2017 International Symposium on Networks, Computers and Communications (ISNCC)最新文献

筛选
英文 中文
RACH overload congestion mechanism for M2M communication in LTE-A: Issues and approaches LTE-A中M2M通信的RACH过载拥塞机制:问题与方法
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8071981
A. H. E. Fawal, A. Mansour, F. Roy, D. L. Jeune, A. Hamie
{"title":"RACH overload congestion mechanism for M2M communication in LTE-A: Issues and approaches","authors":"A. H. E. Fawal, A. Mansour, F. Roy, D. L. Jeune, A. Hamie","doi":"10.1109/ISNCC.2017.8071981","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071981","url":null,"abstract":"The next generation of mobile systems based on LTE-A (Long Term Evolution-Advanced) networks are expected to support the new promising technology M2M (Machine-to-Machine) communications while keeping an eye on its previous H2H (Human-to-Human) communications not to be affected especially when it comes to the expected exponential growth of the number of M2M in the coming years, in particular, with the advance of IoT (Internet of Things) deployment and the expected ubiquity of such objects in the near future. In this article, we review the M2M communication technology from the LTE-A perspective and we outline the random access challenges in high dense areas where the LTE-A network is striving to fulfill the massive number of M2M devices. Moreover, we compare the most common mechanisms found in the literature that deal with the RACH (Random Access Channel) procedure issues and challenges by analyzing the existing solutions and approaches to avoid RACH overload congestion in the M2M communications. To this end, we have developed different M2M scenarios using SimuLTE Modeler to investigate the impact of M2M communications on LTE-A networks in emergency events.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A multi-layer perceptron approach for flow-based anomaly detection 基于流的多层感知器异常检测方法
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072036
Lennart Van Efferen, Amr M. T. Ali-Eldin
{"title":"A multi-layer perceptron approach for flow-based anomaly detection","authors":"Lennart Van Efferen, Amr M. T. Ali-Eldin","doi":"10.1109/ISNCC.2017.8072036","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072036","url":null,"abstract":"The increase in successful cyber-attacks on systems with firewalls and encryption techniques has led to the creation of Intrusion Detection Systems (IDS). Machine learning techniques are often used for these systems to predict malicious behaviour in the vague and unbalanced data. Flow-based IDS monitors only the packet headers of the network traffic and not the attached data to keep up with the growing bandwidth of networks and to maintain the privacy of the users. In this context, a multilayer perceptron approach is analysed on two different datasets and compared to a J48 Decision Tree classifier. Obtained results confirm that flow-based systems seem to be, apart from inevitable, the right way for IDS in the future and that MLP can still be useful in flow-based detection.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A trust management system model for cloud 一种面向云的信任管理系统模型
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072029
Ahmad Ali, Mansoor Ahmed, Abid Khan, M. Ilyas, Muhammad Saad Razzaq
{"title":"A trust management system model for cloud","authors":"Ahmad Ali, Mansoor Ahmed, Abid Khan, M. Ilyas, Muhammad Saad Razzaq","doi":"10.1109/ISNCC.2017.8072029","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072029","url":null,"abstract":"Distributed computing environments merged into cloud computing architecture which is being used extensively for resource sharing. It has provided efficient and flexible ways for the provision of services meeting resource sharing needs and challenges of the time. Cloud computing has become a cost effective solution as compared to traditional systems. In cloud computing, Software, Infrastructure, and Platforms are being provided as services however this introduced new dimensions of research in security and privacy breaches. Trust establishment and its maintenance play a vital role in Cloud Computing. Availability, Security and Privacy are key parameters of trust and sharing of privacy preserved statistics of these parameters with stakeholders enhances but Security and Privacy lapses shatter users trust. This paper proposes a model of Trust Management System which provides a comprehensive component based architecture to facilitate cloud service providers in maintaining Users Trust and ultimately help them in flourishing their business.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126353863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Standard conformable time domain diversity for DVB-T2 system DVB-T2系统的标准兼容时域分集
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072006
Behnam Akbarian, Saeed Ghazi-Maghrebi
