2019 International Symposium on Networks, Computers and Communications (ISNCC)最新文献

筛选
英文 中文
Dynamic Channel Allocation Strategy of Satellite Communication Systems Based on Grey Prediction 基于灰色预测的卫星通信系统动态信道分配策略
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909122
Qinyang Zou, Lidong Zhu
{"title":"Dynamic Channel Allocation Strategy of Satellite Communication Systems Based on Grey Prediction","authors":"Qinyang Zou, Lidong Zhu","doi":"10.1109/ISNCC.2019.8909122","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909122","url":null,"abstract":"As the demand of communications continuously increasing, researches of satellite communication systems have received more and more attention. Among the studies, one of the important problems is access and handover, due to the high-speed movement of satellites and the mobility of the terminals. Meanwhile, the channel allocation strategy is a crucial part of the technology. Therefore, this paper studies the channel reservation strategy, thinking of how to reserve channels reasonably. Finally, a dynamic channel reservation strategy is proposed based on grey prediction to get better access and handover performance. This strategy dynamically adjusts the channel reservation number with the grey model prediction by predicting whether the calls need to handover or not, and then count all the calls that are possible to handoff.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Two-Stage Relay Selection and Power Allocation Algorithm for NOMA-Based Multicast Cognitive Radio Networks 基于多播认知无线网络的两阶段中继选择和功率分配算法
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909195
M. W. Baidas, E. Alsusa, K. Hamdi
{"title":"A Two-Stage Relay Selection and Power Allocation Algorithm for NOMA-Based Multicast Cognitive Radio Networks","authors":"M. W. Baidas, E. Alsusa, K. Hamdi","doi":"10.1109/ISNCC.2019.8909195","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909195","url":null,"abstract":"In this paper, the problem of joint relay selection and power allocation (J-RS-PA) for NOMA-based multicast cognitive radio networks is considered. In particular, the aim is to simultaneously maximize the SINR/SNR of the primary and secondary transmitter-receiver (TR) pairs, subject to quality-of-service (QoS) constraints. Communication between the primary and secondary TR pairs is performed over two-phases, namely, the broadcasting phase, and the cooperation phase. In the broadcasting phase, the primary and secondary transmitters broadcast their data symbols to the intermediate relays; while in the cooperation phase, the selected relay forwards the decoded symbols to their intended receivers. However, the J-RS-PA problem happens to be non-convex (i.e. computationally-prohibitive). Alternatively, an optimal low-complexity two-stage relay selection and power allocation (TS-RS-PA) algorithm is devised, which is based on the solution of intelligent linear programming problem formulations. Simulation results are presented to validate the proposed TS-RS-PA algorithm, which has been shown to yield the optimal SINRlSNR values for the primary and secondary TR pairs in comparison to the J-RS-PA scheme, but with lower computational complexity, while satisfying QoS constraints.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115851486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparative Study of Security Methods against DDOS Attacks in Cloud Computing Environment 云计算环境下防范DDOS攻击的安全方法比较研究
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909110
Hedjaz Sabrine, Abderrahmane Baadache, F. Semchedine
{"title":"Comparative Study of Security Methods against DDOS Attacks in Cloud Computing Environment","authors":"Hedjaz Sabrine, Abderrahmane Baadache, F. Semchedine","doi":"10.1109/ISNCC.2019.8909110","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909110","url":null,"abstract":"Cloud computing has become the future of companies and organizations due to their features that enable to reduce operating costs and increase the effectiveness of systems. However, this evolution made the cloud computing system highly vulnerable to several security threats. Distributed Denial of Service (DDoS) attacks are dangerous attacks that can consume the cloud resources (e.g., Bandwidth, Memory, CPU, etc.), and break down the availability of service to clients. In this paper, we focus on these attacks and we provide a comparative study of recent security mechanisms that are proposed in the literature.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigation on the RF and Microwave Energy Harvesting from wireless and mobile communication networks 无线和移动通信网络射频和微波能量采集的研究
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909092
Chemseddine Benkalfate, M. Feham, A. Ouslimani, Abdelhak Kasbari
{"title":"Investigation on the RF and Microwave Energy Harvesting from wireless and mobile communication networks","authors":"Chemseddine Benkalfate, M. Feham, A. Ouslimani, Abdelhak Kasbari","doi":"10.1109/ISNCC.2019.8909092","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909092","url":null,"abstract":"This paper presents the design and the realization of an antenna and a rectifier circuit for RF and microwave energy harvester. Our study is focused on the analysis of the antenna response and the suitable rectifier circuit for capturing the set RF power, from wireless and mobile communication networks, operational in the frequency band (0.890 – 4) GHz. The used antenna, gives a measure efficiency of around 95% within the previous bandwidth, and the proposed rectifier circuit present a simulated RF - DC conversion efficiency of almost 92% at −75dBm, and the measured one is equal nearly to 60% at −30dBm. The simulation sensitivity of this rectifier circuit is very low, a 5V output voltage is detected at −80dBm RF input power, and the practical sensitivity of this circuit is getting when 1V output voltage is detected at −25dBm input power. Both antenna and rectifier have been fabricated and tested.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122155861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resilient Deployment of Drone Base Stations 无人机基站的弹性部署
