Timothy A. Chadza, Francisco J. Aparicio-Navarro, K. Kyriakopoulos, J. Chambers
{"title":"A look into the information your smartphone leaks","authors":"Timothy A. Chadza, Francisco J. Aparicio-Navarro, K. Kyriakopoulos, J. Chambers","doi":"10.1109/ISNCC.2017.8072022","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072022","url":null,"abstract":"Some smartphone applications (apps) pose a risk to users' personal information. Events of apps leaking information stored in smartphones illustrate the danger that they present. In this paper, we investigate the amount of personal information leaked during the installation and use of apps when accessing the Internet. We have opted for the implementation of a Man-in-the-Middle proxy to intercept the network traffic generated by 20 popular free apps installed on different smartphones of distinctive vendors. This work describes the technical considerations and requirements for the deployment of the monitoring WiFi network employed during the conducted experiments. The presented results show that numerous mobile and personal unique identifiers, along with personal information are leaked by several of the evaluated apps, commonly during the installation process.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wassim Fassi Fihri, Hassan El Ghazi, N. Kaabouch, B. A. E. Majd
{"title":"Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks","authors":"Wassim Fassi Fihri, Hassan El Ghazi, N. Kaabouch, B. A. E. Majd","doi":"10.1109/ISNCC.2017.8071979","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071979","url":null,"abstract":"Primary user emulation (PUE) attack is one of the main threats affecting cognitive radio (CR) networks. The PUE can forge the same signal as the real primary user (PU) in order to use the licensed channel and cause deny of service (DoS). Therefore, it is important to locate the position of the PUE in order to stop and avoid any further attack. Several techniques have been proposed for localization, including the received signal strength indication RSSI, Triangulation, and Physical Network Layer Coding. However, the area surrounding the real PU is always affected by uncertainty. This uncertainty can be described as a lost (cost) function and conditional probability to be taken into consideration while proclaiming if a PU/PUE is the real PU or not. In this paper, we proposed a combination of a Bayesian model and trilateration technique. In the first part a trilateration technique is used to have a good approximation of the PUE position making use of the RSSI between the anchor nodes and the PU/PUE. In the second part, a Bayesian decision theory is used to claim the legitimacy of the PU based on the lost function and the conditional probability to help to determine the existence of the PUE attacker in the uncertainty area.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120948479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pleasant sleep provision system during warm nights as a function of smart home","authors":"Kanae Matsui","doi":"10.1109/ISNCC.2017.8071991","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071991","url":null,"abstract":"The increase in the occurrence of warm nights in Japan is caused by the effects of global warming. A definition of warm nights is a temperature over 25 degrees Celsius during the night; warm nights are often observed in the middle of August in Japan and cause loss of sleep and deconditioning. Moreover, the effects of warm nights cause people to fall ill, especially those with heart disease tend to fall ill easily, which could lead to serious medical conditions. In order to provide a better environment for pleasant sleep during warm nights, this study presents a pleasant sleep provision system, which consists of four main functions. The system collects environmental and evaluation data to detect indoor comfort to determine which indoor comfort residents prefer using a networked sensor and web-based questionnaire. Then, functions of a heating, ventilation, and air conditioning and information provision are adapted for a bedroom and delivered to each person. To confirm the effectiveness of the proposed system, the system was installed in the bedrooms of two houses; two people lived in each house. An experiment was conducted for 20 days, 10 days of which were just for collecting basic data, and the other 10 days for using this system. In addition, to further evaluate the proposed system, the web page provided by the system collects the data of each participant's sleeping time and their preferences. In considering whether the predicted mean vote (PMV) preference was effective or not, 5 days of data of when the proposed system was not used were compared with 5 days of data of when the proposed system with the preference data was used. The results revealed that the proposed system (a) provided a better space for sleeping, (b) sleeping time was longer 5.7 min, (c) showed improved satisfaction of customized information for each person's PMV preference (7.72 percent), and (d) received a system satisfaction rating of 77.5 percent.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in internet of things: A survey","authors":"A. Oracevic, S. Dilek, S. Özdemir","doi":"10.1109/ISNCC.2017.8072001","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072001","url":null,"abstract":"Internet of Things (IoT) can be seen as a pervasive network of networks: numerous heterogeneous entities both physical and virtual interconnected with any other entity or entities through unique addressing schemes, interacting with each other to provide/request all kinds of services. IoT technology is expected to pave the way for groundbreaking applications in a diversity of areas such as healthcare, security and surveillance, transportation, and industry, and integrate advanced technologies of communication, networking, cloud computing, sensing and actuation. Given the enormous number of connected devices that are potentially vulnerable, highly significant risks emerge around the issues of security, privacy, and governance; calling into question the whole future of IoT. IoT applications are expected to affect many aspects of people's lives, bringing about many conveniences; however, if security and privacy cannot be ensured, this can lead to a number of undesired consequences. This survey focuses on the security aspects of IoT, and discusses up-to-date IoT security solutions.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-objective virtual machine placement optimization for cloud computing","authors":"Serap Dorterler, Murat Dörterler, S. Özdemir","doi":"10.1109/ISNCC.2017.8072013","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072013","url":null,"abstract":"Cloud computing enables people to use computing sources (hardware, operating system, software, etc.) over a network. Virtualization technology makes it possible to share hardware resources (CPU, RAM, bandwidth, etc.) for more than one virtual machine (VM), hence virtualization technology is an indispensable part of cloud computing. VMs should be placed over physical machines (PMs) in cloud data centers that employ virtualization technology. While placing VMs, there are some points to be addressed simultaneously such as optimizing CPU, RAM and bandwidth usage while minimizing energy consumption. This is called virtual machine placement (VMP) problem. When more than one objective need to be optimized, multi-objective optimization algorithms are used. In this paper, we tackle the VMP problem by optimizing CPU utilization while minimizing energy consumption. For this purpose, four well-known multi-objective evolutionary algorithms were selected and compared their performance on CloudSim, an open source simulation software. Detailed simulation results for the selected algorithms under different criteria are presented.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Azeddine Khiat, M. E. Khaili, J. Bakkoury, Ayoub Bahnasse