{"title":"Standard conformable time domain diversity for DVB-T2 system","authors":"Behnam Akbarian, Saeed Ghazi-Maghrebi","doi":"10.1109/ISNCC.2017.8072006","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072006","url":null,"abstract":"The performance of standard Alamouti space-frequency block code (SFBC) degrades in highly frequency-selective channels since quasi static fading is required for adjacent subcarriers. An enhanced Alamouti decoder allows a high reliability and capacity enhancement. In this paper, we propose an enhanced Alamouti space frequency block decoding scheme for multiple-input multiple-output (MIMO) and orthogonal frequency division multiplexing (OFDM) systems using cyclic delay diversity (CDD) techniques over highly frequency selective channels. We exemplarity implement this scheme for the second generation terrestrial video broadcasting (DVB-T2) system. Simulation results show that the proposed scheme has lower bit error rate (BER), especially for high SNRs, with respect to the over highly frequency-selective channels such as single frequency networks (SFN). The new scheme allows a high reliability and tolerability. The other advantages of the proposed method are its simplicity, flexibility and standard compatibility with respect to the standard Alamouti decoder.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116641394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of the SFSK-OOK integrated PLC-VLC system under the influence of sunlight SFSK-OOK集成PLC-VLC系统在阳光影响下的评估
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8071978
S. M. Nlom, K. Ouahada, A. Ndjiongue, H. Ferreira
{"title":"Evaluation of the SFSK-OOK integrated PLC-VLC system under the influence of sunlight","authors":"S. M. Nlom, K. Ouahada, A. Ndjiongue, H. Ferreira","doi":"10.1109/ISNCC.2017.8071978","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071978","url":null,"abstract":"With the widespread of light emitting diodes (LEDs) as a primary source of illumination, visible light communication (VLC) offers a lot of potentials by providing both resources and energy saving advantages. This paper presents a practical implementation of an integration of Power Line Communication (PLC) and VLC. The system uses spread frequency shift keying (S-FSK) and on-off keying (OOK) in the PLC and VLC channel respectively. The system is of low complexity, low cost and dedicated to enhance low data rate application of PLC technology. The practical design is compatible with the European Committee for Electrotechnical Standardization (CENELEC) band A and the test are done on a Chinese home environment where the Electric Power Research Institute (EPRI) specifies a 3 kHz to 500 kHz band. Results illustrating the effect of sunlight on this system are presented.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Assurance of QoS in the integration of cloud services and internet of things 云服务与物联网融合中的QoS保障
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072007
H. Khodkari, S. Ghazi-Maghrebi, A. Asosheh
{"title":"Assurance of QoS in the integration of cloud services and internet of things","authors":"H. Khodkari, S. Ghazi-Maghrebi, A. Asosheh","doi":"10.1109/ISNCC.2017.8072007","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072007","url":null,"abstract":"Internet of Things (IoT) and Cloud computing paradigm is a new research area. On the other hand, it has been identified as one of the emerging technologies in the field of computer science and Information Technology. The complementarity of these two technologies plays a major role in accessing any services and applications anywhere, anytime in the many smart environments. It is obvious that the integration of IoT and cloud computing is in its infantile phase and it has not been extended to all application domains due to its inadequate quality of service. In this research, we consider the combination and corporation of IoT and cloud computing as a point of assurance of QoS view.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134264323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A new weight based rotating clustering scheme for WSNS 一种新的基于权值的WSNS旋转聚类方案
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072000
Alsnousi Essa, A. Al-Dubai, I. Romdhani, Mohamed A. Esriaftri
{"title":"A new weight based rotating clustering scheme for WSNS","authors":"Alsnousi Essa, A. Al-Dubai, I. Romdhani, Mohamed A. Esriaftri","doi":"10.1109/ISNCC.2017.8072000","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072000","url":null,"abstract":"Clustering mechanisms in WSNs are among the most widely recommended approaches to sustaining a network throughout its lifetime. Despite a number of research activities associated with clustering in WSNs, some aspects of clustering have not yet been adequately investigated. Unlike existing solutions, this paper proposes a new weighting based approach to electing CHs, considering the node's context; i.e. its transmission range, its degree, remaining energy and centrality from its neighbours. The novelty of our algorithm relates to the selection of a set of nodes with the highest weight as CH candidates, in order to compete for final CH. This will guarantee the selection of optimal cluster heads among sensor nodes. Moreover, this novel approach eliminates the re-clustering process for the entire network in each round, by rotating the CHs inside the created clusters in the first set up phase. The simulation experiments demonstrate that the new approach outperforms its counterparts (HEED, LCP, EEUC and DLCP) with respect to the network's lifetime.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel serious game engineering based interactive visualization and evaluation platform for cellular technologies 基于游戏工程的蜂窝技术交互式可视化评价平台
