Raghad Jawabreh, Narmeen Darawshe, O. Othman, Ahmed Awad
{"title":"FogNetwork Orchestration for Heterogeneous Networks","authors":"Raghad Jawabreh, Narmeen Darawshe, O. Othman, Ahmed Awad","doi":"10.1145/3341325.3342006","DOIUrl":"https://doi.org/10.1145/3341325.3342006","url":null,"abstract":"The evolution of telecommunications has allowed new paradigms to appear; including Internet of Things (IoT). IoT, enables different physical objects to interact, communicate with each other through the Internet. Another paradigm related to the IoT is fog Computing; which is an extension of the cloud Computing. Fog computing performs cloud computing services such as data storage and control on the edges which allow reducing latency problem in the cloud. Related to fog computing, a procedure that determines how the virtualized resources are allocated is called orchestration, it aims to minimize the latency of fog-based services. This paper proposes a new mechanism for fog orchestration of heterogeneous IoT networks in a way that meets the requirements of the clients of the IoT services. Wherein a client requests a specific computational network, according to which the proposed orchestration will choose a path based on node's available resources and on networks conditions.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overshooting and Cost Minimization in LTE Cellular Network Using Non-dominate Sorting Genetic Algorithm based on Laplace Crossover","authors":"Mouhamed Amine Ouamri, Mohamed Azni","doi":"10.1145/3341325.3341997","DOIUrl":"https://doi.org/10.1145/3341325.3341997","url":null,"abstract":"In cellular networks design, cell planning is the primary and most important phase before the deployment of the network's infrastructure. Cell planning aims to determine the best Base Stations (BS) placement in a given area, in order to meet traffic and coverage requirements, and to minimize overshooting that may affect user equipments. Overshooting consists in a signal from a given cell forming a discontinuous coverage area in another adjacent cell. In this paper, we develop a novel optimization method for BS planning. Our objective is to reduce the number of deployed BS while minimizing signal overshooting, under capacity constraint. In the proposed approach, cell planning is formulated as a multi-objective problem. Then, a non-dominate sorting genetic algorithm based on Laplace Crossover is applied in order to solve the problem. The proposed algorithm is implemented and simulations under real conditions are conducted. The performance of the proposed algorithm is compared with that of a real deployed network infrastructure. The results obtained show that the number of required BS can be reduced with a lower rate overshooting.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129086718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"External Device to Protect the Software-Defined Network Performance in Case of a Malicious Attack","authors":"A. Alshra’a, J. Seitz","doi":"10.1145/3341325.3342016","DOIUrl":"https://doi.org/10.1145/3341325.3342016","url":null,"abstract":"Many security analyses argue that the Software-Defined Network (SDNs) framework has many vulnerabilities because SDN provides malicious users an easy opportunity to overload network resources. Typically, the malicious user directs the attack towards the network layer, especially the controller plane which acts as the core of the network. However, the attack is redirected to the application layer when the attacker is defeated in the network layer. This paper proposes to extend the SDN controller with an external device to improve the SDN architecture and to protect the service level of the SDN components against malicious attacks. Simulation results show that the proposal successfully protects Web servers against Slow HTTP DDoS attacks.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130269122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A wider picture of trust: confronting multi-contextual social traits for trust inference","authors":"K. Akilal, Mawloud Omar, Hachem Slimani","doi":"10.1145/3341325.3342021","DOIUrl":"https://doi.org/10.1145/3341325.3342021","url":null,"abstract":"With the advent of social networks, problems related to information veracity and people trustworthiness naturally arise and become more acute as the numbers of participants and the volumes of exchanged information grow. Predicting and recommending trust (and distrust) levels is essential for a healthier online presence. Although many research efforts are being devoted to these tasks, most studies that have been undertaken in this area are constrained by two facts. 1) Distrust, contrary to trust, is not necessarily propagative, thus is harder to infer using propagative approaches. 2) Most publicly available datasets fail to capture the essence of trust for they ignore one of its most important aspects: its context. In this paper, we propose a multidimensional trust model that allows us to describe some social traits that affect trust, and which could not be described with a unidimensional model. We, then, use these traits to propose a straightforward trust prediction approach that does not rely on trust propagation. Our work aims to provide a usable foundation and to ignite more advanced researches on trust and its applications.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pariwish Touseef, Khubaib Amjad Alam, A. Jamil, Hamza Tauseef, S. Ajmal, Rimsha Asif, Bisma Rehman, Sumaira Mustafa
{"title":"Analysis of Automated Web Application Security Vulnerabilities Testing","authors":"Pariwish Touseef, Khubaib Amjad Alam, A. Jamil, Hamza Tauseef, S. Ajmal, Rimsha Asif, Bisma Rehman, Sumaira Mustafa","doi":"10.1145/3341325.3342032","DOIUrl":"https://doi.org/10.1145/3341325.3342032","url":null,"abstract":"In recent years, the global spread of web risks have proposed an immediate demand for security models and prevention mechanisms. This study preliminary findings analyze an extensive literature review on web application vulnerabilities security testing. Out of an initial set of 237 studies, 30 studies were finally included as Primary Research Studies (PRS) by assuring two research questions. The results reveals that SQL injection followed by XSS and Sensitive data exposure are the most recurring risks of web applications. Similarly, Invalidated Redirects and Forwards/Under Protected APIs have received little attention by research community. The scope of this study is also extended to web application vulnerabilities testing and identification of relevant data sets. This paper also recommends future possibilities to enhance the security approaches for protection against the risks.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133950738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hammoudeh, Ibrahim Ghafir, A. Bounceur, Thomas Rawlinson
{"title":"Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain","authors":"M. Hammoudeh, Ibrahim Ghafir, A. Bounceur, Thomas Rawlinson","doi":"10.1145/3341325.3342018","DOIUrl":"https://doi.org/10.1145/3341325.3342018","url":null,"abstract":"This paper is set to demonstrate the methodology and benefits of applying blockchain to the Internet of Things (IoT). It outlines the design of a mission-critical monitoring system using the IoT and blockchain technologies. Blockchain is used to ensure the integrity of data gathered by IoT devices. Smart contracts are used to verify and enforce the conditions of monitored assets during their lifecycle. This system provides continuous, real-time and secure monitoring. A highly configurable interface is designed to allow users set thresholds and alerts.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Carbon monoxide detection: an IoT application used as a tool for civil protection services to save lives","authors":"Badreddine Miles, S. Chikhi, E. Bourennane","doi":"10.1145/3341325.3341998","DOIUrl":"https://doi.org/10.1145/3341325.3341998","url":null,"abstract":"Carbon monoxide (CO) is a particularly toxic gas, and the CO poisoning is the leading cause of fatal poisoning in the world. One solution to deal with this dangerous gas is to exploit the advantages given to us by the applications and the technology advances in internet of things (IoT). In this context, we propose to integrate carbon monoxide detection objects to the internet, as part of civil protection intervention applications in case of detection of carbon monoxide to avoid poisoning. To do this, we propose a typical IoT architecture to manage the alerts sent to civil protection in the event of detection of carbon monoxide (CO). The architecture is based on the Message Queue Telemetry Transport (MQTT) communication protocol. Finally, we present the realization of our Test-bed and its components to integrate the object of detection of carbon monoxide on the internet.","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130180204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","authors":"","doi":"10.1145/3341325","DOIUrl":"https://doi.org/10.1145/3341325","url":null,"abstract":"","PeriodicalId":178126,"journal":{"name":"Proceedings of the 3rd International Conference on Future Networks and Distributed Systems","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126676388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}