{"title":"Sensor nodes estimation for a greenhouse monitoring system using hierarchical wireless network","authors":"H. Sampaio, S. Motoyama","doi":"10.23919/SOFTCOM.2017.8115582","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115582","url":null,"abstract":"The sensor nodes estimation for a greenhouse monitoring system using hierarchical wireless sensor network (WSN) is presented in this paper. The hierarchical wireless sensor network analyzed in this paper is composed by sensor nodes at the lowest level, the router nodes in the middle level to transmit data from sensor nodes to a controller named coordinator node. The coordinator node, in the highest level, is used to communicate with a central base, where all data received are analyzed. The total number of sensor nodes possible to accommodate in this hierarchical system is estimated for two different cases. In first case, considering the total number of addresses available for identification of the sensor and router nodes, an analytical expression is derived for calculation of number of sensor nodes the system can use. In second case, the number of sensor nodes is estimated considering that traffic of sensor nodes has a distribution and modeling the proposed hierarchical WSN as a network of queues. Two different models of network of queues are analyzed. In first model, the feedback traffic from coordinator for activation or deactivation of the actuator nodes is not taken into account, and in second model, the feedback traffic from coordinator is considered. The analysis showed that depending on the packet rates of sensor nodes, a very large monitoring system can be designed.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129155549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Taddia, D. Ferraretti, Mirko Pastorelli, S. Nanni, G. Mazzini
{"title":"Secure management of an Internet voting system: A case study for land reclamation authority","authors":"C. Taddia, D. Ferraretti, Mirko Pastorelli, S. Nanni, G. Mazzini","doi":"10.23919/SOFTCOM.2017.8115579","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115579","url":null,"abstract":"This paper describes the implementative aspects, the main challenges and the adopted solutions for an Internet voting system designed by LepidaSpA and dedicated for specific elections a Land Reclamation Authority in Italian Emilia-Romagna region. Besides the description of the voting system, we also present an efficient and simple administration tool for the management of all the election phases, from the setup to the scrutiny, that represents the essence of this paper as our original contribution. Furthermore, we focus the attention on the characteristics of our implementation in terms of security.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127533047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced architecture for SHM system based on optical sensor and WSN","authors":"A. Zrelli, T. Ezzedine","doi":"10.23919/SOFTCOM.2017.8115533","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115533","url":null,"abstract":"Stability of civil structures is one of the main issues to be considered for the aging of bridges, buildings, tunnels, mines, dams, aircraft or other aging structures. They must be checked correctly, thus, security of civil structures, especially tunnels and bridges, pose a great matter for civil engineering. Therefore, Structural health monitoring ‘SHM’ takes more and more an important area in modern society, that's why several researchers are interested in this topic, new, they try to use novel technology to monitor different civil structures. Furthermore and more importantly, SHM systems are now used to quantify the change in state of the structure. Hence, through SHM systems we can deduce about the prognosis aspects such as capacity and remaining life. SHM has emerged from a vast field of intelligent structures. SHM encompassed lateral disciplines such as signal processing, sensor operation, optical fiber sensor (OFS), wireless network design, etc. In this paper, we are interested to advance an enhanced architecture of SHM system using emerging technologies, we aim to investigate wireless tunnel health monitoring ‘WTHM’ and wireless bridge health monitoring ‘WBHM’ based on optical fiber sensor. We treat the case of bridge \"Rades-La Goulette\" in Tunisia, we propose to use optical fiber sensors and wireless sensor networks \"wsn\" in this bridge. As well, we try to measure damage especially temperature, strain and pressure using Raman, Brillouin and FBG sensors using our enhanced system. To this end, we propose in this paper an enhanced architecture for SHM system based on optical and WSN.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Krstić, M. Stefanovic, S. Suljovic, Sinisa Minic
