Seungeon Song, Sangdong Kim, Youngseok Jin, Chun Hwan Nam, Sung Hae Ye, Jonghun Lee
{"title":"Development of 24GHz millimeter wave radar for energy-saving in an intelligent street lighting system","authors":"Seungeon Song, Sangdong Kim, Youngseok Jin, Chun Hwan Nam, Sung Hae Ye, Jonghun Lee","doi":"10.1109/ISNCC.2019.8909106","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909106","url":null,"abstract":"This paper presents development of 24GHz millimeter wave smart radar for intelligent street lighting system. The developed radar operates at a frequency of 24GHz with 200MHz bandwidth and CW (continuous wave) mode. The two radars are used to cover the street in both directions and detect obstacles moving at the speed of more than 1 km/h including moving pedestrians. The radar detection controls the street lighting. Therefore, the energy-saving performance has been improved because the proposed smart lighting system works only when obstacles around the streetlight exist.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation of Network Service Chaining for SDN-enabled Mobile Packet Data Networks","authors":"Yekta Turk, E. Zeydan","doi":"10.1109/ISNCC.2019.8909179","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909179","url":null,"abstract":"Mobile Network Operators (MNOs) are on the path towards designing flexible architectures. The main goal is to improve the end-to-end system performance responses and at the same time generate more revenue streams thanks to easier and faster service deployments. For this reason, traditional mobile network infrastructure needs to evolve towards a data center oriented infrastructure where services can be initiated on demand. Software Defined Networks (SDN) in combination with Service Function Chaining (SFC) have great potentials for MNOs in terms of flexible and scalable rich service deployment. This paper investigates the setting up an SDN-based SFC experimental implementation that is based on application of SDN concept for mobile core networks. During our experiments, we build a SDN-based Gi-LAN mobile core architecture solution using SFC and evaluate its performance compared to traditional mobile core network service. Our results validate that by dynamically adjusting defined virtual network functions as well as directions and policies of flows with Open Network Operating System (ONOS) controller, SDN-based SFC mechanism is capable of forwarding traffic data flows into each compute nodes having different virtual network functionality.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"485 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of RDMA-enabled Consensus Protocols","authors":"Karim Sonbol, Öznur Özkasap","doi":"10.1109/ISNCC.2019.8909103","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909103","url":null,"abstract":"Several cloud computing applications use Replicated State Machines (RSM) to provide fault-tolerant services, ensuring consistency with consensus protocols. However, these protocols often come with a high latency cost, sometimes even forcing system designers to sacrifice consistency for availability. This latency is due, in part, to unnecessary data copies in the kernel TCP/IP layers. Remote Direct Memory Access (RDMA) bypasses the kernel to provide faster communication and lower CPU overhead through zero-copy data transfer. Recent works have utilized RDMA primitives to improve the performance of consensus protocols. However, integrating RDMA into such protocols and utilizing it efficiently can be a complex task. In this paper, we address this problem by presenting a systematic review of the state-of-the-art approaches for implementing RDMA-based consensus protocols.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134603247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ya'acob, N. Tajudin, A. L. Yusof, M. Kassim, S. S. Sarnin, Nur Zahraa'Zaharudin
{"title":"Investigation of Ionospheric Scintillation and Total Electron Content during Maximum and Minimum Solar Cycle","authors":"N. Ya'acob, N. Tajudin, A. L. Yusof, M. Kassim, S. S. Sarnin, Nur Zahraa'Zaharudin","doi":"10.1109/ISNCC.2019.8909120","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909120","url":null,"abstract":"The global positioning system (GPS) signal that is transmitted from satellite to receiver will be disturbed and degraded in the atmosphere layers due to many factors affecting the signal quality, especially in the ionosphere layer which is an ionised layer in upper atmosphere. Ionospheric scintillation and Total Electron Content (TEC) depletions are the most famous factors that can cause serious effects on GPS signal. This research investigates and analyses the measurement of the ionospheric amplitude scintillation and TEC depletions at quiet and disturbed day. The other parameters involved on this study are the carrier-to-noise (C/No) ratio, and rate of change of TEC (ROT). Data from GISTM receiver at UKM station for minimum solar cycle event were analysed on 5 April 2010 (quiet day) and 7 January 2010 (disturbed day); whereas, data from GISTM for maximum solar cycle event were analysed on 7 October 2015 (quiet day) and 2 June 2015 (disturbed day). The solar cycle event affected on the GPS signal especially when this event increased, so the analysis of ionospheric scintillation during maximum solar cycle event was compared with minimum solar cycle event to investigate the differences between these solar cycle events. The ionospheric scintillation and TEC variations are affected by solar cycle. Results showed that the ionospheric scintillation and TEC variations increased during maximum solar cycle event.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130313563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handover Implementation for Femtocell Deployment in LTE Heterogeneous Networks","authors":"A. L. Yusof, M. Ali, N. Ya'acob","doi":"10.1109/ISNCC.2019.8909132","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909132","url":null,"abstract":"Long Term Evolution (LTE) is the latest mobile network technology that design to further increases of network capacity and coverage. An extensive research on femtocell network known as Home eNodeB has been investigated in LTE to improve the indoor network capacity and further extension of the coverage area in wireless communication networks. However, the handover process in femtocell has becomes a major challenge due to a frequent and unnecessary handover which can increase of handover failure probability rate. Therefore, the main obj ectives of this research is to derive a mathematical formulation of the dynamic boundary area size by incorporating value of user's speed and signaling delay in adaptive Reference Signal Received Power threshold (RSRPth) to ensure the determination of the right femtocell handoff initiation time. In order to observe the value of RSRPth, the users' speed and signaling delay were analyzed based on the probability of false handoff initiation (pa) and probability of handover failure (Pf). The simulation results show that the proposed values of adaptive RSRPth has better performance in initiating a handoff when the speed and signaling delay time varies. The preferred values avoid from sending too early or too late initiation of the femtocell handoff process and hence offload traffic from the heavily loaded macrocells.