2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETs 基于宽带的多路径路由协议QoS增强机制
R. Zaghal, Saeed Salah, M. Ismail
{"title":"An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETs","authors":"R. Zaghal, Saeed Salah, M. Ismail","doi":"10.1109/NTMS.2018.8328681","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328681","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) usually suffer from high packet loss and high link failure rates. These challenges usually increase congestion on some links while other links are almost free. In this paper, we propose a novel mechanism to enhance QoS in multipath routing protocols in MANETs based on the InfiniBand (IB) QoS architecture. The basic idea of our approach is to enhance the load balancing and thus reduce congestion on overloaded links. This mechanism has enabled us to (1) give critical applications higher priority when routing their packets across the network, (2) effectively manage frequent connections and disconnections and thus reduce link failures and packet loss rates, and (3) reduce the overall power consumption as a consequence of the previous gains. We have tested the scheme on the (IBsim) simulator and achieved significant improvements in QoS parameters compared to two well- known routing protocols: AODV and AOMDV.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security 基于MapReduce的Top-k排序网络用户配置文件构建方法
A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes
{"title":"MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security","authors":"A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes","doi":"10.1109/NTMS.2018.8328702","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328702","url":null,"abstract":"Network-user profiling has been used as security technique to detect unknown or malicious behaviors. Top-k rankings of reached services is a new technique for building user profiles. This technique requires to keep in memory all the traffic data during a period of time to build the rankings. However, a single user can produce gigabytes of network traffic data, which may result in low execution performance and out-of memory errors. This work proposes a MapReduce approach that generates top-k rankings from huge network capture files.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Phone Application for Indoor Localization Based on Ble Signal Fingerprint 基于Ble信号指纹的室内定位手机应用
B. Benaissa, Filip Hendrichovsky, Kaori Yishida, M. Köppen, P. Sinčák
{"title":"Phone Application for Indoor Localization Based on Ble Signal Fingerprint","authors":"B. Benaissa, Filip Hendrichovsky, Kaori Yishida, M. Köppen, P. Sinčák","doi":"10.1109/NTMS.2018.8328729","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328729","url":null,"abstract":"Indoor position of devices and persons is a very valuable information for context-aware devices and human activity recognition. The need of such information grows bigger by the advancement of IoT technologies. In this paper, we discuss existing indoor positioning approaches and their applications, give specific interest to the signal strength fingerprint approaches, to which belongs the presented paper. Bluetooth Low Energy Beacons are used as the source of the signal, and the Radial Basis Functions method is employed to create a model that relates to signal strength and position. The proposed approach allows the possibility of making all the computation on a smartphone application, namely, offline data collection and model computation, and online position estimation. Besides, it allows updating the model later.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133634543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Demand Side Management in Smart Grids: A Stackelberg Multi Period Multi Provider Game 智能电网中的需求侧管理:一个Stackelberg多周期多供应商博弈
Hala Alsalloum, A. Masri, L. Merghem, Rana Rahim
{"title":"Demand Side Management in Smart Grids: A Stackelberg Multi Period Multi Provider Game","authors":"Hala Alsalloum, A. Masri, L. Merghem, Rana Rahim","doi":"10.1109/NTMS.2018.8328687","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328687","url":null,"abstract":"In the smart grid context, with the growth of the energy demand, Demand Side Management (DSM) is a good solution to balance the power consumption and the power generation. Its main goal is to satisfy the two essential actors: the providers and the consumers, in order to improve the reliability and the efficiency of the smart grid. With the integration of renewable energies, the number of providers increases leading to introducing many challenges in the load control. In this paper, we propose a novel real time pricing algorithm based on Stackelberg game. It defines the consumers' energy consumption and the providers' price by taking advantages of the bidirectional communication infrastructure in such way to minimize the consumers' bills and maximize the providers' profit; these two concepts become nowadays a portfolio to work on. In this game, different active consumers (i.e. prosumers) negotiate with different energy providers. The performance of our algorithm is proved through extensive simulations. The coherence between the prices/demands deal is shown with two scenarios compared to the literature.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS 基于区块链的高效分布式许可与撤销合作ITS
Noureddine Lasla, M. Younis, Wassim Znaidi, Dhafer Ben Arbia
{"title":"Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS","authors":"Noureddine Lasla, M. Younis, Wassim Znaidi, Dhafer Ben Arbia","doi":"10.13016/M2SB3X16W","DOIUrl":"https://doi.org/10.13016/M2SB3X16W","url":null,"abstract":"Cooperative Intelligent Transportation System (C- ITS) enables inter-networking of vehicles for alerts exchanging in order to improve road safety. While this technology is about to enter the market in the upcoming years, critical questions related to the communication security continue to be challenging research concerns. Current solutions to secure inter-vehicle communication depend mainly on the use of digital certificates for authentication. However, such an approach imposes significant overhead on vehicles since it is computationally demanding and requires validation of the certificate within a limited period. In addition, relying on a central node for deciding on issuing and revoking certificates introduces a single point of failure and could even risk the safety of motorists. In this paper, we propose the use of Blockchain to keep track of the certificate of each vehicle (valid or revoked) in distributed and immutable records. In essence we replace certificate verification with a lightweight blockchain-based authentication approach. In addition, we propose a fully distributed vehicle admission/revocation scheme. We show that our scheme could alleviate the computation overhead and enhance the response time while improving the overall system security.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Multi-Provider Secure Virtual Network Embedding 多提供者安全虚拟网络嵌入
Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu
