A. H. E. Fawal, A. Mansour, F. Roy, D. L. Jeune, A. Hamie
{"title":"RACH overload congestion mechanism for M2M communication in LTE-A: Issues and approaches","authors":"A. H. E. Fawal, A. Mansour, F. Roy, D. L. Jeune, A. Hamie","doi":"10.1109/ISNCC.2017.8071981","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071981","url":null,"abstract":"The next generation of mobile systems based on LTE-A (Long Term Evolution-Advanced) networks are expected to support the new promising technology M2M (Machine-to-Machine) communications while keeping an eye on its previous H2H (Human-to-Human) communications not to be affected especially when it comes to the expected exponential growth of the number of M2M in the coming years, in particular, with the advance of IoT (Internet of Things) deployment and the expected ubiquity of such objects in the near future. In this article, we review the M2M communication technology from the LTE-A perspective and we outline the random access challenges in high dense areas where the LTE-A network is striving to fulfill the massive number of M2M devices. Moreover, we compare the most common mechanisms found in the literature that deal with the RACH (Random Access Channel) procedure issues and challenges by analyzing the existing solutions and approaches to avoid RACH overload congestion in the M2M communications. To this end, we have developed different M2M scenarios using SimuLTE Modeler to investigate the impact of M2M communications on LTE-A networks in emergency events.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-layer perceptron approach for flow-based anomaly detection","authors":"Lennart Van Efferen, Amr M. T. Ali-Eldin","doi":"10.1109/ISNCC.2017.8072036","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072036","url":null,"abstract":"The increase in successful cyber-attacks on systems with firewalls and encryption techniques has led to the creation of Intrusion Detection Systems (IDS). Machine learning techniques are often used for these systems to predict malicious behaviour in the vague and unbalanced data. Flow-based IDS monitors only the packet headers of the network traffic and not the attached data to keep up with the growing bandwidth of networks and to maintain the privacy of the users. In this context, a multilayer perceptron approach is analysed on two different datasets and compared to a J48 Decision Tree classifier. Obtained results confirm that flow-based systems seem to be, apart from inevitable, the right way for IDS in the future and that MLP can still be useful in flow-based detection.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Ali, Mansoor Ahmed, Abid Khan, M. Ilyas, Muhammad Saad Razzaq
{"title":"A trust management system model for cloud","authors":"Ahmad Ali, Mansoor Ahmed, Abid Khan, M. Ilyas, Muhammad Saad Razzaq","doi":"10.1109/ISNCC.2017.8072029","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072029","url":null,"abstract":"Distributed computing environments merged into cloud computing architecture which is being used extensively for resource sharing. It has provided efficient and flexible ways for the provision of services meeting resource sharing needs and challenges of the time. Cloud computing has become a cost effective solution as compared to traditional systems. In cloud computing, Software, Infrastructure, and Platforms are being provided as services however this introduced new dimensions of research in security and privacy breaches. Trust establishment and its maintenance play a vital role in Cloud Computing. Availability, Security and Privacy are key parameters of trust and sharing of privacy preserved statistics of these parameters with stakeholders enhances but Security and Privacy lapses shatter users trust. This paper proposes a model of Trust Management System which provides a comprehensive component based architecture to facilitate cloud service providers in maintaining Users Trust and ultimately help them in flourishing their business.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126353863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Standard conformable time domain diversity for DVB-T2 system","authors":"Behnam Akbarian, Saeed Ghazi-Maghrebi","doi":"10.1109/ISNCC.2017.8072006","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072006","url":null,"abstract":"The performance of standard Alamouti space-frequency block code (SFBC) degrades in highly frequency-selective channels since quasi static fading is required for adjacent subcarriers. An enhanced Alamouti decoder allows a high reliability and capacity enhancement. In this paper, we propose an enhanced Alamouti space frequency block decoding scheme for multiple-input multiple-output (MIMO) and orthogonal frequency division multiplexing (OFDM) systems using cyclic delay diversity (CDD) techniques over highly frequency selective channels. We exemplarity implement this scheme for the second generation terrestrial video broadcasting (DVB-T2) system. Simulation results show that the proposed scheme has lower bit error rate (BER), especially for high SNRs, with respect to the over highly frequency-selective channels such as single frequency networks (SFN). The new scheme allows a high reliability and tolerability. The other advantages of the proposed method are its simplicity, flexibility and standard compatibility with respect to the standard Alamouti decoder.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116641394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the SFSK-OOK integrated PLC-VLC system under the influence of sunlight","authors":"S. M. Nlom, K. Ouahada, A. Ndjiongue, H. Ferreira","doi":"10.1109/ISNCC.2017.8071978","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071978","url":null,"abstract":"With the widespread of light emitting diodes (LEDs) as a primary source of illumination, visible light communication (VLC) offers a lot of potentials by providing both resources and energy saving advantages. This paper presents a practical implementation of an integration of Power Line Communication (PLC) and VLC. The system uses spread frequency shift keying (S-FSK) and on-off keying (OOK) in the PLC and VLC channel respectively. The system is of low complexity, low cost and dedicated to enhance low data rate application of PLC technology. The practical design is compatible with the European Committee for Electrotechnical Standardization (CENELEC) band A and the test are done on a Chinese home environment where the Electric Power Research Institute (EPRI) specifies a 3 kHz to 500 kHz band. Results illustrating the effect of sunlight on this system are presented.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assurance of QoS in the integration of cloud services and internet of things","authors":"H. Khodkari, S. Ghazi-Maghrebi, A. Asosheh","doi":"10.1109/ISNCC.2017.8072007","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072007","url":null,"abstract":"Internet of Things (IoT) and Cloud computing paradigm is a new research area. On the other hand, it has been identified as one of the emerging technologies in the field of computer science and Information Technology. The complementarity of these two technologies plays a major role in accessing any services and applications anywhere, anytime in the many smart environments. It is obvious that the integration of IoT and cloud computing is in its infantile phase and it has not been extended to all application domains due to its inadequate quality of service. In this research, we consider the combination and corporation of IoT and cloud computing as a point of assurance of QoS view.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134264323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alsnousi Essa, A. Al-Dubai, I. Romdhani, Mohamed A. Esriaftri
