Sainandan Bayya Venkata, Prabhakara Yellai, Gaurav D. Verma, A. Lokesh, K. Adithya, Siva Sankara Sai Sanagapati
{"title":"A new Light Weight Transport Method for secured transmission of data for IoT","authors":"Sainandan Bayya Venkata, Prabhakara Yellai, Gaurav D. Verma, A. Lokesh, K. Adithya, Siva Sankara Sai Sanagapati","doi":"10.1109/ANTS.2016.7947775","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947775","url":null,"abstract":"With increase in deployment of the Internet of Things (IoT) devices, there has been an increasing concern regarding security issues with these IoT devices. The limited processing capabilities of these devices pose a serious limitation for the application of conventional security algorithms in these devices. This paper discusses a new Light Weight Transport Method (LWTM) which uses existing Advanced Encryption Standard-Counter (AES_CTR) and Advanced Encryption Standard-Cipher Block Chaining (AES_CBC) algorithms in a way to reduce computational time drastically for IoT applications involving large data. This method can be beneficial in many applications where the data is not entirely sensitive but at the same time the security cannot be compromised.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132731985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic adaptive reconfiguration in virtual optical bus networks","authors":"S. Singh, R. Manivasakan","doi":"10.1109/ANTS.2016.7947824","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947824","url":null,"abstract":"We investigate the planning of virtual optical bus (VOB) networks-as a packet-oriented all-optical solution for transport networks-under changing traffic conditions. The planning of a VOB network consists of grouping all edge-to-edge flows in the network into clusters called VOBs, and that has to be done with the objective of minimizing packet collision rate in the optical network. With the dynamic traffic, the planning should be iterated each time the traffic demand changes, and this requires excessive reconfiguration of already established optical buses. To address this issue, we present a heuristic algorithm called dynamic VOB network layout design (DVNLD) that progressively adapts an initially designed VOB network to traffic changes, while minimizing the required reconfiguration of established VOBs in the network. We also numerically analyze the proposed algorithm and show its effectiveness in adaptation to traffic variations and in reducing the required number of reconfigurations.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116904180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the MitM vulnerability in mobile banking applications for android devices","authors":"S. Kaka, V. N. Sastry, R. Maiti","doi":"10.1109/ANTS.2016.7947811","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947811","url":null,"abstract":"One of the primary concerns that the developers of mobile banking applications should strive to is to ensure the security of user information originating from any of these applications. However, implementing even basic security features, like performing encryption on user data or using HTTPS while connection establishment, on such mobile applications, is often found to be absent either due to the lack of knowledge of user security concerns, or unavailability of security testing experts who can point out the security flaws in the applications. In this paper, we consider man-in-the-middle (MitM) attack, a simple yet powerful attack, as a primary attack to test basic security features that a mobile banking application should impose. We have considered a total of 19 mobile banking applications on Android that are currently got deployed by public sector banks in India and are used by their respective customers. Surprisingly, the In about 90% of these banking applications, we have observed that the attack can be launched with ease even if the applications are using security protocols like HTTPS to establish a communication channel with their respective servers. Moreover, some mobile applications are using simple HTTP protocol to transfer user information without bothering anything about security. Hence, our analysis suggests that a level of revision is required to address the basic security flaws in the mobile banking applications to prevent even simple MitM attack.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"4 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120840545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software-defined mobility in IP based Wi-Fi networks: Design proposal and future directions","authors":"Krishna Vijay Kumar Singh, M. Pandey","doi":"10.1109/ANTS.2016.7947808","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947808","url":null,"abstract":"Current networking devices are limited in their capabilities to dynamically adjust their behaviour with respect to the location changes induced by the mobility of communicating partners. This adversely affects the performance of applications running on top of IP-based wireless networks. Software Defined Networks (SDN) provide the strength of network programability which facilitates on-demand customization of underlying network according to the application context. In this paper, we propose our methodology for seamless mobility in IP-based Wi-Fi networks using SDN. Our solution works for both layer-2 and layer-3 mobility scenarios and is able to cater the needs of Wi-Fi networks. We have evaluated our approach with respect to handover delay, route establishment delay, data loss and throughput both for UDP and TCP traffic. Emulation results obtained establish the applicability of our approach.