{"title":"Level crossing rate of macrodiversity system with three microdiversity receivers over shadowed weibull fading channel","authors":"D. Krstić, M. Stefanovic, S. Suljovic, Sinisa Minic","doi":"10.23919/SOFTCOM.2017.8115556","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115556","url":null,"abstract":"In this paper, the cellular mobile communication system with microdiversity and macrodiversity reception operating over Gamma shadowed Weibull multipath fading environment is analyzed. Macrodiversity selection combining (SC) receiver reduces Gamma long term fading effects and three microdiversity SC receivers mitigate Weibull short term fading effects on the system performance. The useful closed form expression for average level crossing rate of SC receiver output signal envelope operating over Weibull multipath fading channel is derived and this expression is used for calculation the average level crossing rate of proposed macrodiversity system. The influence of Weibull fading parameters, Gamma shadowing severity parameter and shadowing correlation coefficient on average level crossing rate is analyzed.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114968052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business models and value oriented service design elements in ecosystem architecture","authors":"D. Ramljak","doi":"10.23919/SOFTCOM.2017.8115513","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115513","url":null,"abstract":"Enterprises are increasingly being exposed to a number of changes stemming from the overall business environment and their collaborative network of users and partners. Current techniques and models created by using standard frameworks such as Enterprise Architecture are not able to cover relevant design aspects required for service interactions, thus new design elements and aspects stemming from new concepts such as Ecosystem Architectures are being introduced. This paper focuses on introduction of innovative method and models for service design and selection in complex ecosystem environments by focusing on business model definition and value oriented aspects used in service composition.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"60 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FlowVista: Low-bandwidth SDN monitoring driven by business application interaction","authors":"Bartlomiej Siniarski, John Murphy, D. Delaney","doi":"10.23919/SOFTCOM.2017.8115539","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115539","url":null,"abstract":"Large enterprises are moving towards Software Defined Network (SDN) adoption, where business-critical applications are being deployed on top of highly programmable network components and orchestrated by a single or multiple controllers using network protocols, such as OpenFlow or NetConf for communication. Just like in traditional networks, low-cost monitoring solutions need to be developed for SDN. The issue of inaccurate network traffic tagging and amount of overhead associated with using traditional monitoring techniques based on packet sampling or Deep Packet Inspection (DPI) need to be addressed. These traditional techniques are no longer satisfactory for monitoring in SDN. This paper presents FlowVista — a lightweight solution to identify flows using the SDN Northbound interface and addressing flows rather than packets. The high flow matching accuracy is achieved by interacting directly with business application residing in the application layer and translating its high level information to low level network flows in a non-invasive fashion. FlowVista is tested using Voice over IP (VoIP) as a business-critical application in both real and simulated networks. In addition, the portability across various platforms, low bandwidth utilization characteristics and integration with many components native to SDN makes FlowVista suitable for those who want to analyze SDN traffic without having to attach expensive tools that often have limited visibility and granularity.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation and analysis of concurrent BLE link layer state machines running within the same physical device","authors":"A. Balogh, S. Imre","doi":"10.23919/SOFTCOM.2017.8115512","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115512","url":null,"abstract":"Since the Bluetooth Low Energy (BLE) technology was first introduced in 2010 as a part of the Bluetooth 4.0 core specification, there were different improvements applied in the Link Layer (MAC) of the version iterations followed by. One of the key concepts in this layer is the possibility for creating multiple Link Layer state machines (often abstracted as roles), which are able to run concurrently within the same physical device. As BLE is one of the most important technologies in the Internet of Things (IoT), this functionality attracted many researchers and developers. Possibly the most well-known state machine combination is the Advertiser-Scanner, that is used in relay devices of every multihop communication solution based on the broadcast mesh approach, but in other application areas there can occur many other combinations also, especially if one takes into consideration the edge (or fog) computing concept in the IoT world. For being capable to assess the key performance metrics (e.g. delay, throughput, etc.) of these state machines running concurrently on the same device, there was a simulator developed, which is presented in this paper, as well as the analysis of different scenarios (including their practical occurrence, possible bottlenecks and workarounds) based on the results obtained with it.