{"title":"Dynamic Channel Allocation Strategy of Satellite Communication Systems Based on Grey Prediction","authors":"Qinyang Zou, Lidong Zhu","doi":"10.1109/ISNCC.2019.8909122","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909122","url":null,"abstract":"As the demand of communications continuously increasing, researches of satellite communication systems have received more and more attention. Among the studies, one of the important problems is access and handover, due to the high-speed movement of satellites and the mobility of the terminals. Meanwhile, the channel allocation strategy is a crucial part of the technology. Therefore, this paper studies the channel reservation strategy, thinking of how to reserve channels reasonably. Finally, a dynamic channel reservation strategy is proposed based on grey prediction to get better access and handover performance. This strategy dynamically adjusts the channel reservation number with the grey model prediction by predicting whether the calls need to handover or not, and then count all the calls that are possible to handoff.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Two-Stage Relay Selection and Power Allocation Algorithm for NOMA-Based Multicast Cognitive Radio Networks","authors":"M. W. Baidas, E. Alsusa, K. Hamdi","doi":"10.1109/ISNCC.2019.8909195","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909195","url":null,"abstract":"In this paper, the problem of joint relay selection and power allocation (J-RS-PA) for NOMA-based multicast cognitive radio networks is considered. In particular, the aim is to simultaneously maximize the SINR/SNR of the primary and secondary transmitter-receiver (TR) pairs, subject to quality-of-service (QoS) constraints. Communication between the primary and secondary TR pairs is performed over two-phases, namely, the broadcasting phase, and the cooperation phase. In the broadcasting phase, the primary and secondary transmitters broadcast their data symbols to the intermediate relays; while in the cooperation phase, the selected relay forwards the decoded symbols to their intended receivers. However, the J-RS-PA problem happens to be non-convex (i.e. computationally-prohibitive). Alternatively, an optimal low-complexity two-stage relay selection and power allocation (TS-RS-PA) algorithm is devised, which is based on the solution of intelligent linear programming problem formulations. Simulation results are presented to validate the proposed TS-RS-PA algorithm, which has been shown to yield the optimal SINRlSNR values for the primary and secondary TR pairs in comparison to the J-RS-PA scheme, but with lower computational complexity, while satisfying QoS constraints.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115851486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hedjaz Sabrine, Abderrahmane Baadache, F. Semchedine
{"title":"Comparative Study of Security Methods against DDOS Attacks in Cloud Computing Environment","authors":"Hedjaz Sabrine, Abderrahmane Baadache, F. Semchedine","doi":"10.1109/ISNCC.2019.8909110","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909110","url":null,"abstract":"Cloud computing has become the future of companies and organizations due to their features that enable to reduce operating costs and increase the effectiveness of systems. However, this evolution made the cloud computing system highly vulnerable to several security threats. Distributed Denial of Service (DDoS) attacks are dangerous attacks that can consume the cloud resources (e.g., Bandwidth, Memory, CPU, etc.), and break down the availability of service to clients. In this paper, we focus on these attacks and we provide a comparative study of recent security mechanisms that are proposed in the literature.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chemseddine Benkalfate, M. Feham, A. Ouslimani, Abdelhak Kasbari
{"title":"Investigation on the RF and Microwave Energy Harvesting from wireless and mobile communication networks","authors":"Chemseddine Benkalfate, M. Feham, A. Ouslimani, Abdelhak Kasbari","doi":"10.1109/ISNCC.2019.8909092","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909092","url":null,"abstract":"This paper presents the design and the realization of an antenna and a rectifier circuit for RF and microwave energy harvester. Our study is focused on the analysis of the antenna response and the suitable rectifier circuit for capturing the set RF power, from wireless and mobile communication networks, operational in the frequency band (0.890 – 4) GHz. The used antenna, gives a measure efficiency of around 95% within the previous bandwidth, and the proposed rectifier circuit present a simulated RF - DC conversion efficiency of almost 92% at −75dBm, and the measured one is equal nearly to 60% at −30dBm. The simulation sensitivity of this rectifier circuit is very low, a 5V output voltage is detected at −80dBm RF input power, and the practical sensitivity of this circuit is getting when 1V output voltage is detected at −25dBm input power. Both antenna and rectifier have been fabricated and tested.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122155861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient Deployment of Drone Base Stations","authors":"A. Akarsu, Tolga Girici","doi":"10.1109/ISNCC.2019.8909193","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909193","url":null,"abstract":"Drone base stations have emerged as a promising solution to the requirements of future cellular networks which may not be fully met by the existing terrestrial base stations. The main reasons for the superiority of DBSs are the higher probability of line of sight (LoS) and mobility in the sky which provides better adaptation to the demands of users. However, drones are complex electro-mechanical systems and more prone to the errors compared to that of radio communication systems. With the help of onboard sensors, failure tendency of a drone can be estimated and this information can be used to determine the positions of DBSs. In this work, we address the problem of DBSs' deployment where one of the DBSs is assumed to have a high probability of failure. Our proposed algorithm jointly determines the positions of DBSs before a failure occurs and paths to be followed in order to recover the network. Our simulations show that our proposed algorithm provides significant gain in the minimum user data rate performance of the network during recovery phase with tolerable loss in the initial performance compared to the benchmark algorithm.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell
