{"title":"Routing Redundancy Reducing Method for U-Bus Air Using Cloud Cooperation","authors":"Hiroshi Sanada, T. Fujii, Reina Aizawa, T. Kawata","doi":"10.1109/ICUFN.2018.8436696","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436696","url":null,"abstract":"Ahstract-U-Bus Air is a wireless communication standard for metering systems, targeting gas supplies with a multi-hop network function. As a multi-hop wireless network, U-Bus Air gathers meter reading information connected to a monitoring center. The terminal with the function of connecting to a monitoring center is called a gateway (GW). The multi-hop function is used to connect GWs; this reduces the cost of connecting wide-area wireless networks. However, the order of installing a new terminal is random because it is determined by timing of replacement on meter in individual homes on meters in individual homes. As a result, the installing location of GWs cannot be specified in advance. Consequently, any created network topology will exhibit redundancies, such as unnecessary GWs, or generate many small networks. In this paper, we propose two different redundancy reducing methods that use information of terminals on cloud to reconstruct a network topology. The proposed methods consists of three steps: gathering information, emulating the topology to reduce redundancy using cloud, and providing feedback to rebuild information of each smart meter. We perform a computer simulation to evaluate the packet delivery ratio (PDR) and the reduction ratio of the number of GWs. We confirm that the redundancy can be reduced by using the proposed methods without affecting the performance of the network topology.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124347270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Besfort Shala, U. Trick, A. Lehmann, B. Ghita, S. Shiaeles
{"title":"Trust-Based Composition of M2M Application Services","authors":"Besfort Shala, U. Trick, A. Lehmann, B. Ghita, S. Shiaeles","doi":"10.1109/ICUFN.2018.8436992","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436992","url":null,"abstract":"The end-user integration for M2M application service creation and the decentralisation of M2M application service platforms are creating new possibilities for different application fields in the M2M domain. However, besides several advantages, these improvements inherit several security-related issues such as intentionally or accidentally misconfigured M2M application services harming other end-users in the M2M community. This research focuses on evaluating the trustworthiness of new joining decentralised M2M application services provided by end-users. Therefore, this publication presents a novel concept for trust evaluation by combining several model-based testing techniques. Moreover, it defines an approach for trust-based M2M application service selection and composition for end-user consumption. Finally, the overall framework for functional verification and trust evaluation is optimised by full decentralisation of all involved entities.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131749220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nematullo Rahmatov, Hyeonwoo Kim, Meryam Essaid, Shuhration Qurbonov, Hongtaek Ju, Wooguil Pak
{"title":"Hop Count Measurement Between Autonomous Systems Using a Combination of Active and Passive Monitoring","authors":"Nematullo Rahmatov, Hyeonwoo Kim, Meryam Essaid, Shuhration Qurbonov, Hongtaek Ju, Wooguil Pak","doi":"10.1109/ICUFN.2018.8436953","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436953","url":null,"abstract":"End-to-end Internet Quality of Service (QoS) is likely to rely on the hop count, the number of traversed routers. In this paper, we pose the results of the measurements of hop count from a source at Keimyung University towards several destinations spread over the world by using both active and passive measurements. In case of active data, we used traceroute base inferring to measure hops between host IP-addresses, while for passive data, we utilise shortest path approach from BGPview AS graph to infer exact hop count between ASes.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129431438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Baek, Byung-Gil Han, Kwang-Ju Kim, Yun-Su Chung, Soo-In Lee
{"title":"Real-Time Drowsiness Detection Algorithm for Driver State Monitoring Systems","authors":"J. Baek, Byung-Gil Han, Kwang-Ju Kim, Yun-Su Chung, Soo-In Lee","doi":"10.1109/ICUFN.2018.8436988","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436988","url":null,"abstract":"In this paper, we proposes a novel drowsiness detection algorithm using a camera near the dashboard. The proposed algorithm detects the driver's face in the image and estimates the landmarks in the face region. In order to detect the face, the proposed algorithm uses an AdaBoost classifier based on the Modified Census Transform features. And the proposed algorithm uses regressing Local Binary Features for face landmark detection. Eye states (closed, open) is determined by the value of Eye Aspect Ratio which is easily calculated by the landmarks in eye region. The proposed algorithm provides realtime performance that can be run on the embedded device. We obtained the dataset using video records from the infrared camera which is used the real-field. The proposed algorithm tested in the target board (i.mx6q). The result shows that the proposed algorithm outperformed in the speed and accuracy.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133572928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyeonsu Kim, Sunhyo Kim, Kang-Hoon Choi, J. Choi, H. Bae
