{"title":"PSO-Based Rendezvous Point Selection for Delay Efficient Trajectory Formation for Mobile Sink in Wireless Sensor Networks","authors":"Anjula Mehto, S. Tapaswi, K. K. Pattanaik","doi":"10.1109/COMSNETS48256.2020.9027330","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027330","url":null,"abstract":"Data acquisition using mobile sink (MS) provides an effective solution to the energy-hole problem in wireless sensor network (WSN), caused during multi-hop data forwarding of sensor nodes towards the static sink. Rendezvous point (RP) selection to form the trajectory of MS is a very effective and popular way applied in this regard. In RP based methods, a set of designated sensor nodes act as RPs, and non-RP nodes transmit data towards the closest RPs. MS follows the trajectory formed using RPs to acquire sensory data from WSN. Traditional RPs selection methods neglect the data delivery delay, and the traffic rate constraints of the sensor nodes, which can affect the delay efficiency of the formed trajectory. This paper overcomes the challenge and considers data delivery delay, and the traffic rate constraints of sensor nodes during RPs selection to design the delay-efficient trajectory of MS. The trajectory formation problem is an NP-hard problem. A meta-heuristic like a particle swarm optimization (PSO) has already been proven to provide a feasible and promising way to solve this problem. This paper proposes a novel PSO-based RPs selection (PSO-RPS) method under the data delivery delay and the traffic rate constraints of the sensor nodes for delay-efficient data acquisition. Simulation results depict that the proposed PSO- RPS outperforms against the existing state-of-the-art methods in terms of various performance metrics, such as the number of RPs, trajectory length, and data acquisition latency.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sriraam, S. Sajeev, Rohit Joshi, Amogh Vithalkar, M. Bansal, Harshan Jagadeesh
{"title":"Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks","authors":"S. Sriraam, S. Sajeev, Rohit Joshi, Amogh Vithalkar, M. Bansal, Harshan Jagadeesh","doi":"10.1109/COMSNETS48256.2020.9027314","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027314","url":null,"abstract":"While 5G systems are being deployed across the globe in a phased manner, trust models for communication between the User Equipment (UE) and the core network play a vital role in fulfilling the network goals promised by 5G. Towards that end, the 5G - Authentication and Key Agreement (5G-AKA) protocol has been standardised by the 3GPP consortium after multiple iterations and corrective responses. Despite this progress, there is a requirement to collate information from multiple ETSI technical specifications and several research contributions to implement a standardised security architectural model for 5G networks. Identifying the absence of single point repository containing 5G security protocols, this demonstration provides first hand collation and description of state-of-the-art details in simple and unified manner. In this demonstration, we implement the 3GPP compliant 5G-AKA protocol on a network of XBee S2C devices wherein the protocol involves a sequence of modules involving secure authentication, key exchange and payload transmission. To implement the security protocol, we extract the precise recommendations of 3GPP and also use open source algorithms wherever the implementation is left open as proprietary solution. Other than implementing standard modules from 3GPP specifications, we also showcase novel key exchange and provenance-recovery mechanisms that potentially fit the 5G standards in the framework of device-to-device (D2D) communication.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132786759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure and Privacy-Preserved Road Condition Monitoring System","authors":"Barnana Baruah, Subhasish Dhal","doi":"10.1109/COMSNETS48256.2020.9027482","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027482","url":null,"abstract":"Connected vehicular cloud computing (CVCC), a combination of VANETs and cloud computing, is recently emerged as a promising paradigm for road condition monitoring task. However, for the efficient utilization of the advantages of CVCC, there is a necessity to look into the security and privacy requirements of this system. A vehicle needs to be authenticated for the genuinity of its road condition monitoring report. Also, there is a need to preserve privacy against the trusted but curious agents of the cloud server. Wang et al. recently proposed a cloud-based road condition monitoring scheme, and attempted to tackle these issues. Unfortunately, we discovered that this scheme has critical security and privacy issues that must be addressed. Since, the Roadside Units (RSUs) that have been used in their scheme are trusted but curious, they may collude with each other and successfully reveal some sensitive information like the trajectory of the vehicle user. Moreover, their scheme fails to provide anonymity and unlinkability for the vehicle user. Furthermore, an attacker can be successful to induce forged emergency case through replay attack. Apart from these security and privacy issues, the cloud server in their scheme cannot segregate a threshold number of current reports, from a threshold number of the combination of old and current reports. This paper proposes a secure and privacy-preserved road condition monitoring system. The security analysis of the proposed system is performed, which ensures that the proposed system is secure.