{"title":"Study and evaluation of voice over IP signaling protocols performances on MIPv6 protocol in mobile 802.11 network: SIP and H.323","authors":"Azeddine Khiat, M. E. Khaili, J. Bakkoury, Ayoub Bahnasse","doi":"10.1109/ISNCC.2017.8072037","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072037","url":null,"abstract":"The world currently has a strong trend towards homogeneous wireless networks, thanks to the mobility service that they offer, unlike wired networks. However, in homogeneous wireless networks several limits are required, like the transition from one network to another. This transition was often accompanied by a short connection failure due to the change of IPv4 addresses. However, in the presence of real-time applications, this network change delay is not accepted. The MIPv6 solution mitigates this deficiency by maintaining the same IPv6 address when moving from one network to another. In this paper, we will study MIPv6, and we will evaluate the Voice over IP (VOIP) performance with its two SIP and H.323 architectures. The study will be performed in a homogeneous 802.11e network in the context of a horizontal handover taking into account the MIPv6 technology. The evaluation criteria are: the call set-up time, the end-to-end delay, the loss rate and the jitter.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115274580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidimensional database modeling: Literature survey and research agenda in the big data era","authors":"A. Cuzzocrea, Rim Moussa","doi":"10.1109/ISNCC.2017.8072024","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072024","url":null,"abstract":"The purpose of this paper is twofold: First, to survey the literature on Multidimensional Database Modeling fundamentals, and Second, to sketch a research agenda which challenges Big Data four V's, namely Volume, Velocity, Veracity, and Variety.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128566941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticated compressive sensing imaging","authors":"Wu Tao, C. Ruland","doi":"10.1109/ISNCC.2017.8072009","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072009","url":null,"abstract":"The CS (Compressive Sensing) theory has been widely implemented in many areas, the CSI (Compressive Sensing Imaging) method is one of them. In this paper, in order to design the authenticated CSI system, we have introduced the CSI method and the image authentication mechanisms. The design strategies would be also discussed. Then, the CS based MAC (CSMAC) has been implemented in the CSI system, which makes the authentication and the sensing processes in one step. Furthermore, in order to adapt the CSI system's property, the CSMAC is designed to tolerate the content-preserving manipulations but oppose the harmful ones, so that the information integrity is protected with the content robustness.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124764174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of TCP wave performance applied to real HTTP traffic","authors":"A. Salam, M. Luglio, C. Roseti, F. Zampognaro","doi":"10.1109/ISNCC.2017.8071984","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071984","url":null,"abstract":"TCP Wave is an innovative transport protocol adopting a burst-based transmission approach, instead of the traditional window-based one. In TCP Wave the underlying IP packet transmission process results completely changed because of an internal timer to schedule bursts, which replaces the ACK-clocked transmission of all TCP versions. So far, TCP Wave capabilities have been assessed in a large gamut of scenarios but mainly limited to unidirectional bulk-like transfers involving a TCP sender and a TCP receiver. In this paper, TCP Wave behavior and performance are evaluated for the first time with real HTTP running applications, which are characterized by: a request/response interactive traffic model, a short and, in some cases, spaced objects transmissions and a mutual role of TCP peers that can act either as sender or receiver according to the application operations. TCP Wave procedures were accurately adapted to be suitable in this scenario and will be described in details. Finally, ns-3 simulator was setup and test campaign was performed, including both a real Web server and an HTTP client.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mehmet-Ali, Farshad Keyvan Ghazvini, M. Doughan
{"title":"Modelling of a MAC protocol for mobile M2M communications","authors":"M. Mehmet-Ali, Farshad Keyvan Ghazvini, M. Doughan","doi":"10.1109/ISNCC.2017.8072018","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072018","url":null,"abstract":"Machine-to-machine (M2M) communications is one of the enabling technologies for connecting massive number of devices to the Internet of Things (IoT). M2M communications have different characteristics than human-to-human (H2H) communications. In this work, we assume that the machines are mobile, as a result, the number of machines served by the network is variable. We consider a contention-based MAC protocol for M2M communications. The transmissions are organized into frames and each machine is assumed to generate probabilistically one or zero packet per frame. The machines have been divided into different types according to their packet generation probabilities. We assume that a machine will attempt transmission of a packet until it generates a new packet. A packet will be lost if it hasnot been successfully transmitted by the time the machine generates a new packet. We have derived packet loss probability for each type of machines. The numerical results show that very low packet loss probability may be achieved for a wide range of traffic load. The results of this paper may be used in the dimensioning of M2M networks.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116933804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}