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127145352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bhattacharjee, Sourav Kanta, Saket Modi, Madhumita Paul, S. Bit
{"title":"Disaster messenger: An android based infrastructure less application for post disaster information exchange","authors":"S. Bhattacharjee, Sourav Kanta, Saket Modi, Madhumita Paul, S. Bit","doi":"10.1109/ANTS.2016.7947806","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947806","url":null,"abstract":"Natural disasters take its toll on traditional communication infrastructure severely causing intermittent network connectivity due to partially or fully damaged communication infrastructure. Therefore, data dissemination is hampered and the volunteers and different disaster management agencies find it difficult to communicate among them. Fortunately, a sizeable population (around 35%–45%) these days owns various wireless devices like smart phones, tablets etc. with multiple communication interfaces (Bluetooth, Wi-Fi Direct). These devices with their alternative communication capabilities can be harnessed in a disaster aftermath in order to disseminate situational information. However, the procedure to disseminate such information through these devices should be simple enough so that minimal technical expertise is required from the user end. Several Android based applications are available which offers data forwarding service based on Wi-Fi direct. All such applications provide only unicast mode of communication while lacking to provide multicast and broadcast services. In this paper we provide a complete solution Disaster Messenger, an Android based application which allows the volunteers to disseminate information in absence of network infrastructure (through Wi-Fi direct) in unicast, multicast and broadcast mode. We perform rigorous field experiments to evaluate the performance of Disaster Messenger by varying movement speeds of the nodes and distance between the nodes. We also evaluate its performance in terms of energy efficiency. The comparison of the Disaster Messenger with a couple of well-known file sharing applications namely SHAREit and BitTorrent Sync reveals that Disaster Messenger outperforms SHAREit and BitTorrent Sync in terms of energy efficiency and data transfer rate in unicast mode. Due to unavailability of any competing application which supports multicast and broadcast services, we have not been able to compare the performance of our application for the said services.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"703 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122987197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigation of beam blocking in mmWave indoor WPAN using dynamic control delegation based approach","authors":"Arijit Bhattacharjee, R. Bhattacharjee, S. Bose","doi":"10.1109/ANTS.2016.7947846","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947846","url":null,"abstract":"The mmWave band of frequencies suffer from very poor diffraction capabilities which results in their high susceptibility towards beam blocking. Thus, the devices connected on a mmWave based communication network can communicate only through their line-of-sight (LoS) neighbors which makes it difficult for their deployment in indoor environments (e.g. residential households, offices etc). Additionally, the presence of non-stationery member nodes can create further difficulties in maintaining stable LoS links. In this paper, we discuss a novel approach involving dynamic control delegation (DCD) by a piconet controller to mitigate the problem of beam blocking. We propose some delegation based techniques which can be used by a piconet controller to address the problems of beam blocking and link instability to a significant extent. Finally, we validate our claim by evaluating the performance of the proposed techniques over different network scenarios.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Colman Meixner, G. Figueiredo, M. Fiorani, M. Tornatore, B. Mukherjee
