{"title":"Deploying Time-based Sampling Techniques in Software-Defined Networking","authors":"David R. Teixeira, J. M. Silva, S. R. Lima","doi":"10.23919/SOFTCOM.2018.8555763","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555763","url":null,"abstract":"Network data volumes have seen a substantial increase in recent years, in part due to the massive use of mobile devices, the dissemination of streaming services and the rise of concepts such as IoT. This growing trend highlights the need to improve network monitoring systems to cope with challenges related with performance, flexibility and security. SoftwareDefined Networking (SDN) and traffic sampling techniques can be combined to provide a toolset that can be used for enhancing network management activities and performance evaluation. In this context, this paper presents a proposal for supporting timebased sampling techniques in SDN, providing network statistics at the controller level and allowing the self-configuration of traffic sampling in network devices. The proposed solution, designed to improve the efficiency and flexibility of network measurement systems, takes into account the underlying need to establish a balance between the reliability of the collected data and the computational effort involved in the sampling process. The proof-of-concept results emphasize the potential of applying and configuring different time-based sampling techniques through a SDN framework and a small set of standard OpenFlow messages. Comparative results on the accuracy and overhead of each technique when sampling real traffic traces are also provided.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Transport for Edge Computing in 5G Networks","authors":"Å. Arvidsson, L. Westberg","doi":"10.23919/SOFTCOM.2018.8555815","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555815","url":null,"abstract":"We consider TCP performance for cloud services in 5G cellular networks and show that edge clouds offer the highest throughput, but that further improvements still are possible. To this end we devise a concept where edge clouds connected directly to the radio access network can increase their transmission rates by relying on the built in re-transmissions (through quality of service features) and on the built in user fairness (through per-user buffers and scheduler policies). We use numerical examples from measurements in real networks to demonstrate that the concept is efficient and significantly improves the effective throughput beyond what placement alone can do, and we also outline possible further improvements.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121027230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fountain Data Estimation within Bayesian model Classification in Wireless Sensor Network","authors":"F. Belabed, R. Bouallègue","doi":"10.23919/SOFTCOM.2018.8555754","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555754","url":null,"abstract":"In this paper, a novel distributed estimation scheme is proposed. This model combines learning methods and fountain codes. In order to minimize the number of transmissions as well as the impact of useless data, we determine the optimal minimal number of encoded packets needed for a successful decoding. Sensor observations are encoded using fountain codes. Then messages are collected at the cluster head where a final estimation is provided with a classification based on Bayes rules. The main goal of this paper is to estimate the needed number of encoded packets according to a Bayesian method. The performance results have been analyzed through a comparison with the Support Vector Machine.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122870960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Misdetection Probability Analyses of OFDM Signals in Energy Detection Cognitive Radio Systems","authors":"J. Lorincz, D. Begusic, I. Ramljak","doi":"10.23919/SOFTCOM.2018.8555811","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555811","url":null,"abstract":"Cognitive radio (CR) networks are an intelligent wireless communication technology that is aware of its surrounding environment. The main process of the cognitive radio is spectrum sensing. Energy detection (ED) method was found to be a promising candidate for spectrum sensing in the CR networks. However, the detection performance of the ED method is susceptible to noise fluctuations at the receiver side, known as noise uncertainty. To obtain better performance when noise uncertainty impacts ED process, it is necessary to incorporate a dynamic signal detection based on sensing threshold adaptation. In this paper, the influence of noise uncertainty and dynamic threshold adaptation for the ED of signals transmitted using orthogonal frequency division modulation (OFDM) is investigated. The major contribution of this work is the analyses of the influence of different parameters including: modulation constellations, noise uncertainty level, dynamic threshold and signal to noise ratio values on a probability of received signal misdetection. Simulation results show that a combination of some of the analysed parameters can significantly improve ED process for OFDM signals.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130374823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Extended Access Barring Mechanism for Massive Machine-Type Communications in 5G Context","authors":"S. Alaya, Mohamed Tahar Missaoui, M. Frikha","doi":"10.23919/SOFTCOM.2018.8555739","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555739","url":null,"abstract":"The random-access procedure used to support Machine to Machine (M2M) or Machine-Type Communications (MTC), does not provide efficient support for high user loads. This is due to the Slotted ALOHA used as an access protocol for the transmission of preambles and the use of random back-offs in case of Random Access Channel (RACH) failure. With the expected explosion of the number of devices in the coming years, the need for an efficient design to manage the access to the network becomes an urgent key issue especially with the reduced number of preambles available to perform the RACH procedure. To this end, the Third Generation Partnership Project (3GPP) proposed the Extended Access Barring (EAB) mechanism as a solution to control overload for MTC devices. In this paper, we propose an enhancement of the 3GPP EAB mechanism by expanding the contention space statically and dynamically with the aim to reduce collisions and to increase the success probability and therefore to fulfill constraints in terms of delay and energy consumption. An analytical approach along with simulations are provided in this paper to show the impact of this contention space expansion on the performance of the existing 3GPP EAB mechanism.