Proceedings of the 3rd International Conference on Future Networks and Distributed Systems最新文献

筛选
英文 中文
Energy efficient Multi-hops Routing protocol based on Clusters Reorganization for wireless sensor networks 基于聚类重组的无线传感器网络节能多跳路由协议
Feriel Khanouche, Lydia Maouche, Foudil Mir, Mohamed Essaid Khanouche
{"title":"Energy efficient Multi-hops Routing protocol based on Clusters Reorganization for wireless sensor networks","authors":"Feriel Khanouche, Lydia Maouche, Foudil Mir, Mohamed Essaid Khanouche","doi":"10.1145/3341325.3341994","DOIUrl":"https://doi.org/10.1145/3341325.3341994","url":null,"abstract":"A crucial issue to be addressed in large-scale Wireless Sensor Networks composed of thousands of sensors, is the optimal management of the energy consumption in data routing. In this paper an Energy efficient Multi-hops Routing protocol based on Clusters Reorganization (EMRCR) is proposed to overcome the limitations of clustering-based routing protocols such as the random election of cluster-heads (CHs), the unequal distribution of clusters, and the one-hop communication between CHs and the base station. In EMRCR protocol, temporary CHs are first elected and each node is attached to the most appropriate CH. To ensure a good balance among nodes in terms of energy consumption, each formed cluster is then divided into zones to migrate the CH role toward the node having the highest energy and number of neighbors. Besides, the zones of each cluster are divided into sub-zones to reduce the energy consumption of the nodes located far from the CH. Finally, to decrease the energy consumption of the CHs located far from the base station, the collected data are transmitted through a multi-hop inter-clusters routing process. The obtained results show that the proposed protocol outperforms others clustering-based routing protocols in terms of energy consumption and network lifetime.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124041644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards gait analysis - Creating a setup for the analyses under laboratory conditions 走向步态分析-创建实验室条件下的分析设置
Maik Benndorf, M. Gaedke, T. Haenselmann
{"title":"Towards gait analysis - Creating a setup for the analyses under laboratory conditions","authors":"Maik Benndorf, M. Gaedke, T. Haenselmann","doi":"10.1145/3341325.3342005","DOIUrl":"https://doi.org/10.1145/3341325.3342005","url":null,"abstract":"The human gait offers a variety of information about the human being. In order to make accurate statements about this information, it is necessary to analyse the gait patterns of numerous participants. This requires the same conditions for all participants, which are difficult to realize in reality. In this paper, we describe an approach with which the gait analysis can be carried out for all participants under laboratory conditions. We propose a setup for the recording of the data and a pipeline for analysing. This approach will be evaluated with exemplary results of a volunteer.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123112510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly Behavior Analysis for IoT Network Nodes 物联网网络节点异常行为分析
J. Pacheco, V. Benitez, Luis Félix
{"title":"Anomaly Behavior Analysis for IoT Network Nodes","authors":"J. Pacheco, V. Benitez, Luis Félix","doi":"10.1145/3341325.3342008","DOIUrl":"https://doi.org/10.1145/3341325.3342008","url":null,"abstract":"The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect smart buildings, homes, and cities. The integration of IoT with Fog and Cloud Computing can bring not only the computational requirements, but they also enable IoT services to be pervasive, cost-effective, and can be accessed from anywhere and at any time. In any IoT application, communications are crucial to deliver the required information, for instance to take actions during crisis events. However, IoT components such as Gateways, usually referred as IoT nodes, will introduce major security challenges as they contribute to increase the attack surface, preventing the IoT to deliver accurate information to final users. In this paper, we present a methodology to develop an Intrusion Detection System based on Anomaly Behavior Analysis to detect when an IoT network node is being compromised. Our preliminary experimental results show that our approach accurately detects known and unknown anomalies due to misuses or cyber-attacks, with high detection rate and low false alarms.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131751713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Temperature-based models of batteries for the simulation of Wireless Sensor Networks 用于无线传感器网络仿真的基于温度的电池模型
Nabil Kadjouh, A. Bounceur, A. Tari, R. Euler, Loïc Lagadec, A. Laouid