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072012
Pratip Chakraborty, Nandish P. Kuruvatti, H. Schotten
{"title":"A novel serious game engineering based interactive visualization and evaluation platform for cellular technologies","authors":"Pratip Chakraborty, Nandish P. Kuruvatti, H. Schotten","doi":"10.1109/ISNCC.2017.8072012","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072012","url":null,"abstract":"In today's world, mobile communication has become a ubiquitously used technology, currently on the verge of its fifth generation (5G). 5G anticipates higher traffic volume and connected device density than present. It further envisions variety of service types and use cases arising from them. Various 5G concepts are being developed in order to satiate the aforementioned challenges. One of the key tasks for 5G consortium however, is to present the developed technology and concepts to wider audience (academia, industry) and even convince decision makers from non-information and communications technology (ICT) industries. Thus, it is desired to have easy to understand illustrations of envisioned 5G use cases and proposed technical solutions, targeting the non-experts. The contemporary simulation framework has limited or no provision to dynamically visualize and interact with the simulation scenario, rendering it difficult to be used for marketing as well as academic purposes. In this paper, we propose a serious game engineering based 3D visualization and evaluation framework, which allows dynamic and interactive visualization of simulated scenario. The proposed framework is simulator agnostic which enables viewer to immerse oneself into the simulated scene, visualize key performance indicators (KPI) in almost real time and even interact with simulator by changing key simulation parameters. These features equip the proposed interactive visualization/evaluation platform (IVEP) to demonstrate the 5G use cases and developed concepts better, paving way for easier understanding and evaluation of the concepts even by non-experts.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A real-time risk assessment model for intrusion detection systems 入侵检测系统的实时风险评估模型
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8071990
El Mostapha Chakir, M. Moughit, Y. I. Khamlichi
{"title":"A real-time risk assessment model for intrusion detection systems","authors":"El Mostapha Chakir, M. Moughit, Y. I. Khamlichi","doi":"10.1109/ISNCC.2017.8071990","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071990","url":null,"abstract":"Nowadays, Intrusion Detection Systems become an important components of network security, they collect and check events from networks and hosts, looking for signs of security violations. As soon as unnecessary events are detected, IDS triggers alerts to report them, thus, the security administrator take safety measures to stop the attack or repair the compromised system. Normally, this is what IDSs should do, but in practice, IDSs have been observed to generate a huge number of alerts, especially false alerts (i.e., false positives), this make the task of security administrator very difficult, he must analyze each alert manually, either a fake or real threat. This paper proposes an approach to Intrusion Real-Time Risk Assessment, the objective is to evaluate the severity of alerts, minimize false positives, distinguish alerts with low importance and irrelevant one, thereby, report serious alerts that present a real threat to the network system by calculating the Risk of alerts and prioritizing them according to their severity. We will tightly integrate this new model with an existing framework.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121026787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal resource allocation for downlink OFDM-Based cognitive radio networks 基于ofdm的下行认知无线网络资源优化分配
2017 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2017-05-01 DOI: 10.1109/ISNCC.2017.8072008
Xu Wang, S. Ekin, E. Serpedin
{"title":"Optimal resource allocation for downlink OFDM-Based cognitive radio networks","authors":"Xu Wang, S. Ekin, E. Serpedin","doi":"10.1109/ISNCC.2017.8072008","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072008","url":null,"abstract":"In this paper, we study the downlink resource allocation (RA) problem in orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) networks. Our goal is to maximize the aggregated capacity of secondary users (SUs). In addition, the power of SUs is controlled to keep the interference introduced to primary users (PUs) under certain limits, which gives rise to a non-convex mixed integer non-linear programming (MINLP) optimization problem. In this paper, it is illustrated that the non-convex MINLP formulation admits a special structure and the optimal solution can be always achieved using standard convex optimization techniques under a general and practical assumption. In particular, the subgradient method is adopted to address the problem in the dual domain. The effectiveness of the proposed algorithms is verified by simulations.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信