{"title":"An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETs","authors":"R. Zaghal, Saeed Salah, M. Ismail","doi":"10.1109/NTMS.2018.8328681","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328681","url":null,"abstract":"Mobile Ad-hoc Networks (MANETs) usually suffer from high packet loss and high link failure rates. These challenges usually increase congestion on some links while other links are almost free. In this paper, we propose a novel mechanism to enhance QoS in multipath routing protocols in MANETs based on the InfiniBand (IB) QoS architecture. The basic idea of our approach is to enhance the load balancing and thus reduce congestion on overloaded links. This mechanism has enabled us to (1) give critical applications higher priority when routing their packets across the network, (2) effectively manage frequent connections and disconnections and thus reduce link failures and packet loss rates, and (3) reduce the overall power consumption as a consequence of the previous gains. We have tested the scheme on the (IBsim) simulator and achieved significant improvements in QoS parameters compared to two well- known routing protocols: AODV and AOMDV.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes
{"title":"MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security","authors":"A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes","doi":"10.1109/NTMS.2018.8328702","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328702","url":null,"abstract":"Network-user profiling has been used as security technique to detect unknown or malicious behaviors. Top-k rankings of reached services is a new technique for building user profiles. This technique requires to keep in memory all the traffic data during a period of time to build the rankings. However, a single user can produce gigabytes of network traffic data, which may result in low execution performance and out-of memory errors. This work proposes a MapReduce approach that generates top-k rankings from huge network capture files.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Benaissa, Filip Hendrichovsky, Kaori Yishida, M. Köppen, P. Sinčák
{"title":"Phone Application for Indoor Localization Based on Ble Signal Fingerprint","authors":"B. Benaissa, Filip Hendrichovsky, Kaori Yishida, M. Köppen, P. Sinčák","doi":"10.1109/NTMS.2018.8328729","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328729","url":null,"abstract":"Indoor position of devices and persons is a very valuable information for context-aware devices and human activity recognition. The need of such information grows bigger by the advancement of IoT technologies. In this paper, we discuss existing indoor positioning approaches and their applications, give specific interest to the signal strength fingerprint approaches, to which belongs the presented paper. Bluetooth Low Energy Beacons are used as the source of the signal, and the Radial Basis Functions method is employed to create a model that relates to signal strength and position. The proposed approach allows the possibility of making all the computation on a smartphone application, namely, offline data collection and model computation, and online position estimation. Besides, it allows updating the model later.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133634543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demand Side Management in Smart Grids: A Stackelberg Multi Period Multi Provider Game","authors":"Hala Alsalloum, A. Masri, L. Merghem, Rana Rahim","doi":"10.1109/NTMS.2018.8328687","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328687","url":null,"abstract":"In the smart grid context, with the growth of the energy demand, Demand Side Management (DSM) is a good solution to balance the power consumption and the power generation. Its main goal is to satisfy the two essential actors: the providers and the consumers, in order to improve the reliability and the efficiency of the smart grid. With the integration of renewable energies, the number of providers increases leading to introducing many challenges in the load control. In this paper, we propose a novel real time pricing algorithm based on Stackelberg game. It defines the consumers' energy consumption and the providers' price by taking advantages of the bidirectional communication infrastructure in such way to minimize the consumers' bills and maximize the providers' profit; these two concepts become nowadays a portfolio to work on. In this game, different active consumers (i.e. prosumers) negotiate with different energy providers. The performance of our algorithm is proved through extensive simulations. The coherence between the prices/demands deal is shown with two scenarios compared to the literature.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noureddine Lasla, M. Younis, Wassim Znaidi, Dhafer Ben Arbia
{"title":"Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS","authors":"Noureddine Lasla, M. Younis, Wassim Znaidi, Dhafer Ben Arbia","doi":"10.13016/M2SB3X16W","DOIUrl":"https://doi.org/10.13016/M2SB3X16W","url":null,"abstract":"Cooperative Intelligent Transportation System (C- ITS) enables inter-networking of vehicles for alerts exchanging in order to improve road safety. While this technology is about to enter the market in the upcoming years, critical questions related to the communication security continue to be challenging research concerns. Current solutions to secure inter-vehicle communication depend mainly on the use of digital certificates for authentication. However, such an approach imposes significant overhead on vehicles since it is computationally demanding and requires validation of the certificate within a limited period. In addition, relying on a central node for deciding on issuing and revoking certificates introduces a single point of failure and could even risk the safety of motorists. In this paper, we propose the use of Blockchain to keep track of the certificate of each vehicle (valid or revoked) in distributed and immutable records. In essence we replace certificate verification with a lightweight blockchain-based authentication approach. In addition, we propose a fully distributed vehicle admission/revocation scheme. We show that our scheme could alleviate the computation overhead and enhance the response time while improving the overall system security.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu
