{"title":"BER Analysis of Wavelength Division Multiplexing-Based Multiple Beam Scheduling Scheme Based on Gamma Approximation Channel","authors":"S. Nam, Ju-Hyung Lee, C. Yoon, Young-Chai Ko","doi":"10.1109/ICUFN.2018.8436739","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436739","url":null,"abstract":"In this paper, we statistically analyze the BER performance of a threshold-based parallel multiple beam selection scheme for a free-space optical (FSO) based system with wavelength division multiplexing (WDM) in cases where a pointing error has occurred under Gamma turbulence conditions, which are a good approximation of Gamma-Gamma distribution. Our derived results based on the Gamma distribution as an approximation of the Gamma-Gamma distribution can be used as approximated performance measure (lower) bounds.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Route Plan Exchange Scheme Based on Block Chain","authors":"Doyoung Chung, Hae Sook Jeon","doi":"10.1109/ICUFN.2018.8436761","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436761","url":null,"abstract":"Route Plan describes recommended movement of vessels. It consists of waypoints, and each waypoint demonstrates expected arrival/depature times, angle, and direction. The importance of route plan is become more important as appearance of autonomous ship. To achieve safe and smart voyage, integrity of route plan is very important. To avoid forgery and temper of route plan, and clarify who is responsible, digital signature is one of reliable solution. In this study, we suggest route plan management scheme which demonstrates how to manage digital signature of route plan based on block chain.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133075362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Effect of LTE on the Coexistence of NB-IoT","authors":"Junghoon Oh, Hoyoung Song","doi":"10.1109/ICUFN.2018.8436641","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436641","url":null,"abstract":"The 3GPP Release-13 has introduced a Narrowband Internet of Things (NB-IOT) which is capable of Low Power Wide Area (LPWA) IoT service. NB-IoT can interfere with LTE cellular because the NB-IoT uses the license band differently from the LPWA IoT (Sig-fox, LoRa, and so on) using the unlicensed band. In this paper, it is shown that NB-IoT can cause interference even though subcarrier frequency 15 kHz like LTE is used, and the degree of interference is shown through testing. The test results show how to suppress NB-IoT interference for LTE and LTE resource allocation.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detectors for Intent ICC Security Vulnerability with Android IDE","authors":"Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya","doi":"10.1109/ICUFN.2018.8436802","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436802","url":null,"abstract":"With the time-to-market pressures for mobile app development is increasing, its development cycle is getting shorter and developers have little to no time for security remediation. Many mobile app developers overlook the security quality of the software in the development cycle. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Early elimination of possible security vulnerability will help to secure our software, and mitigate the security risk threats from potential malicious attacking. However, many developers lack awareness of the importance of security vulnerability and the necessary secure software development knowledge and skills. An effective security vulnerability detecting tools integrated with IDE would be very beneficial for software developers. In this paper we explore the Android common ICC vulnerability and present ICC intent flaw detectors with open source FindSecurityBugs integrated in Android Studio IDE.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"149 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ali, N. Shahin, Arslan Musaddiq, Byung-Seo Kim, S. Kim
{"title":"Fair and Efficient Channel Observation-Based Listen-Before Talk (CoLBT) for LAA-WiFi Coexistence in Unlicensed LTE","authors":"R. Ali, N. Shahin, Arslan Musaddiq, Byung-Seo Kim, S. Kim","doi":"10.1109/ICUFN.2018.8436776","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436776","url":null,"abstract":"License Assisted Access-WiFi (LAA-WiFi) coexistence allows the operations on the unlicensed spectrum for Long Term Evolution (LTE) along with existing unlicensed wireless local area networks (WLANs). The current spectrum access process of legacy WLANs uses clear channel assessment (CCA) and carrier sense multiple access with collision avoidance (CSMA/CA), where the spectrum is sensed before use and a random binary exponential backoff (BEB) mechanism is employed for collision avoidance. While LAA uses a listen-before-talk (LBT) mechanism, moderately similar to the CCA CSMA/CA for channel access. However, there is a fairness issue when these two technologies coexist. In this paper, we propose a channel observation-based LBT (CoLBT) mechanism for fairness in LAA-Wi-Fi coexistence scenarios. Specifically, we introduce a more realistic practical channel observation-based collision probability observed by the LAA evolved Node B (eNB) to adaptively scale-up and scale-down the backoff contention window for channel contention, to reduce the waste of resources and improve LAA-WiFi coexistence performance. Simulation results validate that the proposed CoLBT mechanism is effective in LAA-WiFi coexistence scenario and can improve fairness performance, compared with the current mechanism of LBT.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyun-Soo Jeong, Kyunyeol Park, Sung-Jin Cho, Seok-Tae Kim