{"title":"A new weight based rotating clustering scheme for WSNS","authors":"Alsnousi Essa, A. Al-Dubai, I. Romdhani, Mohamed A. Esriaftri","doi":"10.1109/ISNCC.2017.8072000","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072000","url":null,"abstract":"Clustering mechanisms in WSNs are among the most widely recommended approaches to sustaining a network throughout its lifetime. Despite a number of research activities associated with clustering in WSNs, some aspects of clustering have not yet been adequately investigated. Unlike existing solutions, this paper proposes a new weighting based approach to electing CHs, considering the node's context; i.e. its transmission range, its degree, remaining energy and centrality from its neighbours. The novelty of our algorithm relates to the selection of a set of nodes with the highest weight as CH candidates, in order to compete for final CH. This will guarantee the selection of optimal cluster heads among sensor nodes. Moreover, this novel approach eliminates the re-clustering process for the entire network in each round, by rotating the CHs inside the created clusters in the first set up phase. The simulation experiments demonstrate that the new approach outperforms its counterparts (HEED, LCP, EEUC and DLCP) with respect to the network's lifetime.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pratip Chakraborty, Nandish P. Kuruvatti, H. Schotten
{"title":"A novel serious game engineering based interactive visualization and evaluation platform for cellular technologies","authors":"Pratip Chakraborty, Nandish P. Kuruvatti, H. Schotten","doi":"10.1109/ISNCC.2017.8072012","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072012","url":null,"abstract":"In today's world, mobile communication has become a ubiquitously used technology, currently on the verge of its fifth generation (5G). 5G anticipates higher traffic volume and connected device density than present. It further envisions variety of service types and use cases arising from them. Various 5G concepts are being developed in order to satiate the aforementioned challenges. One of the key tasks for 5G consortium however, is to present the developed technology and concepts to wider audience (academia, industry) and even convince decision makers from non-information and communications technology (ICT) industries. Thus, it is desired to have easy to understand illustrations of envisioned 5G use cases and proposed technical solutions, targeting the non-experts. The contemporary simulation framework has limited or no provision to dynamically visualize and interact with the simulation scenario, rendering it difficult to be used for marketing as well as academic purposes. In this paper, we propose a serious game engineering based 3D visualization and evaluation framework, which allows dynamic and interactive visualization of simulated scenario. The proposed framework is simulator agnostic which enables viewer to immerse oneself into the simulated scene, visualize key performance indicators (KPI) in almost real time and even interact with simulator by changing key simulation parameters. These features equip the proposed interactive visualization/evaluation platform (IVEP) to demonstrate the 5G use cases and developed concepts better, paving way for easier understanding and evaluation of the concepts even by non-experts.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A real-time risk assessment model for intrusion detection systems","authors":"El Mostapha Chakir, M. Moughit, Y. I. Khamlichi","doi":"10.1109/ISNCC.2017.8071990","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8071990","url":null,"abstract":"Nowadays, Intrusion Detection Systems become an important components of network security, they collect and check events from networks and hosts, looking for signs of security violations. As soon as unnecessary events are detected, IDS triggers alerts to report them, thus, the security administrator take safety measures to stop the attack or repair the compromised system. Normally, this is what IDSs should do, but in practice, IDSs have been observed to generate a huge number of alerts, especially false alerts (i.e., false positives), this make the task of security administrator very difficult, he must analyze each alert manually, either a fake or real threat. This paper proposes an approach to Intrusion Real-Time Risk Assessment, the objective is to evaluate the severity of alerts, minimize false positives, distinguish alerts with low importance and irrelevant one, thereby, report serious alerts that present a real threat to the network system by calculating the Risk of alerts and prioritizing them according to their severity. We will tightly integrate this new model with an existing framework.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121026787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal resource allocation for downlink OFDM-Based cognitive radio networks","authors":"Xu Wang, S. Ekin, E. Serpedin","doi":"10.1109/ISNCC.2017.8072008","DOIUrl":"https://doi.org/10.1109/ISNCC.2017.8072008","url":null,"abstract":"In this paper, we study the downlink resource allocation (RA) problem in orthogonal frequency division multiplexing (OFDM)-based cognitive radio (CR) networks. Our goal is to maximize the aggregated capacity of secondary users (SUs). In addition, the power of SUs is controlled to keep the interference introduced to primary users (PUs) under certain limits, which gives rise to a non-convex mixed integer non-linear programming (MINLP) optimization problem. In this paper, it is illustrated that the non-convex MINLP formulation admits a special structure and the optimal solution can be always achieved using standard convex optimization techniques under a general and practical assumption. In particular, the subgradient method is adopted to address the problem in the dual domain. The effectiveness of the proposed algorithms is verified by simulations.","PeriodicalId":176998,"journal":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}