2017 Sixth International Conference on Communications and Networking (ComNet)最新文献

筛选
英文 中文
Weighted grid authorization graph (WGAG) 加权网格授权图(WGAG)
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-31 DOI: 10.1109/COMNET.2017.8285589
Sara Namane, M. Kaiiali, Nacira Ghoualmi Zine, R. Wankar, C. R. Rao, S. Sezer
{"title":"Weighted grid authorization graph (WGAG)","authors":"Sara Namane, M. Kaiiali, Nacira Ghoualmi Zine, R. Wankar, C. R. Rao, S. Sezer","doi":"10.1109/COMNET.2017.8285589","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285589","url":null,"abstract":"Grid is a collection of distributed computing resources. These resources are available over a local or wide area network that appears to an end user or application as one large virtual computing system. The vision is to create virtual dynamic organizations through secure and coordinated resource-sharing among individuals and institutions. Access control to these resources is a problem difficult to manage, how to store and manage the security policies of such a system plays a key role. If these policies are not properly stored, the response time to access control requests will be dramatically increased. Grid Authorization Graph (GAG) was proposed to improve the authorization efficiency by eliminating the redundancy in checking security rules. This article proposes the Weighted Grid Authorization Graph (WGAG) as an enhancement to GAG which further improves the authorization efficiency by avoiding a lots of security rule checking. Finally, as proof of concept, we implement the WGAG simulator where simulations were done. The obtained results show that the proposed model can effectively reduce the complexity of security rule checking and gave better results than GAG.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A fluid approach for evaluating the performance of TCP traffic in the presence of real time traffic 一种在存在实时流量时评估TCP流量性能的流体方法
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-27 DOI: 10.1109/COMNET.2017.8285593
Mohamed El Hedi Boussada, M. Frikha, Jean-Marie Garcia
{"title":"A fluid approach for evaluating the performance of TCP traffic in the presence of real time traffic","authors":"Mohamed El Hedi Boussada, M. Frikha, Jean-Marie Garcia","doi":"10.1109/COMNET.2017.8285593","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285593","url":null,"abstract":"Today, the Internet traffic is mostly dominated by an elastic data transfer. However, with the progressive development of the real time applications, it is anticipated that the streaming traffic will contribute a significant amount of traffic in the near future. By combining priority queuing with Class Based Weighted Fair Queueing (CBWFQ), The Low Latency Queueing (LLQ) is a very important router discipline that aims to provide the needed quality of service (QoS) for each traffic category. Priority queueing is used to guarantee delay constraints for real-time traffic, whereas CBWFQ is used to ensure acceptable throughput for traffic classes that are less sensitive to delay. In this paper, we focus on developing a fluid model to capture the relation between elastic traffic and the real time traffic in a LLQ system under a quasi-stationary assumption. Our analysis of the CBWFQ system is based on some numerical observations and relies on the conservation of the average total number of elastic flows carried by the elastic system. Detailed packet level simulations of TCP flows show the accuracy of our analysis. The results presented in this paper allows a rapid performance evaluation of TCP traffic circulating in the actual IP networks.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"505 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green and secure relay selection algorithm in cooperative networks 协作网络中绿色安全中继选择算法
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-01 DOI: 10.1109/COMNET.2017.8285599
Takwa Bouallegue, K. Sethom
{"title":"Green and secure relay selection algorithm in cooperative networks","authors":"Takwa Bouallegue, K. Sethom","doi":"10.1109/COMNET.2017.8285599","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285599","url":null,"abstract":"The broadcast nature of wireless communications makes it difficult to hide transmitted signals from unauthorized users. To this end, physical-layer security is emerging as a promising paradigm to protect the wireless communications against eavesdropping attacks. The fundamental principle behind physical layer security is to exploit the inherent randomness of noise and communication channels to limit the amount of information that can be extracted at the ‘bit’ level by an unauthorized receiver. In this paper, we investigate physical layer security issues in a two-way relay network. The idea is that when the eavesdropper channel is a degraded version of the main channel, the source and the destination can exchange perfectly secure messages at a non-zero rate. Moreover, we use green base stations as relays. Conventional energy sources are a huge source of atmospheric pollution. The renewable energy sources use natural resources and do not cause any pollution, hence they are termed green energy sources. We evaluate the security performance of cooperative relay transmission in Rayleigh fading environments in terms of secrecy capacity and intercept probability.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133921943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing performance of joint SVR interpolation for LTE system with 64-QAM modulation under 500 Km/h mobile velocity 分析64-QAM调制LTE系统在500 Km/h移动速度下的联合SVR插值性能