{"title":"Efficient Privacy-preserving User Identity with Purpose-based Encryption","authors":"T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell","doi":"10.1109/ISNCC.2019.8909174","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909174","url":null,"abstract":"In recent years, users may store their Personal Identifiable Information (PII) in the Cloud environment so that Cloud services may access and use it on demand. When users do not store personal data in their local machines, but in the Cloud, they may be interested in questions such as where their data are, who access it except themselves. Even if Cloud services specify privacy policies, we cannot guarantee that they will follow their policies and will not transfer user data to another party. In the past 10 years, many efforts have been taken in protecting PII. They target certain issues but still have limitations. For instance, users require interacting with the services over the frontend, they do not protect identity propagation between intermediaries and against an untrusted host, or they require Cloud services to accept a new protocol. In this paper, we propose a broader approach that covers all the above issues. We prove that our solution is efficient: the implementation can be easily adapted to existing Identity Management systems and the performance is fast. Most importantly, our approach is compliant with the General Data Protection Regulation from the European Union.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125327632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noushin Karimpour, Burak Karaduman, Aybars Ural, Moharram Challenger, O. Dagdeviren
{"title":"IoT based Hand Hygiene Compliance Monitoring","authors":"Noushin Karimpour, Burak Karaduman, Aybars Ural, Moharram Challenger, O. Dagdeviren","doi":"10.1109/ISNCC.2019.8909151","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909151","url":null,"abstract":"Compliance monitoring and surveillance is an important task in hospitals and health centers as the health-care associated infections can have serious consequences such as increasing mortality and accelerating morbidity. Monitoring and surveillance by human observers have its own difficulties such as loss of observer concentration, human error build-up, and professional deformation. In this work, we have implemented and compared the performance of two Internet of Things based approaches for monitoring the hand hygiene of medical staff during patient visiting. We used ESP modules as base stations and smart-phones as mobile nodes and estimated the distances using Bluetooth RSSI values to locate the medical staff in a patient's room. In the proximity-based solution, we compared the RSSI from a mobile node measured on different ESP nodes/modules and utilized the assumption stating that the mobile node is closest to an ESP node which yields the highest RSSI value. In the trilateration based approach, we used the RSSI values to estimate the distance of mobile nodes to each ESP node and we used a trilateration algorithm to locate the mobile node in the room. Our experiments showed that the proximity-based solution recorded 20% incorrect location visiting while the percentage for the trilateration based solution was 8%. This indicates that the trilateration based approach is more reliable than the proximity-based solution in this application domain.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing V ANET's Secure Routing with the Trust Metric","authors":"Afef Slama, Ilhem Lengliz","doi":"10.1109/ISNCC.2019.8909128","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909128","url":null,"abstract":"Secure routing is unceasing thought-provoking topic in Vehicular Ad Hoc Networks (VANETs) in view of the essential characteristics of these networks, notably strong mobility of the nodes, highly dynamic and specific topology, significant loss rate and very short duration of communications. Indeed, every secure routing protocol ought to adjust its operation in order to fulfill V ANETs requirements and to provide a better secure level. Integrating Route Life Time policy (RLT) to AODV and DSR routing protocols is one of these adjustments. This policy aims to enhance the overall route lifetime. Trust Cryptographic Secure Routing (TCSR) protocol is another proposal for safe routing based on the choice of the most reliable node during the routing process. In this paper, we propose a comparative study of AODV-RLT, DSR-RLT and TCSR routing protocols to assess their performances. The simulation results show that TCSR protocol outperforms AODV-RL T and DSR-RLT in terms of verification delay and average throughput.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special Aspects of Ultra-Short Radio Wave Propagation above the Sea Surface. Theoretical Background and Experimental Results","authors":"V. Popovich, O. Smirnova, T. Popovich","doi":"10.1109/ISNCC.2019.8909116","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909116","url":null,"abstract":"Anomalous propagation of radio waves above the sea surface depends primarily on the existence of marine boundary layers. Meteorological data that characterizes the marine boundary layers can be analytically described by duct profiles. The following types of atmospheric ducts are well known: evaporation duct, surface-based duct, surface duct and elevated duct. The major problem of analytical description of duct profiles lies in acquisition of vertical distribution of air temperature, relative humidity, atmosphere pressure and refractivity index. This paper examines one of the possible examples of acquisition of data about vertical distribution of air temperature, relative humidity and atmosphere pressure with the use of helicopter and a network of multisensors in the area of the Gulf of Finland. The new method of estimation of radio wave propagation characteristics is also presented. The presented method allows to examine patterns of radiolocation field forming under different atmospheric conditions. The results obtained by this method may be applied in the next generation of theoretical research and may be used for practical purposes in cell networks and wideband radio technologies that are, in turn, widely applied in coastal businesses, sea transport, sea surveillance and identification systems and in many other areas.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126923149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Veiled Shared key Generation for Intra-Convoy Secret Communication Sessions","authors":"S. Al-Shareeda","doi":"10.1109/ISNCC.2019.8909173","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909173","url":null,"abstract":"Convoys or Platoons are groups of autos that can preserve a constricted inter-vehicle space gaps for effective driving on roads. Members of a convoy can share secret sessions that only a convoy-vehicle can decipher. In this sense, convoy-vehicles can encrypt their exchanged data using either the hybrid encryption of the Elliptic Curve Integrated Encryption Scheme or the symmetric encryption of the Advanced Encryption Standard as suggested by the current standards specifications. The symmetric encryption key length is critical for security; if one key is captured, the whole system is compromised. The hybrid encryption is fully contingent upon the beforehand availability of a secure authentication framework. For these two hinted at points, a previous work explored the feasibility of having somewhat homomorphically encrypted keys to be used by any pair of vehicles. The promising obtained results motivated the expansion and modification of the construction to encompass more convoy-vehicles in the creation of the private key instead of only a single pair of vehicles. The analytical results, of two targeted scenarios (with and without a convoy leader), confirm our preliminary work stating that it is feasible to achieve such convoy-wise key establishment with reasonable storage and computation overheads.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126941583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}