2019 International Conference on Advanced Communication Technologies and Networking (CommNet)最新文献

筛选
英文 中文
Software Defined Networking for Energy Efficient Wireless Sensor Network 节能无线传感器网络的软件定义网络
Mohamed Saad Azizi, M. L. Hasnaoui
{"title":"Software Defined Networking for Energy Efficient Wireless Sensor Network","authors":"Mohamed Saad Azizi, M. L. Hasnaoui","doi":"10.1109/COMMNET.2019.8742362","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742362","url":null,"abstract":"Wireless sensor networks (WSNs) consist of individual nodes that interact with the environment by sensing and controlling physical parameters such as temperature, pressure and humidity. Considering the energy constraint of nodes in WSNs considerable effort has been taken to design efficient routing protocol in order to prolong the lifetime of WSNs. Clustering is an effective procedure for prolonging the lifetime of the network. Recently, Software Defined Networking (SDN) has been identified as a promising network paradigm for WSNs. In this paper, we present an overview of WSNs as well as SDN. We discuss some recent works that merges SDN with WSNs. Then, we propose our two energy efficient routing protocols to extend wireless sensor network Lifetime. The first contribution we are using clustering method with classical approach. The second contribution we propose a new approach by using SDN paradigm. In this case we are doping part of advanced node by energy in order to play as SDN controller. The simulations result show that our protocol with classical approach outperforms DEEC and SEP. In the other hand the SDN protocol outperform our classical protocol. Finally, we discuss our approach as perspective on how to use and develop communication protocol by using SDN controller.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126489100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Achievable Ergodic Capacity Under F Composite Fading Conditions F复合衰落条件下可实现遍历容量
P. Sofotasios, Seong Ki Yoo, S. Cotton, S. Muhaidat, F. J. López-Martínez, J. M. Romero-Jerez, K. