{"title":"Flat identifier to locator mapping scheme in the global internet","authors":"Jungim Kim, Tae-Ho Lee, Heeyoung Jung","doi":"10.1109/NOF.2013.6724520","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724520","url":null,"abstract":"We propose an identifier to locator (ID/LOC) mapping scheme to resolve a locator for a flat identifier and a location update scheme to support dynamic mobility across the global Internet. The aggregation of flat identifiers is not feasible, which can lead to an explosion of binding information between ID and mapping server storing ID/LOC mapping. Also an efficient management of heavy location update traffic is becoming important with increasing numbers of mobile devices. The proposed scheme uses the bloom filter for the inter-domain mapping and the code word compression for inter-domain update message, to achieve mapping scalability and to reduce inter-domain update traffic overhead.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133468637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fuzzy adaptive DRX power saving mechanism for LTE-Advanced networks","authors":"Gwo-Jong Yu","doi":"10.1109/NOF.2013.6724503","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724503","url":null,"abstract":"Due to the energy of mobile device is limited, an energy efficient communication protocol is important. In 3GPP LTE-Advanced network, energy consumption can be reduced through discontinuous reception (DRX) mechanism. However, unsuitable DRX parameters may significantly increase packet delay when packets for UE arrive from Internet during DRX period. To deal with the tradeoff between energy consumption and packet delay, a fuzzy logic controller (FLC) is proposed to adaptively adjust DRX cycle. The proposed mechanism includes traffic estimation and fuzzy logic controller. With the predicated traffic amount, FLC-based DRX mechanism can automatically adjust DRX parameters to achieve better tradeoff between energy consumption and packet delay. Numerical results reveal that the proposed adaptive fuzzy adaptive DRX mechanism outperforms fixed DRX parameters.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133878006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds","authors":"C. P. Gupta, Iti Sharma","doi":"10.1109/NOF.2013.6724526","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724526","url":null,"abstract":"With single computer's computation power not sufficing, need for sharing resources to manipulate and manage data through clouds is increasing rapidly. Hence, it is favorable to delegate computations or store data with a third party, the cloud provider. However, delegating data to third party poses the risks of data disclosure during computation. The problem can be addressed by carrying out computation without decrypting the encrypted data. The results are also obtained encrypted and can be decrypted at the user side. This requires modifying functions in such a way that they are still executable while privacy is ensured or to search an encrypted database. Homomorphic encryption provides security to cloud consumer data while preserving system usability. We propose a symmetric key homomorphic encryption scheme based on matrix operations with primitives that make it easily adaptable for different needs in various cloud computing scenarios.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130929424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yue Wu, Zhangyin Qian, M. Riguidel, Gongliang Chen
{"title":"CogTag: Cognitive tags framework for new generation Internet beyond IP & MPLS","authors":"Yue Wu, Zhangyin Qian, M. Riguidel, Gongliang Chen","doi":"10.1109/NOF.2013.6724523","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724523","url":null,"abstract":"This paper presents a new Internet framework, called CogTag, using cognitive tags which addresses the current Internet issues from the ground up. CogTag extends IP and MPLS, introducing a light markup language to encode a sequence of tags and advocating semantic tagging of network entities as a new general approach to usher intelligence into the future Internet. The framework promotes a radical innovation in the cognitive annotation and processing of protocol headers, which will be done by XML-like semantic marking. The paper first introduces the design principles of the proposed framework, then describes the framework in more details and discusses a use case; and then gives a prototype implementation using Click modular router; finally it concludes and presents future work.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Field trial results on a cooperative small cell feeder uplink using six-fold sectorization","authors":"M. Grieger, G. Fettweis","doi":"10.1109/NOF.2013.6724502","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724502","url":null,"abstract":"It is expected that the increasing demand for higher data rates in mobile cellular networks will force operators to deploy denser networks using a large number of additional small cells (SCs). A major challenge coming along with this project is the required broadband backhaul link to connect new sites to the core backbone network. Wireless backhaul technologies work well for line-of-sight (LOS) connections where highly directive antennas can be used. High throughput non-line-of-sight (NLOS) wireless links, which are in the focus of this work, are much more difficult to deploy because of increased path-loss and channel fading due to moving scatterers which motivate the use of more homogeneous antennas that come along with increased inter-cell interference. The problem of inter-cell interference is well known from the radio access of mobile stations, and one potential solution that was discussed extensively in recent publications is joint multi-antenna signal processing of macro cells (MCs). In this work, we consider joint signal processing of multiple collocated MCs. In particular, we report field trial results of a joint detection (JD) feeder uplink in an urban testbed where one macro site is equipped with six partially overlapping sectors. An evaluation of achievable data rates for different SC deployment scenarios show the great benefit of this approach.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sangwook Bak, Seokseong Jeon, Young-Joo Suh, Chansu Yu, Dongsoo Han