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-01 DOI: 10.1109/COMNET.2017.8285585
A. Charrada, A. Samet
{"title":"Analyzing performance of joint SVR interpolation for LTE system with 64-QAM modulation under 500 Km/h mobile velocity","authors":"A. Charrada, A. Samet","doi":"10.1109/COMNET.2017.8285585","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285585","url":null,"abstract":"In this paper, we investigate the estimation of fast-fading LTE downlink channel in high-speed applications of LTE Advanced. A robust channel estimation and interpolation algorithm is essential in order to adequately track the fast time-varying channel response. Using Support Vector Machine Regression (SVR) and exploiting kernel features, we develop an extended algorithm to jointly estimate the complex-valued channel frequency response in time and frequency domains from the transmission of known pilot symbols. This paper integrates both channel estimation at pilot symbols and interpolation at data symbols into the complex SVR interpolation method under very high mobility condition. The Bit Error Rate (BER) and Mean Square Error (MSE) performances of our fast-fading channel estimation scheme is demonstrated via simulation for LTE Downlink with 64-QAM modulation and 500 Km/h velocity.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129559523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem 基于TH-UWB的NTRU公钥密码体制的隐私组距离边界协议
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-01 DOI: 10.1109/COMNET.2017.8285598
Jamel Miri, B. Nsiri, R. Bouallègue
{"title":"Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem","authors":"Jamel Miri, B. Nsiri, R. Bouallègue","doi":"10.1109/COMNET.2017.8285598","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285598","url":null,"abstract":"In Time Hopping Ultra-WideBand Impulse Radio (TH-UWB-IR) communication systems, relay attacks represent nowadays a critical threat to authentication protocols. This risk can be mitigated through the use of Distance Bounding (DB) protocols. Some recent works have discussed many issues on the implementation of distance bounding protocols (DB) on UWB communication was considered in the context of single Prover and a single Verifier. In our work, we adapt the THSKI protocol to privacy Group Distance Bounding protocol with NTRU cryptography system. The security and the different merits of the proposed protocol are analyzed.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A dynamic access control scheme to balance massive access requests of differentiated M2M services in 5G/HetNets 一种动态访问控制方案,用于平衡5G/HetNets下不同M2M业务的海量访问请求
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-01 DOI: 10.1109/COMNET.2017.8285601
Kaouther Taleb Ali, S. Rejeb, Z. Choukair
{"title":"A dynamic access control scheme to balance massive access requests of differentiated M2M services in 5G/HetNets","authors":"Kaouther Taleb Ali, S. Rejeb, Z. Choukair","doi":"10.1109/COMNET.2017.8285601","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285601","url":null,"abstract":"Machine to Machine (M2M) or Machine Type Communication (MTC) is an emerging technologies in communication system and networking research area. It represents a key component of Internet of Thing (IoT) and is considered as one of the promising technologies which is being regarded in the future 5G Heterogeneous Networks (5G/HetNets). One of the most difficult challenges to support M2M communications is their huge number compared to available radio resources. Hence to deal with Random Access channel (RACH) overload and to better control the Access the 3GPP proposed the Access Class Barring (ACB) method. In this paper we proposed an algorithm to improve this method based on load balancing mechanism and a dynamic ACB factors, according M2M traffic category with respect to their access delay. Simulation results were done for testing the effectiveness of our proposed mechanism and show that using a base station selection method and tacking into account differentiated M2M services can increase the access success probability and reduce Access delay especially for devices with high priority traffic while satisfying the load balancing between Base stations (BS).","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121266740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Medium access control in VANET VANET中的介质访问控制
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-01 DOI: 10.1109/COMNET.2017.8285596
Narjes Boulila, L. Saïdane
