2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)最新文献

筛选
英文 中文
Generating Datasets Based on the HuMIdb Dataset for Risk-based User Authentication on Smartphones 基于HuMIdb数据集生成基于风险的智能手机用户认证数据集
M. Papaioannou, G. Zachos, G. Mantas, Aliyah Essop, A. Karasuwa, Jonathan Rodriguez
{"title":"Generating Datasets Based on the HuMIdb Dataset for Risk-based User Authentication on Smartphones","authors":"M. Papaioannou, G. Zachos, G. Mantas, Aliyah Essop, A. Karasuwa, Jonathan Rodriguez","doi":"10.1109/CAMAD55695.2022.9966901","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966901","url":null,"abstract":"User authentication acts as the first line of defense verifying the identity of a mobile user, often as a prerequisite to allow access to resources in a mobile device. Risk-based user authentication based on behavioral biometrics appears to have the potential to increase mobile authentication security without sacrificing usability. Nevertheless, in order to precisely evaluate classification and/or novelty detection algorithms for risk-based user authentication, it is of utmost importance to make use of quality datasets to train and test these algorithms. To the best of our knowledge, there is a lack of up-to-date, representative and comprehensive datasets that are publicly available to the research community for effective training and evaluation of classification and/or novelty detection algorithms suitable for risk-based user authentication. Toward this direction, in this paper, the aim is to provide details on how we generate datasets based on HuMIdb dataset for training and testing classification and novelty detection algorithms for risk-based adaptive user authentication. The HuMIdb dataset is the most recent and publicly available dataset for behavioral user authentication.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance 基于行为建模的智能汽车自动监控驾驶员身份认证方法
Djamila Zamouche, Sofiane Aissani, K. Zizi, Lina Bourkeb, Khaled Hamouid, Mawloud Omar
{"title":"A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance","authors":"Djamila Zamouche, Sofiane Aissani, K. Zizi, Lina Bourkeb, Khaled Hamouid, Mawloud Omar","doi":"10.1109/CAMAD55695.2022.9966884","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966884","url":null,"abstract":"Driver authentication is a vital aspect that enhances passengers' safety and security. Indeed, driver authentication enables detection of maintaining normal driving behavior, car theft, fraudulent switching of designated drivers prevention, etc., which allows a vehicle system to distinguish between legitimate users from not legitimate ones and make transportation safer. This paper introduces an efficient in-car driver authentication approach for vehicle security and safety based on driver behavior. The proposed approach continuously monitors the driver's behavior and compares it with normal behaviors already recorded during a learning phase. Our solution is based on an algebraic method, namely the Conditional Basic Process Algebra (CBPA), to model the driver's driving style in two stages, before and after starting the car, taking into account the positions of the seat, mirrors, the seat belt, etc. We demonstrate through simulation results the efficiency of our approach in terms of response time and detection success rate.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127387939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A compact simple circular disk printed monopole Antenna for multiple applications 一种紧凑简单的圆形圆盘印刷单极天线,适用于多种应用
M. L. Bouknia, R. Zegadi, D. Sayad, C. Zebiri, I. Elfergani, Jonathan Rodriguez, I. Otung, R. Abd‐Alhameed
{"title":"A compact simple circular disk printed monopole Antenna for multiple applications","authors":"M. L. Bouknia, R. Zegadi, D. Sayad, C. Zebiri, I. Elfergani, Jonathan Rodriguez, I. Otung, R. Abd‐Alhameed","doi":"10.1109/CAMAD55695.2022.9966896","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966896","url":null,"abstract":"This work presents simple circular patch printed monopole Antenna presented for ultra-wideband (UWB) applications, the proposed antenna has a dimension of 23mm*34mm*1.5mm fabricated on FR4 dielectric substrate material with dielectric constant 4.3. The magnitude of S11 < - 10 dB of the structure, which explains the fractional bandwidth of 2.76-17.15 GHz. The gain and antenna efficiency of the structure are 5.4dBi and 88%, respectively. The simulated results with commercial microwave studio simulator CST and compared with the commercial HFSS simulator are in relatively good agreement. All these properties suggest that the proposed structure has applications in WiMAX, WLAN, C-band, X-band and Ku-band, as well as various other applications in wireless communications.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124432023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Elastic Load Balancing in Software Defined Satellite Networks 软件定义卫星网络中的弹性负载均衡
D. Adami, S. Giordano, M. Pagano
