2018 IEEE Symposium on Computers and Communications (ISCC)最新文献

筛选
英文 中文
IoT-Based Architecture for Data Analytics of Arboviruses in Smart Cities 基于物联网的智慧城市虫媒病毒数据分析架构
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538722
P. Tavares, E. Rodrigues
{"title":"IoT-Based Architecture for Data Analytics of Arboviruses in Smart Cities","authors":"P. Tavares, E. Rodrigues","doi":"10.1109/ISCC.2018.8538722","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538722","url":null,"abstract":"With the progress of sensor technologies, there has been an increase in the number of connected computing devices capable of collecting information and interacting with the environment in which they are inserted, forming the basis of the Internet of Things (IoT). Such devices enable the development of new applications capable of making cities more intelligent, providing improvements to society and urban infrastructure. As a result of the interaction between different applications, there is a large set of data, from which useful knowledge can be extracted. An important problem to be faced is the recurrent occurrence of arbovirus outbreaks in big cities with tropical climate. This research proposes an architecture capable of aggregating data from different types of IoT devices, and manipulating them using data analytics techniques to assist the surveillance of arbovirus outbreaks. As an example of case study, we present an exploratory analysis of climatology data and cases of arbovirus diseases in the city of Fortaleza, Ceará, Brazil, between the years of 2011 and 2017.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Network Slicing Component for LTE Uplink Transmission LTE上行链路传输的网络切片组件
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538556
Pedro H. A. Rezende, E. Madeira
{"title":"A Network Slicing Component for LTE Uplink Transmission","authors":"Pedro H. A. Rezende, E. Madeira","doi":"10.1109/ISCC.2018.8538556","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538556","url":null,"abstract":"Upcoming 5G mobile systems are expected to meet the QoS requirements of a massive amount of devices with different service constraints. In this context, 5G networks can not rely on the monolithic architecture present in today’s networks. 5G mobile systems intend using network slicing to enable the creation of multiple logical networks (network slices) on top of a common physical infrastructure. These network slices are tailored according to the users’ service requirements. Network slicing can be deployed due to the consolidation of multiple technologies, such as NFV and SDN. This paper introduces a component named Slice Optimizer, implemented as an extension of LTE’s evolved NodeB, responsible to realize network slicing for LTE uplink transmission. The Slice Optimizer receives network slicing information from an Orchestrator, which is embedded in an SDN Controller. The Slice Optimizer, based on these network slicing information and on the current network state, selects the best slice to be scheduled at the moment. We performed extensive simulations to evaluate our proposal. The results show that our proposal can adapt to the network state, significantly increasing the user’s QoS experience.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An SDN-based Framework for Managing Internet Exchange Points 基于 SDN 的互联网交换点管理框架
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538695
Luis Felipe Cunha Martins, Ítalo F. S. Cunha, D. Guedes
{"title":"An SDN-based Framework for Managing Internet Exchange Points","authors":"Luis Felipe Cunha Martins, Ítalo F. S. Cunha, D. Guedes","doi":"10.1109/ISCC.2018.8538695","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538695","url":null,"abstract":"Internet Exchange Points (IXP) have become crucial building blocks of today’s networked services, localizing traffic, improving performance, and reducing costs. IXPs span a wide range of business models—for-profit, not-for-profit, and freeof-charge—and thus have diverse business goals. As a result, different IXPs have different requirements on their infrastructure and want to enforce different policies. Unfortunately, despite their success, IXPs face significant infrastructure management challenges like scalability limitations or lack of security. In this paper we present SDIX, an infrastructure management framework for IXPs that uses software-defined networking functionality to provide efficient and flexible primitives that IXPs can use and extend to implement policies. We evaluate SDIX on a realistic IXP infrastructure emulated on Mininet and show how it achieves different goals while simplifying management. We also show that SDIX is deployable on current hardware and can scale to IXPs with thousands of member networks.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparison of path-following algorithms for loiter paths of Unmanned Aerial Vehicles 无人机漫游路径路径跟踪算法比较
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538672
Daniel M. Xavier, N. B. F. Silva, K. Branco
