Ozan AlpTopal, Zekai Liang, G. Ascheid, Guido Dartmann, Gunes KarabulutKurt
{"title":"Using of Wavelets for Secret Key Generation: A Measurement Based Study","authors":"Ozan AlpTopal, Zekai Liang, G. Ascheid, Guido Dartmann, Gunes KarabulutKurt","doi":"10.1109/TELFOR.2018.8611930","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8611930","url":null,"abstract":"For the physical layer (PHY) key generation, two distant nodes exploit the reciprocal channel coefficients as a shared secret. These nodes may obtain erroneous channel estimates and generate highly correlated but not identical secret keys. In this work, we analyze the key error rate (KER) performances when different wavelet families are utilized as a pre-processing step in PHY key generation. Measurement-based KER results show that selection of the wavelet can significantly change the performance.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130724012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reenterable Colored Petri Net Models of Networks, Grids, and Clouds: Case Study for Provider Backbone Bridge","authors":"D. Zaitsev, T. Shmeleva, A. I. Sleptsov","doi":"10.1109/TELFOR.2018.8611840","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8611840","url":null,"abstract":"We introduce reenterable models of networks which contain only one instance of each component and accept a given topology as a parameter. Dynamic elements of the model (tokens) which simulate packets, records of switching and routing tables are supplied with a topology location tag. Switching tags allows us to simulate all the devices of a given topological scheme. The network model is supplied with special measurement subnets which allow fast computation of the network bandwidth, the packet delivery time, and jitter on-fly directly in the process of simulation, without storing intermediate statistical data, for the network performance and QoS evaluation. The advantage of the technique is a fast reconfiguration of models that is very significant for the model-driven design of networks. A case study presents the reenterable model of a Provider Backbone Bridge that comes to replace the Multiprotocol Label Switching technology.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid OFDM-IM System for BER Performance Improvement","authors":"Jovana Mrkic, E. Kočan","doi":"10.1109/TELFOR.2018.8611873","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8611873","url":null,"abstract":"OFDM-IM is modulation technique which is able to outperform classical OFDM modulation in terms of spectral and energy efficiency, by exploiting concept of Index Modulation (IM). However, this improvement can be achieved at the expense of worse bit-error-rate (BER) performance for the low to medium signal-to-noise ratio (SNR) values, while for the high SNRs it outperforms OFDM system in terms of BER. Thus, in this paper, we propose a hybrid system for BER minimization, which assumes implementation of OFDM-IM at high SNR values, and classical OFDM at lower SNR values, all based on the known channel characteristics.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116451293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Ambient Noise Incident Energy Angular Distribution on Building Facades Using Microphone Array","authors":"Miloš Bjelić","doi":"10.1109/TELFOR.2018.8612124","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8612124","url":null,"abstract":"The in-situ value of the sound reduction index of a façade element depends on the angular energy distribution of the noise impeding the façade. Generally speaking, the shape of the outdoor noise angular energy distribution is not known. Therefore, it is necessary to determine and analyze this distribution in real urban environments. This paper presents the methodology for experimental determination of the incident energy angular distribution of the outdoor noise on the building envelope. The method is based on the sound source localization using an optimized microphone array with 24 microphones and utilizing the algorithms for space-time signal processing. The methodology is applied in several characteristic terrain configurations in urban environments in order to observe the differences in the shapes of angular distributions. By using known building material characteristics and experimentally obtained shapes of the angular distributions, a prediction was performed for the in-situ value of the sound reduction index of the most common façade elements in urban environments. Such method enables the observation of differences of in-situ values of the same partition when it is placed in urban environments with different terrain configurations.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128543593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Shevchuk, M. Geraimchuk, O. Ivakhiv, O. Veselska, A. Sachenko
