{"title":"WSCE 2020 Breaker Page","authors":"","doi":"10.1109/wsce51339.2020.9275501","DOIUrl":"https://doi.org/10.1109/wsce51339.2020.9275501","url":null,"abstract":"","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI-Powered Honeypots for Enhanced IoT Botnet Detection","authors":"Vasileios A. Memos, K. Psannis","doi":"10.1109/WSCE51339.2020.9275581","DOIUrl":"https://doi.org/10.1109/WSCE51339.2020.9275581","url":null,"abstract":"Internet of Things (IoT) is a revolutionary expandable network which has brought many advantages, improving the Quality of Life (QoL) of individuals. However, IoT carries dangers, due to the fact that hackers have the ability to find security gaps in users’ IoT devices, which are not still secure enough and hence, intrude into them for malicious activities. As a result, they can control many connected devices in an IoT network, turning IoT into Botnet of Things (BoT). In a botnet, hackers can launch several types of attacks, such as the well known attacks of Distributed Denial of Service (DDoS) and Man in the Middle (MitM), and/or spread various types of malicious software (malware) to the compromised devices of the IoT network. In this paper, we propose a novel hybrid Artificial Intelligence (AI)-powered honeynet for enhanced IoT botnet detection rate with the use of Cloud Computing (CC). This upcoming security mechanism makes use of Machine Learning (ML) techniques like the Logistic Regression (LR) in order to predict potential botnet existence. It can also be adopted by other conventional security architectures in order to intercept hackers the creation of large botnets for malicious actions.","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116529339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin Huang, Jinsuo Liu, Yuhang Yan, Gaofeng Zhao, Yang Li, Wei Luo
{"title":"The Enhanced EAP Authentication Protocol for Devices in Power LTE Private Network","authors":"Jin Huang, Jinsuo Liu, Yuhang Yan, Gaofeng Zhao, Yang Li, Wei Luo","doi":"10.1109/WSCE51339.2020.9275583","DOIUrl":"https://doi.org/10.1109/WSCE51339.2020.9275583","url":null,"abstract":"This paper analyzes the advantages and disadvantages of the existing 3GPP WLAN-4G converged network access authentication protocol EAP-AKA. Aiming at the design of power private network, this paper introduces the WAPI certificate authentication mechanism and designs an access authentication protocol WEAP. The proposed WLAN4G interconnection structure model and access authentication mechanism in this paper solve the problem of unified access authentication for WLAN terminals in a converged networking environment. Analysis and simulation results show that compared with the original WAPI authentication protocol, WAPI-XG1, the proposed protocol has higher security and execution efficiency.","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Stimoniaris, Hermes Foto, Georgios Voutsakelis, G. Kokkonis
{"title":"Design and Construction of HVAC and Lighting Controller with Internet of Things Capabilities","authors":"D. Stimoniaris, Hermes Foto, Georgios Voutsakelis, G. Kokkonis","doi":"10.1109/WSCE51339.2020.9275578","DOIUrl":"https://doi.org/10.1109/WSCE51339.2020.9275578","url":null,"abstract":"This paper proposes an automatic control of the heating and lighting system of a building in such a way as to save energy when the building is or is not in use. The proposed controller with the Internet of Things and the application’s capabilities, provides remote control and supervision of a building’s heating and lighting system from around the world. The proposed system can record temperature, humidity, and room lighting in a graph that can be used by any site, and the measurements are available for any use. Heating control is achieved by using an electric valve in the heating circuit, whereas lighting control is achieved by using two relays. The ESP8266 is used to connect the circuit to the internet, while the main microcontroller is the Arduino NANO. In addition, the present work addresses both the problems of energy consumption in a building, which is solved by the construction, thermal and visual comfort, and the new technology of Internet of Things. The design and construction of the PCB, the development of the application, as well as the programming method of the microcontrollers along with their programs are included. The aim of this paper is the use of cutting-edge technology in tertiary sector buildings for energy saving and possible upgrading of the energy class of the building. Finally, in the conclusion of this work suggests are given for new expansions that can be easily added to the existing construction.","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"444 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125765040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kento Fujisawa, Fumiya Kemmochi, A. Yoneyama, H. Otsuka
{"title":"Performance of Adaptive Control CRE against Cluster Size for UE Layout in Multiband HetNets","authors":"Kento Fujisawa, Fumiya Kemmochi, A. Yoneyama, H. Otsuka","doi":"10.1109/WSCE51339.2020.9275568","DOIUrl":"https://doi.org/10.1109/WSCE51339.2020.9275568","url":null,"abstract":"Heterogeneous networks (HetNets) combined with macrocells and picocells in the same coverage are expected to increase system capacity and/or effectively utilize a wide frequency band in fifth-generation (5G) mobile systems and beyond. In HetNets, cell range expansion (CRE) using a positive cell selection offset (CSO) is an important technique that can allow more user equipment (UE) to access picocells. A higher-order modulation scheme such as 1024-quadrature amplitude modulation (QAM) is expected to increase data rates in 5G. This paper describes a personal picocell scheme using adaptive control CRE through the use of two different CSOs to improve user throughput in a multiband HetNet. In particular, we investigate the user throughput of the adaptive control CRE against the cluster size for UE layout defined as the radius of circle centered at each pico-evolved Node B (picoeNB), using a new modulation and coding scheme (MCS) incorporating 1024-QAM. From these results, we confirm that the proposed adaptive control CRE can improve the 5percentile user throughput by 4% compared with conventional CRE while maintaining the average user throughput for a cluster size of 40 m. We also show that a cluster size of 20 m can improve the average and 5-percentile user throughputs by 29% and 13% respectively compared with a cluster size of 40 m. This work will provide a remarkably effective solution for designing multiband HetNets with the use of an MCS incorporating 1024-QAM in 5G and beyond.","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131083775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chrysi K. Metallidou, Konstantinos E. Psannis, Eugenia Alexandropoulou-Egyptiadou
