Sara Namane, M. Kaiiali, Nacira Ghoualmi Zine, R. Wankar, C. R. Rao, S. Sezer
{"title":"Weighted grid authorization graph (WGAG)","authors":"Sara Namane, M. Kaiiali, Nacira Ghoualmi Zine, R. Wankar, C. R. Rao, S. Sezer","doi":"10.1109/COMNET.2017.8285589","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285589","url":null,"abstract":"Grid is a collection of distributed computing resources. These resources are available over a local or wide area network that appears to an end user or application as one large virtual computing system. The vision is to create virtual dynamic organizations through secure and coordinated resource-sharing among individuals and institutions. Access control to these resources is a problem difficult to manage, how to store and manage the security policies of such a system plays a key role. If these policies are not properly stored, the response time to access control requests will be dramatically increased. Grid Authorization Graph (GAG) was proposed to improve the authorization efficiency by eliminating the redundancy in checking security rules. This article proposes the Weighted Grid Authorization Graph (WGAG) as an enhancement to GAG which further improves the authorization efficiency by avoiding a lots of security rule checking. Finally, as proof of concept, we implement the WGAG simulator where simulations were done. The obtained results show that the proposed model can effectively reduce the complexity of security rule checking and gave better results than GAG.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed El Hedi Boussada, M. Frikha, Jean-Marie Garcia
{"title":"A fluid approach for evaluating the performance of TCP traffic in the presence of real time traffic","authors":"Mohamed El Hedi Boussada, M. Frikha, Jean-Marie Garcia","doi":"10.1109/COMNET.2017.8285593","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285593","url":null,"abstract":"Today, the Internet traffic is mostly dominated by an elastic data transfer. However, with the progressive development of the real time applications, it is anticipated that the streaming traffic will contribute a significant amount of traffic in the near future. By combining priority queuing with Class Based Weighted Fair Queueing (CBWFQ), The Low Latency Queueing (LLQ) is a very important router discipline that aims to provide the needed quality of service (QoS) for each traffic category. Priority queueing is used to guarantee delay constraints for real-time traffic, whereas CBWFQ is used to ensure acceptable throughput for traffic classes that are less sensitive to delay. In this paper, we focus on developing a fluid model to capture the relation between elastic traffic and the real time traffic in a LLQ system under a quasi-stationary assumption. Our analysis of the CBWFQ system is based on some numerical observations and relies on the conservation of the average total number of elastic flows carried by the elastic system. Detailed packet level simulations of TCP flows show the accuracy of our analysis. The results presented in this paper allows a rapid performance evaluation of TCP traffic circulating in the actual IP networks.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"505 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green and secure relay selection algorithm in cooperative networks","authors":"Takwa Bouallegue, K. Sethom","doi":"10.1109/COMNET.2017.8285599","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285599","url":null,"abstract":"The broadcast nature of wireless communications makes it difficult to hide transmitted signals from unauthorized users. To this end, physical-layer security is emerging as a promising paradigm to protect the wireless communications against eavesdropping attacks. The fundamental principle behind physical layer security is to exploit the inherent randomness of noise and communication channels to limit the amount of information that can be extracted at the ‘bit’ level by an unauthorized receiver. In this paper, we investigate physical layer security issues in a two-way relay network. The idea is that when the eavesdropper channel is a degraded version of the main channel, the source and the destination can exchange perfectly secure messages at a non-zero rate. Moreover, we use green base stations as relays. Conventional energy sources are a huge source of atmospheric pollution. The renewable energy sources use natural resources and do not cause any pollution, hence they are termed green energy sources. We evaluate the security performance of cooperative relay transmission in Rayleigh fading environments in terms of secrecy capacity and intercept probability.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133921943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing performance of joint SVR interpolation for LTE system with 64-QAM modulation under 500 Km/h mobile velocity","authors":"A. Charrada, A. Samet","doi":"10.1109/COMNET.2017.8285585","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285585","url":null,"abstract":"In this paper, we investigate the estimation of fast-fading LTE downlink channel in high-speed applications of LTE Advanced. A robust channel estimation and interpolation algorithm is essential in order to adequately track the fast time-varying channel response. Using Support Vector Machine Regression (SVR) and exploiting kernel features, we develop an extended algorithm to jointly estimate the complex-valued channel frequency response in time and frequency domains from the transmission of known pilot symbols. This paper integrates both channel estimation at pilot symbols and interpolation at data symbols into the complex SVR interpolation method under very high mobility condition. The Bit Error Rate (BER) and Mean Square Error (MSE) performances of our fast-fading channel estimation scheme is demonstrated via simulation for LTE Downlink with 64-QAM modulation and 500 Km/h velocity.