{"title":"Elastic Load Balancing in Software Defined Satellite Networks","authors":"D. Adami, S. Giordano, M. Pagano","doi":"10.1109/CAMAD55695.2022.9966886","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966886","url":null,"abstract":"Software Defined Networking (SDN) is a key technology for enabling satellite networks and, more specifically, their Ground Segment Network (GSN), with innovative services. The most important entity of the SDN architecture is the controller that enables network programmability. In this paper, we present the design and development of a new SDN controller for the GSN. The core of the controller is a new application for handling the traffic load over the GSN links and, in case of failures, for automatically rerouting traffic flows. We also propose an elastic load balancing policy that leverages on a parametric approach for assigning the cost to the GSN links thus allowing network administrators to adjust the links load by establishing a threshold between consolidation and balancing. To assess the effectiveness of our load control policy, we carried out experimental tests using the Mininet emulation environment.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart home's energy management applying the deep deterministic policy gradient and clustering 基于深度确定性策略梯度和聚类的智能家居能源管理
Ioannis Zenginis, J. Vardakas, K. Ramantas, C. Verikoukis
{"title":"Smart home's energy management applying the deep deterministic policy gradient and clustering","authors":"Ioannis Zenginis, J. Vardakas, K. Ramantas, C. Verikoukis","doi":"10.1109/CAMAD55695.2022.9966887","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966887","url":null,"abstract":"Smart buildings, equipped with controllable devices and energy management systems are expected to be substantial parts of the future energy grids. In this paper, a Reinforcement Learning (RL)-based method is developed for the energy scheduling of a smart home's energy storage system, which is also equipped with a photovoltaic system. The proposed scheme aims to minimize the electricity cost of the smart home; the overall problem is formulated as a Markov decision process, and it is solved by applying the Deep Deterministic Policy Gradient (DDPG). The main advantage of the proposed method is that increases the degree of similarity between the train set and the test set, through data clustering, achieving superior energy schedules than the existing RL-based approaches.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133000866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained Augmentation for RF Fingerprinting under Impaired Channels 受损信道下射频指纹识别的细粒度增强
O. Gul, Michel Kulhandjian, B. Kantarci, A. Touazi, C. Ellement, C. D’amours
{"title":"Fine-grained Augmentation for RF Fingerprinting under Impaired Channels","authors":"O. Gul, Michel Kulhandjian, B. Kantarci, A. Touazi, C. Ellement, C. D’amours","doi":"10.1109/CAMAD55695.2022.9966888","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966888","url":null,"abstract":"Critical infrastructures such as connected and au-tonomous vehicles, are susceptible to cyber attacks due to their mission-critical deployment. To ensure security by design, radio frequency (RF)-based security is considered as an effective technique for a wirelessly monitored or actuated critical infrastructure. For this purpose, this paper proposes a novel augmentation-driven deep learning approach to analyze unique transmitter fingerprints to determine the legitimacy of a user device or transmitter. An RF fingerprinting model is susceptible to various channel and environmental conditions that impact the learning performance of a machine/deep learning model. As data gathering cannot be considered as a feasible alternative, efficient solutions that can tackle the impact of varying channels on learning performance are emergent. This work aims to shed light on the RF fingerprinting problem from a different angle when 4G, 5G and WiFi data samples are collected from different transmitters by proposing a fine-grained augmentation approach to improve the learning performance of a deep learning model. Numerical results point out the promising RF fingerprinting performance when training data are augmented in a waveform-specific fine-grained manner as fingerprinting accuracy (87.94%) under the previously presented TDL/CDL augmentation can be boosted to 95.61% under previously unseen RF data instances.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125501149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Beacon Rate Adjustment Scheme based on Autonomic Computing for 5G-V2X 基于自主计算的5G-V2X信标速率调整方案
Houda Hafi, Wahabou Abdou
{"title":"A Beacon Rate Adjustment Scheme based on Autonomic Computing for 5G-V2X","authors":"Houda Hafi, Wahabou Abdou","doi":"10.1109/CAMAD55695.2022.9966920","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966920","url":null,"abstract":"Transport services issues are one of the motivating reasons that push research and engineering communities to design and build smart cities. The fifth generation of mobile communications (5G) and Intelligent Transportation Systems (ITS) play a major role to improve transportation efficiency. Two kinds of messages are basically transmitted in 5G-enabled ITS - event-driven and periodic messages. The former are sent whenever a road hazard event like traffic accidents is detected, whereas the latter are generated by each vehicle to advise neighbors about its status information like position, speed, and direction. A high transmission rate of periodic messages consumes a large amount of bandwidth and causes a channel congestion, as well as, a low transmission rate could alter the neighbors discovery process. In this work, a simple and efficient self-adaptive beacons transmission scheme based on autonomic computing is proposed. The purpose is to reduce the overhead in the network and give more chance to higher priority traffic (like immediate emergency message) to access to the radio channel without distorting the view of node's local topology. The solution is validated with a safety message broadcasting protocol. The simulation results show that the proposed mechanism improves the protocol's performance.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122847444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid SIC with Residual Error Factor in Wireless Powered Communications 无线供电通信中残余误差因子的混合SIC