{"title":"Optimization of Transferring the Information Packets with Limited Time for Wireless Network","authors":"B. Shevchuk, M. Geraimchuk, O. Ivakhiv, O. Veselska, A. Sachenko","doi":"10.1109/TELFOR.2018.8611950","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8611950","url":null,"abstract":"Wireless sensory networks cover various fields of human activity. Unresolved problems in the construction of wireless devices for long-term monitoring of objects, processes, events and phenomena with unlicensed use of radio channels ISM-frequency range is given the limitations on the bandwidth operating frequency for computer networks operation. The solution of this problem is based on the rapid processing of monitoring data by the Object System to determine the most informative data. Such data are subject to the primary delivery (transfer) to the local and central database, as well as to the compact coding the binary information packet sequences.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"324 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133940535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Google Assistant in Android Application for Voice Control of Media Playback","authors":"Uroš Višekruna, M. Savic","doi":"10.1109/TELFOR.2018.8611831","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8611831","url":null,"abstract":"In this paper is performed integration of the Google Assistant into Android test application. The realized solution enables voice control of content playback on a TV or set top box. The user can start or stop the playback, go to the next or previous segment, or skip the specified number of seconds. In the paper is also developed a visual solution for the application. The functionality of the solution was confirmed by testing.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"62 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129314545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kalajdziski, K. Trivodaliev, Biljana Risteska Stojkoske, I. Ivanoska, Blagorodna Ilievska
{"title":"Knowledge Discovery in Cyber Attacks Data","authors":"S. Kalajdziski, K. Trivodaliev, Biljana Risteska Stojkoske, I. Ivanoska, Blagorodna Ilievska","doi":"10.1109/TELFOR.2018.8612072","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8612072","url":null,"abstract":"One of the major challenges in managing security in broadband and high-speed networks is the detection of suspicious anomalies in network traffic. In recent years a lot of effort is focused on developing automatic detection of cyber-attacks using data mining techniques on the data generated from network traffic. In this paper a methodology for automatic detection of cyber-attacks is proposed. To improve the performance, the network traffic data is first preprocessed by filtering and combining features from the original data. The new augmented and refined data is then used to build a classification model that can discriminate between normal network traffic and cyber-attacks. Experimental scenarios are set up to evaluate the effect of preprocessing on the final performance, and additionally to provide insight on possible recommendations in terms of a most suitable classification algorithm. The obtained results indicate performance improvement with data preprocessing. All used classification algorithms provide very high AUC of over 0.95 which attests that the proposed methodology is highly promising for the development and improvement of current and future cyber-attacks detection systems.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116587038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Tosic, A. Samčović, N. Lekíc, B. Todorović, S. Jankovic, S. Mladenović
{"title":"Spectrogram Image Analyzes of Interference Caused by Led Light in HF Band","authors":"N. Tosic, A. Samčović, N. Lekíc, B. Todorović, S. Jankovic, S. Mladenović","doi":"10.1109/TELFOR.2018.8611987","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8611987","url":null,"abstract":"This paper presents the analysis of the interference caused by the LED reflector. LED lighting is nowadays increasingly popular due to low consumption, but LED drivers are causing interference in different frequency bands. Analysis in this paper is carried out on the HF frequency band and the spectrogram is used as a means of displaying interferences with different window function.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123655224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of MANET Networks Based on AODV Protocol in NS-3 Simulator","authors":"Pavle D. Bugarčić, Marija Z. Malnar, N. Jevtic","doi":"10.1109/TELFOR.2018.8612100","DOIUrl":"https://doi.org/10.1109/TELFOR.2018.8612100","url":null,"abstract":"In this paper a comparative analysis of network performance regarding to Random Waypoint (RW) and Gauss-Markov (GM) mobility models within Ad hoc On Demand Distance Vector (AODV) protocol in Network Simulator 3 (NS-3) is given. Simulation results were compared according to throughput, percentage of packet loss, routing overhead, average end to end delay and jitter. In the simulations various node speeds and traffic loads are used. In order to obtain these network parameters a new software patch is developed for NS-3 simulator and used in this paper. The source code of this implementation is publicly available.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protect Corporate Networks from DDoS Attacks Using Arbor Technology","authors":"M. Koprivica, Nataša Neškovi","doi":"10.1109/telfor.2018.8611963","DOIUrl":"https://doi.org/10.1109/telfor.2018.8611963","url":null,"abstract":"The technical solution for protecting corporate users from DDoS attacks in the Telekom Srbija network, based on the Arbor technology, has been considered. The Arbor environment and its implementation in the Telekom Srbija network are presented. In order to enable cloud signaling, and additional user services, solution for virtualization of security system containing the necessary changes in the network topology was presented.","PeriodicalId":229131,"journal":{"name":"2018 26th Telecommunications Forum (TELFOR)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124858167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}