{"title":"An Efficient IoT System Respecting the GDPR","authors":"Chrysi K. Metallidou, Konstantinos E. Psannis, Eugenia Alexandropoulou-Egyptiadou","doi":"10.1109/WSCE51339.2020.9275573","DOIUrl":"https://doi.org/10.1109/WSCE51339.2020.9275573","url":null,"abstract":"Smart technologies integrated in the industry of Hotels is an emerging field in terms of the revolution of industry 4.0. Hotels in the context of providing luxury, specialization, intelligence and easiness to the residents, regarding the hotel's services, are willing to transform their concept into smart hotels by applying the Internet of Things (IoT) technologies to every operation, device, functionality and service and by providing to the residents the convenience of handling everything simply on themselves, through a smart device. However, security features of the IoT applications and privacy for the users are great issues for users and Organizations (residents and the industry of Hotels), due to the General Data Protection Regulation (GDPR).In this paper, we focus on the development of a smart system, than can be applied to any smart building, especially to an intelligent hotel, that supports all smart functionalities, provides the desired convenience to the users, bases on IoT technologies and takes into account security and privacy preconditions indicated by the GDPR.","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125851112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated Learning Algorithms: Towards Next Generation Communication Systems","authors":"Konstantinos D. Stergiou, Konstantinos E. Psannis","doi":"10.1109/WSCE51339.2020.9275577","DOIUrl":"https://doi.org/10.1109/WSCE51339.2020.9275577","url":null,"abstract":"We provide a survey of four different categories of Federated Learning algorithms and their limitations as these were unveiled through experiments using commonly accepted data sets. The level of data heterogeneity forms a potential benchmark to compare Federated Averaging, Gradient Descent, Evolutionary, and Differential Privacy methods and, among other criteria, identifies the gaps that need to be addressed from future approaches.","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129875412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dimitrios Pliatsios, P. Sarigiannidis, Konstantinos E. Psannis, S. Goudos, V. Vitsas, I. Moscholios
{"title":"Big Data against Security Threats: The SPEAR Intrusion Detection System","authors":"Dimitrios Pliatsios, P. Sarigiannidis, Konstantinos E. Psannis, S. Goudos, V. Vitsas, I. Moscholios","doi":"10.1109/WSCE51339.2020.9275580","DOIUrl":"https://doi.org/10.1109/WSCE51339.2020.9275580","url":null,"abstract":"The environmental concerns, the limited availability of conventional energy sources, the integration of alternative energy sources and the increasing number of power-demanding appliances change the way electricity is generated and distributed. Smart Grid (SG) is an appealing concept, which was developed in response to the emerging issues of electricity generation and distribution. By leveraging the latest advancements of Information and Communication Technologies (ICT), it offers significant benefits to energy providers, retailers and consumers. Nevertheless, SG is vulnerable to cyber attacks, that could cause critical economic and ecological consequences. Traditional Intrusion Detection Systems (IDSs) are becoming less efficient in detecting and mitigating cyberattacks, due to their limited capabilities of analyzing the exponentially increasing volume of network traffic. In this paper, we present the Secure and PrivatE smArt gRid (SPEAR) platform, which features a Big Data enabled IDS that timely detects and identifies cyber attacks against SG components. In order to validate the efficiency of the SPEAR platform regarding the protection of critical infrastructure, we installed the platform in a small wind power plant.","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT and Mobility in Smart Cities","authors":"Ioanna Zafeiriou","doi":"10.1109/WSCE51339.2020.9275584","DOIUrl":"https://doi.org/10.1109/WSCE51339.2020.9275584","url":null,"abstract":"In a smart city environment, one of the leading problems that local authorities are expected to deal with, is traffic. The adoption of IoT technologies may provide contemporary cities with practical solutions. The installation of smart sensors and cameras provide specialists with a plentiful of data. The results of their usage can be studied and bring conclusions regarding a more appropriate architecture of public transport networks. In practice, smart cities can acquire smart parking networks, control of traffic violations and vehicle tracking through platforms that could observe traffic using the consolidation of information selected by smart sensors. This article refers to the smart sensors’ technologies in IoT mobility and their implementation, the challenges encountered in citizens’ privacy and protection of their personal data as well as the possibility of IoT use for the prevention of pedestrians’ accidents.","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116008517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSCE 2020 Index","authors":"","doi":"10.1109/wsce51339.2020.9275502","DOIUrl":"https://doi.org/10.1109/wsce51339.2020.9275502","url":null,"abstract":"","PeriodicalId":183074,"journal":{"name":"2020 3rd World Symposium on Communication Engineering (WSCE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134634960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}