{"title":"Multi-Provider Secure Virtual Network Embedding","authors":"Francois Boutigny, S. Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu","doi":"10.1109/NTMS.2018.8328706","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328706","url":null,"abstract":"Network virtualization enables tenants to lease computing and networking resources from one or more infrastructure provider (InP), like in Infrastructure as a Service (IaaS). As such, tenants outsource their networks, fully or partially, to reduce their capital expenditure, while expecting to still provide the same quality of service to their customers. Yet, such services may rely on data considered as sensitive by tenants, tenants' customers or the law, which should be protected appropriately. Besides, personal data protection laws paired with the objective to offer an optimal customer experience may lead tenants to distribute their virtual networks over multiple InPs. Yet, the interconnection between different InPs should respect their security policies. In this paper, we aim to ease the adoption of network virtualization by guaranteeing both tenants and InPs that their security policies are all enforced when creating a virtual network. To this end, we present a Virtual Network Embedding solution in a multi-provider context, and how we leverage it in a use case.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128674227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Small Transactions with Sustainable Incentives","authors":"Fabio Pianese, Matteo Signorini, Souradip Sarkar","doi":"10.1109/NTMS.2018.8328744","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328744","url":null,"abstract":"The design of a successful distributed system for enabling payments and small transactions among Internet users has long been a major challenge in applied computer science. Bitcoin, the first cryptocurrency having reached world-wide popularity, suffers from sustainability problems such as inefficient energy expenditure for its network operation and from perverse incentives that foster speculative hoarding behavior. We propose a digital transfer system based on a variant of the Bitcoin ledger that is meant to support deterministic small payments with enforced proportional transaction fees: to achieve this property, we renounce the persistence of balances expected of a cryptocurrency, thus mitigating currency hoarding. We introduce at the same time a novel external incentive mechanism based on a verifiable third party with the goal of promoting long-term sustainability, adjusting the margins of profitability for contributors to the proof-of-work scheme without stifling the transaction rate.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"60 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120824001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bézier Curves Based Novel Calibration Technique of Beamformers in IEEE 802.11 WLAN Networks","authors":"Mehdi Guessous, L. Zenkouar","doi":"10.1109/NTMS.2018.8328682","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328682","url":null,"abstract":"IEEE 802.11 WLAN networks face challenges for end- to-end service performance concerning new mobility applications: real-time interactive communications, analytics and business intelligence. In dense indoor deployments, co-channel interference is a major issue. One of Radio Resource Management (RRM) techniques that is used to tackle this issue and maximize transmit opportunity is beamforming. From a signal processing perspective, the related-work concentrates on array elements' signal weighting and phase shifting to achieve the desired angle of radiation, direction of arrival and gain. This work presents a novel beamformer's calibration technique that enhances related-work results in the context of indoor WLAN network with a considerably lessened processing time and an augmented transmission quality. Our solution model approach is based on concepts from Computed Aided Graphical Design (CAGD) especially Bézier curves, and takes advantage of now-a-day WLAN networks design and deployment characteristics.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115148675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems","authors":"S. Dadkhah, M. Köppen, S. Sadeghi, Kaori Yoshida","doi":"10.1109/NTMS.2018.8328726","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328726","url":null,"abstract":"Currently, automatic face detection systems are widely used in various social media. The improvement of the automated intelligent face recognition can easily result in the invasion of the user 's privacy if the predefined functions for their so- called artificial intelligent systems are designed with no respect to the user privacy, this means that users do not get the right to prevent these types of automatic face detection. The problem does not stop here, and recently some organization attempted to use automated face recognition system as a digital personal judgment tools. For instance, judging if a person is criminal only based on the attributes of his/her face. In the present technology, spreading the personal information such as individual digital images are fast and inevitable. Thus, in this paper, some of the techniques to evade automatic face recognition is investigated. The focused of this article is to highlight the advantages of different Half-Toning algorithms concerning avoiding unwanted automated face detection/recognition. In the experimental phase, the result of varying filtering and modification algorithms compared to the proposed filtering technique.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133194182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. D'Andria, J. M. Garrido, M. Boniface, S. Modafferi, Simon Crowle, L. Middleton, K. C. Apostolakis, K. Dimitropoulos, P. Daras
{"title":"ProsocialLearn: A Prosocial Games Marketplace","authors":"F. D'Andria, J. M. Garrido, M. Boniface, S. Modafferi, Simon Crowle, L. Middleton, K. C. Apostolakis, K. Dimitropoulos, P. Daras","doi":"10.1109/NTMS.2018.8328715","DOIUrl":"https://doi.org/10.1109/NTMS.2018.8328715","url":null,"abstract":"ProsocialLearn is a digital pro-social games platform. The ProsocialLearn project has delivered a series of disruptive innovations for the production and distribution of pro-social digital games that engage children (7-10 years old). Additionally it has stimulated technology transfer from the games industry to the educational sector. ProsocialLearn fosters the creation of a new market for digital games aimed at increasing social inclusion and academic performance, as well as a distribution channel to deliver prosocial games to children and teachers in European schools. Furthermore, it provides a proven pro-social methodology to design digital games. The ProsocialLearn platform makes available a series of APIs, which game developers use to integrate many of the ProsocialLearn functions into games, i.e. emotion and engagement monitoring, in-game achievements, games adaptation based on Prosocial Learning Objectives (PLOs), and micro-transactions.","PeriodicalId":140704,"journal":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}