2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)最新文献

筛选
英文 中文
Performance Analysis of a novel Passenger Train Wireless Communications Architecture for High-Speed Trains 一种新型高速列车旅客列车无线通信架构的性能分析
Subharthi Banerjee, M. Hempel, H. Sharif
{"title":"Performance Analysis of a novel Passenger Train Wireless Communications Architecture for High-Speed Trains","authors":"Subharthi Banerjee, M. Hempel, H. Sharif","doi":"10.1109/MOWNET.2018.8428864","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428864","url":null,"abstract":"Achievable wireless networking performance in High Speed Trains (HST) experiences significant challenges originating from the high speed at which those trains travel. In this paper, we have studied a train communications architecture that leverages a Railcar-to-Railcar (R2R) wireless communication scheme known as Wireless Digital Train Line (WiDTL) as the core in-train network architecture. We have also provided simulation results for Train-to-Ground (T2G) networks for different network evolutions, environments and FCC regulations and a comprehensive in-train network simulation based on realtime passenger and user-portable device interactions. According to the simulations we could conclude that present fourth generation (4G) network architectures can not meet IMT-2020 specifications, whereas 5G-New Radio (5G-NR) shows positive results towards supporting the continually increasing bandwidth-intensive services provided to - and demanded by - passengers data traffic. We also have shown how the modularity provided through physically decoupling user and control plane traffic in WiDTL enables shifting of network burden towards the locomotive and central station.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree 基于攻击树的车载Ad-hoc网络安全性分析
Meriem Houmer, M. L. Hasnaoui, Abdeslam Elfergougui
{"title":"Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree","authors":"Meriem Houmer, M. L. Hasnaoui, Abdeslam Elfergougui","doi":"10.1109/MOWNET.2018.8428905","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428905","url":null,"abstract":"Nowadays, Vehicular ad hoc network confronts many challenges in terms of security and privacy, due to the fact that data transmitted are diffused in an open access environment. However, highest of drivers want to maintain their information discreet and protected, and they do not want to share their confidential information. So, the private information of drivers who are distributed in this network must be protected against various threats that may damage their privacy. That is why, confidentiality, integrity and availability are the important security requirements in VANET. This paper focus on security threat in vehicle network especially on the availability of this network. Then we regard the rational attacker who decides to lead an attack based on its adversary's strategy to maximize its own attack interests. Our aim is to provide reliability and privacy of VANET system, by preventing attackers from violating and endangering the network. to ensure this objective, we adopt a tree structure called attack tree to model the attacker's potential attack strategies. Also, we join the countermeasures to the attack tree in order to build attack-defense tree for defending these attacks.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125563914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Which NoSQL database for IoT Applications? 哪些NoSQL数据库适合物联网应用?
S. Amghar, Safae Cherdal, S. Mouline
{"title":"Which NoSQL database for IoT Applications?","authors":"S. Amghar, Safae Cherdal, S. Mouline","doi":"10.1109/MOWNET.2018.8428922","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428922","url":null,"abstract":"A large amount of data are generated every moment by connected objects creating Internet of Things (IoT). These data are difficult to handle using traditional databases leading to use NoSQL databases. These latter have achieved a large popularity thanks to their high performance, flexibility in scaling, and high availability. But, which NoSQL database is the most suitable for IoT applications? In this paper, we discuss the main requirements of IoT data management, and we compare five of the most popular NoSQL databases namely, Redis, Cassandra, MongoDb, Couchbase and Neo4j, in accordance with IoT data management requirements, in order to find the most suitable NoSQL database for IoT applications.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Impulsive Noise Reduction Techniques in Power Line Communication: A Survey and Recent Trends 电力线通信中的脉冲降噪技术:综述与最新发展趋势
Samir Laksir, A. Chaoub, A. Tamtaoui
{"title":"Impulsive Noise Reduction Techniques in Power Line Communication: A Survey and Recent Trends","authors":"Samir Laksir, A. Chaoub, A. Tamtaoui","doi":"10.1109/MOWNET.2018.8428879","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428879","url":null,"abstract":"Power Line Communication (PLC) is a technology that permits data transmission using the electrical networks. In the last few years, research in the area of efficient wired home-networking services and Smart Grid has received a great interest thanks to the already-existing indoor network and the ubiquitous sockets (outlets) inside homes and buildings. However, the power-line mediums present challenging task and provide shaky environment for multimedia (audio, image and video) transmission. As a matter of fact, the noise with the highest impact on multimedia transmission is the impulsive noise with disturbances of bursts of errors. Therefore, there has been an intense research in the area of error-mitigation strategies in PLC, thus the need for such a survey. This survey points out the state-of-the-art techniques, and discusses some key questions regarding the current and future trends related to PLC signal protection strategies.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimized GTS Utilization for IEEE 802.15.4 Standard 基于IEEE 802.15.4标准的GTS利用率优化
Ahmad Naseem Alvi, Rahat Mehmood, Muhammad Talha Ahmed, Malik Abdullah, S. Bouk
{"title":"Optimized GTS Utilization for IEEE 802.15.4 Standard","authors":"Ahmad Naseem Alvi, Rahat Mehmood, Muhammad Talha Ahmed, Malik Abdullah, S. Bouk","doi":"10.1109/MOWNET.2018.8428852","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428852","url":null,"abstract":"Low rate and low processing wireless applications are under high demands since last decade. Most of these applications use IEEE 802.15.4 standard on their physical and Medium Access Control (MAC) layers. The standard operates in 868MHz, 915MHz, and 2400MHz frequency bands, and offers superframe structure in its beacon enabled modes. This superframe structure comprises of Contention Access Period (CAP) and Contention Free Periods (CFP). During CFP, nodes are allocated Guaranteed Time Slots (GTS) to transfer their data. In this work, CFP slots of superframe structure have been fine-tuned for better link utilization. A knapsack optimization algorithm is designed to accommodate more CFP requesting nodes. The proposed scheme improves the link utilization and accommodates more nodes as compared to the existing standard. The analytical results show that our proposed work improves the link utilization almost 50% and allows up to double of nodes as compared to the standard on all three frequency bands.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126780995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Copyright 版权
