{"title":"ICCSN 2018 Preface","authors":"","doi":"10.1109/iccsn.2018.8488235","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488235","url":null,"abstract":"","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"BC-29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126719741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Millimeter-Wave Full-Duplex MIMO Systems with Hybrid Beamforming","authors":"Feng-Cheng Wei, Meng-Lin Ku, Char-Dir Chung","doi":"10.1109/iccsn.2018.8488224","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488224","url":null,"abstract":"In this paper, we investigate a millimeter-wave full-duplex (FD) multiple-input multiple-output system, where an FD base station is capable of concurrently receiving data from a half-duplex (HD) uplink user and transmitting data to an HD downlink user via hybrid beamforming. To effectively mitigate the self-interference and co-channel interference, the sum rate of the uplink and downlink transmissions is maximized by jointly designing hybrid beamforming at the base station and digital beamforming at the two users. The design problem is non-convex due to the multiplication among beamforming matrices, and it is converted to an equivalent weighted sum minimum mean square error (WMMSE) problem for mathematical tractability. An iterative WMMSE hybrid beamforming algorithm is first proposed based on alternative optimization. By adding semi-unitary structures to digital beamforming, a low-complexity semi-unitary hybrid beamforming algorithm is developed without requiring iterations. Computer simulations are used to demonstrate the effectiveness of the proposed systems, as compared with conventional HD systems.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127365310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Network Traffic Identification Technology for Big Data Platform","authors":"Wang Fei, Feng Jing","doi":"10.1109/iccsn.2018.8488315","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488315","url":null,"abstract":"In the information age, the problem about network security has been more and more serious. For the management of network traffic, the relevant network management agencies want to classify and identify various network traffic in order to supervise. However, more and more network traffic exist in the form of encryption, so that some malicious people damage it in virtue of the encrypted nature of the traffic. On the other hand, on account of the large capacity of the network traffic itself, traditional method for the data analysis can’t satisfy it. Therefore, it is necessary to import the platform of the big data. In this paper, we known about the differences of encrypted traffic and unencrypted traffic through the deep studying of the encrypted traffic at first. Secondly, we classify and analyze current technology about the recognition of encrypted traffic, and deduce the algorithm based on the information entropy recognition technology. Finally, we conduct the experiment about the encrypted traffic recognition technology in the big data platform, provides feasibility verification for network traffic research on big data platform, and make a prospect for the next step through the analysis of experimental result.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132038183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Box of Virtual Middleboxes Design and Implementation in Software Defined Networking","authors":"Fang Aijun, T. Bulega, Ding Shoulei","doi":"10.1109/iccsn.2018.8488214","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488214","url":null,"abstract":"The purpose of this paper is to introduce a box of packages containing application models of virtual middleboxes based hypervisor technology and to propose a standard container (box) program with a virtual appliance. The net element of physical hardware is the virtual middleboxes applying virtual appliance of open virtualization format (OVF) package for business application service. It is software-defined networking (SDN) based on network management theory, NFV implementation, and cloud computing service concept. It addresses flexible, elastic, and on-demand self-service of the out-of-the-box service platform. Applications packaged with operating system in the virtual appliance are pre-configured software stack. They can be loaded into virtual middleboxes anywhere, enabling flexible rapid distribution and deployment to meet customized user needs. In this study, the virtual appliance container is x86-based server hardware with installed hypervisor virtualization platform.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NSA-CSIPSO: Satellite Navigation Signal Acquisition Method Based on Compressed Sensing Using Improved Particle Swarm Optimization","authors":"Qing Li, Lige Zhang, Xiaolin Qin, Weiyi Chen","doi":"10.1109/iccsn.2018.8488308","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488308","url":null,"abstract":"Satellite navigation impacts military, civil, and other scientific areas at a mass level. However, despite destroying satellites directly, electromagnetic interference has become a main destruct way especially when acquiring satellite navigation signal in wartime. To avoid this issue, an adaptive-antenna beam forming algorithm based on direction of angle (DOA) estimation and anti-jamming compressed sensing (CS) technology was proposed in this paper, where spatial azimuth of sparsity signal can be acquired from the terminal of satellite navigation, with the advantage of compression and sampling of sparse signal. To improve this algorithm, the method, improved Particle Swarm Optimization (IPSO), was added to the acquisition of navigation signal. Simulation experiments show that this satellite Navigation Signal Acquisition method based on Compressed Sensing using improved Particle Swarm Optimization (NSA-CSIPSO) can ensure the accuracy of signal restoration in satellite navigation while reducing the space-required data from the receiver, which provides a new view of designing anti-jamming receiver in the future.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133979857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Application Awareness Framework Based on SDN and Machine Learning: Defining the Roadmap and Challenges","authors":"Hamed Z. Jahromi, D. Delaney","doi":"10.1109/iccsn.2018.8488328","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488328","url":null,"abstract":"Software Defined Networking (SDN) has presented a unique networking paradigm to develop network innovations and address the issues discovered by distributed network architectures. This paper aims to address challenges involved in introducing application aware network framework using an arbitrary performance metric and preparing network information for machine learning (ML) analysis. The main goal of this is to automate application specific resource allocation and orchestration.A key facet of the framework is utilizing an application feedback interface to the SDN's Northbound Interface which can receive, during runtime, an arbitrary performance metric from an application and characterizes this in accordance with the network path features, thus making it unique among the literature. The metric describes how well the application is performing in its performance goals. The framework analyses and translates this metric into network features allowing a network manager to calculate the effect of network decisions on application goals.To achieve this the framework utilizes centralized SDN architecture, collects and prepares network information that is better predisposed for ML analysis.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Elkamchouchi, M. Shawky, Ali E. Takieldeen, I. M. Fouda, M. M. Khalil, A. Elkomy, A. K. AbdElrasol