{"title":"Comparison of path-following algorithms for loiter paths of Unmanned Aerial Vehicles","authors":"Daniel M. Xavier, N. B. F. Silva, K. Branco","doi":"10.1109/ISCC.2018.8538672","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538672","url":null,"abstract":"Unmanned Aerial Vehicles are an example of critical embedded system, since it uses specific hardware and software to control the vehicle through its operation. One of the main parts of the system is the autopilot, which is responsible for stabilising the aircraft during the flight, executing navigation tasks and sensing the environment. The path-following is an important capability of a UAV, allowing it to follow a desired path defined by waypoints. Several solutions of the path-following for loiter paths are described in the literature, but most of them only deals with the 2D scenario. Therefore, this paper presents an extension process to determine path-following algorithms based on Carrot-Chasing, Non-Linear Guidance Law (NLGL), Pure Pursuit and Line-of-Sight (PLOS) and Vector Field. It also demonstrates a comparison between these new algorithms using a simulation with wind disturbances, which shows that NLGL produces smaller errors and Carrot-Chasing and PLOS requires less effort.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Error Probability Analysis of Nyquist-I Pulses in Intersymbol and Cochannel Interference 码间和共信道干扰下Nyquist-I脉冲的误差概率分析
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538639
Jaime Aranda-Cubillo, César A. Azurdia-Meza, R. Souza, S. M. Sánchez, I. Jirón
{"title":"Error Probability Analysis of Nyquist-I Pulses in Intersymbol and Cochannel Interference","authors":"Jaime Aranda-Cubillo, César A. Azurdia-Meza, R. Souza, S. M. Sánchez, I. Jirón","doi":"10.1109/ISCC.2018.8538639","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538639","url":null,"abstract":"The coexistence of different types technologies supported by the same infrastructure introduces unwanted interference that affects negatively the communication system. In this manuscript, recently proposed Nyquist-I pulses are evaluated in terms of bit error rate (BER) considering first, the effect of cochannel interference (CCI) and later, inter-symbol interference (ISI) and CCI simultaneously, under the effects of time jitter. The results indicate that considering a fixed interference power, as the number of interfering signals increases, the effect of the CCI also increases. Additionally, when the effects of CCI and ISI are considered simultaneously, both the magnitude of the main lobe and the magnitudes of the lateral side-lobes of the impulse response are preponderant in the calculation of the BER.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration RWAC:一种组协作的自包含读写访问控制方案
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538611
Jinmiao Wang, B. Lang, Ruijin Zhu
{"title":"RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration","authors":"Jinmiao Wang, B. Lang, Ruijin Zhu","doi":"10.1109/ISCC.2018.8538611","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538611","url":null,"abstract":"With the development of the Internet and personal digital devices, self-organizing and open-pattern collaborations are becoming popular. In such environments, data are usually outsourced to third-party servers in the cloud, which are out of the control domain of data owners. Hence, traditional access control models, which are enforced relying on data storage servers, will face new security challenges. In this paper, we propose a self- contained read and write access control (RWAC) scheme based on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based group signature (ABGS) mechanism. By adopting a two-step encryption strategy using CP-ABE and utilizing the write control policy as the signature policy in ABGS, RWAC ensures that fine-grained read and write access control can be enforced during decryption and signature generation without dependence on any third parties. To prevent privacy leakage from RWAC policies, we adopt a CP-ABE scheme with hidden policy. Then, we introduce the policy hiding method into ABGS and propose an ABGS scheme with hidden policy. Moreover, users can trace the edit history of each data object with the signature or a write list. The security analysis indicates that RWAC is able to enforce fine-grained read and write access controls for group collaborations while also ensuring data confidentiality and integrity.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse Detection for Spatial Modulation in Multiple Access Channels 多址信道中空间调制的稀疏检测
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538700
Yuliang Tu, Lin Gui, Qibo Qin, H. Wen