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122493599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electromagnetic modeling of the GPR response to the pipe system set in the concrete slab","authors":"Ivan Luburić, Zvonimir Peric, S. Šesnić","doi":"10.23919/SOFTCOM.2017.8115531","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115531","url":null,"abstract":"The paper deals with the work of georadar and its applications. Ground-penetrating radar (GPR) is a geophysical method that uses radar pulses to image the subsurface. This nondestructive method uses electromagnetic radiation in the microwave band (UHF/VHF frequencies) of the radio spectrum, and detects the reflected signals from subsurface structures. GPR can have applications in a variety of media, including rock, soil, ice, fresh water, pavements and structures. In the right conditions, practitioners can use GPR to detect subsurface objects, changes in material properties, voids and cracks. To be able to achieve this feat, gprMax program, which is open source software that simulates electromagnetic wave propagation, is used. It uses Yee's algorithm to solve Maxwell's equations in 3D using the Finite-Difference Time-Domain (FDTD) method. The simulations presented in this paper serve as an opener to the subject in further development of various models for EM propagation with hertzian dipole as a source.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Vercelli, I. Rainero, H. D. Rosario, M. Summers, R. Wieching, G. Aumayr, S. Bandelow, L. Ciferri, M. Bazzani
{"title":"My-active and healthy ageing (My-AHA): An ICT platform to detect frailty risk and propose intervention","authors":"A. Vercelli, I. Rainero, H. D. Rosario, M. Summers, R. Wieching, G. Aumayr, S. Bandelow, L. Ciferri, M. Bazzani","doi":"10.23919/SOFTCOM.2017.8115505","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115505","url":null,"abstract":"Stemming from a holistic view of interrelated frailties, cognitive decline, physical frailty, depression and anxiety, social isolation and poor sleep quality, My-AHA proposes an ICT platform for early detection of pre-frailty and intervention to sustain active and healthy ageing and slowing or reversing further decline. The main aim of My-AHA is to reduce frailty risk by improving physical activity and cognitive function, psychological state, social resources, nutrition, sleep and overall well-being in older adults with pre-frailty symptoms. It will empower older citizens to better manage their own health, providing new ways of health monitoring and disease prevention through individualized profiling and personalized recommendations, feedback and support. An ICT-based platform will detect defined risks in the frailty domains early and accurately via non-stigmatising embedded sensors and data readily available in the daily living environment of older adults. When risk is detected (pre-frail), My-AHA will provide targeted ICT-based interventions. These interventions will follow an integrated approach to motivate users to participate in physical exercise, cognitively stimulating games and social networking to achieve long-term behavioural change, sustained by continued end user engagement with My-AHA. A randomized controlled study (RCT), involving 300 subjects receiving intervention, and 300 controls from many EU and non EU countries, to evaluate intercultural aspects, is ongoing in order to evaluate efficacy of the my-AHA platform. The ultimate aim is to deliver significant innovation in the area of active and healthy ageing through cooperation between European health care organizations, SMEs, and NGOs.1","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121765445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryma Boussaha, Y. Challal, Malika Bessedik, A. Bouabdallah
{"title":"Towards authenticated network coding for named data networking","authors":"Ryma Boussaha, Y. Challal, Malika Bessedik, A. Bouabdallah","doi":"10.23919/SOFTCOM.2017.8115565","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115565","url":null,"abstract":"Named Data Networking represents a novel and an alternative approach to the current host based Internet architecture, in which the content becomes the core of the communication model. In this paper, we propose to improve named data networking robustness and throughput performances by introducing network coding functionalities. We also propose an optimized authentication model based on homomorphic encryption to deal with the \"pollution attacks\" problem in which malicious nodes can flood the network with bad packets and prevent the reconstruction of information at recipients. We first present our optimized homomorphic signature scheme with respect to the practical constraints such as the processing overhead generated by complex cryptographic operations and we define the network coding scheme tailored for named data networking. Our numerical results demonstrate that the use of this optimized model reduces by 10% the overall calculation cost induced by cryptographic operations compared to a hop-by-hop coding and verification model.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114810666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}