R. Meneguette, A. Boukerche, D. Guidoni, R. E. Grande, A. Loureiro, L. Villas
{"title":"A flow mobility management architecture based on proxy mobile IPv6 for vehicular networks","authors":"R. Meneguette, A. Boukerche, D. Guidoni, R. E. Grande, A. Loureiro, L. Villas","doi":"10.1109/ISCC.2016.7543823","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543823","url":null,"abstract":"Vehicular network applications may be benefited by the use of simultaneous network interfaces to maximize through-put and reducing latency. In order to take advantage of all radio interfaces of the vehicle and to provide a good quality of service for vehicular applications, we have developed an architecture that performs the management of the flow mobility based on some classes of application for vehicle network. Our goal is to minimize the time of handover between the rings of flows in order to meet the minimum requirements of vehicular applications, as well as to maximize the throughput. Simulations have been conducted to analyze the performance of the proposed architecture by comparing it to other previously devised architectures. As a result, the proposed architecture presented a low delivery time of messages, packets with lower loss and lower delay.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"243 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ariel F. F. Marques, G. M. Júnior, L. M. Silva, R. S. Avila, L. H. A. Correia
{"title":"ISCRa - an Intelligent Sensing Protocol for Cognitive Radio","authors":"Ariel F. F. Marques, G. M. Júnior, L. M. Silva, R. S. Avila, L. H. A. Correia","doi":"10.1109/ISCC.2016.7543770","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543770","url":null,"abstract":"The increased use of ISM frequencies (Industrial, Scientific and Medical) has caused interference problems and lack of availability of resources for wireless networks. Cognitive Radios (CR) emerged as an alternative to reduce interferences and intelligently use the spectrum. Several protocols have been developed to solve these problems, however, they focus on spectrum sensing or spectrum decision. This paper presents ISCRa (Intelligent Sensing for Cognitive Radios), a MAC protocol based on artificial neural networks and data obtained from regulatory agencies. Results demonstrate that ISCRa obtained higher delivery rate in high traffic when compared to CogMAC and AHP protocols, while maintaining the latency.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114392316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Magueta, D. Castanheira, Adão Silva, R. Dinis, A. Gameiro
{"title":"Iterative space-frequency equalizer for CE-OFDM mmW based systems","authors":"R. Magueta, D. Castanheira, Adão Silva, R. Dinis, A. Gameiro","doi":"10.1109/ISCC.2016.7543826","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543826","url":null,"abstract":"In this paper we design a new iterative space-frequency equalizer, based on iterative block decision feedback equalization (IB-DFE) principle, for multiplexing MIMO CE-OFDM millimeter wave (mmW) based systems. Linear frequency domain equalizers are not the most efficient to separate the spatial streams due to inter-carrier interference. Therefore, we design a non-linear equalizer that takes into account both inter-block and residual inter-carrier interferences by efficiently exploit the high space-frequency diversity order inherent to these systems. The feedforward and feedback matrices for the proposed iterative space-frequency equalizer are obtained by minimizing the overall mean square error (MSE) of all data streams at each subcarrier. Our iterative scheme significantly outperforms the linear frequency domain equalizers, recently considered for CE-OFDM, with only a few iterations.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116209490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient KP-ABE scheme for content protection in Information-Centric Networking","authors":"Jinmiao Wang, B. Lang","doi":"10.1109/ISCC.2016.7543839","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543839","url":null,"abstract":"Media streaming has largely dominated the Internet traffic and the trend will keep increasing in the next years. To efficiently distribute the media content, Information-Centric Networking (ICN) has attracted many researchers. Since end users usually obtain content from indeterminate caches in ICN, the publisher cannot reinforce data security and access control depending on the caches. Hence, the ability of self-contained protection is important for the cached contents. Attribute-based encryption (ABE) is considered the preferred solution to achieve this goal. However, the existing ABE schemes usually have problems regarding efficiency. The exponentiation in key generation and pairing operation in decryption respectively increases linearly with the number of attributes involved, which make it costly. In this paper, we propose an efficient key-policy ABE with fast key generation and decryption (FKP-ABE). In the key generation, we get rid of exponentiation and only require multiplications/divisions for each attribute in the access policy. And in the decryption, we reduce the pairing operations to a constant number, no matter how many attributes are used. The efficiency analysis indicates that our scheme has better performance than the existing KP-ABE schemes. Finally, we present an implementation framework that incorporates the proposed FKP-ABE with the ICN architecture.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113976306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eduardo Soares, Cristina C. Oliveira, J. Maia, Rafael Almeida, M. Coimbra, P. Brandão, R. Prior
{"title":"Modular Health Kiosk for health self-assessment","authors":"Eduardo Soares, Cristina C. Oliveira, J. Maia, Rafael Almeida, M. Coimbra, P. Brandão, R. Prior","doi":"10.1109/ISCC.2016.7543754","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543754","url":null,"abstract":"We describe the architecture, problems and lessons learned from building a Health Kiosk from commercial, off-the shelf Personal Health Devices and a computer with a touch-screen interface. The kiosk is used autonomously by patients to measure vital data prior to a consultation, in the scope of a population screening, or for routinely monitoring. The prototype was tested in multiple events with different user groups, aided by observer reporting and user questionnaires to assess problems and difficulties with the interface and device usage.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuansong Qiao, Xueyuan Wang, Guiming Fang, Brian A. Lee
