sustains fairness and incites for better channel assignment.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing privacy on Mobile Health: An integrated privacy module","authors":"Souad Sadki, Hanan El Bakkali","doi":"10.1109/NGNS.2014.6990259","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990259","url":null,"abstract":"The evolution of mobile communication in the health sector has improved patients' quality of care. Nowadays, doctors can make diagnosis even though the patient is miles away using mobile technologies such as smart phones or tablet PCs. Nevertheless, the exchange of medical information through mobile devices brings on serious threats to patients' privacy. We believe that privacy must be considered during the development of any mobile healthcare system. In this paper we discuss the efficiency of current privacy and security protection mechanisms used in current mobile systems. The nature and the diversity of medical information shared between different entities (physicians, hospitals, laboratories, pharmacies...) increases privacy and security risks. Thus, we introduce a new conceptual module to preserve privacy in mobile healthcare. By integrating this module into current mobile healthcare systems architecture, we obtain a privacy-preserving system enabling patients to monitor and manage the disclosure of their sensitive health information during a mobile transaction.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Telecommunications market share game with ambiguous pricing strategies","authors":"Toufik Mouhyiddine, Essaid Sabir, Mohammed Sadik","doi":"10.1109/NGNS.2014.6990253","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990253","url":null,"abstract":"The purpose of this article is to bring interesting findings about consumer confusion. Obviously one of the major economic challenge is to define the most realistic consumer model on the purchasing decision making. This decision is highly limited by the information they have, the cognitive limitations of their minds, and the finite amount of time they have to make a choice. The notion of consumer confusion has recently gained considerable popularity in the economics such as behavioral sciences leading researchers to propose appropriate models to understand their impact on the competition. We propose on this paper a new approach concerning the consumer confusion using game-theoretical analysis which describe the interactions between two concurrent service providers and the effect of this confusion on the competition. In this paper we consider a duopoly model of rational Service providers competing to maximize profit in a market of confused and non confused population. We prove using non cooperative game theory inside a confused environment, contrary to what seems intuitively right, that there is a Nash equilibrium to this pricing game. We also show that the stability of this competition is verified under some conditions on price sensitivity and the ISPs use advertising to increase their benefit among the confused subscribers.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123420790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of a node's death on behavior of the LEACH protocol and its descendants","authors":"Abedelhalim Hnini, Abdellah Ezzati, A. Hajami","doi":"10.1109/NGNS.2014.6990219","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990219","url":null,"abstract":"Wireless sensor networks have gained major attention from most of the recent research community. One of the important issues in this type of networks is the inherent limited power of the network sensor nodes. Hierarchical routing protocols are incorporate of efficiently balancing the load on the sensor nodes. But, dice the death of some nodes to the network begins to deteriorate more and more. This paper describes the comparative analyses of LEACH protocol with its various descendants in the level on the influence of network after the event of the death of a node regardless the node (C-H node or member node). In addition, we have given some relief proposals to strengthen the network in particular cases and its implementation in Network Simulator (NS2).","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new MANETs clustering algorithm based on nodes performances","authors":"M. Dyabi, A. Hajami, H. Allali","doi":"10.1109/NGNS.2014.6990222","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990222","url":null,"abstract":"A mobile ad hoc network (MANET) is a dynamic wireless network which can be formed without the need for any pre-existing infrastructure in which each node can act as a router. In comparison with fixed networks, some new security issues have arisen with the introduction of MANETs. Secure routing, in particular, is an important and complicated issue. Organizing mobile nodes into manageable clusters can limit the amount of secure routing information. Under a cluster structure, mobile nodes are managed by nodes called cluster heads. The clusterhead role is resource consuming since its always switched on and is responsible for the long-range transmission. If a node has this role, it would burn its resource quickly, and after it died, all its members would be headless. In this work, we propose a new clustering algorithm for ad hoc networks, where the clusters are formed around the most powerful nodes, i.e, the node that has the best material resources such as residual energy, free memory, processor speed and hard disk space is elected as cluster head. Our algorithm takes into account the node range by including in our calculation the node density. Therefore, we are sure that the cluster head is represented by the most powerful and the less mobile node in the network that can perform its roles in the best conditions. This solution will be used to manage cryptographic keys in an ad hoc network. Our algorithm gives major improvements regarding the number and the performance of elected cluster heads. Analysis and simulation results are used to show the performance of our algorithm, compared with other clustering algorithms in literature.