2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)最新文献

筛选
英文 中文
BER Analysis of Wavelength Division Multiplexing-Based Multiple Beam Scheduling Scheme Based on Gamma Approximation Channel 基于伽玛近似信道的波分复用多波束调度方案的误码率分析
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436739
S. Nam, Ju-Hyung Lee, C. Yoon, Young-Chai Ko
{"title":"BER Analysis of Wavelength Division Multiplexing-Based Multiple Beam Scheduling Scheme Based on Gamma Approximation Channel","authors":"S. Nam, Ju-Hyung Lee, C. Yoon, Young-Chai Ko","doi":"10.1109/ICUFN.2018.8436739","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436739","url":null,"abstract":"In this paper, we statistically analyze the BER performance of a threshold-based parallel multiple beam selection scheme for a free-space optical (FSO) based system with wavelength division multiplexing (WDM) in cases where a pointing error has occurred under Gamma turbulence conditions, which are a good approximation of Gamma-Gamma distribution. Our derived results based on the Gamma distribution as an approximation of the Gamma-Gamma distribution can be used as approximated performance measure (lower) bounds.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Route Plan Exchange Scheme Based on Block Chain 基于区块链的路由计划交换方案
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436761
Doyoung Chung, Hae Sook Jeon
{"title":"Route Plan Exchange Scheme Based on Block Chain","authors":"Doyoung Chung, Hae Sook Jeon","doi":"10.1109/ICUFN.2018.8436761","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436761","url":null,"abstract":"Route Plan describes recommended movement of vessels. It consists of waypoints, and each waypoint demonstrates expected arrival/depature times, angle, and direction. The importance of route plan is become more important as appearance of autonomous ship. To achieve safe and smart voyage, integrity of route plan is very important. To avoid forgery and temper of route plan, and clarify who is responsible, digital signature is one of reliable solution. In this study, we suggest route plan management scheme which demonstrates how to manage digital signature of route plan based on block chain.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133075362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on the Effect of LTE on the Coexistence of NB-IoT LTE对NB-IoT共存的影响研究
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436641
Junghoon Oh, Hoyoung Song
{"title":"Study on the Effect of LTE on the Coexistence of NB-IoT","authors":"Junghoon Oh, Hoyoung Song","doi":"10.1109/ICUFN.2018.8436641","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436641","url":null,"abstract":"The 3GPP Release-13 has introduced a Narrowband Internet of Things (NB-IOT) which is capable of Low Power Wide Area (LPWA) IoT service. NB-IoT can interfere with LTE cellular because the NB-IoT uses the license band differently from the LPWA IoT (Sig-fox, LoRa, and so on) using the unlicensed band. In this paper, it is shown that NB-IoT can cause interference even though subcarrier frequency 15 kHz like LTE is used, and the degree of interference is shown through testing. The test results show how to suppress NB-IoT interference for LTE and LTE resource allocation.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detectors for Intent ICC Security Vulnerability with Android IDE Android IDE的Intent ICC安全漏洞检测器
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436802
Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya
{"title":"Detectors for Intent ICC Security Vulnerability with Android IDE","authors":"Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya","doi":"10.1109/ICUFN.2018.8436802","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436802","url":null,"abstract":"With the time-to-market pressures for mobile app development is increasing, its development cycle is getting shorter and developers have little to no time for security remediation. Many mobile app developers overlook the security quality of the software in the development cycle. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Early elimination of possible security vulnerability will help to secure our software, and mitigate the security risk threats from potential malicious attacking. However, many developers lack awareness of the importance of security vulnerability and the necessary secure software development knowledge and skills. An effective security vulnerability detecting tools integrated with IDE would be very beneficial for software developers. In this paper we explore the Android common ICC vulnerability and present ICC intent flaw detectors with open source FindSecurityBugs integrated in Android Studio IDE.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"149 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fair and Efficient Channel Observation-Based Listen-Before Talk (CoLBT) for LAA-WiFi Coexistence in Unlicensed LTE 基于信道观测的公平高效的LAA-WiFi无授权LTE共存先听后讲(CoLBT
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436776
R. Ali, N. Shahin, Arslan Musaddiq, Byung-Seo Kim, S. Kim
{"title":"Fair and Efficient Channel Observation-Based Listen-Before Talk (CoLBT) for LAA-WiFi Coexistence in Unlicensed LTE","authors":"R. Ali, N. Shahin, Arslan Musaddiq, Byung-Seo Kim, S. Kim","doi":"10.1109/ICUFN.2018.8436776","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436776","url":null,"abstract":"License Assisted Access-WiFi (LAA-WiFi) coexistence allows the operations on the unlicensed spectrum for Long Term Evolution (LTE) along with existing unlicensed wireless local area networks (WLANs). The current spectrum access process of legacy WLANs uses clear channel assessment (CCA) and carrier sense multiple access with collision avoidance (CSMA/CA), where the spectrum is sensed before use and a random binary exponential backoff (BEB) mechanism is employed for collision avoidance. While LAA uses a listen-before-talk (LBT) mechanism, moderately similar to the CCA CSMA/CA for channel access. However, there is a fairness issue when these two technologies coexist. In this paper, we propose a channel observation-based LBT (CoLBT) mechanism for fairness in LAA-Wi-Fi coexistence scenarios. Specifically, we introduce a more realistic practical channel observation-based collision probability observed by the LAA evolved Node B (eNB) to adaptively scale-up and scale-down the backoff contention window for channel contention, to reduce the waste of resources and improve LAA-WiFi coexistence performance. Simulation results validate that the proposed CoLBT mechanism is effective in LAA-WiFi coexistence scenario and can improve fairness performance, compared with the current mechanism of LBT.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Color Medical Image Encryption Using Two-Dimensional Chaotic Map and C-MLCA 基于二维混沌映射和C-MLCA的彩色医学图像加密