{"title":"A New Image Encryption Algorithm Combining the Meaning of Location with Output Feedback Mode","authors":"H. Elkamchouchi, M. Shawky, Ali E. Takieldeen, I. M. Fouda, M. M. Khalil, A. Elkomy, A. K. AbdElrasol","doi":"10.1109/iccsn.2018.8488233","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488233","url":null,"abstract":"Encryption is very essential to secure data in multimedia and communication systems. This paper represents a new concept for image encryption using a new method based on the Meaning of Location (MOL) and the Output Feedback Mode (OFB). In this method, the public key is an image which will be converted into RGB numbers and the private key is random integers used to permutate the image. The initialization vector of the “OFB” mode is going to be encrypted using the locations of the RGB numbers. Security analysis of the proposed algorithm has been measured and approved its strength. Statistical tests show that the MOL-OFB algorithm is suitable for securing multimedia applications and it has the potential to secure communication systems in a variety of wired/wireless scenarios such as mobile phone services and smartcards.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xi Fang, Yueyang Yu, Li Li, Jifang Jin, Lifeng Wang, Lei Zhang, Xianwei Gao
{"title":"Poly Phase Network OFDM/OQAM for Optical Communication System","authors":"Xi Fang, Yueyang Yu, Li Li, Jifang Jin, Lifeng Wang, Lei Zhang, Xianwei Gao","doi":"10.1109/iccsn.2018.8488215","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488215","url":null,"abstract":"Orthogonal frequency division multiplexing offset quadrature amplitude modulation (OFDM/OQAM) could provide high spectral efficiency with the eliminating of cyclic prefixed (CP) inserted in conventional OFDM systems. For optical OFDM/OQAM, real filed orthogonal condition guaranteed by the using of the filter bank could combat the inter symbol interference (ISI) induced by chromatic dispersion (CD) and polarization mode dispersion (PMD). However, the constructing of the filter bank is more comprehensive than conventional OFDM modulation. For this approach, the complexities induced by the filtering of the information symbols with the prototype filter brought constraints to the implementation of the optical OFDM/OQAM systems. In this paper, we introduced poly phase network (PPN) OFDM/OQAM to optical communication systems for the first time. With the using of the PPN OFDM/OQAM, the generating of the odd and the even OFDM/OQAM blocks could be performed separately. The convolution approach could be replaced by the multiplication of the PPN OFDM/OQAM symbols with the prototype filter. With the using of the PPN method, the computational complexities of the transmitter and the receiver for optical OFDM/OQAM system could be decreased significantly. As shown in the Montel Carlo simulation results, PPN OFDM/OQAM employing the prototype filter with promising time-frequency-localization (TFL) property provided promising transmission performance for optical communication systems.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122187816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Cryptographic Scheme with Dynamic Key","authors":"Yuxin Wu, Jing Wang","doi":"10.1109/iccsn.2018.8488320","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488320","url":null,"abstract":"Internet of things (IoT) devices have been widely used, but their communication security is easily overlooked. Moreover, some data collected by the IoT devices may lead to the breach of users’ privacy. In order to ensure secure communication between IoT nodes and servers, we propose a Iightweight cryptographic scheme with dynamic key. In this scheme, pseudo stream cipher is put forward for simplifying key synchronization and data encryption, which can effectively reduce the consumption of the IoT nodes. The mutual authentication, session key synchronization and updating are completed through several encrypted communications respectively. Meanwhile, the key length and update cycle are variable to prevent attacks. We compared the scheme’s security and performance with some Iightweight authentication and cryptographic schemes. According to the analysis, the proposed scheme can provide more security features with low overhead of communication which is suitable for protect communication security of IoT nodes with limited resources and power.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xi Fang, Yueyang Yu, Cheng Zhao, Lei Zhang, Jianxin Wang, Xianwei Gao
{"title":"Pilot Power Optimization Based Channel Estimation Method for Optical OFDM/OQAM","authors":"Xi Fang, Yueyang Yu, Cheng Zhao, Lei Zhang, Jianxin Wang, Xianwei Gao","doi":"10.1109/iccsn.2018.8488282","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488282","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) combined with offset quadrature amplitude modulation (OQAM) have become the hot research topic recently. OFDM/OQAM utilizes the specially designed filter bank with promising time-frequency localization (TFL) property to overcome inter-symbol-interference (ISI). However, the orthogonal condition for OFDM/OQAM only holds in the real field. Optical OFDM/OQAM systems faced with serious intrinsic imaginary interference (IMI) effect induced by chromatic dispersion (CD) and polarization mode dispersion (PMD), which decreased the transmission performance significantly. In this paper, we proposed a pilot power optimization based channel estimation method to improve the system robustness against IMI effect for optical OFDM/OQAM systems. The general pilot design criterion has been proposed in this paper, and numerous pilot structures reported in previous publications have been compared with the proposed method. As demonstrated in the simulation results, the pseudo pilot structures satisfying the proposed structure could obtain optimal pseudo pilot power, which could improve the system robustness against IMI effect and amplified spontaneous emission (ASE) evidently.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}