{"title":"Characteristics of a large-scale WiFi radiomap and their implications in indoor localization","authors":"Sangwook Bak, Seokseong Jeon, Young-Joo Suh, Chansu Yu, Dongsoo Han","doi":"10.1109/NOF.2013.6724506","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724506","url":null,"abstract":"Due to the wide-spread of mobile devices such as smartphones, localization at both indoors and outdoors constitute a critical component in numerous location-based services. This paper considers indoor localization using WiFi fingerprints (FPs), which is a set of received signal strength (RSS) values from observable access points (APs). Typically, FPs are collected at several locations in a venue to create a WiFi radiomap, which is then used to estimate the location of a client device. However, most of previous studies evaluated their indoor localization algorithms and mechanisms on small-scale venues such as academic buildings, leaving us an important and practical question whether they perform well in large-scale environments with hundreds or thousands of APs. We surveyed a large-scale venue of Gangnam Coex underground mall in downtown Seoul, Korea, which might be sufficient to make most of existing solutions to suffer. This paper characterizes the radiomap of Gangnam Coex while highlighting the differences with that of a typical, small-scale academic building to facilitate the design of indoor localization algorithms for large-scale venues.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123775987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced adaptive periodic mobility load balancing algorithm for LTE femtocell networks","authors":"Woo-Jae Kim, Young-Joo Suh","doi":"10.1109/NOF.2013.6724504","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724504","url":null,"abstract":"Rapid increase in the number of 4G network users and explosive growth of traffics have led to capacity problem. In addition, cellular network has low Quality of Service (QoS) and coverage holes problem in indoor environment. To solve these problems, many researchers and working groups suggest the femtocell. However, the femtocell has a problem which is that a large amount of loads converges on a small number of femtocells. This problem arise from both human mobility and installation feature of the femtocell. Thus, load balancing algorithm is needed for femtocell networks. In this paper, we suggest the Enhanced Adaptive Periodic Mobility Load Balancing (E-APMLB) algorithm. It is advanced version of both the fixed periodic Mobility Load Balancing (MLB) algorithm and Adaptive Periodic Mobility Load Balancing (APMLB) algorithm which is our previous work. As a result of simulation, our proposed scheme has lower blocking probability and higher throughput than both the fixed periodic MLB algorithm and the APMLB algorithm.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124609338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jian Li, Jin Xiao, Minh N. H. Nguyen, J. W. Hong, R. Boutaba
{"title":"BreezChirp: Energy efficient Wi-Fi bandwidth estimator for smartphones","authors":"Jian Li, Jin Xiao, Minh N. H. Nguyen, J. W. Hong, R. Boutaba","doi":"10.1109/NOF.2013.6724505","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724505","url":null,"abstract":"Mobile data service is a rapidly growing business sector today. Available application bandwidth is an essential metric for managing applications and user experience. However, existing bandwidth measurement tools are ill-suited for the wireless environment due to large variance in environmental conditions, mobility, and energy consumption constraints. In this paper, we modify a known available bandwidth measurement technique - pathChirp to the wireless environment by utilizing the energy management features of the Wi-Fi communication device on smartphones. Our resulting tool BreezChirp is effective and energy conserving. We implemented BreezChrip on smartphones and evaluate its performance through field experiments.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Simsek, M. Becke, Yves Igor Jerschow, E. Rathgeb
{"title":"A clean-slate security vision for future networks: Simultaneously ensuring information security and establishing smart in-network services using the example of blind packet forwarding","authors":"I. Simsek, M. Becke, Yves Igor Jerschow, E. Rathgeb","doi":"10.1109/NOF.2013.6724501","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724501","url":null,"abstract":"To solve many of the challenges identified in Future Network debates, there are approaches, which suggest that a network should be service-oriented, flexibly and dynamically orchestrated from atomic smart in-network services. In these approaches in-network services require access to various control data signalled in different ways to utilise the complete functionality of the orchestrated network. The diversity and amount of required control data rises progressively so that the communication endpoints have to allow more and more access to information about themselves. To ensure information confidentiality and integrity for two communicating end points, the de facto method applied so far is end-to-end encryption of information transferred between the two end points. However, in-network services have then no longer access to the encrypted control data and they cannot accomplish their tasks anymore. Thus, we can either ensure information security or establish smart in-network services. Our paper focuses on this dilemma and introduces an approach where we redesign the smart in-network services to blind but still smart ones that can still correctly process masked control data by using a new kind of cryptographic algorithms. The feasibility of our approach is demonstrated by redesigning the packet forwarding service to a blind one. Additionally, we present our prototype implementation of the blind packet forwarding and evaluate it.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114809802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach for QoS constraint networks in cloud environments","authors":"Marc Körner, Alexander Stanik, Andreas Kliem","doi":"10.1109/NOF.2013.6724522","DOIUrl":"https://doi.org/10.1109/NOF.2013.6724522","url":null,"abstract":"Many QoS constraints in network environments exists, beginning with hard real time networks on the field bus level, up to Differentiated Services or VLAN tagging for commodity computer networks. However, all these approaches are not applicable for cloud-based environments, where networks need to be configured dynamically and on-demand. In this paper, we present an approach for centralized and dynamic network configuration. We show that QoS constraints can be fulfilled by decoupling the control and datapath of packet forwarding hardware in Ethernet based interconnection networks, that are widely-used in data centers and cloud environments. Furthermore, we introduce our cloud middleware and explain the resulting problems raised by interconnecting virtualized embedded systems through overlay networks with QoS constraints coming from the field bus domain.","PeriodicalId":143986,"journal":{"name":"2013 Fourth International Conference on the Network of the Future (NoF)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126623227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}