{"title":"Copyright","authors":"","doi":"10.1109/mownet.2018.8428856","DOIUrl":"https://doi.org/10.1109/mownet.2018.8428856","url":null,"abstract":"","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New safety measure to protect the 3G/4G SIM cards against cloning 新的安全措施,以保护3G/4G SIM卡克隆
N. Zidouni, S. Chitroub, Hakima Chebout, Nesrine Boukais
{"title":"New safety measure to protect the 3G/4G SIM cards against cloning","authors":"N. Zidouni, S. Chitroub, Hakima Chebout, Nesrine Boukais","doi":"10.1109/MOWNET.2018.8428876","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428876","url":null,"abstract":"A new security mechanism that could be implemented in the mobile phones for a more strength safety measure in cellular network communications is proposed. It permits of reinforcing at the same time the authentication process of the subscriber and the data encryption communicated between subscriber and network. In fact, the attack that could put in risk the security of subscribers and operators, namely the Subscriber Identity Module (SIM) card cloning, remains possible because of some failures observed in the authentication process and the encryption key generation used by the SIM card and the Univer-sal SIM (USIM) card of the mobile phones in 3G/3G++ and 4G, respectively. Our proposal is based on signal processing technique of spectral spread called Code-division multiple access (CDMA). The idea is to use the pseudo-random codes for spreading the resulting information of the authentication algorithm. This makes very difficult to decrypt the encrypted communications between subscriber and the operator. Further, spreading of information extends the data and increase the size of the encryption key to be used. We have tested the robustness of our proposal against many possible attacks and the results are very promising.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130840890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MOCP: An Offloading Protocol for Mobile Cloud and IoT virtualization MOCP:移动云和物联网虚拟化的卸载协议
C. Mahmoudi, F. Mourlin
{"title":"MOCP: An Offloading Protocol for Mobile Cloud and IoT virtualization","authors":"C. Mahmoudi, F. Mourlin","doi":"10.1109/MOWNET.2018.8428923","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428923","url":null,"abstract":"The Internet of Things (IoT) is a vast and dynamic domain that is evolving rapidly. It relies on the cloud computing for the analysis of the tremendous amount of data generated by connected devices. Communication between the IoT and the cloud is thus crucial to the proper functioning of such a system. Moreover, IoT systems are hungry for virtualization and mobility techniques as they contribute to building dynamic and reliable communications. This paper describes the existing virtualization techniques for IoT and mobile cloud. It the Mobile Offloading and Communication Protocol (MOCP) as a framework for the mobile cloud computing and IoT virtualization. A use case presenting the benefits of virtualization to the IoT composition is also provided.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129959791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel SDN-based Architecture and Traffic Steering Method for Service Function Chaining 一种新的基于sdn的业务功能链架构与流量导向方法
Hajar Hantouti, N. Benamar
{"title":"A Novel SDN-based Architecture and Traffic Steering Method for Service Function Chaining","authors":"Hajar Hantouti, N. Benamar","doi":"10.1109/MOWNET.2018.8428930","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428930","url":null,"abstract":"Complex services composed of middleboxes are mainly used to meet the requirements of advanced services such as security services, monitoring systems, and personalized enterprise services. However, forwarding a traffic across middleboxes is a tedious and error-prone task. Service function chaining (SFC) presents different solutions to steer the traffic among intermediate service functions. However statically managing, deploying, and configuring an SFC remains a challenging task. Dynamic SFC has recently gained significant interest from big networking operators motivated by the emerging technologies of Software Defined Networking (SDN) and Network Function Virtualization (NFV). In this paper, we present a new SDN based architecture and a novel header for traffic steering for dynamic SFC. Our results show that the header we describe in this paper does not increase the packet size nor the overhead.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On mm Wave Radio Network Planning based on a Centralized Access Control 基于集中接入控制的毫米波无线网络规划
D. Panno, Salvatore Riolo
{"title":"On mm Wave Radio Network Planning based on a Centralized Access Control","authors":"D. Panno, Salvatore Riolo","doi":"10.1109/MOWNET.2018.8428870","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428870","url":null,"abstract":"In the recent years, we are witnessing an increasing demand of higher throughput, lower latency, higher reliability, and more efficient energy consumption. In order to meet these requirements in the future 5G cellular network, we adopt Device-to-Device communications, 60 GHz unlicensed band transmissions and adaptive beamforming techniques. The symbiosis of these technologies provides multi-Gigabit data rates, improved system capacity, strong interference reduction, while reducing eNodeB data traffic, end-to-end latency and power consumption. On the other hand, a major issue is the limited communication range due to the high path loss. At the aim of extending these benefits to a wide indoor scenario, we consider a Millimeterwave Mobile Broadband (MMB) system, consisting of multiple mmWave Access Points (APs) interconnected among themselves through a wireless backhaul network at 60 GHz. In this scenario, APs need to be properly deployed to ensure the system functioning, i.e., a radio network planning is needed. Since planning a cellular system depends on a large number of aspects, we need to carry out a proper analysis which takes into account not only the specific characteristics of MMB systems, but also the adopted Access Control scheme. In this paper, on basis of our previously proposed Access Control scheme, we provide some hints for planning a MMB system, organized in two phases. First, we derive coverage planning constraints. Second, the capacity planning and parameter configuration are derived in a network topology fulfilling the coverage constraints.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信