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8437025
Hyun-Soo Jeong, Kyunyeol Park, Sung-Jin Cho, Seok-Tae Kim
{"title":"Color Medical Image Encryption Using Two-Dimensional Chaotic Map and C-MLCA","authors":"Hyun-Soo Jeong, Kyunyeol Park, Sung-Jin Cho, Seok-Tae Kim","doi":"10.1109/ICUFN.2018.8437025","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437025","url":null,"abstract":"In this paper, we propose a new color medical image encryption method using two-dimensional chaotic map and C-MLCA. The two-dimensional chaotic map is a structure with self-preserving properties, which moves the position of the pixel and encrypts the image. C-MLCA uses a maximum length PN sequence based on the properties of CA. The sequences with unpredictably complex rules create a basis image and the basis image is XOR-computed with the original image. That is, C-MLCA encrypts the image by changing the eigenvalues of the pixels through the computation process. Using these two features, we introduce an effective encryption method to overcome the limitations of the existing encryption methods. By comparing and analyzing the encrypted image with the original image, we were able to confirm that the proposed encryption method has a high level of stability and security.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114871461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance Evaluation of Kademlia in Mobile Ad Hoc Networks 移动Ad Hoc网络中Kademlia的性能评估
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436723
Mohammad Al Mojamed, Awwadh Al-Shehri
{"title":"Performance Evaluation of Kademlia in Mobile Ad Hoc Networks","authors":"Mohammad Al Mojamed, Awwadh Al-Shehri","doi":"10.1109/ICUFN.2018.8436723","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436723","url":null,"abstract":"MANET is a decentralized network optimized for an infrastructure-less area. Its applications are designed to operate in a distributed manner. Peer-to-peer (P2P) overlays are a possible addition to MANETs to aid in managing resources and information sharing in distributed networks. In this paper, the Kademlia P2P overlay is deployed over a dynamic and different MANET underlaying technologies. This overlay was combined with two different types of MANET routing: OLSR and AODV. An extensive evaluation is carried out for the performance of these combinations in different dynamic network settings. The results show that in most cases, Kademlia achieves its best performance when layered over AODV. However, OLSR-based Kademlia outperforms AODV in terms of delay and network load.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To Improve the Convergence and Parallelism of Gauss-Seidel Routing Algorithm with Finite Element Method for Wireless Sensor Networks 用有限元方法改进无线传感器网络高斯-塞德尔路由算法的收敛性和并行性
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436839
Ren-Song Ko
{"title":"To Improve the Convergence and Parallelism of Gauss-Seidel Routing Algorithm with Finite Element Method for Wireless Sensor Networks","authors":"Ren-Song Ko","doi":"10.1109/ICUFN.2018.8436839","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436839","url":null,"abstract":"The scalability challenge of many problems in massively -dense wireless sensor networks may be mitigated from a macroscopic perspective. One example is the weak formulation of the load-balancing routing problem, which solution can be used to route information. Hence, a routing algorithm, the distributed Gauss-Seidel iteration (DGSI), was proposed to coordinate sensors to solve the weak formulation iteratively. In this paper, we propose the atomic red-black distributed Gauss-Seidel iteration with finite element method (ARB-DGSI-FEM) to eliminate the early termination problem of DGSI due to the presence of holes, and thus improve the accuracy of numerical solutions. In addition, ARB-DGSI-FEM allows the values of unknowns to be updated in the red-black order to achieve the maximum degree of parallelism and reduce the convergence time. Our simulation results reveal that ARB-DGSI-FEM significantly improves the parallelism without too much sacrifice of accuracy.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MPEG-DASH MPD for Tile-based Hybrid Stereoscopic 360-degree Video Streaming MPEG-DASH MPD基于瓷砖混合立体360度视频流
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8437012
Dongho You, Eunyoung Jeong, Dong Ho Kim
{"title":"MPEG-DASH MPD for Tile-based Hybrid Stereoscopic 360-degree Video Streaming","authors":"Dongho You, Eunyoung Jeong, Dong Ho Kim","doi":"10.1109/ICUFN.2018.8437012","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437012","url":null,"abstract":"In this paper, we propose tile-based hybrid stereoscopic 360° video streaming service, in which low-quality 2D, high-quality 2D and 3D services can be provided by a single scalable HEVC (SHVC) en/decoder. In addition to this, its associated MPEG-DASH media presentation description (MPD) signaling is also presented as an example.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain 基于topp的超级账本结构区块链双因素认证方案
2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2018-07-01 DOI: 10.1109/ICUFN.2018.8436784
Woo-Suk Park, Dongyeop Hwang, Ki-Hyung Kim
{"title":"A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain","authors":"Woo-Suk Park, Dongyeop Hwang, Ki-Hyung Kim","doi":"10.1109/ICUFN.2018.8436784","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436784","url":null,"abstract":"In this paper, we propose a new authentication method to prevent authentication vulnerability of Claim Token method of Membership Service provide in Private BlockChain. We chose Hyperledger Fabric v1.0 using JWT authentication method of membership service. TOTP, which generate OTP tokens and user authentication codes that generate additional time-based password on existing authentication servers, has been applied to enforce security and two-factor authentication method to provide more secure services.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信