{"title":"Resilient cloud network mapping with virtualized BBU placement for cloud-RAN","authors":"Carlos Colman Meixner, G. Figueiredo, M. Fiorani, M. Tornatore, B. Mukherjee","doi":"10.1109/ANTS.2016.7947790","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947790","url":null,"abstract":"Cloud Radio Access Network (C-RAN) will improve mobile radio coordination and resource efficiency by allowing baseband processing unit (BBU) functions to be virtualized and centralized, i.e., deployed in a BBU hotel. We consider a BBU hoteling scheme based on the concept of access cloud network (ACN). An ACN consists of virtualized BBUs (vBBUs) placed in metro cloud data centers (metro DCs). A vBBU is connected to a set of remote radio heads (RRHs). ACN resiliency against network and processing failures is critical for C-RAN deployments. Hence, in this study, we propose three protection approaches: 1+1 ACN protection, 1+1 ACN and vBBU protection, and partial ACN protection. Simulation results show that both 1+1 ACN and 1+1 ACN and vBBU protection requires large capacity for backup to provide 100% survivability for singlelink and single-DC failures. As a result, we suggest a partial ACN protection approach which provides degraded services with only 8% additional network resources.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122538412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An asynchronous algorithm for providing energy efficient coverage and connectivity in Wireless Sensor Networks","authors":"N. Ansari, U. Deshpande, S. P. Mohammad","doi":"10.1109/ANTS.2016.7947797","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947797","url":null,"abstract":"There are two major requirements for any surveillance application of Wireless Sensor Networks (WSN) — coverage and connectivity. In the design of any algorithm for WSN, the major constraint is limited battery life time of the sensor nodes. Most of the existing work on combined problem of coverage and connectivity either require the clocks of the nodes to be synchronized or require exact location information of the nodes to be known. In this paper, we present an Asynchronous Algorithm which is Energy Efficient and provides integrated Coverage and Connectivity, called (AAEECC). Our algorithm does not require clock synchronization of nodes at any stage neither does it require exact location information of the nodes. It is low cost, fully distributed and scalable. In the following, we discuss the approach used. First, we build a minimum hopcount graph for connectivity. Second, we propose a scheduling algorithm for providing desired coverage. Third, we define a fault tolerant connectivity maintenance algorithm (FTCM) to re-ensure connectivity as network may become disconnected due to scheduling.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122780644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dip Ghosh, Priya Roy, C. Chowdhury, S. Bandyopadhyay
{"title":"An ensemble of condition based classifiers for indoor localization","authors":"Dip Ghosh, Priya Roy, C. Chowdhury, S. Bandyopadhyay","doi":"10.1109/ANTS.2016.7947872","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947872","url":null,"abstract":"Radio frequency fingerprinting, based on Wi-Fi signals is a popular approach for indoor localization. Recently a few works have explored applicability of machine learning techniques to this problem. However, the challenging task of accurately finding the position depends on prior efforts of fingerprinting. Another challenge is that, distance sensitivity of signal strength depends on proximity to the access point. Heterogeneity of devices adds new dimension to the challenge. Existing solutions mostly aim at fingerprinting under the set of conditions considered so that training and test data can be taken under similar experimental setup. In this paper, an ensemble of condition based classifiers are designed for indoor localization that handles device heterogeneity, temporal heterogeneity and context heterogeneity (door and window open/close, presence/absence of other users in vicinity). We have created an indoor localization data set where data is collected in above mentioned dimensions. When the training and test data sets are taken under similar environmental conditions with same devices, the average classification accuracy ranges between 72.2% to 92.6%. But for a validation set which contains examples for every conditions, the classifiers achieve an average maximum accuracy of 74.8% when individual training set corresponding to specific conditions are used. To avoid these conditional dependencies we have used an ensemble of condition specific K-nearest neighbour classifiers which enables us to predict the location with 96% accuracy.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of OTN solutions for metro networks in Asia","authors":"Sourav Das, Anil Kumar Nagaraja, H. Sardesai","doi":"10.1109/ANTS.2016.7947810","DOIUrl":"https://doi.org/10.1109/ANTS.2016.7947810","url":null,"abstract":"We compare OTN (Optical Transport Network) solutions for two Asian networks by using muxponders (no OTN switching) and transponders (with OTN switching) solutions and find that in the presence of sub-10G clients, OTN switching can lower the network costs, in addition to its other advantages of digital restoration in the event of fiber cuts.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128094493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}