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116520316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DeepMines: A fog Enabled Prediction Platform for Underground Coal Mines","authors":"Sunny Sanyal, Animesh Chattopadhyay","doi":"10.1109/COMSNETS48256.2020.9027454","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027454","url":null,"abstract":"The underground mining industry observes enormous losses in terms of human lives and infrastructure every year due to fatal fire hazards and blasts caused due to methane accumulation. When the methane levels are high, the methane monitoring systems deployed inside the mines don't provide sufficient time to remove the accumulated methane gas and thus remains only one option of halting the work and evacuation of the workers. Therefore, the mining industry suffers a loss of productivity due to frequent evacuations, power terminations, and false alarms caused by conventional monitoring systems. This paper advocates an alternate paradigm of forecasting rather than detection, which ensures that the system gets sufficient time to take necessary measures to remove the accumulated methane gas without completely halting the work. The paper presents a fog computing enabled ioT data aggregation and accident prediction framework for high-stress underground mining scenarios that predict fatal accidents due to high methane accumulation using Deep LSTM encoder-decoder architecture. The experimental results show that the proposed solution can classify accidental scenarios at an accuracy of 94.23 percent along with a satisfactory long-duration future time series prediction.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132275301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Vorugunti, Prerana Mukherjee, Viswanath Pulabaigari
{"title":"Online Signature Profiling using Generative Adversarial Networks","authors":"C. Vorugunti, Prerana Mukherjee, Viswanath Pulabaigari","doi":"10.1109/COMSNETS48256.2020.9027369","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027369","url":null,"abstract":"A signature is an ability learned by humans from an elementary age. The skill to generate one's own exclusive signature along with imitating another writer's signature is a challenging and complex task. In real time scenarios like E-Commerce and M-Commerce payments, user verification based on online signatures constrain the verification framework needs to be trained extensively with huge samples, which unfeasible to obtain. Hence, as a solution, in this paper, we propose a first its of kind of attempt in which an intelligent framework tries to learn the online signatures of a writer using Deep Generative Adversarial Networks (DGANs). Thorough experimental analysis on three widely used datasets MCYT-100, SVC, SUSIG confirms the supremacy of the method and boost confidence in real time deployment of our framework in data centric applications like offline signature verification, forged document detection, etc.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133102144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive Radio Networks with Energy Harvesting and Eavesdropping-Emulation Resilience","authors":"A. Banerjee, S. Maity","doi":"10.1109/COMSNETS48256.2020.9027337","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027337","url":null,"abstract":"Spectrum scarcity, limited power and coverage, reliable data transmission, security threats, etc. are few challenges in future 5G enabling wireless transceiver nodes. Cognitive radio (CR) while looks promising to address spectrum scarcity problem, energy harvesting (EH) would then provide operation sustainability, thus integration leads to EH-enabled CR network (CRN). Since spectrum sensing (SS) and secondary data transmission are two key issues in a CR system, primary user emulation attack (PUEA) and eavesdropping are the two common security threats in any CRN. Thus a CR system design needs opportunistic sharing for reliable data transmission with sustainable network operation in presence of such security threats. A CRN model is proposed here that includes a set of transmit-receive node pairs of secondary users (SUs) to share primary user (PU) spectrum, one fusion center (FC), one PUEA node, an eavesdropper node and multiple cooperative jammers to countermeasure the effect of eavesdropping. Protection in eavesdropping is done by selecting the best friendly jammer that minimizes the signal-to-interference plus noise ratio at the eavesdropper. The objective of this study is to maximize the sum secondary throughput of the network under the constraints of meeting the sensing reliability of PU, individual energy causality for each SU and friendly jammer, interference at PU receiver, individual secondary and secrecy outage probability. Simulation result show the efficacy of the proposed scheme.