{"title":"Color Medical Image Encryption Using Two-Dimensional Chaotic Map and C-MLCA","authors":"Hyun-Soo Jeong, Kyunyeol Park, Sung-Jin Cho, Seok-Tae Kim","doi":"10.1109/ICUFN.2018.8437025","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437025","url":null,"abstract":"In this paper, we propose a new color medical image encryption method using two-dimensional chaotic map and C-MLCA. The two-dimensional chaotic map is a structure with self-preserving properties, which moves the position of the pixel and encrypts the image. C-MLCA uses a maximum length PN sequence based on the properties of CA. The sequences with unpredictably complex rules create a basis image and the basis image is XOR-computed with the original image. That is, C-MLCA encrypts the image by changing the eigenvalues of the pixels through the computation process. Using these two features, we introduce an effective encryption method to overcome the limitations of the existing encryption methods. By comparing and analyzing the encrypted image with the original image, we were able to confirm that the proposed encryption method has a high level of stability and security.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114871461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Kademlia in Mobile Ad Hoc Networks","authors":"Mohammad Al Mojamed, Awwadh Al-Shehri","doi":"10.1109/ICUFN.2018.8436723","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436723","url":null,"abstract":"MANET is a decentralized network optimized for an infrastructure-less area. Its applications are designed to operate in a distributed manner. Peer-to-peer (P2P) overlays are a possible addition to MANETs to aid in managing resources and information sharing in distributed networks. In this paper, the Kademlia P2P overlay is deployed over a dynamic and different MANET underlaying technologies. This overlay was combined with two different types of MANET routing: OLSR and AODV. An extensive evaluation is carried out for the performance of these combinations in different dynamic network settings. The results show that in most cases, Kademlia achieves its best performance when layered over AODV. However, OLSR-based Kademlia outperforms AODV in terms of delay and network load.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To Improve the Convergence and Parallelism of Gauss-Seidel Routing Algorithm with Finite Element Method for Wireless Sensor Networks","authors":"Ren-Song Ko","doi":"10.1109/ICUFN.2018.8436839","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436839","url":null,"abstract":"The scalability challenge of many problems in massively -dense wireless sensor networks may be mitigated from a macroscopic perspective. One example is the weak formulation of the load-balancing routing problem, which solution can be used to route information. Hence, a routing algorithm, the distributed Gauss-Seidel iteration (DGSI), was proposed to coordinate sensors to solve the weak formulation iteratively. In this paper, we propose the atomic red-black distributed Gauss-Seidel iteration with finite element method (ARB-DGSI-FEM) to eliminate the early termination problem of DGSI due to the presence of holes, and thus improve the accuracy of numerical solutions. In addition, ARB-DGSI-FEM allows the values of unknowns to be updated in the red-black order to achieve the maximum degree of parallelism and reduce the convergence time. Our simulation results reveal that ARB-DGSI-FEM significantly improves the parallelism without too much sacrifice of accuracy.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MPEG-DASH MPD for Tile-based Hybrid Stereoscopic 360-degree Video Streaming","authors":"Dongho You, Eunyoung Jeong, Dong Ho Kim","doi":"10.1109/ICUFN.2018.8437012","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437012","url":null,"abstract":"In this paper, we propose tile-based hybrid stereoscopic 360° video streaming service, in which low-quality 2D, high-quality 2D and 3D services can be provided by a single scalable HEVC (SHVC) en/decoder. In addition to this, its associated MPEG-DASH media presentation description (MPD) signaling is also presented as an example.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain","authors":"Woo-Suk Park, Dongyeop Hwang, Ki-Hyung Kim","doi":"10.1109/ICUFN.2018.8436784","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436784","url":null,"abstract":"In this paper, we propose a new authentication method to prevent authentication vulnerability of Claim Token method of Membership Service provide in Private BlockChain. We chose Hyperledger Fabric v1.0 using JWT authentication method of membership service. TOTP, which generate OTP tokens and user authentication codes that generate additional time-based password on existing authentication servers, has been applied to enforce security and two-factor authentication method to provide more secure services.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}