A. Estepa, R. Estepa, J. Vozmediano, Pablo Carrillo
{"title":"Dynamic VoIP codec selection on smartphones","authors":"A. Estepa, R. Estepa, J. Vozmediano, Pablo Carrillo","doi":"10.5296/npa.v6i2.5370","DOIUrl":"https://doi.org/10.5296/npa.v6i2.5370","url":null,"abstract":"Voice over IP (VoIP) applications can choose a plethora of different speech codecs, which differ in bandwidth, listening speech quality, and resilience to quality degradation under packet loss. However, VoIP Codecs also exhibit differences in facets such as computational complexity or traffic generated that impact on the energy consumption of smartphones due to the use of processor. In this work deals with the study of energy consumption differences among VoIP codecs. We compare the execution time required to encode/decode reference conversations. Our results show that computational complexity has a significant impact on battery consumption (a factor of up to 10 was found between different codecs). Based on our results, we provide a ranking of energy efficiency. We also propose a simple algorithm for codec dynamic selection considering the dimensions of quality, energy and bandwidth. Our algorithm reacts to network conditions choosing the codec that provides less battery consumption constrained to user-defined targets for minimum quality and maximum codec bitrate.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129566515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alberto Álvarez, Laura Pozueco, Sergio Cabrero Barros, X. G. Pañeda, Roberto García, David Melendi, Gabriel Díaz
{"title":"Adaptive Streaming: A subjective catalog to assess the performance of objective QoE metrics","authors":"Alberto Álvarez, Laura Pozueco, Sergio Cabrero Barros, X. G. Pañeda, Roberto García, David Melendi, Gabriel Díaz","doi":"10.5296/npa.v6i2.5461","DOIUrl":"https://doi.org/10.5296/npa.v6i2.5461","url":null,"abstract":"Scalable streaming has emerged as a feasible solution to resolve users' heterogeneity problems. SVC is the technology that has served as the definitive impulse for the growth of streaming adaptive systems. Systems seek to improve layer switching efficiency from the network point of view but, with increasing importance, without jeopardizing user perceived video quality, i.e., QoE. We have performed extensive subjective experiments to corroborate the preference towards adaptive systems when compared to traditional non-adaptive systems. The resulting subjective scores are correlated with most relevant Full Reference (FR) objective metrics. We obtain an exponential relationship between human decisions and the same decisions expressed as a difference of objective metrics. A strong correlation with subjective scores validates objective metrics to be used as aid in the adaptive decision taking algorithms to improve overall systems performance. Results show that, among the evaluated objective metrics, PSNR is the metric that provide worse results in terms of reproducing the human decisions.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133708961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
José Estrada-Jiménez, A. Rodríguez, Javier Parra-Arnau, J. Forné
{"title":"Evaluation of a Query-Obfuscation Mechanism for the Privacy Protection of User Profiles","authors":"José Estrada-Jiménez, A. Rodríguez, Javier Parra-Arnau, J. Forné","doi":"10.5296/npa.v6i2.5395","DOIUrl":"https://doi.org/10.5296/npa.v6i2.5395","url":null,"abstract":"Traces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the information obtained from this process is used by big advertising companies. Accurate user profiles are built based on web searches, tags, tweets and even clicks issued by users. Collecting and processing this huge amount of personal data represents a serious risk for the user’s privacy but most of people are not aware of such risk. We describe in this paper a way to measure the effectiveness of a query obfuscation method. Since privacy level of user profiles is only estimated theoretically in some previous work, we firstly create a privacy risk measuring tool in a Firefox add-on which we named PrivMeter. Besides warning the user about his privacy levels, this tool is especially useful to evaluate the obfuscation mechanism offered by another very well-known add-on called TrackMeNot. We find that, for identification attacks, TrackMeNot importantly improved the user’s privacy. However, against more sophisticated attacks, such as classification attacks, the obfuscation mechanism was not successful enough.