Proceedings of the 3rd International Conference on Future Networks and Distributed Systems最新文献

筛选
英文 中文
FogNetwork Orchestration for Heterogeneous Networks 异构网络的FogNetwork编排
Raghad Jawabreh, Narmeen Darawshe, O. Othman, Ahmed Awad
{"title":"FogNetwork Orchestration for Heterogeneous Networks","authors":"Raghad Jawabreh, Narmeen Darawshe, O. Othman, Ahmed Awad","doi":"10.1145/3341325.3342006","DOIUrl":"https://doi.org/10.1145/3341325.3342006","url":null,"abstract":"The evolution of telecommunications has allowed new paradigms to appear; including Internet of Things (IoT). IoT, enables different physical objects to interact, communicate with each other through the Internet. Another paradigm related to the IoT is fog Computing; which is an extension of the cloud Computing. Fog computing performs cloud computing services such as data storage and control on the edges which allow reducing latency problem in the cloud. Related to fog computing, a procedure that determines how the virtualized resources are allocated is called orchestration, it aims to minimize the latency of fog-based services. This paper proposes a new mechanism for fog orchestration of heterogeneous IoT networks in a way that meets the requirements of the clients of the IoT services. Wherein a client requests a specific computational network, according to which the proposed orchestration will choose a path based on node's available resources and on networks conditions.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Overshooting and Cost Minimization in LTE Cellular Network Using Non-dominate Sorting Genetic Algorithm based on Laplace Crossover 基于拉普拉斯交叉的非支配排序遗传算法在LTE蜂窝网络中的超调与成本最小化
Mouhamed Amine Ouamri, Mohamed Azni
{"title":"Overshooting and Cost Minimization in LTE Cellular Network Using Non-dominate Sorting Genetic Algorithm based on Laplace Crossover","authors":"Mouhamed Amine Ouamri, Mohamed Azni","doi":"10.1145/3341325.3341997","DOIUrl":"https://doi.org/10.1145/3341325.3341997","url":null,"abstract":"In cellular networks design, cell planning is the primary and most important phase before the deployment of the network's infrastructure. Cell planning aims to determine the best Base Stations (BS) placement in a given area, in order to meet traffic and coverage requirements, and to minimize overshooting that may affect user equipments. Overshooting consists in a signal from a given cell forming a discontinuous coverage area in another adjacent cell. In this paper, we develop a novel optimization method for BS planning. Our objective is to reduce the number of deployed BS while minimizing signal overshooting, under capacity constraint. In the proposed approach, cell planning is formulated as a multi-objective problem. Then, a non-dominate sorting genetic algorithm based on Laplace Crossover is applied in order to solve the problem. The proposed algorithm is implemented and simulations under real conditions are conducted. The performance of the proposed algorithm is compared with that of a real deployed network infrastructure. The results obtained show that the number of required BS can be reduced with a lower rate overshooting.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129086718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
External Device to Protect the Software-Defined Network Performance in Case of a Malicious Attack 外部设备保护软件定义网络性能,防止恶意攻击
A. Alshra’a, J. Seitz
{"title":"External Device to Protect the Software-Defined Network Performance in Case of a Malicious Attack","authors":"A. Alshra’a, J. Seitz","doi":"10.1145/3341325.3342016","DOIUrl":"https://doi.org/10.1145/3341325.3342016","url":null,"abstract":"Many security analyses argue that the Software-Defined Network (SDNs) framework has many vulnerabilities because SDN provides malicious users an easy opportunity to overload network resources. Typically, the malicious user directs the attack towards the network layer, especially the controller plane which acts as the core of the network. However, the attack is redirected to the application layer when the attacker is defeated in the network layer. This paper proposes to extend the SDN controller with an external device to improve the SDN architecture and to protect the service level of the SDN components against malicious attacks. Simulation results show that the proposal successfully protects Web servers against Slow HTTP DDoS attacks.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130269122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A wider picture of trust: confronting multi-contextual social traits for trust inference 更广阔的信任图景:面对信任推理的多情境社会特征
K. Akilal, Mawloud Omar, Hachem Slimani
