{"title":"Performance Analysis of a novel Passenger Train Wireless Communications Architecture for High-Speed Trains","authors":"Subharthi Banerjee, M. Hempel, H. Sharif","doi":"10.1109/MOWNET.2018.8428864","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428864","url":null,"abstract":"Achievable wireless networking performance in High Speed Trains (HST) experiences significant challenges originating from the high speed at which those trains travel. In this paper, we have studied a train communications architecture that leverages a Railcar-to-Railcar (R2R) wireless communication scheme known as Wireless Digital Train Line (WiDTL) as the core in-train network architecture. We have also provided simulation results for Train-to-Ground (T2G) networks for different network evolutions, environments and FCC regulations and a comprehensive in-train network simulation based on realtime passenger and user-portable device interactions. According to the simulations we could conclude that present fourth generation (4G) network architectures can not meet IMT-2020 specifications, whereas 5G-New Radio (5G-NR) shows positive results towards supporting the continually increasing bandwidth-intensive services provided to - and demanded by - passengers data traffic. We also have shown how the modularity provided through physically decoupling user and control plane traffic in WiDTL enables shifting of network burden towards the locomotive and central station.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meriem Houmer, M. L. Hasnaoui, Abdeslam Elfergougui
{"title":"Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree","authors":"Meriem Houmer, M. L. Hasnaoui, Abdeslam Elfergougui","doi":"10.1109/MOWNET.2018.8428905","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428905","url":null,"abstract":"Nowadays, Vehicular ad hoc network confronts many challenges in terms of security and privacy, due to the fact that data transmitted are diffused in an open access environment. However, highest of drivers want to maintain their information discreet and protected, and they do not want to share their confidential information. So, the private information of drivers who are distributed in this network must be protected against various threats that may damage their privacy. That is why, confidentiality, integrity and availability are the important security requirements in VANET. This paper focus on security threat in vehicle network especially on the availability of this network. Then we regard the rational attacker who decides to lead an attack based on its adversary's strategy to maximize its own attack interests. Our aim is to provide reliability and privacy of VANET system, by preventing attackers from violating and endangering the network. to ensure this objective, we adopt a tree structure called attack tree to model the attacker's potential attack strategies. Also, we join the countermeasures to the attack tree in order to build attack-defense tree for defending these attacks.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125563914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Which NoSQL database for IoT Applications?","authors":"S. Amghar, Safae Cherdal, S. Mouline","doi":"10.1109/MOWNET.2018.8428922","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428922","url":null,"abstract":"A large amount of data are generated every moment by connected objects creating Internet of Things (IoT). These data are difficult to handle using traditional databases leading to use NoSQL databases. These latter have achieved a large popularity thanks to their high performance, flexibility in scaling, and high availability. But, which NoSQL database is the most suitable for IoT applications? In this paper, we discuss the main requirements of IoT data management, and we compare five of the most popular NoSQL databases namely, Redis, Cassandra, MongoDb, Couchbase and Neo4j, in accordance with IoT data management requirements, in order to find the most suitable NoSQL database for IoT applications.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impulsive Noise Reduction Techniques in Power Line Communication: A Survey and Recent Trends","authors":"Samir Laksir, A. Chaoub, A. Tamtaoui","doi":"10.1109/MOWNET.2018.8428879","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428879","url":null,"abstract":"Power Line Communication (PLC) is a technology that permits data transmission using the electrical networks. In the last few years, research in the area of efficient wired home-networking services and Smart Grid has received a great interest thanks to the already-existing indoor network and the ubiquitous sockets (outlets) inside homes and buildings. However, the power-line mediums present challenging task and provide shaky environment for multimedia (audio, image and video) transmission. As a matter of fact, the noise with the highest impact on multimedia transmission is the impulsive noise with disturbances of bursts of errors. Therefore, there has been an intense research in the area of error-mitigation strategies in PLC, thus the need for such a survey. This survey points out the state-of-the-art techniques, and discusses some key questions regarding the current and future trends related to PLC signal protection strategies.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Naseem Alvi, Rahat Mehmood, Muhammad Talha Ahmed, Malik Abdullah, S. Bouk
{"title":"Optimized GTS Utilization for IEEE 802.15.4 Standard","authors":"Ahmad Naseem Alvi, Rahat Mehmood, Muhammad Talha Ahmed, Malik Abdullah, S. Bouk","doi":"10.1109/MOWNET.2018.8428852","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428852","url":null,"abstract":"Low rate and low processing wireless applications are under high demands since last decade. Most of these applications use IEEE 802.15.4 standard on their physical and Medium Access Control (MAC) layers. The standard operates in 868MHz, 915MHz, and 2400MHz frequency bands, and offers superframe structure in its beacon enabled modes. This superframe structure comprises of Contention Access Period (CAP) and Contention Free Periods (CFP). During CFP, nodes are allocated Guaranteed Time Slots (GTS) to transfer their data. In this work, CFP slots of superframe structure have been fine-tuned for better link utilization. A knapsack optimization algorithm is designed to accommodate more CFP requesting nodes. The proposed scheme improves the link utilization and accommodates more nodes as compared to the existing standard. The analytical results show that our proposed work improves the link utilization almost 50% and allows up to double of nodes as compared to the standard on all three frequency bands.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126780995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copyright","authors":"","doi":"10.1109/mownet.2018.8428856","DOIUrl":"https://doi.org/10.1109/mownet.2018.8428856","url":null,"abstract":"","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Zidouni, S. Chitroub, Hakima Chebout, Nesrine Boukais