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigation of Nonlinear Amplifier Distortion for CP-OFDM Based Cognitive Radio Systems","authors":"Hanen Lajnef, M. Dakhli, M. Hizem, R. Bouallègue","doi":"10.23919/SOFTCOM.2018.8555744","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555744","url":null,"abstract":"To reach a high data rate Quality of Service (QoS), the fifth generation (5G) was combined with the promising technology Cognitive Radio (CR), which can address the spectrum scarcity problem by means of dynamic spectrum sensing (SS). Therefore, the (SS) is an essential requirement of CR which detects and share the unused spectrum without having harmful interference on other users. In this paper, we investigate the effect of nonlinear distortions due to high-power amplifier (HPA) on the performances of the OFDM-CR system (orthogonal frequency division multiplexing based on cognitive radio). Afterward, in order to improve its performance, an iterative compensation algorithm employing the Nonlinear Distortion cancellation (NDC) principle was investigated.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NEMO: A Flexible Java-based Network Emulator","authors":"Luca Davoli, Yanina Protskaya, L. Veltri","doi":"10.23919/SOFTCOM.2018.8555769","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555769","url":null,"abstract":"Network emulation provides the capability to evaluate applications on standalone systems, representing a trade-off between real infrastructures and simulators, providing a lowlayer virtual network, and yet allowing real high-layer application code to be executed. Moreover, network emulation is useful to study and evaluate the behavior of applications in different conditions(maybe sometimes difficult to reach in real networks), in turn allowing a rapid deployment of hybrid real hardware/virtual network topologies. In this paper, a modular, flexible and highly scalable Java-based network emulator, denoted as NEMO, is proposed. NEMO can be integrated with external open-source Java applications or used as a virtualization mechanism, able to run third-party Java binary applications on a virtual node attached to either a virtual network or a real external network, in a completely transparent way for the end-user. Moreover, NEMO allows to plug in user-defined network components and run virtual networks composed by millions of nodes on a single end-user machine, as well as on a distributed infrastructure.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131657996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Ali Kandi, Hicham Lakhlef, A. Bouabdallah, Y. Challal
{"title":"An Efficient Multi-Group Key Management Protocol for Internet of Things","authors":"Mohamed Ali Kandi, Hicham Lakhlef, A. Bouabdallah, Y. Challal","doi":"10.23919/SOFTCOM.2018.8555857","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555857","url":null,"abstract":"Internet of Things (IoT) is a network made up of a large number of devices which are able to automatically communicate to computer systems, people and each other providing various services for the benefit of society. One of the main challenges facing the IoT is how to secure communication between these devices. Among all the issues, the Group Key Management is one of the most difficult. Although different approaches have been proposed to solve it, most of them use the same security parameters to secure all communications. Thus, if several services are provided by the network, communications within a service will be accessible to all network members even those which did not subscribe to it. Moreover, the compromise of a member will jeopardize all services. In this paper, we propose a highly scalable Multi-Group Key Management protocol for IoT which ensures the forward and backward secrecy, efficiently recovers from collusion attacks and guarantees the secure coexistence of several services in a single network. To achieve this, our protocol manages several groups with independent security parameters.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micro-Expressions Detection Based on Micro-Motions Dense Optical Flows","authors":"S. Nistor, A. Darabant, D. Borza","doi":"10.23919/SOFTCOM.2018.8555833","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555833","url":null,"abstract":"Micro-expressions are one of the most reliable sources of deceit detection. They are fast, involuntary facial movements and they usually occur when a person tries to hide their true feelings. This paper presents a novel method for micro-expression detection in high speed video-sequences. We first define several free-form regions of interest on the face based on the location of the muscles of facial expression. Dense optical flow features are extracted from each region, and their magnitude and direction are used to spot micro-expressions in the video sequence. The direction of movement is used to filter out irrelevant, macro movements. The proposed algorithm for micro-expression detection is training free and it involves a simple voting procedure on the movement magnitude from each region. The proposed method was tested on a publicly available database.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133626647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a Private CDN with an Off-Sourced Network Infrastructure: Model and Case Study","authors":"C. Canali, A. Corbelli, R. Lancellotti","doi":"10.23919/SOFTCOM.2018.8555766","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2018.8555766","url":null,"abstract":"Content Delivery Networks for multimedia contents are typically managed by a dedicated company. However, there are cases where an enterprise already investing in a dedicated network infrastructure wants to deploy its own private CDN. This scenario is quite different from traditional CDNs for a twofold reason: first, the workload characteristics; second, the impact on the available choices for the CDN design of having the management of the network infrastructure off-sourced to a third party. The contribution of this paper is to introduce and discuss the optimization models used to design the private CDN and to validate our models using a case study.","PeriodicalId":227652,"journal":{"name":"2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132287901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}