{"title":"A wider picture of trust: confronting multi-contextual social traits for trust inference","authors":"K. Akilal, Mawloud Omar, Hachem Slimani","doi":"10.1145/3341325.3342021","DOIUrl":"https://doi.org/10.1145/3341325.3342021","url":null,"abstract":"With the advent of social networks, problems related to information veracity and people trustworthiness naturally arise and become more acute as the numbers of participants and the volumes of exchanged information grow. Predicting and recommending trust (and distrust) levels is essential for a healthier online presence. Although many research efforts are being devoted to these tasks, most studies that have been undertaken in this area are constrained by two facts. 1) Distrust, contrary to trust, is not necessarily propagative, thus is harder to infer using propagative approaches. 2) Most publicly available datasets fail to capture the essence of trust for they ignore one of its most important aspects: its context. In this paper, we propose a multidimensional trust model that allows us to describe some social traits that affect trust, and which could not be described with a unidimensional model. We, then, use these traits to propose a straightforward trust prediction approach that does not rely on trust propagation. Our work aims to provide a usable foundation and to ignite more advanced researches on trust and its applications.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Automated Web Application Security Vulnerabilities Testing 自动化Web应用安全漏洞测试分析
Pariwish Touseef, Khubaib Amjad Alam, A. Jamil, Hamza Tauseef, S. Ajmal, Rimsha Asif, Bisma Rehman, Sumaira Mustafa
{"title":"Analysis of Automated Web Application Security Vulnerabilities Testing","authors":"Pariwish Touseef, Khubaib Amjad Alam, A. Jamil, Hamza Tauseef, S. Ajmal, Rimsha Asif, Bisma Rehman, Sumaira Mustafa","doi":"10.1145/3341325.3342032","DOIUrl":"https://doi.org/10.1145/3341325.3342032","url":null,"abstract":"In recent years, the global spread of web risks have proposed an immediate demand for security models and prevention mechanisms. This study preliminary findings analyze an extensive literature review on web application vulnerabilities security testing. Out of an initial set of 237 studies, 30 studies were finally included as Primary Research Studies (PRS) by assuring two research questions. The results reveals that SQL injection followed by XSS and Sensitive data exposure are the most recurring risks of web applications. Similarly, Invalidated Redirects and Forwards/Under Protected APIs have received little attention by research community. The scope of this study is also extended to web application vulnerabilities testing and identification of relevant data sets. This paper also recommends future possibilities to enhance the security approaches for protection against the risks.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133950738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain 使用物联网和区块链在关键任务应用中进行持续监控
M. Hammoudeh, Ibrahim Ghafir, A. Bounceur, Thomas Rawlinson
{"title":"Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain","authors":"M. Hammoudeh, Ibrahim Ghafir, A. Bounceur, Thomas Rawlinson","doi":"10.1145/3341325.3342018","DOIUrl":"https://doi.org/10.1145/3341325.3342018","url":null,"abstract":"This paper is set to demonstrate the methodology and benefits of applying blockchain to the Internet of Things (IoT). It outlines the design of a mission-critical monitoring system using the IoT and blockchain technologies. Blockchain is used to ensure the integrity of data gathered by IoT devices. Smart contracts are used to verify and enforce the conditions of monitored assets during their lifecycle. This system provides continuous, real-time and secure monitoring. A highly configurable interface is designed to allow users set thresholds and alerts.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Carbon monoxide detection: an IoT application used as a tool for civil protection services to save lives 一氧化碳检测:一种物联网应用程序,用作民防服务挽救生命的工具
Badreddine Miles, S. Chikhi, E. Bourennane
{"title":"Carbon monoxide detection: an IoT application used as a tool for civil protection services to save lives","authors":"Badreddine Miles, S. Chikhi, E. Bourennane","doi":"10.1145/3341325.3341998","DOIUrl":"https://doi.org/10.1145/3341325.3341998","url":null,"abstract":"Carbon monoxide (CO) is a particularly toxic gas, and the CO poisoning is the leading cause of fatal poisoning in the world. One solution to deal with this dangerous gas is to exploit the advantages given to us by the applications and the technology advances in internet of things (IoT). In this context, we propose to integrate carbon monoxide detection objects to the internet, as part of civil protection intervention applications in case of detection of carbon monoxide to avoid poisoning. To do this, we propose a typical IoT architecture to manage the alerts sent to civil protection in the event of detection of carbon monoxide (CO). The architecture is based on the Message Queue Telemetry Transport (MQTT) communication protocol. Finally, we present the realization of our Test-bed and its components to integrate the object of detection of carbon monoxide on the internet.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130180204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems 第三届未来网络与分布式系统国际会议论文集
{"title":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","authors":"","doi":"10.1145/3341325","DOIUrl":"https://doi.org/10.1145/3341325","url":null,"abstract":"","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126676388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信