{"title":"Temperature-based models of batteries for the simulation of Wireless Sensor Networks","authors":"Nabil Kadjouh, A. Bounceur, A. Tari, R. Euler, Loïc Lagadec, A. Laouid","doi":"10.1145/3341325.3342013","DOIUrl":"https://doi.org/10.1145/3341325.3342013","url":null,"abstract":"The main parameter studied in a simulation of a Wireless Sensor Network is the lifetime of the network. In other words, the state of the battery of each node. That is why modelling correctly the battery is very important to obtain realistic results. In real applications, many types of batteries can be considered, where their lifetime depends on the weather variations and on the type of the considered sensor node. In this paper, we present some models of batteries simulated with the CupCarbon simulator. The models are obtained by estimating the consumption of real batteries. This is done by studying series of discharging current values with respect to different voltage values and different temperatures. Furthermore, we implement a new module in the CupCarbon simulator to allow testing the proposed models and to implement new personal models.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129857755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Buffer-Aided 5G Cooperative Networks: Considering the Source Delay 缓冲辅助5G协同网络:考虑源延迟
Mohammad Alkhawatrah, Yu Gong, O. Aldabbas, M. Hammoudeh
{"title":"Buffer-Aided 5G Cooperative Networks: Considering the Source Delay","authors":"Mohammad Alkhawatrah, Yu Gong, O. Aldabbas, M. Hammoudeh","doi":"10.1145/3341325.3342003","DOIUrl":"https://doi.org/10.1145/3341325.3342003","url":null,"abstract":"Applying relays employed with data buffers drastically enhance the performance of cooperative networks. However, lengthening the packet delay is still a serious challenge for cooperative networks. This paper thoroughly studies a new factor affecting the packet delay which is the source delay. This factor plays a key role in calculating the total delay that messages encounter before reaching their destination. This delay is crucial especially in applications that require their messages to get transmitted as fast as possible. Markov chain is employed to model the system and analyze the source delay. Numerical simulations verify the analytical model, the results show that buffer-aided relays can beat non-buffer relays in terms of average packet delay, especially at low signal to noise ratio (SNR) range. This makes adding buffers to relays an attractive solution for the packet delay in 5G applications.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133194702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sensitive and Private Data Analysis: A Systematic Review 敏感和私人数据分析:系统回顾
Syeda Sana Zainab, Mohand Tahar Kechadi
{"title":"Sensitive and Private Data Analysis: A Systematic Review","authors":"Syeda Sana Zainab, Mohand Tahar Kechadi","doi":"10.1145/3341325.3342002","DOIUrl":"https://doi.org/10.1145/3341325.3342002","url":null,"abstract":"Each day an extensive amount of data is produced from various organisations, such as e-commerce, IT, hospitals, retail and supply chain, etc. Due to the expansion of computer devices and advances in technology this immense amount of data has been collected and analysed to support decision making. The examination of such data is advancing businesses and contributing advantageously to society in numerous diverse areas. However, serious privacy concerns are raised due to the storage and flow of potentially sensitive data [31]. Strategies that permit the knowledge extraction from the data, while protecting privacy, are known as privacy-preserving data mining (PPDM) techniques. This paper surveys the analysis of private and sensitive data using various PPDM algorithms and techniques. We also highlighted their advantages and limitations within various contexts.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114325763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LRAP
Ahmad Bilal, M. Hussain
{"title":"LRAP","authors":"Ahmad Bilal, M. Hussain","doi":"10.1145/3341325.3342025","DOIUrl":"https://doi.org/10.1145/3341325.3342025","url":null,"abstract":"In contemporary context aware systems when an event is triggered, system responds through sense-decide-actuate cycle and carries out requisite task with corresponding processing expenditure. However, such systems are lacking the capability to establish learned association among subsequent events, furthermore, the notion of the context is embedded into applications that may pose certain processing overhead. Therefore, each event is considered as arrival of afresh situation and dealt with entirely replicated processing cycle. Such computing mechanism where each event is stimulus to complete resource utilization leads the system towards processing overwhelming. This research work proposes a LRAP: a Learned Reflex action embedded Associative context learning based processing efficient Paradigm in visual sensor networks. In which each actuation of the system serves as new context to succeeding event and aids it to evolve internally. Gradually, with exposition to multiple events system refines its context repository with