{"title":"Maximal Ratio Combining for Long-Range Underwater Acoustic Communication in East Sea","authors":"Hyeonsu Kim, Sunhyo Kim, Kang-Hoon Choi, J. Choi, H. Bae","doi":"10.1109/ICUFN.2018.8437008","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437008","url":null,"abstract":"In October 1999 a long-range underwater acoustic communication experiment was conducted in East Sea of Korea. In this experiment, horizontal distance between a transmitter and receiving array was 559.25 km. The transmitted signals were 511-digit m sequence with a center frequency of 366 Hz and a bandwidth of 45.75 Hz, and the modulation type was binary phase shift keying. In order to compensate inter-symbol interference, maximal ratio combining and equalization are adopted sequentially. As a result, 0.01 of uncoded bit error rate is obtained at a data rate of 37.2 bit per second.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ahead-of-Time Compiler System for the IoT-Cloud Virtual Machine","authors":"Junho Jeong, Yunsik Son, Yangsun Lee","doi":"10.1109/ICUFN.2018.8437031","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437031","url":null,"abstract":"Though the use of internet of things (IoT) technology is increasing, it is difficult to reuse application program once implemented because of various kinds of device and platform. In order to solve these problems, a method of using a virtual machine in an IoT device has been proposed. However, there is a disadvantage that the execution speed of the application program is very slow compared to the native code due to the characteristics of the virtual machine. Ahead-of-Time (AoT) compilation is a technique that precompiles bytecodes into native code to speed up execution of virtual machines. In this paper, we design the AoT compilation system for IoT-Cloud virtual machine system. The designed system is suitable for the convergence environment of the IoT and the cloud. Since only a portion of the bytecode is compiled into native code, the memory load of the virtual machine required for loading native code is reduced.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116030733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security","authors":"Woong Son, B. Jung, Choul‐Young Kim, Jong Min Kim","doi":"10.1109/ICUFN.2018.8436732","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436732","url":null,"abstract":"In this paper, we propose a novel pseudo-random beamforming technique with beam selection for improving physical-layer security (PLS) in a downlink cellular network where consists of a base station (BS) with Nt antennas, NMS legitimate mobile stations (MSs), and NE eavesdroppers. In the proposed technique, the BS generates multiple candidates of beamforming matrix each of which consists of orthogonal beamforming vectors in a pseudo-random manner. Each legitimate MS opportunistically feeds back the received signal-to-interference-and-noise ratio (SINR) value for all beamforming vectors to the BS. The BS transmits data to the legitimate MSs with the optimal beamforming matrix among multiple beam forming matrices that maximizes the secrecy sum-rate. Simulation results show that the proposed technique outperforms the conventional random beamforming technique in terms of the achievable secrecy sum-rate.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kwang-Wook Yun, Hyeong-Geon Kim, Joonho Kwon, Han-You Jeong, Yoon-Ho Choi
{"title":"Vehicular Acceleration Advisory Algorithm Using V2V Communication in Highway Junction Point","authors":"Kwang-Wook Yun, Hyeong-Geon Kim, Joonho Kwon, Han-You Jeong, Yoon-Ho Choi","doi":"10.1109/ICUFN.2018.8436985","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436985","url":null,"abstract":"The highway junction point, where the ramp is merged with the mainstream, is the main traffic congestion point in the highway when handling transport demands. A vehicle driving on the ramp generally attempts to enter the highway without predicting the traffic condition, and commonly causes traffic congestion on highways. Traffic congestion in the highway junction is defined as the traffic situation that the transport demand in the conjunction point exceeds the bottleneck capacity and the accumulated demand remains to the bottleneck. Under traffic congestion, vehicles driving on the ramp cannot efficiently enter the highway. As a result, the waiting time of the vehicle on the ramp becomes long, and fuel consumption and CO2 emission increase due to the frequent acceleration and deceleration. In this paper, we propose a vehicular speed acceleration advisory algorithm for the vehicle on the ramp at the junction point. By recognizing the traffic condition on highways using V2V (Vehicle-to-Vehicle) communication, the proposed algorithm helps to reduce the frequent acceleration and deceleration by drivers. From the simulation results, compared to the conventional driving on the ramp, we show that the proposed algorithm can decrease fuel consumption, CO2 emission under various vehicle densities.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116371276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kwang-Man Ko, Ali Mohammed Mansoor, Rodina Ahmed, Soon-Gohn Kim
{"title":"Efficient Deployment of Service Function Chains (SFCs) in a Self-Organizing SDN-NFV Networking Architecture to Support IOT","authors":"Kwang-Man Ko, Ali Mohammed Mansoor, Rodina Ahmed, Soon-Gohn Kim","doi":"10.1109/ICUFN.2018.8436674","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436674","url":null,"abstract":"SDN and NFV provide the underlying cloud-centric operational infrastructure necessary to drive new revenue streams and exploit new market opportunities, such as IoT and M2M. In this paper, we introduce an in-progress a new dynamic fine-grained (two-layer) functions placement and migration mechanism for SDN/NFV-enabled network in IoT/5G infrastructure that considers load balancing and fault tolerance and congestion avoidance while respecting the specific requirements of the IoT application and utilizing the network resources.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132913465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demand Response Operation Method on Energy Big Data Platform","authors":"Tai-Yeon Ku, Wan-ki Park, Hoon Choi","doi":"10.1109/ICUFN.2018.8436753","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436753","url":null,"abstract":"Energy management system should predict the future energy use and generation amount for the optimal operation of ESS based on the measured energy amount, renewable energy production amount and energy usage, and establish the operation plan. In this paper, we describe the technologies that can be saved through the analysis of big data of energy resources for renewable energy and present Demand Response Operation Method through big data analysis. Through this technology, it is possible to find new information by discovering patterns and correlations hidden in data, and to respond appropriately when issuing DR.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132895334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}