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and analyzing precision time protocol — Application to prototyping distributed embedded systems","authors":"M. Chkouri, M. Bozga","doi":"10.1109/NGNS.2014.6990220","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990220","url":null,"abstract":"Prototyping distributed embedded system can be seen as a collection of many requirements covering many domains. System designers and developers need to describe both functional and non-functional requirements. Building distributed systems is a very tedious task since the application has to be verifiable and analyzable. Architecture Analysis and Design Language (AADL) provides adequate syntax and semantics to express and support distributed embedded systems. This paper studies a general methodology for prototyping distributed applications using the Precision Time Protocol (PTP) for building and translating AADL systems into a distributed application using network communication protocol. This allows simulation of systems specified in AADL to fully assess system viability, to refine and to correct the behavior of the system using the BIP (Behavior Interaction Priority) toolset.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132093818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Zerrik, Amina El ouadghiri, D. El Ouadghiri, Rachid Atay, M. Bakhouya, J. Gaber
{"title":"Towards a decentralized and adaptive software-defined networking architecture","authors":"S. Zerrik, Amina El ouadghiri, D. El Ouadghiri, Rachid Atay, M. Bakhouya, J. Gaber","doi":"10.1109/NGNS.2014.6990272","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990272","url":null,"abstract":"Software-defined networking (SDN) is the rising technology in near future to build programmable networks as a way to simplify the evolution of networks. It is a new networking paradigm with the main aim is to decouple forwarding hardware from control decisions. However, existing SDN architectures are centralized and then cannot meet the requirements of both scalability and adaptability simultaneously. The way in which they have typically been constructed is often very inflexible due to the risk of bottlenecks. Issues are that SDN architectures must be able to scale to billions of nodes, able to adapt to dynamic conditions, must be highly available, secure and should require minimal human configuration and management. Therefore, new architectures are required and need to be highly flexible with self-organizing capabilities in order to cope with a dynamically changing environment. In this paper, a decentralized architecture is introduced. Design concepts are presented to highlight its operation modes.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youness Boukouchi, Adil Khamal, A. Marzak, Hicham Moutachaouik
{"title":"QMGenerator: Generation of quality models from a metamodel based on The MDA approach","authors":"Youness Boukouchi, Adil Khamal, A. Marzak, Hicham Moutachaouik","doi":"10.1109/NGNS.2014.6990275","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990275","url":null,"abstract":"Today, technology and IT platforms are in continuous exponential growth, however, this growth has created several problems related to portability, reusability, interoperability but most important of all is the fact that it is related to the software quality. From these facts, the OMG proposed the Model Driven Architecture (MDA), which is based on the models as independent primary objects of any platform, and which are transformed thereafter into other objects specific to each platform (code, dB count, XMLFile,...). Therefore, to assess and ensure the quality of software, stakeholders (designer, developers, users, &) in this domain, need a quality model, the most difficult thing to do is to choose it from a diversity of models taking into account the rarity of the meta-models. Based on the MDA approach, this article will introduce a software quality and quality models, a comparison of model structures, our meta-model of software quality and finally, the proposal of a process of generating models by our QMGenerator Framework of software quality.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114744094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compressed and distributed host identity protocol for end-to-end security in the IoT","authors":"Somia Sahraoui, A. Bilami","doi":"10.1109/NGNS.2014.6990267","DOIUrl":"https://doi.org/10.1109/NGNS.2014.6990267","url":null,"abstract":"Wireless Sensor Networks (WSNs), as a key part of the Internet of Things (IoT), allow the representation of the dynamic characteristics of the physical world in the Internet's virtual world. Thus, sensor nodes are henceforth considered as Internet hosts and may act freely as web clients or servers. Undoubtedly, security and end-users privacy issues rise and become more severe in the IoT, due to the asymmetric nature of the communications between sensor nodes and the ordinary Internet hosts. Many solutions propose to use the classical IP-based security protocols for IoT, after adapting them to WSN's constraints by either messages compression or computational-load distribution techniques. In this paper we propose a 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) compression model for HIP (Host Identity Protocol) header, as well as, an adapted distribution scheme of the computational load in HIP's key agreement process. For an extreme lightweight end-to-end security, we propose to combine both compression and distribution models for HIP in WSNs side, in the IoT. The partial evaluation results show that the proposed protocol, named compressed and distributed HIP (CD-HIP), is more adapted than the standard HIP, while introducing minor header communication overhead.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}