introspective context extracted through processed retrospective context that serves as meta-context to upcoming events leading the system towards evolution of context addition. Such context learning through improved introspective context utilization maximizes the system internal actuation that further optimizes the independent functions of reduced sensing and improved decision with minimal resource exploitation evolving it as a cut-through processing mechanism. Furthermore, when system gains the maximum internal actuation it responds impulsively against repetition of an event through intro-spectively evolved actuation based associative learning that imitates learned reflex action through associative context learning leading the system towards exceedingly processing efficient paradigm.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123221305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigating and Experimenting Interference Mitigation by Capture Effect in LoRa Networks LoRa网络中捕获效应抑制干扰的研究与实验
C. Pham, A. Bounceur, L. Clavier, U. Noreen, M. Ehsan
{"title":"Investigating and Experimenting Interference Mitigation by Capture Effect in LoRa Networks","authors":"C. Pham, A. Bounceur, L. Clavier, U. Noreen, M. Ehsan","doi":"10.1145/3341325.3342022","DOIUrl":"https://doi.org/10.1145/3341325.3342022","url":null,"abstract":"","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IoT Database Forensics: An Investigation on HarperDB Security 物联网数据库取证:HarperDB安全调查
Robert Marsh, Sana Belguith, T. Dargahi
{"title":"IoT Database Forensics: An Investigation on HarperDB Security","authors":"Robert Marsh, Sana Belguith, T. Dargahi","doi":"10.1145/3341325.3341993","DOIUrl":"https://doi.org/10.1145/3341325.3341993","url":null,"abstract":"The data that are generated by several devices in the IoT realm require careful and real time processing. Recently, researchers have concentrated on the usage of cloud databases for storing such data to improve efficiency. HarperDB aims at producing a DBMS that is relational and non-relational simultaneously, to help journeymen developers creating products and servers in the IoT space. Much of what the HarperDB team has talked about has been achieved, but from a security perspective, a lot of improvements need to be made. The team has clearly focused on the problems that exist from a database and data point of view, creating a structure that is unique, fast, easy to use and has great potential to grow with a startup. The functionality and ease of use of this DBMS is not in question, however as the trade-off triangle to the right suggests, this does entail an impact to security. In this paper, using multiple forensic methodologies, we performed an in-depth forensic analysis on HarperDB and found several areas of extreme concern, such as lack of logging functionalities, basic level of authorisation, exposure of users' access rights to any party using the database, There had to be a focus on preventative advice instead of reactive workarounds due to the nature of the flaws found in HarperDB. As such, we provide a number of recommendations for the users and developers.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126954197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Survey on Cache Schemes in Heterogeneous Networks using 5G Internet of Things 基于5G物联网的异构网络缓存方案研究
S. Ajmal, Muteeb Bin Muzammil, A. Jamil, S. Abbas, Umer Iqbal, Pariwish Touseef
{"title":"Survey on Cache Schemes in Heterogeneous Networks using 5G Internet of Things","authors":"S. Ajmal, Muteeb Bin Muzammil, A. Jamil, S. Abbas, Umer Iqbal, Pariwish Touseef","doi":"10.1145/3341325.3342027","DOIUrl":"https://doi.org/10.1145/3341325.3342027","url":null,"abstract":"The 5th Generation Internet of Things is necessary to cope up with the increasing demands of the data with the time. The model of communication demands higher data rates, low latency in the network, efficient power utilization, and reliable transfer of data. To enhance the productivity of the system and to avoid the delays, the cache has played a significant part in the advancement of the 5G-IOT model. The 5G-IOT caching scheme helps in reducing the delays that were caused when there was no cache in the system. Currently, in 5G-IOT, there are caches on each base station, which reduces the delay and enhances the efficiency of the system. Moreover, energy is a great concern in the wireless system. The wireless nodes have limited energy so that it should be consumed in a well-organized and efficient way to achieve maximum effort from them. There are many caching schemes according to the type of network in 5G-IOT systems. There are a lot of methods of caching which takes into account the concern and issue of energy consumption. There are different types of models 5G-IOT caching, one of these is related to heterogeneous systems. Caching in heterogeneous systems using 5G-IOT is explained in this paper.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信