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909193
A. Akarsu, Tolga Girici
{"title":"Resilient Deployment of Drone Base Stations","authors":"A. Akarsu, Tolga Girici","doi":"10.1109/ISNCC.2019.8909193","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909193","url":null,"abstract":"Drone base stations have emerged as a promising solution to the requirements of future cellular networks which may not be fully met by the existing terrestrial base stations. The main reasons for the superiority of DBSs are the higher probability of line of sight (LoS) and mobility in the sky which provides better adaptation to the demands of users. However, drones are complex electro-mechanical systems and more prone to the errors compared to that of radio communication systems. With the help of onboard sensors, failure tendency of a drone can be estimated and this information can be used to determine the positions of DBSs. In this work, we address the problem of DBSs' deployment where one of the DBSs is assumed to have a high probability of failure. Our proposed algorithm jointly determines the positions of DBSs before a failure occurs and paths to be followed in order to recover the network. Our simulations show that our proposed algorithm provides significant gain in the minimum user data rate performance of the network during recovery phase with tolerable loss in the initial performance compared to the benchmark algorithm.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient Privacy-preserving User Identity with Purpose-based Encryption 基于目的加密的高效隐私保护用户身份
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909174
T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell
{"title":"Efficient Privacy-preserving User Identity with Purpose-based Encryption","authors":"T. H. Vo, W. Fuhrmann, K. Fischer-Hellmann, S. Furnell","doi":"10.1109/ISNCC.2019.8909174","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909174","url":null,"abstract":"In recent years, users may store their Personal Identifiable Information (PII) in the Cloud environment so that Cloud services may access and use it on demand. When users do not store personal data in their local machines, but in the Cloud, they may be interested in questions such as where their data are, who access it except themselves. Even if Cloud services specify privacy policies, we cannot guarantee that they will follow their policies and will not transfer user data to another party. In the past 10 years, many efforts have been taken in protecting PII. They target certain issues but still have limitations. For instance, users require interacting with the services over the frontend, they do not protect identity propagation between intermediaries and against an untrusted host, or they require Cloud services to accept a new protocol. In this paper, we propose a broader approach that covers all the above issues. We prove that our solution is efficient: the implementation can be easily adapted to existing Identity Management systems and the performance is fast. Most importantly, our approach is compliant with the General Data Protection Regulation from the European Union.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125327632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT based Hand Hygiene Compliance Monitoring 基于物联网的手部卫生合规监测
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909151
Noushin Karimpour, Burak Karaduman, Aybars Ural, Moharram Challenger, O. Dagdeviren
{"title":"IoT based Hand Hygiene Compliance Monitoring","authors":"Noushin Karimpour, Burak Karaduman, Aybars Ural, Moharram Challenger, O. Dagdeviren","doi":"10.1109/ISNCC.2019.8909151","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909151","url":null,"abstract":"Compliance monitoring and surveillance is an important task in hospitals and health centers as the health-care associated infections can have serious consequences such as increasing mortality and accelerating morbidity. Monitoring and surveillance by human observers have its own difficulties such as loss of observer concentration, human error build-up, and professional deformation. In this work, we have implemented and compared the performance of two Internet of Things based approaches for monitoring the hand hygiene of medical staff during patient visiting. We used ESP modules as base stations and smart-phones as mobile nodes and estimated the distances using Bluetooth RSSI values to locate the medical staff in a patient's room. In the proximity-based solution, we compared the RSSI from a mobile node measured on different ESP nodes/modules and utilized the assumption stating that the mobile node is closest to an ESP node which yields the highest RSSI value. In the trilateration based approach, we used the RSSI values to estimate the distance of mobile nodes to each ESP node and we used a trilateration algorithm to locate the mobile node in the room. Our experiments showed that the proximity-based solution recorded 20% incorrect location visiting while the percentage for the trilateration based solution was 8%. This indicates that the trilateration based approach is more reliable than the proximity-based solution in this application domain.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Enhancing V ANET's Secure Routing with the Trust Metric 利用信任度量增强vanet的安全路由