{"title":"Sparse Detection for Spatial Modulation in Multiple Access Channels","authors":"Yuliang Tu, Lin Gui, Qibo Qin, H. Wen","doi":"10.1109/ISCC.2018.8538700","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538700","url":null,"abstract":"In this paper, a low-complexity detector based on the multi-user sparse Bayesian learning (MSBL) method is proposed for the multi-user spatial modulation (SM) multiple-input-multiple-output (MIMO) system. Firstly, we formulate the multiple access channel SM (MAC-SM) detection as a sparse recovery problem with fixed sparsity constraint. Then, by exploiting the characteristic of the SM transmit signal, we coarsely detect all the potential positions of active antennas. Finally, we select the maximum likely set of the index of active antennas from all user and utilize the zeros-forcing (ZF) estimate to recover the modulation signals. In addition, we theoretically analyze the complexity of proposed algorithm. Experiment and simulation results demonstrate that the proposed detector achieves a good tradeoff between performance and computational complexity.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122722512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Investigation on Wannacry Ransomware and its Detection Wannacry勒索软件及其检测研究
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538354
M. S. Kumar, J. Ben-othman, K. .. Srinivasagan
{"title":"An Investigation on Wannacry Ransomware and its Detection","authors":"M. S. Kumar, J. Ben-othman, K. .. Srinivasagan","doi":"10.1109/ISCC.2018.8538354","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538354","url":null,"abstract":"The technological advancement has been accompanied with many issues to the information: security, privacy, and integrity. Malware is one of the security issues that threaten computer system. Ransomware is a type of malicious software that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. This paper investigates the intrusion of WannaCry ransomware and the possible detection of the ransomware using static and dynamic analysis. From the analysis, the features of the malware were extracted and detection has been done using those features. The intrusion detection technique used here in this study is Yara-rule based detection which involves an attempt to define a set of rules which comprises of unique strings which is decoded from the wannacry file.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122743747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Innovative Osmotic Computing Framework for Self Adapting City Traffic in Autonomous Vehicle Environment 自主车辆环境下自适应城市交通的创新渗透计算框架
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538675
Basilio Filocamo, A. Galletta, M. Fazio, J. Ruiz, M. Sotelo, M. Villari
{"title":"An Innovative Osmotic Computing Framework for Self Adapting City Traffic in Autonomous Vehicle Environment","authors":"Basilio Filocamo, A. Galletta, M. Fazio, J. Ruiz, M. Sotelo, M. Villari","doi":"10.1109/ISCC.2018.8538675","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538675","url":null,"abstract":"In recent years, autonomous driving is becoming a very hot topic for both researchers and car manufacturers. Indeed, around the world new discoveries have been published. In this work we present an innovative Osmotic Computing solution for self adapting city traffic in autonomous vehicle environment. The Vehicular-to-Vehicular (V2V) and Vehicular to Edge-Cloud (V2EC) interactions inside specific areas of the City are considered: the interconnections. The Framework we are creating is able to adapt on a Dynamic Environment where Vehicles, Pedestrians and Physical Infrastructures can interact each other, offering continuous information on interconnections status and city traffic in general.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122840420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Real-Time Underwater Computing System 实时水下计算系统
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538617
Hussain Albarakati, R. Ammar, Raafat S. Elfouly
{"title":"Real-Time Underwater Computing System","authors":"Hussain Albarakati, R. Ammar, Raafat S. Elfouly","doi":"10.1109/ISCC.2018.8538617","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538617","url":null,"abstract":"Underwater acoustic sensor networks have emerged as a new technology for underwater real-time applications such as oil inspection, seismic monitoring, and disaster prevention. However, this new technology is bound to data sensing, transmission, and forwarding, which makes the transmission of large volumes of data costly in terms of both time and power. This has inspired our research activities to develop underwater computing systems. In this advanced technology, information is extracted under the water using embedded processors via data mining and/or data compression. In our previous study, we developed a new set of real-time underwater embedded system architectures that can handle various network configurations. The aim was to minimize end-to-end delay and power consumption based on network parameters (i.e., data rate, central processing node capabilities, gathering node capabilities, and water depth) for both homogenous and heterogeneous applications. In this study, we developed a data-gathering algorithm that divides sensor nodes into clusters to find the best location for master nodes and their sensor members and the best location for the central computer. The system performance is calculated in terms of minimum end-to-end delay, power consumption, and load balancing among master nodes. Simulation is used to verify the results and to evaluate the performance of various sensor topologies.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114605121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信