{"title":"Doopnet: An emulator for network performance analysis of Hadoop clusters using Docker and Mininet","authors":"Yuansong Qiao, Xueyuan Wang, Guiming Fang, Brian A. Lee","doi":"10.1109/ISCC.2016.7543832","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543832","url":null,"abstract":"Hadoop is one of the most important Big Data processing and storage systems. In recent years, a lot of efforts have been put to enhance Hadoop's performance from networking perspectives. However, there are limited tools that can help researchers to verify their networking algorithm design in terms of Hadoop's performance. This paper proposes Doopnet which is a framework and toolset for creating Hadoop clusters in a virtualized environment and for monitoring/analysing of Hadoop's networking characteristics under different network configurations. Doopnet enables users to automatically set up a Hadoop cluster over Docker containers running inside Mininet. The Hadoop traffic is collected inside the containers and virtual switches through network flow monitors. The users can easily modify network topologies or configurations through Mininet, observe the networking behaviour through network flow monitors, and analyse the effects of different network settings on Hadoop's performance. Examples are presented to demonstrate how to setup the Doopnet testbed and analyse Hadoop traffic.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125691881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible multi-path routing for global optimization in software-defined datacenters","authors":"Weihua Liu, Weihua Zhou, Yongming Wang, Yuyao Duan, Zhenxiang Gao","doi":"10.1109/ISCC.2016.7543738","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543738","url":null,"abstract":"Existing traffic engineering strategies can achieve locally optimized network capability by uniformly leading flows to candidate paths. From a global network view, software defined network (SDN) allows a central controller to steer traffic effectively, and to improve network performance significantly, both for backbone and data center networks (DCNs). However, rational using of limited or expensive resources is very important in SDN, e.g., ternary content addressable memory (TCAM). In this paper, we focus on satisfying global network objectives such as delay and packet loss, with a comprehensive consideration of other criteria (network throughput and forwarding table size). We present a flexible multi-path routing scheme and formulate this as a mixed integer linear programming. It's turned out by simulation results and analysis that the delay and packet loss performance using proposed global algorithm outperforms other existing algorithms.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125785737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Barsocchi, A. Crivello, M. Girolami, Fabio Mavilia, E. Ferro
{"title":"Are you in or out? Monitoring the human behavior through an occupancy strategy","authors":"P. Barsocchi, A. Crivello, M. Girolami, Fabio Mavilia, E. Ferro","doi":"10.1109/ISCC.2016.7543732","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543732","url":null,"abstract":"IoT and cloud represent the breakthrough for making concrete the envisioned scenarios for Smart Environments and specifically, those scenarios devoted to the human well-being. Under this respect, we propose a system focused on the quality of the environments where employees work with particular attention to the energy consumption. We describe a long-term monitoring system together with the Stigma algorithm designed to detect the presence or the absence of a worker by exploiting sensing information.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127958121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Villari, A. Celesti, Maurizio Giacobbe, M. Fazio
{"title":"Enriched E-R model to design hybrid database for big data solutions","authors":"M. Villari, A. Celesti, Maurizio Giacobbe, M. Fazio","doi":"10.1109/ISCC.2016.7543733","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543733","url":null,"abstract":"Advances in database technologies are moving the attention of data managers from well known structured relational databases (SQL-Like DBs) towards NoSQL approaches, especially to address big data issues. However, changing technologies in consolidated data management system is hard and requires great investments. Deploying hybrid SQL-NoSQL approaches could be a good solution to speed up the transition in many domains and information systems, but a formal data model to design hybrid databases is necessary. This paper presents a new data model aimed at solving this issue. Starting from the well known E-R model, we introduce some additional components to identify data and “big data” in the system, in order to drive the implementation of SQL-like solutions to manage data, and NoSQL solutions to manage big data. The paper also discusses a Hospital Information System use case, to clearly show how the proposed enriched E-R model can be successfully adopted.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132346850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dinesha Ranathunga, M. Roughan, Phil Kernick, Nickolas J. G. Falkner
{"title":"Malachite: Firewall policy comparison","authors":"Dinesha Ranathunga, M. Roughan, Phil Kernick, Nickolas J. G. Falkner","doi":"10.1109/ISCC.2016.7543759","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543759","url":null,"abstract":"Firewalls are a crucial element of any modern day business; they protect data and resources in a communications network from unauthorised access. In particular domains, such as SCADA networks, there are guidelines for firewall configuration, but currently there are no automated means to test compliance. Our research tackles this from first principles: we ask how firewall policies can be described at a high-level, independent of firewall-vendor and network minutiae. The semantic foundations we propose allow us to compare network-wide firewall policies and check if they are equivalent; or one is contained in the other in meaningful ways. These foundations also enable policy change-impact analysis and help identify functional discrepancies between multiple policy designs from users in distinct policy sub-domains (e.g., SCADA engineers, Corporate admins).","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}