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shared Memory Enabled Service Plane Optimization","authors":"Subramanian Ramanathan, Jeslin Puthenparambil","doi":"10.1109/COMSNETS48256.2020.9027436","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027436","url":null,"abstract":"Applications and services that Edge technologies offer has made critical the efficient implementation and deployment of container-based network functions. The current SD- WAN applications make inefficient use of system resources, and will greatly benefit from rearchitecting the packet flow. We demonstrate our service plane optimization with the Snort application hosted as a container on Cisco Cloud Services Router (CSR).","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Real-Time Edge Computed Occupancy Estimation in an Indoor Environment","authors":"Anirban Das, R. Gupta, Suchetana Chakraborty","doi":"10.1109/COMSNETS48256.2020.9027463","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027463","url":null,"abstract":"Sensing the presence of occupants and estimating the occupancy level in an indoor environment are the fundamental requirements for various applications performing remote monitoring, home automation and optimal resource planning. Data generated from a set of passive heterogeneous sensors deployed for this purpose are multimodal and streaming in nature. This work aims to formulate the human occupancy estimation in an indoor environment as a multi-class problem and proposes a edge-based data management framework for human occupancy estimation. The proposed framework is low-cost and light-weight in addition to being capable of performing real-time inference. Also testbed experimentation results is provided to justify the performance of the proposed scheme.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srikrishna Acharya, B. Amrutur, Yogesh L. Simmhan, Aditya Gopalan, Parimal Parag, Himanshu Tyagi
{"title":"CORNET: A Co-Simulation Middleware for Robot Networks","authors":"Srikrishna Acharya, B. Amrutur, Yogesh L. Simmhan, Aditya Gopalan, Parimal Parag, Himanshu Tyagi","doi":"10.1109/COMSNETS48256.2020.9027459","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027459","url":null,"abstract":"This paper describes CORNET, a co-simulation middleware for applications involving multi-robot systems like a network of Unmanned Aerial Vehicle (UAV) systems. Design of such systems requires knowledge of the flight dynamics of UAVs and the communication links connecting UAVs with each other or with the ground control station. Besides, UAV networks are dynamic and distinctive from other ad-hoc networks and require protocols that can adapt to high-mobility, dynamic topology and changing link quality in power constrained resource platforms. Therefore, it is necessary to co-design the UAV path planning algorithms and the communication protocols. The proposed co-simulation framework integrates existing tools to simulate flight dynamics and network related aspects. Gazebo with robot operating system (ROS) is used as a physical system UAV simulator and NS-3 is used as a network simulator, to jointly capture the cyber-physical system (CPS) aspects of the multi-UAV systems. A particular aspect we address is on synchronizing time and position across the two simulation environments, and we provide APIs to allow easy migration of the algorithms to real platforms.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126136927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nishanth Subramanian, B. ShashwathaMitraG., J. P. Martin, K. Sekaran
{"title":"HTmRPL++ : A Trust-Aware RPL Routing Protocol for Fog Enabled Internet of Things","authors":"Nishanth Subramanian, B. ShashwathaMitraG., J. P. Martin, K. Sekaran","doi":"10.1109/COMSNETS48256.2020.9027387","DOIUrl":"https://doi.org/10.1109/COMSNETS48256.2020.9027387","url":null,"abstract":"With the proliferation of Fog computing, computation is moved to edge devices and is not based on a purely centralized approach. In a Fog computing network, the network topology is dynamic. New nodes will join and leave. One of the major issues in Fog computing is trust. Trust is the level of assurance that an object will behave in a satisfactory manner. The Routing Protocol for Low Power and Lossy Networks (RPL) is a protocol used for routing in IoT networks. RPL provides meager protection against routing or other forms of attacks. The resource-constrained nature of Fog nodes prevents the use of heavyweight cryptographic algorithms to achieve secured communication. A lightweight mechanism is thus essential to impart security in Fog-IoT networks. Trust analysis provides a behavior-based analysis of entities in the system with the power to predict future behavior. In this paper, a lightweight Recommendation based Trust Mechanism is proposed to impart security to RPL.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127950562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}