2017 International Symposium on Networks, Computers and Communications (ISNCC)最新文献

筛选
英文 中文
A look into the information your smartphone leaks 看看你的智能手机泄露的信息
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-10-19 DOI: 10.1109/ISNCC.2017.8072022
Timothy A. Chadza, Francisco J. Aparicio-Navarro, K. Kyriakopoulos, J. Chambers
{"title":"A look into the information your smartphone leaks","authors":"Timothy A. Chadza, Francisco J. Aparicio-Navarro, K. Kyriakopoulos, J. Chambers","doi":"10.1109/ISNCC.2017.8072022","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072022","url":null,"abstract":"Some smartphone applications (apps) pose a risk to users' personal information. Events of apps leaking information stored in smartphones illustrate the danger that they present. In this paper, we investigate the amount of personal information leaked during the installation and use of apps when accessing the Internet. We have opted for the implementation of a Man-in-the-Middle proxy to intercept the network traffic generated by 20 popular free apps installed on different smartphones of distinctive vendors. This work describes the technical considerations and requirements for the deployment of the monitoring WiFi network employed during the conducted experiments. The presented results show that numerous mobile and personal unique identifiers, along with personal information are leaked by several of the evaluated apps, commonly during the installation process.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks 认知无线电网络中主用户仿真攻击定位的三边检验贝叶斯决策模型
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-16 DOI: 10.1109/ISNCC.2017.8071979
Wassim Fassi Fihri, Hassan El Ghazi, N. Kaabouch, B. A. E. Majd
{"title":"Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks","authors":"Wassim Fassi Fihri, Hassan El Ghazi, N. Kaabouch, B. A. E. Majd","doi":"10.1109/ISNCC.2017.8071979","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071979","url":null,"abstract":"Primary user emulation (PUE) attack is one of the main threats affecting cognitive radio (CR) networks. The PUE can forge the same signal as the real primary user (PU) in order to use the licensed channel and cause deny of service (DoS). Therefore, it is important to locate the position of the PUE in order to stop and avoid any further attack. Several techniques have been proposed for localization, including the received signal strength indication RSSI, Triangulation, and Physical Network Layer Coding. However, the area surrounding the real PU is always affected by uncertainty. This uncertainty can be described as a lost (cost) function and conditional probability to be taken into consideration while proclaiming if a PU/PUE is the real PU or not. In this paper, we proposed a combination of a Bayesian model and trilateration technique. In the first part a trilateration technique is used to have a good approximation of the PUE position making use of the RSSI between the anchor nodes and the PU/PUE. In the second part, a Bayesian decision theory is used to claim the legitimacy of the PU based on the lost function and the conditional probability to help to determine the existence of the PUE attacker in the uncertainty area.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120948479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Pleasant sleep provision system during warm nights as a function of smart home 在温暖的夜晚提供舒适的睡眠系统作为智能家居的功能
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-16 DOI: 10.1109/ISNCC.2017.8071991
Kanae Matsui
{"title":"Pleasant sleep provision system during warm nights as a function of smart home","authors":"Kanae Matsui","doi":"10.1109/ISNCC.2017.8071991","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071991","url":null,"abstract":"The increase in the occurrence of warm nights in Japan is caused by the effects of global warming. A definition of warm nights is a temperature over 25 degrees Celsius during the night; warm nights are often observed in the middle of August in Japan and cause loss of sleep and deconditioning. Moreover, the effects of warm nights cause people to fall ill, especially those with heart disease tend to fall ill easily, which could lead to serious medical conditions. In order to provide a better environment for pleasant sleep during warm nights, this study presents a pleasant sleep provision system, which consists of four main functions. The system collects environmental and evaluation data to detect indoor comfort to determine which indoor comfort residents prefer using a networked sensor and web-based questionnaire. Then, functions of a heating, ventilation, and air conditioning and information provision are adapted for a bedroom and delivered to each person. To confirm the effectiveness of the proposed system, the system was installed in the bedrooms of two houses; two people lived in each house. An experiment was conducted for 20 days, 10 days of which were just for collecting basic data, and the other 10 days for using this system. In addition, to further evaluate the proposed system, the web page provided by the system collects the data of each participant's sleeping time and their preferences. In considering whether the predicted mean vote (PMV) preference was effective or not, 5 days of data of when the proposed system was not used were compared with 5 days of data of when the proposed system with the preference data was used. The results revealed that the proposed system (a) provided a better space for sleeping, (b) sleeping time was longer 5.7 min, (c) showed improved satisfaction of customized information for each person's PMV preference (7.72 percent), and (d) received a system satisfaction rating of 77.5 percent.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security in internet of things: A survey 物联网中的安全:一项调查
