2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies最新文献

筛选
英文 中文
Load Adaptive Caching Points for a Content Distribution Network 为内容分发网络加载自适应缓存点
Samaneh Igder, Hamdi Idjmayyel, B. Qazi, S. Bhattacharya, J. Elmirghani
{"title":"Load Adaptive Caching Points for a Content Distribution Network","authors":"Samaneh Igder, Hamdi Idjmayyel, B. Qazi, S. Bhattacharya, J. Elmirghani","doi":"10.1109/NGMAST.2015.24","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.24","url":null,"abstract":"The unprecedented growth in content demand on smartphones has significantly increased the energy consumption of current cellular and backbone networks. Apart from achieving stringent carbon footprint targets, provisioning high data rates to city vehicular users while maintaining quality of service (QoS) remains a serious challenge. In previous work, to support content delivery at high data rates, the number and locations of caching points (CPs) within a content distribution network (CDN) were optimized while reducing the operational energy consumption compared to typical cellular networks. Further reduction in energy consumption may be possible through sleep cycles, which reduces transmission energy consumption. However, sleep cycles degrade the quality of service. Therefore, in this paper, we propose a novel load adaptation technique for a CP which not only enhances content download rate but also reduces transmission energy consumption through random sleep cycles. Unlike a non-load adaptive (deterministic) CP, the performance results reveal that the load adaptive CP achieves considerably lower average piece delay (approximately 60% on average during the day), leveraging the introduction of random sleep cycles to save transmission energy. The proposed CP saves up to 84% transmission energy during off-peak hours and 33% during the whole day while fulfilling content demand in a city vehicular environment.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security for Future Software Defined Mobile Networks 未来软件定义移动网络的安全性
Madhusanka Liyanage, Ijaz Ahmed, M. Ylianttila, Jesus Llorente Santos, R. Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, C. Jimenez
{"title":"Security for Future Software Defined Mobile Networks","authors":"Madhusanka Liyanage, Ijaz Ahmed, M. Ylianttila, Jesus Llorente Santos, R. Kantola, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca, Asier Valtierra, C. Jimenez","doi":"10.1109/NGMAST.2015.43","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.43","url":null,"abstract":"5G constitutes the next revolution in mobile communications. It is expected to deliver ultra-fast, ultra-reliable network access supporting a massive increase of data traffic and connected nodes. Different technologies are emerging to address the requirements of future mobile networks, such as Software Defined Networking (SDN), Network Function Virtualization (NFV) and cloud computing concepts. In this paper, we introduce the security challenges these new technologies are facing, inherent to the new telecommunication paradigm. We also present a multitier approach to secure Software Defined Mobile Network (SDMN) by tackling security at different levels to protect the network itself and its users. First, we secure the communication channels between network elements by leveraging Host Identity Protocol (HIP) and IPSec tunnelling. Then, we restrict the unwanted access to the mobile backhaul network with policy based communications. It also protects the backhaul devices from source address spoofing and Denial of Service (DoS) attacks. Finally, we leverage Software Defined Monitoring (SDM) and data collection to detect, prevent and react to security threats.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"1826 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Optimising QoE Distribution for Video Applications through LTE-WiFi Interworking 通过LTE-WiFi互联优化视频应用QoE分布
Mirghiasaldin Seyedebrahimi, Xiaohong Peng
{"title":"Optimising QoE Distribution for Video Applications through LTE-WiFi Interworking","authors":"Mirghiasaldin Seyedebrahimi, Xiaohong Peng","doi":"10.1109/NGMAST.2015.70","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.70","url":null,"abstract":"Mobile WiFi devices are becoming increasingly popular in non-seamless and user-controlled mobile traffic offloading alongside the standard WiFi hotspots. Unlike the operator-controlled hotspots, a mobile WiFi device relies on the capacity of the macro-cell for the data rate allocated to it. This type of devices can help offloading data traffic from the macro-cell base station and serve the end users within a closer range, but will change the pattern of resource distributions operated by the base station. We propose a resource allocation scheme that aims to optimize user quality of experience (QoE) when accessing video services in the environment where traffic offloading is taking place through interworking between a mobile communication system and low range wireless LANs. In this scheme, a rate redistribution algorithm is derived to perform scheduling which is controlled by a no-reference quality assessment metric in order to achieve the desired trade-offs between efficiency and fairness. We show the performance of this algorithm in terms of the distribution of the allocated data rates throughout the macro-cell investigated and the service coverage offered by the WiFi access point.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud 云环境下分布式拒绝服务攻击防范仿真研究