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129476911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware Operation-Based Access Control for Internet of Things Applications","authors":"Didem Genç, E. Tomur, Y. M. Erten","doi":"10.1109/ISNCC.2019.8909196","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909196","url":null,"abstract":"Recently, interest of both the academic and industrial world in Internet of Things (IoT) has been increasing and this trend requires development of new security approaches addressing potential weaknesses in this domain. Despite the presence of many studies directed towards security of IoT applications, they are mostly adoption of current methods to IoT scenarios. Yet, IoT applications are comprised of various kinds of different entities including computers, processes, people and services. Therefore, it is inadequate to detect malicious attempts by using conventional security methods, which apply fixed security policies and do not take interaction of things, that is context information, into account. In this study, by considering new security requirements of next generation IoT applications, we propose a fine-grained, dynamic and easily manageable access control model, which is called context-aware operation-based access control.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126345339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of FBMC in 5G Mobile Communications Over Different Modulation Techniques","authors":"A. Rachini, Mustafa Musa Jaber","doi":"10.1109/ISNCC.2019.8909111","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909111","url":null,"abstract":"The main aim of recent research effort based on 5G mobile technology is to increase the bandwidth for all users, large bandwidth, more efficient and easily manageable and uninterrupted uniform connectivity. A key aspect to this movement has been the development of novel signal transmission techniques and advanced signal processing receiver that allow significant increases in wireless capacity without attendant increases in bandwidth or power requirements. In order to achieve this goal, several transmission techniques are tested like FBMC, F-OFDM, UFMC and WOLA. In this paper, we simulate the performance of the transmission techniques listed above against OFDM technology used for 4G in terms of BER vs SNR. Simulations result show that FBMC technique has a good performance against other techniques.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"47 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120999885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tarfah Mohammed Alsultan, A. Salam, K. Alissa, N. Saqib
{"title":"A Comparative Study of Biometric Authentication in Cloud Computing","authors":"Tarfah Mohammed Alsultan, A. Salam, K. Alissa, N. Saqib","doi":"10.1109/ISNCC.2019.8909117","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909117","url":null,"abstract":"Cloud computing has attracted businesses to move from the traditional way of sharing IT resources due to multiple factors including cost, productivity, performance, scalability and security. The benefits of cloud computing are enormous, but it is a complex technology needing complex protocols for human identification for specific applications over the network. Biometric authentication provides one of the promising methods for authentication in a cloud environment. This paper is a survey-based review that summarize the recent schemes used for biometric authentication in the cloud computing and highlights their pros and cons to find the best approach for this purpose. Result of this survey recommended that the multimodal biometric authentication improves and reduces its complexity and computation time with the use of Biometric-as-a-service (Baas).","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Decentralized Multi-ruling Arbiter for Cyberspace Mimicry Defense","authors":"Congqi Shen, Shuangxi Chen, Chun-Ming Wu","doi":"10.1109/ISNCC.2019.8909197","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909197","url":null,"abstract":"Cyberspace Mimicry Defense (CMD) has been widely used to achieve intrusion prevention against unknown system vulnerabilities or backdoors. The multi-ruling arbiter is a key part in CMD. This paper focuses on the problem of multi-ruling arbiter under data injection attack from the perspective of attacker and defender. We build a decentralized multi-ruling arbiter model for arbitration and introduced a standard iteration process to achieve consensus without attackers. We describe two data injection attack models for decentralized multi-ruling arbiter, namely random data injection attack and stealthy data injection attack. Further, we characterize the negative effect of the data injection attack on the performance of multi-ruling correctness. In order to mitigate the negative effect of random data injection attack, we propose a reliable multi-ruling arbitration approach based on adaptive threshold. By cutting future communication with the malicious neighbor, the decentralized multi-ruling arbiter is robust against random data injection attacks. Simulation results show that the proposed arbitration approach can effectively defend against random data injection attacks.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadband Millimeter Wave Planar Power Combiner/Divider","authors":"A. Ghavidel, Ali Khierdoost","doi":"10.1109/ISNCC.2019.8909088","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909088","url":null,"abstract":"This work presents a microstrip millimeter wave planar power combiner/divider (4 to 1). The exponential taper is connected to single and multiport transmission lines, using the narrow and wide side, respectively. An oversized transmission line is interfaced between taper wide-side and multiport (four ports) and then multiport are matched by stepped impedance transformer. Both bandwidth enhancement techniques, exponential and stepped impedance transformer, are employed to enhance the performance of the power combiner/divider. It operates in the frequency range 33.5-42.2 GHz with a combining efficiency of about 90%. The divider/combiner ports exhibit a 12dB return loss, an average insertion loss of 7.5dB and isolation of 6dB. Its size is 8.66mm × 17.82mm and the multiport distance 3.12mm.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132465351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}