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-16 DOI: 10.1109/ISNCC.2017.8072001
A. Oracevic, S. Dilek, S. Özdemir
{"title":"Security in internet of things: A survey","authors":"A. Oracevic, S. Dilek, S. Özdemir","doi":"10.1109/ISNCC.2017.8072001","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072001","url":null,"abstract":"Internet of Things (IoT) can be seen as a pervasive network of networks: numerous heterogeneous entities both physical and virtual interconnected with any other entity or entities through unique addressing schemes, interacting with each other to provide/request all kinds of services. IoT technology is expected to pave the way for groundbreaking applications in a diversity of areas such as healthcare, security and surveillance, transportation, and industry, and integrate advanced technologies of communication, networking, cloud computing, sensing and actuation. Given the enormous number of connected devices that are potentially vulnerable, highly significant risks emerge around the issues of security, privacy, and governance; calling into question the whole future of IoT. IoT applications are expected to affect many aspects of people's lives, bringing about many conveniences; however, if security and privacy cannot be ensured, this can lead to a number of undesired consequences. This survey focuses on the security aspects of IoT, and discusses up-to-date IoT security solutions.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Multi-objective virtual machine placement optimization for cloud computing 面向云计算的多目标虚拟机布局优化
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-16 DOI: 10.1109/ISNCC.2017.8072013
Serap Dorterler, Murat Dörterler, S. Özdemir
{"title":"Multi-objective virtual machine placement optimization for cloud computing","authors":"Serap Dorterler, Murat Dörterler, S. Özdemir","doi":"10.1109/ISNCC.2017.8072013","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072013","url":null,"abstract":"Cloud computing enables people to use computing sources (hardware, operating system, software, etc.) over a network. Virtualization technology makes it possible to share hardware resources (CPU, RAM, bandwidth, etc.) for more than one virtual machine (VM), hence virtualization technology is an indispensable part of cloud computing. VMs should be placed over physical machines (PMs) in cloud data centers that employ virtualization technology. While placing VMs, there are some points to be addressed simultaneously such as optimizing CPU, RAM and bandwidth usage while minimizing energy consumption. This is called virtual machine placement (VMP) problem. When more than one objective need to be optimized, multi-objective optimization algorithms are used. In this paper, we tackle the VMP problem by optimizing CPU utilization while minimizing energy consumption. For this purpose, four well-known multi-objective evolutionary algorithms were selected and compared their performance on CloudSim, an open source simulation software. Detailed simulation results for the selected algorithms under different criteria are presented.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Study and evaluation of voice over IP signaling protocols performances on MIPv6 protocol in mobile 802.11 network: SIP and H.323 移动802.11网络中基于MIPv6协议的IP语音信令协议性能研究与评价:SIP和H.323
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072037
Azeddine Khiat, M. E. Khaili, J. Bakkoury, Ayoub Bahnasse
{"title":"Study and evaluation of voice over IP signaling protocols performances on MIPv6 protocol in mobile 802.11 network: SIP and H.323","authors":"Azeddine Khiat, M. E. Khaili, J. Bakkoury, Ayoub Bahnasse","doi":"10.1109/ISNCC.2017.8072037","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072037","url":null,"abstract":"The world currently has a strong trend towards homogeneous wireless networks, thanks to the mobility service that they offer, unlike wired networks. However, in homogeneous wireless networks several limits are required, like the transition from one network to another. This transition was often accompanied by a short connection failure due to the change of IPv4 addresses. However, in the presence of real-time applications, this network change delay is not accepted. The MIPv6 solution mitigates this deficiency by maintaining the same IPv6 address when moving from one network to another. In this paper, we will study MIPv6, and we will evaluate the Voice over IP (VOIP) performance with its two SIP and H.323 architectures. The study will be performed in a homogeneous 802.11e network in the context of a horizontal handover taking into account the MIPv6 technology. The evaluation criteria are: the call set-up time, the end-to-end delay, the loss rate and the jitter.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115274580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multidimensional database modeling: Literature survey and research agenda in the big data era 多维数据库建模:大数据时代的文献综述与研究议程