Wael Alosaimi, M. Alshamrani, K. Al-Begain
{"title":"Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud","authors":"Wael Alosaimi, M. Alshamrani, K. Al-Begain","doi":"10.1109/NGMAST.2015.50","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.50","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an economical version of such attack. This new form is known as Economical Denial of Sustainability (EDoS) attack. To counteract such attacks, traditional network security means are used. Specifically, the firewalls that are working as filters for the incoming packets to the targeted network according to designated rules by the administrators can mitigate the impacts of DDoS and EDoS attacks. In this paper, a new solution called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) is proposed to encounter these attacks by utilizing the firewall capabilities in controlling a verification process to protect the targeted system. These capabilities are evaluated in a simulation environment. The results proved that the firewall mitigates the DDoS impacts successfully by improving the provided services to the users in terms of the response time and server load under attack. The study also suggests following implementation for the proposed framework with an active testbed.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Assessment of Personal Exposure to Wireless Communication Technologies in Different Microenvironments 不同微环境下个人无线通信技术暴露评估
E. Hamiti, M. Ibrani, Luan Ahma, Rreze Halili, Doruntine Berisha, Vlerar Shala
{"title":"Assessment of Personal Exposure to Wireless Communication Technologies in Different Microenvironments","authors":"E. Hamiti, M. Ibrani, Luan Ahma, Rreze Halili, Doruntine Berisha, Vlerar Shala","doi":"10.1109/NGMAST.2015.56","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.56","url":null,"abstract":"The use of mobile communication applications, services, and technologies has become an indispensable part of everyday life, a fact which has promoted research on the assessment of human exposure to radio-frequency electromagnetic fields and related health issues. To evaluate personal exposure to wireless technologies and broadcast transmitters in this study the personal exposure meters with triaxial E-field probe are used, enabling frequency selective measurements of electric field strength in 14 predefined frequency bands (80 MHz-6 GHz). The measurements were conducted in five microenvironments: home, office, coffee shops, transport vehicles and outdoor, resulting in 122 944 measurement samples. For each microenvironment the mean value of power density from different wireless technologies is presented, including the contribution of specific wireless technology to the total personal exposure. The obtained results are compared with the exposure limits given by the International Commission on Non-Ionizing Radiation Protection.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126812558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Denial of Service Attacks Mitigation in the Cloud 云中的拒绝服务攻击缓解
Wael Alosaimi, M. Zák, K. Al-Begain
{"title":"Denial of Service Attacks Mitigation in the Cloud","authors":"Wael Alosaimi, M. Zák, K. Al-Begain","doi":"10.1109/NGMAST.2015.48","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.48","url":null,"abstract":"Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability. In this case, it is called Economical Denial of Sustainability (EDoS) attack. This study introduces an effective solution that is designed to counteract such attacks and protect targeted networks. The proposed framework is called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS). This method is tested practically and the test's results proved the success of the framework in limiting the end-to-end response time and handling complex versions of these attacks on multiple layers.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy-Enhanced Group Communication for Vehicular Delay Tolerant Networks 车载容延迟网络的隐私增强组通信
C. P. A. Ogah, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran, Yue Cao, P. Asuquo, Masoud Al Tawqi
{"title":"Privacy-Enhanced Group Communication for Vehicular Delay Tolerant Networks","authors":"C. P. A. Ogah, H. Cruickshank, Zhili Sun, Ganesh Chandrasekaran, Yue Cao, P. Asuquo, Masoud Al Tawqi","doi":"10.1109/NGMAST.2015.67","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.67","url":null,"abstract":"Vehicular Delay Tolerant Networking (VDTN) is a special instance of Vehicular Ad hoc Networking (VANET) and in particular Delay Tolerant Networking (DTN) that utilizes infrastructure to enhance connectivity in challenged environments. While VANETs assume end-to-end connectivity, DTNs and VDTNs do not. Such networks are characterized by dynamic topology, partitioning due to lack of end-to-end connectivity, and opportunistic encounters between nodes. Notably, VDTNs enhances the capabilities DTNs to provide support for delay and intermittent connectivity. Hence, they can easily find