{"title":"New safety measure to protect the 3G/4G SIM cards against cloning","authors":"N. Zidouni, S. Chitroub, Hakima Chebout, Nesrine Boukais","doi":"10.1109/MOWNET.2018.8428876","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428876","url":null,"abstract":"A new security mechanism that could be implemented in the mobile phones for a more strength safety measure in cellular network communications is proposed. It permits of reinforcing at the same time the authentication process of the subscriber and the data encryption communicated between subscriber and network. In fact, the attack that could put in risk the security of subscribers and operators, namely the Subscriber Identity Module (SIM) card cloning, remains possible because of some failures observed in the authentication process and the encryption key generation used by the SIM card and the Univer-sal SIM (USIM) card of the mobile phones in 3G/3G++ and 4G, respectively. Our proposal is based on signal processing technique of spectral spread called Code-division multiple access (CDMA). The idea is to use the pseudo-random codes for spreading the resulting information of the authentication algorithm. This makes very difficult to decrypt the encrypted communications between subscriber and the operator. Further, spreading of information extends the data and increase the size of the encryption key to be used. We have tested the robustness of our proposal against many possible attacks and the results are very promising.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130840890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MOCP: An Offloading Protocol for Mobile Cloud and IoT virtualization","authors":"C. Mahmoudi, F. Mourlin","doi":"10.1109/MOWNET.2018.8428923","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428923","url":null,"abstract":"The Internet of Things (IoT) is a vast and dynamic domain that is evolving rapidly. It relies on the cloud computing for the analysis of the tremendous amount of data generated by connected devices. Communication between the IoT and the cloud is thus crucial to the proper functioning of such a system. Moreover, IoT systems are hungry for virtualization and mobility techniques as they contribute to building dynamic and reliable communications. This paper describes the existing virtualization techniques for IoT and mobile cloud. It the Mobile Offloading and Communication Protocol (MOCP) as a framework for the mobile cloud computing and IoT virtualization. A use case presenting the benefits of virtualization to the IoT composition is also provided.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129959791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel SDN-based Architecture and Traffic Steering Method for Service Function Chaining","authors":"Hajar Hantouti, N. Benamar","doi":"10.1109/MOWNET.2018.8428930","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428930","url":null,"abstract":"Complex services composed of middleboxes are mainly used to meet the requirements of advanced services such as security services, monitoring systems, and personalized enterprise services. However, forwarding a traffic across middleboxes is a tedious and error-prone task. Service function chaining (SFC) presents different solutions to steer the traffic among intermediate service functions. However statically managing, deploying, and configuring an SFC remains a challenging task. Dynamic SFC has recently gained significant interest from big networking operators motivated by the emerging technologies of Software Defined Networking (SDN) and Network Function Virtualization (NFV). In this paper, we present a new SDN based architecture and a novel header for traffic steering for dynamic SFC. Our results show that the header we describe in this paper does not increase the packet size nor the overhead.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On mm Wave Radio Network Planning based on a Centralized Access Control","authors":"D. Panno, Salvatore Riolo","doi":"10.1109/MOWNET.2018.8428870","DOIUrl":"https://doi.org/10.1109/MOWNET.2018.8428870","url":null,"abstract":"In the recent years, we are witnessing an increasing demand of higher throughput, lower latency, higher reliability, and more efficient energy consumption. In order to meet these requirements in the future 5G cellular network, we adopt Device-to-Device communications, 60 GHz unlicensed band transmissions and adaptive beamforming techniques. The symbiosis of these technologies provides multi-Gigabit data rates, improved system capacity, strong interference reduction, while reducing eNodeB data traffic, end-to-end latency and power consumption. On the other hand, a major issue is the limited communication range due to the high path loss. At the aim of extending these benefits to a wide indoor scenario, we consider a Millimeterwave Mobile Broadband (MMB) system, consisting of multiple mmWave Access Points (APs) interconnected among themselves through a wireless backhaul network at 60 GHz. In this scenario, APs need to be properly deployed to ensure the system functioning, i.e., a radio network planning is needed. Since planning a cellular system depends on a large number of aspects, we need to carry out a proper analysis which takes into account not only the specific characteristics of MMB systems, but also the adopted Access Control scheme. In this paper, on basis of our previously proposed Access Control scheme, we provide some hints for planning a MMB system, organized in two phases. First, we derive coverage planning constraints. Second, the capacity planning and parameter configuration are derived in a network topology fulfilling the coverage constraints.","PeriodicalId":236142,"journal":{"name":"2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}