{"title":"Multi-Provider Secure Virtual Network Embedding","authors":"Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu","doi":"10.1109/NTMS.2018.8328706","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328706","url":null,"abstract":"Network virtualization enables tenants to lease computing and networking resources from one or more infrastructure provider (InP), like in Infrastructure as a Service (IaaS). As such, tenants outsource their networks, fully or partially, to reduce their capital expenditure, while expecting to still provide the same quality of service to their customers. Yet, such services may rely on data considered as sensitive by tenants, tenants' customers or the law, which should be protected appropriately. Besides, personal data protection laws paired with the objective to offer an optimal customer experience may lead tenants to distribute their virtual networks over multiple InPs. Yet, the interconnection between different InPs should respect their security policies. In this paper, we aim to ease the adoption of network virtualization by guaranteeing both tenants and InPs that their security policies are all enforced when creating a virtual network. To this end, we present a Virtual Network Embedding solution in a multi-provider context, and how we leverage it in a use case.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128674227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Small Transactions with Sustainable Incentives 可持续激励下的小额交易
Fabio Pianese, Matteo Signorini, Souradip Sarkar
{"title":"Small Transactions with Sustainable Incentives","authors":"Fabio Pianese, Matteo Signorini, Souradip Sarkar","doi":"10.1109/NTMS.2018.8328744","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328744","url":null,"abstract":"The design of a successful distributed system for enabling payments and small transactions among Internet users has long been a major challenge in applied computer science. Bitcoin, the first cryptocurrency having reached world-wide popularity, suffers from sustainability problems such as inefficient energy expenditure for its network operation and from perverse incentives that foster speculative hoarding behavior. We propose a digital transfer system based on a variant of the Bitcoin ledger that is meant to support deterministic small payments with enforced proportional transaction fees: to achieve this property, we renounce the persistence of balances expected of a cryptocurrency, thus mitigating currency hoarding. We introduce at the same time a novel external incentive mechanism based on a verifiable third party with the goal of promoting long-term sustainability, adjusting the margins of profitability for contributors to the proof-of-work scheme without stifling the transaction rate.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"60 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120824001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bézier Curves Based Novel Calibration Technique of Beamformers in IEEE 802.11 WLAN Networks 基于bsamziier曲线的IEEE 802.11无线局域网波束形成器标定新技术
Mehdi Guessous, L. Zenkouar
{"title":"Bézier Curves Based Novel Calibration Technique of Beamformers in IEEE 802.11 WLAN Networks","authors":"Mehdi Guessous, L. Zenkouar","doi":"10.1109/NTMS.2018.8328682","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328682","url":null,"abstract":"IEEE 802.11 WLAN networks face challenges for end- to-end service performance concerning new mobility applications: real-time interactive communications, analytics and business intelligence. In dense indoor deployments, co-channel interference is a major issue. One of Radio Resource Management (RRM) techniques that is used to tackle this issue and maximize transmit opportunity is beamforming. From a signal processing perspective, the related-work concentrates on array elements' signal weighting and phase shifting to achieve the desired angle of radiation, direction of arrival and gain. This work presents a novel beamformer's calibration technique that enhances related-work results in the context of indoor WLAN network with a considerably lessened processing time and an augmented transmission quality. Our solution model approach is based on concepts from Computed Aided Graphical Design (CAGD) especially Bézier curves, and takes advantage of now-a-day WLAN networks design and deployment characteristics.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115148675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems 研究半调色技术对无用人脸检测系统的影响
S. Dadkhah, M. Köppen, S. Sadeghi, Kaori Yoshida
{"title":"Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems","authors":"S. Dadkhah, M. Köppen, S. Sadeghi, Kaori Yoshida","doi":"10.1109/NTMS.2018.8328726","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328726","url":null,"abstract":"Currently, automatic face detection systems are widely used in various social media. The improvement of the automated intelligent face recognition can easily result in the invasion of the user 's privacy if the predefined functions for their so- called artificial intelligent systems are designed with no respect to the user privacy, this means that users do not get the right to prevent these types of automatic face detection. The problem does not stop here, and recently some organization attempted to use automated face recognition system as a digital personal judgment tools. For instance, judging if a person is criminal only based on the attributes of his/her face. In the present technology, spreading the personal information such as individual digital images are fast and inevitable. Thus, in this paper, some of the techniques to evade automatic face recognition is investigated. The focused of this article is to highlight the advantages of different Half-Toning algorithms concerning avoiding unwanted automated face detection/recognition. In the experimental phase, the result of varying filtering and modification algorithms compared to the proposed filtering technique.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133194182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ProsocialLearn: A Prosocial Games Marketplace ProsocialLearn:亲社交游戏市场
F. D'Andria, J. M. Garrido, M. Boniface, S. Modafferi, Simon Crowle, L. Middleton, K. C. Apostolakis, K. Dimitropoulos, P. Daras
{"title":"ProsocialLearn: A Prosocial Games Marketplace","authors":"F. D'Andria, J. M. Garrido, M. Boniface, S. Modafferi, Simon Crowle, L. Middleton, K. C. Apostolakis, K. Dimitropoulos, P. Daras","doi":"10.1109/NTMS.2018.8328715","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328715","url":null,"abstract":"ProsocialLearn is a digital pro-social games platform. The ProsocialLearn project has delivered a series of disruptive innovations for the production and distribution of pro-social digital games that engage children (7-10 years old). Additionally it has stimulated technology transfer from the games industry to the educational sector. ProsocialLearn fosters the creation of a new market for digital games aimed at increasing social inclusion and academic performance, as well as a distribution channel to deliver prosocial games to children and teachers in European schools. Furthermore, it provides a proven pro-social methodology to design digital games. The ProsocialLearn platform makes available a series of APIs, which game developers use to integrate many of the ProsocialLearn functions into games, i.e. emotion and engagement monitoring, in-game achievements, games adaptation based on Prosocial Learning Objectives (PLOs), and micro-transactions.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信