{"title":"Medium access control in VANET","authors":"Narjes Boulila, L. Saïdane","doi":"10.1109/COMNET.2017.8285596","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285596","url":null,"abstract":"Vehicular Ad hoc Network (VANETs) help improve efficiency of security applications and road safety. Using the information exchanged between vehicles, the latter can warn drivers about dangerous situations. Detection and warning about such situations require reliable communication between vehicles. In fact, the IEEE 802.11p (WAVE: Wireless Access in the Vehicular Environment) was proposed to support the rapid exchange of data between the vehicles. Several Medium Access Control (MAC) protocols were also introduced for safety application VANET. In this paper, we present the different MAC basic protocols in VANET. We used simulation to compare and analyze their performances.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128827249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Taxonomy and comparative study of NDN forwarding strategies NDN转发策略的分类与比较研究
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-01 DOI: 10.1109/COMNET.2017.8285592
Narjes Aloulou, M. Ayari, M. Zhani, L. Saïdane, G. Pujolle
{"title":"Taxonomy and comparative study of NDN forwarding strategies","authors":"Narjes Aloulou, M. Ayari, M. Zhani, L. Saïdane, G. Pujolle","doi":"10.1109/COMNET.2017.8285592","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285592","url":null,"abstract":"Named Data Networking (NDN) has been recently proposed as a promising architecture for the Internet of the future where communications are centered around content rather than hosts. Despite its benefits, NDN brings several challenges like the design of novel data caching policies and efficient interest forwarding schemes (i.e., content look-up). In this paper, we survey the main NDN forwarding schemes proposed in the literature and classify them. We also conduct extensive simulations to evaluate and compare their performance in terms of throughput, mean download time, cache hit ratio and interest overhead. We finally discuss the simulation results and highlight the pros and cons of the existing strategies.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125396087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Comparative study of two array configurations for 2D-DOA estimation in LS-MIMO systems LS-MIMO系统二维doa估计两种阵列配置的比较研究
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-01 DOI: 10.1109/COMNET.2017.8285597
Sahbi Mazlout, M. Salah, A. Samet
{"title":"Comparative study of two array configurations for 2D-DOA estimation in LS-MIMO systems","authors":"Sahbi Mazlout, M. Salah, A. Samet","doi":"10.1109/COMNET.2017.8285597","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285597","url":null,"abstract":"In this paper, a comparison between two array geometries, including URA arrays and L-shaped arrays, for two-dimensional DOA estimation is presented. For each geometry, algorithm which achieved the more accurate 2D-DOA estimates is considered. Indeed, conjugate symmetry based subspace and 2D-ESPRIT estimators are, respectively, chosen for the estimation of the L-Shaped and URA structures. Various criteria are taken into consideration such us the angular spread. A comparative study of the performance of geometries is carried out in terms of RMSE over a wide range of scenarios. The advantages and drawbacks of each geometry and the respective DOA estimation approaches are illustrated through a numerical comparison.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
New hybrid rate adaptation algorithm (HR2A) for video streaming over WLAN 新的混合速率自适应算法(HR2A)的视频流通过WLAN
2017 Sixth International Conference on Communications and Networking (ComNet) Pub Date : 2017-03-01 DOI: 10.1109/COMNET.2017.8285586
Aicha Idriss Hentati, L. Chaari, Olfa Ben Rhaiem
{"title":"New hybrid rate adaptation algorithm (HR2A) for video streaming over WLAN","authors":"Aicha Idriss Hentati, L. Chaari, Olfa Ben Rhaiem","doi":"10.1109/COMNET.2017.8285586","DOIUrl":"https://doi.org/10.1109/COMNET.2017.8285586","url":null,"abstract":"IEEE 802.11e Wireless Local Area Networks (WLANs) provide multiple and high transmission rates to improve the system throughput by adapting its transmission rate. Since the IEEE 802.11standard did not specify a precise rate controlling algorithm, we propose a new Hybrid Rate Adaptation Algorithm (denoted as HR2A) for video transmission over 802.11e networks. The HR2A scheme adjusts the data transmission rate based on two metrics: the RSSI (Received Signal Strength Indicator) and the packets loss rate. Through simulations; we investigate the feasibility and the performance of HR2A. The metrics used to evaluate the effectiveness of HR2A are: Peak Signal to Noise Ratio (PSNR), average End-to-end Delay, effective throughput and packets loss rate. Our simulation results show that the applying of HR2A improves the quality of transmitted video streams H.264/SVC.","PeriodicalId":192985,"journal":{"name":"2017 Sixth International Conference on Communications and Networking (ComNet)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124899719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信