applicability in the early stages of the deployment of vehicular networks characterized by low infrastructure deployment as is obtainable in rural areas and in military communications. Privacy implementation and evaluation is a major challenge in VDTNs. Group communication has become one of the well discussed means for achieving effective privacy and packet routing in ad hoc networks including VDTNs. However, most existing privacy schemes lack flexibility in terms of the dynamics of group formation and the level of privacy achievable. Again, it is difficult to evaluate privacy for sparse VDTNs for rural area and early stages of deployment. This paper reports on an improved privacy scheme based on group communication scheme in VDTNs. We analyze the performance of our model in terms of trade-off between privacy and performance based on delivery overhead and message delivery ratio using simulations. While this is a work in progress, we report that our scheme has considerable improvement compared to other similar schemes described in literature.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Q-learning Based Random Access with Collision free RACH Interactions for Cellular M2M 基于q学习的无碰撞RACH交互随机存取蜂窝M2M
L. Bello, P. Mitchell, D. Grace, Tautvydas Mickus
{"title":"Q-learning Based Random Access with Collision free RACH Interactions for Cellular M2M","authors":"L. Bello, P. Mitchell, D. Grace, Tautvydas Mickus","doi":"10.1109/NGMAST.2015.22","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.22","url":null,"abstract":"This paper investigates the coexistence of M2M and H2H based traffic sharing the RACH of an existing cellular network. Q-learning is applied to control the RACH access of the M2M devices which enables collision free access amongst the M2M user group. Frame ALOHA for a Q-learning RACH access (FA-QL-RACH) is proposed to realise a collision free RACH access between the H2H and M2M user groups. The scheme introduces a separate frame for H2H and M2M to use in the RACH access. Simulation results show that applying Q-learning to realise the proposed FA-QL-RACH scheme resolves the RACH overload problem and improves the RACH-throughput. Finally the improved RACH-throughput performance indicates that the FA-QL-RACH scheme has eliminated the collision between the H2H and M2M user groups.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114689204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Communication Channels Dynamic Switching Model for Always-Connected Availability of Service Oriented Mobile Applications 面向服务的移动应用始终连接可用性的通信通道动态交换模型
Diogo Azevedo, H. Paredes, Benjamim Fonseca
{"title":"A Communication Channels Dynamic Switching Model for Always-Connected Availability of Service Oriented Mobile Applications","authors":"Diogo Azevedo, H. Paredes, Benjamim Fonseca","doi":"10.1109/NGMAST.2015.51","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.51","url":null,"abstract":"In the current technological landscape, companies face problems associated with the development of mobile applications and rapid integration with their enterprise systems to ensure the availability of value-added services for its customers in pervasive environment. To fill this gap, a generic model for dynamic switching of communication channels to ensure the principles of transparency in distributed environments is proposed, by: (1) designing an interchangeable communication layer for mobile applications, (2) ensuring the transparency of the communication channels, (3) proposing a framework for the development of mobile applications in distributed environment to guarantee the mentioned above communication transparency.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things and M2M Communications as Enablers of Smart City Initiatives 物联网和M2M通信是智慧城市计划的推动者
S. K. Datta, C. Bonnet
{"title":"Internet of Things and M2M Communications as Enablers of Smart City Initiatives","authors":"S. K. Datta, C. Bonnet","doi":"10.1109/NGMAST.2015.10","DOIUrl":"https://doi.org/10.1109/NGMAST.2015.10","url":null,"abstract":"This paper describes Internet of Things (IoT) and Machine-to-Machine (M2M) communications as the enablers of smart city initiatives. The challenges in modern cities are briefly identified. Utilization of IoT based applications and services could mitigate these challenges. The paper then introduces an architecture based on oneM2M standards for smart cities. The key elements of the architecture are described along with the common service functions. The main contributions of the work are -- (i) uniform metadata exchange with things using Sensor Markup Language and its extensions, (ii) uniform description of heterogeneous things for configuration management, (iii) OMA Lightweight M2M based device management framework, (iv) resource discovery framework and (v) Machine-to-Machine Measurement framework based M2M data processing and analytics. The core functionalities of these frameworks are exposed to the consumers through RESTful web services. An application scenario on crowdsourcing in the smart cities is highlighted. Finally the paper concludes with future research directions.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124987762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信