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072024
A. Cuzzocrea, Rim Moussa
{"title":"Multidimensional database modeling: Literature survey and research agenda in the big data era","authors":"A. Cuzzocrea, Rim Moussa","doi":"10.1109/ISNCC.2017.8072024","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072024","url":null,"abstract":"The purpose of this paper is twofold: First, to survey the literature on Multidimensional Database Modeling fundamentals, and Second, to sketch a research agenda which challenges Big Data four V's, namely Volume, Velocity, Veracity, and Variety.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128566941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Authenticated compressive sensing imaging 认证压缩感知成像
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072009
Wu Tao, C. Ruland
{"title":"Authenticated compressive sensing imaging","authors":"Wu Tao, C. Ruland","doi":"10.1109/ISNCC.2017.8072009","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072009","url":null,"abstract":"The CS (Compressive Sensing) theory has been widely implemented in many areas, the CSI (Compressive Sensing Imaging) method is one of them. In this paper, in order to design the authenticated CSI system, we have introduced the CSI method and the image authentication mechanisms. The design strategies would be also discussed. Then, the CS based MAC (CSMAC) has been implemented in the CSI system, which makes the authentication and the sensing processes in one step. Furthermore, in order to adapt the CSI system's property, the CSMAC is designed to tolerate the content-preserving manipulations but oppose the harmful ones, so that the information integrity is protected with the content robustness.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124764174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of TCP wave performance applied to real HTTP traffic 应用于真实HTTP流量的TCP波性能评估
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8071984
A. Salam, M. Luglio, C. Roseti, F. Zampognaro
{"title":"Evaluation of TCP wave performance applied to real HTTP traffic","authors":"A. Salam, M. Luglio, C. Roseti, F. Zampognaro","doi":"10.1109/ISNCC.2017.8071984","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071984","url":null,"abstract":"TCP Wave is an innovative transport protocol adopting a burst-based transmission approach, instead of the traditional window-based one. In TCP Wave the underlying IP packet transmission process results completely changed because of an internal timer to schedule bursts, which replaces the ACK-clocked transmission of all TCP versions. So far, TCP Wave capabilities have been assessed in a large gamut of scenarios but mainly limited to unidirectional bulk-like transfers involving a TCP sender and a TCP receiver. In this paper, TCP Wave behavior and performance are evaluated for the first time with real HTTP running applications, which are characterized by: a request/response interactive traffic model, a short and, in some cases, spaced objects transmissions and a mutual role of TCP peers that can act either as sender or receiver according to the application operations. TCP Wave procedures were accurately adapted to be suitable in this scenario and will be described in details. Finally, ns-3 simulator was setup and test campaign was performed, including both a real Web server and an HTTP client.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modelling of a MAC protocol for mobile M2M communications 移动M2M通信的MAC协议建模
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072018
M. Mehmet-Ali, Farshad Keyvan Ghazvini, M. Doughan
{"title":"Modelling of a MAC protocol for mobile M2M communications","authors":"M. Mehmet-Ali, Farshad Keyvan Ghazvini, M. Doughan","doi":"10.1109/ISNCC.2017.8072018","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072018","url":null,"abstract":"Machine-to-machine (M2M) communications is one of the enabling technologies for connecting massive number of devices to the Internet of Things (IoT). M2M communications have different characteristics than human-to-human (H2H) communications. In this work, we assume that the machines are mobile, as a result, the number of machines served by the network is variable. We consider a contention-based MAC protocol for M2M communications. The transmissions are organized into frames and each machine is assumed to generate probabilistically one or zero packet per frame. The machines have been divided into different types according to their packet generation probabilities. We assume that a machine will attempt transmission of a packet until it generates a new packet. A packet will be lost if it hasnot been successfully transmitted by the time the machine generates a new packet. We have derived packet loss probability for each type of machines. The numerical results show that very low packet loss probability may be achieved for a wide range of traffic load. The results of this paper may be used in the dimensioning of M2M networks.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116933804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信