Jhenifer de O. Melo, F. Lima
{"title":"Hybrid SIC with Residual Error Factor in Wireless Powered Communications","authors":"Jhenifer de O. Melo, F. Lima","doi":"10.1109/CAMAD55695.2022.9966895","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966895","url":null,"abstract":"A wireless powered communication network (WPCN) has a periodic time frame divided into two stages; the first one is devoted to power transfer to mobile users while uplink data transmission takes place in the second stage. This paper studies impact of a new method for pairing users in non-orthogonal multiple access (NOMA), called Hybrid SIC (HSIC), on the performance of a NOMA-based WPCN system when imperfect successive interference cancellation (SIC) is assumed. Two well-known variants of SIC, channel state information (CSI)-based and quality of service (QoS)-based SIC schemes, are often considered separately during user pairing. With HSIC, the best of those two variants can be achieved by a proper switching between them. In this paper, we firstly adapt the HSIC scheme to the WPCN scenario where there is a delay sensitive user requesting a low data rate, called primary user, and other users that are delay tolerant and request a higher data rate, called secondary users. Using NOMA, one of the secondary users is admitted to share the same resources block with the primary user. Then, we formulate an optimization problem for solving the admitted user's data rate maximization subject to QoS guarantee for the primary user assuming imperfect SIC. Moreover, we propose a method to solve this problem that can be seen as a generalization of the original HSIC method. Simulation results show that the proposed solution is capable of protecting primary user QoS while maximizing admitted user's data rate in different scenarios with perfect and imperfect SIC.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"661 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116098099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Mid-Infrared Gas Absorption Spectroscopic Detection Using Multilayer Optical Structures 多层光学结构增强中红外气体吸收光谱检测
R. Zegadi, M. L. Bouknia, D. Sayad, C. Zebiri, I. Elfergani, Jonathan Rodriguez, Z. Vujicic, R. Abd‐Alhameed
{"title":"Enhanced Mid-Infrared Gas Absorption Spectroscopic Detection Using Multilayer Optical Structures","authors":"R. Zegadi, M. L. Bouknia, D. Sayad, C. Zebiri, I. Elfergani, Jonathan Rodriguez, Z. Vujicic, R. Abd‐Alhameed","doi":"10.1109/CAMAD55695.2022.9966897","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966897","url":null,"abstract":"Porous Germanium (PGe) is a very promising material for spectroscopy and detection applications in the mid-IR wavelength range, due to its particular physicochemical properties, in particular, its large spectral transparency window ranging from 2 to 15 μm. Multilayers, such as Bragg reflectors and microcavities, based on porous germanium material are designed and their optical spectra are simulated to detect CO2 and CH4.","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125648288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality of Service Aware Scheduling in Mixed Traffic Wireless Networks 混合流量无线网络中服务质量感知调度
Areen Shiyahin, Stefan Schwarz, M. Rupp
{"title":"Quality of Service Aware Scheduling in Mixed Traffic Wireless Networks","authors":"Areen Shiyahin, Stefan Schwarz, M. Rupp","doi":"10.1109/CAMAD55695.2022.9966904","DOIUrl":"https://doi.org/10.1109/CAMAD55695.2022.9966904","url":null,"abstract":"When considering a traffic mix in a wireless net-work, the scheduler needs to be aware of the type of user packets and the state of each user buffer in order to satisfy the requirements of users. In such networks, the requirements vary in terms of latency, throughput, and reliability, thus a trade-off is required to enhance the overall network performance. Therefore, a Quality of Service Aware Scheduler (QAS) is proposed with tuning parameters to achieve a balanced Quality of Service (QoS) delivery. Moreover, moderate fairness is imposed among full buffer users that are assumed to have an infinite amount of data in the packets buffer. An open-source modeling tool is used to solve the Resource Blocks (RBs) optimization problem of QAS. System-level simulations are performed to investigate the performance of the proposed scheduler and compare it to the benchmark schedulers namely Round Robin (RR) and Best Channel Quality Indicator (CQI).","PeriodicalId":166029,"journal":{"name":"2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133917194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信