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Grid ICT Research Lines out of the European Project INTEGRIS","authors":"J. Selga, G. Corral, A. Zaballos, R. Pozuelo","doi":"10.5296/npa.v6i2.5439","DOIUrl":"https://doi.org/10.5296/npa.v6i2.5439","url":null,"abstract":"The Smart Grid is at the same time a part of the Internet of Things and an example of a cyber-physical system where the physical power grid is surrounded by many intelligent and communication devices that allow for an enhanced management of the power network itself. The Smart Grid may bring great performance benefits to the society in terms of enabling the massive introduction of renewable energy sources in the power grid, the reduction of carbon emissions and improved sustainability among others. However, it may also bring big computer networking challenges to achieve the needed high reliability and low latency and even risks in terms of cybersecurity since it opens the power system to at least the same threats faced by the Internet. In fact, it is reasonable to think that the vulnerabilities will be still larger, considering the novel, heterogeneous and distributed nature of the Smart Grid. Furthermore, cybersecurity in Smart Grids is essential for the survival and feasibility of this electricity concept, thus making the risks still more relevant. Such ICT systems and computer networks supporting the Smart Grid concept need to be very efficient and to comply with very stringent requirements, at least for some of the services to be provided. They also need to efficiently integrate and manage in a single network a vast array of technologies among which diverse link layer technologies, meshed and non-meshed Ethernet networks, different cybersecurity protocols, networking at different layers, cognitive systems and storage and replication of data. The objective is to provide a system capable of providing adequate service to the wide array of applications foreseen for the Smart Grid but the complexity of the problem is really impressive and it is not possible to focus all of its aspects in a single paper or even project. The present paper presents these requirements, the solutions and results developed and tested in the FP7 European Project INTEGRIS as well as the future challenges and research lines identified as a result of the project and some prospective solutions.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Álvaro Navas, P. Capelastegui, Francisco Huertas, Pablo Alonso-Rodriguez, Juan C. Dueñas
{"title":"REST service testing based on inferred XML schemas","authors":"Álvaro Navas, P. Capelastegui, Francisco Huertas, Pablo Alonso-Rodriguez, Juan C. Dueñas","doi":"10.5296/npa.v6i2.5360","DOIUrl":"https://doi.org/10.5296/npa.v6i2.5360","url":null,"abstract":"The concept of service oriented architecture has been extensively explored in software engineering, due to the fact that it produces architectures made up of several interconnected modules, easy to reuse when building new systems. This approach to design would be impossible without interconnection mechanisms such as REST (Representationa State Transfer) services, which allow module communication while minimizing coupling. . However, this low coupling brings disadvantages, such as the lack of transparency, which makes it difficult to sistematically create tests without knowledge of the inner working of a system. In this article, we present an automatic error detection system for REST services, based on a statistical analysis over responses produced at multiple service invocations. Thus, a service can be systematically tested without knowing its full specification. The method can find errors in REST services which could not be identified by means of traditional testing methods, and provides limited testing coverage for services whose response format is unknown. It can be also useful as a complement to other testing mechanisms.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125955105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Tornos, J. L. Salazar, J. Piles, J. Saldaña, Luis Casadesus, José Ruíz, J. Fernández-Navajas
{"title":"An eVoting System Based on Ring Signatures","authors":"J. Tornos, J. L. Salazar, J. Piles, J. Saldaña, Luis Casadesus, José Ruíz, J. Fernández-Navajas","doi":"10.5296/npa.v6i2.5390","DOIUrl":"https://doi.org/10.5296/npa.v6i2.5390","url":null,"abstract":"The increase of Internet penetration in the last years is boosting the popularity of eVoting systems. However, in order to have a security level similar to that of an in-person voting, a series of security requisites have to be accomplished. This article describes a secure eVoting protocol based on ring signatures. The implementation details and the different modules of a voting platform including this signature protocol are presented. In addition, a special characteristic has been included in the voting protocol: during the signature process a parameter called \"linking tag\" is generated, able to identify the different votes sent by a single voter during a voting process. This characteristic makes it interesting in e-Cognocracy and Quality of Experience evaluation scenarios.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134120939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection of data in unsecured public cloud environment with open, vulnerable networks using threshold-based secret sharing","authors":"R. Dutta, B. Annappa","doi":"10.5296/npa.v6i1.4862","DOIUrl":"https://doi.org/10.5296/npa.v6i1.4862","url":null,"abstract":"With the recent popularity of cloud computing, public cloud infrastructure is now being offered by many vendors. Many small, medium as well as large enterprises are now moving into public cloud due to its significant business advantages, flexibility and reduced cost. However, public cloud environments are less secure and the complete setup consists of vulnerable public networks. Data is send typically over the internet or very large, open networks which are vulnerable to security attacks. Protection of data is hence primarily important in a public, third-party cloud. This paper is an extension of the previously published work and discusses a general approach to distribute and transmit data in an unsecured environment. We propose an application layer technique of protecting important data in public clouds which are transmitted over public networks.