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909128
Afef Slama, Ilhem Lengliz
{"title":"Enhancing V ANET's Secure Routing with the Trust Metric","authors":"Afef Slama, Ilhem Lengliz","doi":"10.1109/ISNCC.2019.8909128","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909128","url":null,"abstract":"Secure routing is unceasing thought-provoking topic in Vehicular Ad Hoc Networks (VANETs) in view of the essential characteristics of these networks, notably strong mobility of the nodes, highly dynamic and specific topology, significant loss rate and very short duration of communications. Indeed, every secure routing protocol ought to adjust its operation in order to fulfill V ANETs requirements and to provide a better secure level. Integrating Route Life Time policy (RLT) to AODV and DSR routing protocols is one of these adjustments. This policy aims to enhance the overall route lifetime. Trust Cryptographic Secure Routing (TCSR) protocol is another proposal for safe routing based on the choice of the most reliable node during the routing process. In this paper, we propose a comparative study of AODV-RLT, DSR-RLT and TCSR routing protocols to assess their performances. The simulation results show that TCSR protocol outperforms AODV-RL T and DSR-RLT in terms of verification delay and average throughput.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Special Aspects of Ultra-Short Radio Wave Propagation above the Sea Surface. Theoretical Background and Experimental Results 海面上超短无线电波传播的特殊方面。理论背景与实验结果
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909116
V. Popovich, O. Smirnova, T. Popovich
{"title":"Special Aspects of Ultra-Short Radio Wave Propagation above the Sea Surface. Theoretical Background and Experimental Results","authors":"V. Popovich, O. Smirnova, T. Popovich","doi":"10.1109/ISNCC.2019.8909116","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909116","url":null,"abstract":"Anomalous propagation of radio waves above the sea surface depends primarily on the existence of marine boundary layers. Meteorological data that characterizes the marine boundary layers can be analytically described by duct profiles. The following types of atmospheric ducts are well known: evaporation duct, surface-based duct, surface duct and elevated duct. The major problem of analytical description of duct profiles lies in acquisition of vertical distribution of air temperature, relative humidity, atmosphere pressure and refractivity index. This paper examines one of the possible examples of acquisition of data about vertical distribution of air temperature, relative humidity and atmosphere pressure with the use of helicopter and a network of multisensors in the area of the Gulf of Finland. The new method of estimation of radio wave propagation characteristics is also presented. The presented method allows to examine patterns of radiolocation field forming under different atmospheric conditions. The results obtained by this method may be applied in the next generation of theoretical research and may be used for practical purposes in cell networks and wideband radio technologies that are, in turn, widely applied in coastal businesses, sea transport, sea surveillance and identification systems and in many other areas.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126923149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Veiled Shared key Generation for Intra-Convoy Secret Communication Sessions 车队内部秘密通信会话的隐藏共享密钥生成
2019 International Symposium on Networks, Computers and Communications (ISNCC) Pub Date : 2019-06-01 DOI: 10.1109/ISNCC.2019.8909173
S. Al-Shareeda
{"title":"Veiled Shared key Generation for Intra-Convoy Secret Communication Sessions","authors":"S. Al-Shareeda","doi":"10.1109/ISNCC.2019.8909173","DOIUrl":"https://doi.org/10.1109/ISNCC.2019.8909173","url":null,"abstract":"Convoys or Platoons are groups of autos that can preserve a constricted inter-vehicle space gaps for effective driving on roads. Members of a convoy can share secret sessions that only a convoy-vehicle can decipher. In this sense, convoy-vehicles can encrypt their exchanged data using either the hybrid encryption of the Elliptic Curve Integrated Encryption Scheme or the symmetric encryption of the Advanced Encryption Standard as suggested by the current standards specifications. The symmetric encryption key length is critical for security; if one key is captured, the whole system is compromised. The hybrid encryption is fully contingent upon the beforehand availability of a secure authentication framework. For these two hinted at points, a previous work explored the feasibility of having somewhat homomorphically encrypted keys to be used by any pair of vehicles. The promising obtained results motivated the expansion and modification of the construction to encompass more convoy-vehicles in the creation of the private key instead of only a single pair of vehicles. The analytical results, of two targeted scenarios (with and without a convoy leader), confirm our preliminary work stating that it is feasible to achieve such convoy-wise key establishment with reasonable storage and computation overheads.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126941583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信