{"title":"Cooperation based energy efficiency optimization using game theory framework for heterogeneous networks","authors":"S. Bouferda, A. Hayar, B. Zayen, M. Rifi","doi":"10.1109/RELABIRA.2012.6235091","DOIUrl":"https://doi.org/10.1109/RELABIRA.2012.6235091","url":null,"abstract":"Wireless communications knows a real progress that continues relentless as subscribers consume new products and services using mobile devices having more and more powerful feature sets and performance. Consequently we have both a growth in electromagnetic radiation which can be harmful for human health, and mobiles battery consumption that have to be increasingly greater with such performances. In this paper1 we propose a new power optimization scheme that aims to reduce the transmit power while guarantying a good capacity for the system, based on a cooperation protocol algorithm and using a game theory based resource allocation scheme.","PeriodicalId":180400,"journal":{"name":"2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power fairness for multicast traffic in optical networks with adaptive light splitters","authors":"S. Jawhar, Bernard A. Cousin, Z. Bitar","doi":"10.1109/RELABIRA.2012.6235088","DOIUrl":"https://doi.org/10.1109/RELABIRA.2012.6235088","url":null,"abstract":"To perform data multicasting in the optical layer, optical nodes must be equipped with light splitters. Light splitters can split one light wave to more than one node output. A lot of work had been done in order to enhance the structure of the light splitter in a way to reduce its cost and enhance its performance in terms of the power loss resulted of multiple splitting. To guarantee the fairness of power received by different members of a same multicast group, the use of adaptive light splitters is required. Adaptive light splitters allow splitting an incoming light signal into two or more node output with the ability of varying the individual power of each output signal. This paper studies the benefits of using adaptive splitters on the value of the power received by each of the multicast group members in a way to assure fairness among all members.","PeriodicalId":180400,"journal":{"name":"2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Double-link failure localization based on the monitoring trail concept in WDM networks","authors":"E. Doumith, S. al Zahr","doi":"10.1109/RELABIRA.2012.6235087","DOIUrl":"https://doi.org/10.1109/RELABIRA.2012.6235087","url":null,"abstract":"As traffic demands are continuously increasing, core networks must be able to react almost instantaneously to any single, even multiple, failure(s) in order to prevent huge data losses. Even though the probability of simultaneous multiple failures is very small, the time needed to repair a single failure ranges from several hours (for landline fibers) to several weeks (for submarine fibers). During this period, the network is vulnerable to any new failure that may occur in the network. Therefore, designing survivable WDM networks against multiple failures requires efficient and accurate detection and localization mechanisms. In this paper, we extend the monitoring trail concept in order to detect and unambiguously localize any single- and double- link failure in the network. Compared to our previously proposed MEMOTA algorithm, the improved MEMOTA++ algorithm benefits from an improved trail reconfiguration algorithm in order to reduce its execution time. Numerical simulations have been carried out using the Deutsche Telekom and the Geant-2 European networks. We show that a monitoring solution able to localize any double-link failure in the Deutsche Telekom network is 122% more expensive than the one able to localize any single-link failure, but remains 10.9% more economical than the traditional link-based monitoring solution.","PeriodicalId":180400,"journal":{"name":"2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122161838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensured confidentiality authentication and key agreement protocol for EPS","authors":"J. B. Abdo, H. Chaouchi, M. Aoude","doi":"10.1109/RELABIRA.2012.6235098","DOIUrl":"https://doi.org/10.1109/RELABIRA.2012.6235098","url":null,"abstract":"The revenue from Security v/s its financial and performance cost debate has its fingerprints shown in EPS's 3GPP Technical specification, where some contradiction between the security philosophy v/s design caught the attention of the research community. Example of these contradictions is the shown in 3GPP's technical specification where the user's identity must be confidential to third parties, while in the design, the user's permanent Identifier is sent in plaintext over radio channel. Radio channels is susceptible to eavesdropping thus Users can be tracked for a short period before the temporary identifier is used, but this time is more than enough for a terrorist attack. Most of the papers published related to this topic, are proposing solutions for the above contradiction. In our work, some of these papers' security robustness will be evaluated by exploiting its vulnerabilities, and simulating newly proposed attack (Intelligent Brute Force), thus sizing the confidence in its proposals. A new mechanism, Ensured confidentiality Authentication and Key agreement (EC-AKA), is proposed to enhance the user's confidentiality and cover the identified AKA's vulnerabilities, thus fulfilling the market's long term needs, which LTE was developed for.","PeriodicalId":180400,"journal":{"name":"2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)","volume":"8 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120998303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing configurations for car speed measurements using passive RFID tags","authors":"A. Moubayed, U. Eid, C. Abou-Rjeily","doi":"10.1109/RELABIRA.2012.6235092","DOIUrl":"https://doi.org/10.1109/RELABIRA.2012.6235092","url":null,"abstract":"The ability to detect instantaneous speed is crucial for several applications. Moving objects such as vehicles and robots need to detect their speeds on a regular basis. Current systems measure speed using radars and speedometers which base the detection of the speed on the Doppler frequency shift phenomenon. Furthermore, Global Positioning Systems (GPS) do not usually work inside closed structures. In this paper, we present a cheap alternative to measure speed using RFID passive tags. The system is based on a RFID reader that reads tags installed within its reading range. The reader can be fixed or moving. Several configurations are tested to determine the best spacing of the tags as well as the possible benefit of using an extra antenna to detect speed. Moreover, calculations will be based on three different selection criteria of the time instances.","PeriodicalId":180400,"journal":{"name":"2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. A. H. Hassan, Ali Kassem, Y. Harkouss, R. Assaf, S. E. Assad
{"title":"New chaotic image encryption technique","authors":"H. A. H. Hassan, Ali Kassem, Y. Harkouss, R. Assaf, S. E. Assad","doi":"10.1109/RELABIRA.2012.6235103","DOIUrl":"https://doi.org/10.1109/RELABIRA.2012.6235103","url":null,"abstract":"This paper presents a new image encryption technique based on neural chaotic generator. This encryption technique includes two main operations, permutation at pixel level and masking and permutation at bit level. The chaotic generator used in the encryption of image is perturbed by a new technique done by artificial neural network. Simulations show that the proposed encryption technique is effective and has a high level security.","PeriodicalId":180400,"journal":{"name":"2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123568247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hamze, A. Hamie, J. L. Wei, J. Tang, A. Sharaiha, M. Guegan, A. Alaeddine
{"title":"Significantly improved optical OFDM transmission performances with 10dB reduced optical input powers by quantum dot SOA intensity modulators","authors":"M. Hamze, A. Hamie, J. L. Wei, J. Tang, A. Sharaiha, M. Guegan, A. Alaeddine","doi":"10.1109/RELABIRA.2012.6235089","DOIUrl":"https://doi.org/10.1109/RELABIRA.2012.6235089","url":null,"abstract":"In comparison with conventional semiconductor optical amplifier (SOA) intensity modulators in intensity modulation and direct detection (IMDD) passive optical network (PON) systems, quantum dot SOA intensity modulators can considerably improve the transmission performance of optical orthogonal frequency division multiplexed (OFDM) signals, broaden the optimum operating condition ranges, and allows a 10dB reduction in continuous (CW) optical input power injected into the modulators for achieving signal bit rates more than 30Gb/s over 60km single mode fibers (SMFs).","PeriodicalId":180400,"journal":{"name":"2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}