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scriptable Sensor Network Applications for Rapid Development of Internet of Things","authors":"Sanat Sarangi, Subrat Kar","doi":"10.5296/npa.v6i1.4763","DOIUrl":"https://doi.org/10.5296/npa.v6i1.4763","url":null,"abstract":"Internet of Things (IoT) refers to the paradigm of having sensor-enabled devices represented on a global inter-connected web. A sensor network is a customized network of sensor nodes deployed for a specific objective. Due its variety of application areas, objectives and end-user requirements of sensor networks can differ widely between deployments. Internet of Things, on the other hand, envisions a homogeneous presentation of information from sensor nodes for mining and analysis, irrespective of their heterogeneous sources. To tackle such conflicting requirements, we present RAPIDSNAP—a scriptable application framework for rapid deployment of sensor networks—which acts as a smart middleware to adapt sensor networks for Internet of Things. RAPIDSNAP provides script-based extensions to facilitate rapid deployment of customized sensor network applications while providing bridge-interfaces for integrating them with IoT repositories such as Wisekar. We illustrate the impact of RAPIDSNAP and Wisekar by using them to propose extensions to a sensor network based health application—Gaitsense. We conclude by comparing RAPIDSNAP with other script-based frameworks.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Occupancy Information in Support of Adaptive Spectrum Sensing for Cognitive Radio","authors":"K. Patil, Snehal Barge, K. Skouby, R. Prasad","doi":"10.5296/npa.v6i1.4863","DOIUrl":"https://doi.org/10.5296/npa.v6i1.4863","url":null,"abstract":"Cognitive radio (CR) is an emerging solution to spectrum scarcity currently faced worldwide as CR can change its operating parameters like frequency and bandwidth according to the radio environment and provides efficient spectrum utilisation. Many measurement campaigns conducted around the world showed that the licensed spectrum is not efficiently utilized which led to the need of implementation of dynamic spectrum access (DSA). Statistical information about current frequency usage and its use for developing new algorithms and protocols for CR network is the research area that still requires much more effort. In this paper we discuss the comparison of measurement results obtained from two measurement campaigns conducted in Pune at same location but with different total bandwidths considered. Further to implement CR the best suited channels are obtained from the data collected by using adaptive sensing methods, reference, duty cycle, periodicity and Markov method. The results of spectrum sensing methods show that spectrum occupancy information play a vital role in sensing best suited channels for cognitive radio.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"590 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117071750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Das, Ayan Chatterjee, Nabamita Pal, A. Mukherjee, M. K. Naskar
{"title":"A Degree-first Greedy Search Algorithm for the Evaluation of Structural Controllability of Real World Directed Complex Networks","authors":"D. Das, Ayan Chatterjee, Nabamita Pal, A. Mukherjee, M. K. Naskar","doi":"10.5296/npa.v6i1.4756","DOIUrl":"https://doi.org/10.5296/npa.v6i1.4756","url":null,"abstract":"Ubiquitous data flow through a directed complex network requires the complete structural controllability of the network. For evaluating the structural controllability of any network, determination of maximum matching in the network is a cardinal task and has always been a problem of immense concern. Its solution is mandatory in structural control theory for controlling real world complex networks. The existing classical approach through the Hopcroft-Karp algorithm and other proposed algorithms require the determination of the bipartite equivalent graph (i.e., network), which belongs to the NP-complete class of problems. In this article, we propose a degree-first greedy search algorithm to determine maximum matching in unipartite graphs without determining its bipartite equivalent. Thus this classical problem of the NP-Complete class can be solved using the heuristic, with reduced complexity. This algorithm can be efficiently used to find maximum matching in most of the real world complex networks that follow Erdős-Renyi model. Simulation results obtained using our heuristic reveal that dense and homogenous networks can be controlled with fewer controller nodes popularly termed as driver nodes, compared to the sparse inhomogeneous networks.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130255421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}