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129559523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem","authors":"Jamel Miri, B. Nsiri, R. Bouallègue","doi":"10.1109/COMNET.2017.8285598","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285598","url":null,"abstract":"In Time Hopping Ultra-WideBand Impulse Radio (TH-UWB-IR) communication systems, relay attacks represent nowadays a critical threat to authentication protocols. This risk can be mitigated through the use of Distance Bounding (DB) protocols. Some recent works have discussed many issues on the implementation of distance bounding protocols (DB) on UWB communication was considered in the context of single Prover and a single Verifier. In our work, we adapt the THSKI protocol to privacy Group Distance Bounding protocol with NTRU cryptography system. The security and the different merits of the proposed protocol are analyzed.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic access control scheme to balance massive access requests of differentiated M2M services in 5G/HetNets","authors":"Kaouther Taleb Ali, S. Rejeb, Z. Choukair","doi":"10.1109/COMNET.2017.8285601","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285601","url":null,"abstract":"Machine to Machine (M2M) or Machine Type Communication (MTC) is an emerging technologies in communication system and networking research area. It represents a key component of Internet of Thing (IoT) and is considered as one of the promising technologies which is being regarded in the future 5G Heterogeneous Networks (5G/HetNets). One of the most difficult challenges to support M2M communications is their huge number compared to available radio resources. Hence to deal with Random Access channel (RACH) overload and to better control the Access the 3GPP proposed the Access Class Barring (ACB) method. In this paper we proposed an algorithm to improve this method based on load balancing mechanism and a dynamic ACB factors, according M2M traffic category with respect to their access delay. Simulation results were done for testing the effectiveness of our proposed mechanism and show that using a base station selection method and tacking into account differentiated M2M services can increase the access success probability and reduce Access delay especially for devices with high priority traffic while satisfying the load balancing between Base stations (BS).","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121266740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medium access control in VANET","authors":"Narjes Boulila, L. Saïdane","doi":"10.1109/COMNET.2017.8285596","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285596","url":null,"abstract":"Vehicular Ad hoc Network (VANETs) help improve efficiency of security applications and road safety. Using the information exchanged between vehicles, the latter can warn drivers about dangerous situations. Detection and warning about such situations require reliable communication between vehicles. In fact, the IEEE 802.11p (WAVE: Wireless Access in the Vehicular Environment) was proposed to support the rapid exchange of data between the vehicles. Several Medium Access Control (MAC) protocols were also introduced for safety application VANET. In this paper, we present the different MAC basic protocols in VANET. We used simulation to compare and analyze their performances.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128827249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Narjes Aloulou, M. Ayari, M. Zhani, L. Saïdane, G. Pujolle
{"title":"Taxonomy and comparative study of NDN forwarding strategies","authors":"Narjes Aloulou, M. Ayari, M. Zhani, L. Saïdane, G. Pujolle","doi":"10.1109/COMNET.2017.8285592","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285592","url":null,"abstract":"Named Data Networking (NDN) has been recently proposed as a promising architecture for the Internet of the future where communications are centered around content rather than hosts. Despite its benefits, NDN brings several challenges like the design of novel data caching policies and efficient interest forwarding schemes (i.e., content look-up). In this paper, we survey the main NDN forwarding schemes proposed in the literature and classify them. We also conduct extensive simulations to evaluate and compare their performance in terms of throughput, mean download time, cache hit ratio and interest overhead. We finally discuss the simulation results and highlight the pros and cons of the existing strategies.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125396087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of two array configurations for 2D-DOA estimation in LS-MIMO systems","authors":"Sahbi Mazlout, M. Salah, A. Samet","doi":"10.1109/COMNET.2017.8285597","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285597","url":null,"abstract":"In this paper, a comparison between two array geometries, including URA arrays and L-shaped arrays, for two-dimensional DOA estimation is presented. For each geometry, algorithm which achieved the more accurate 2D-DOA estimates is considered. Indeed, conjugate symmetry based subspace and 2D-ESPRIT estimators are, respectively, chosen for the estimation of the L-Shaped and URA structures. Various criteria are taken into consideration such us the angular spread. A comparative study of the performance of geometries is carried out in terms of RMSE over a wide range of scenarios. The advantages and drawbacks of each geometry and the respective DOA estimation approaches are illustrated through a numerical comparison.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New hybrid rate adaptation algorithm (HR2A) for video streaming over WLAN","authors":"Aicha Idriss Hentati, L. Chaari, Olfa Ben Rhaiem","doi":"10.1109/COMNET.2017.8285586","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285586","url":null,"abstract":"IEEE 802.11e Wireless Local Area Networks (WLANs) provide multiple and high transmission rates to improve the system throughput by adapting its transmission rate. Since the IEEE 802.11standard did not specify a precise rate controlling algorithm, we propose a new Hybrid Rate Adaptation Algorithm (denoted as HR2A) for video transmission over 802.11e networks. The HR2A scheme adjusts the data transmission rate based on two metrics: the RSSI (Received Signal Strength Indicator) and the packets loss rate. Through simulations; we investigate the feasibility and the performance of HR2A. The metrics used to evaluate the effectiveness of HR2A are: Peak Signal to Noise Ratio (PSNR), average End-to-end Delay, effective throughput and packets loss rate. Our simulation results show that the applying of HR2A improves the quality of transmitted video streams H.264/SVC.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}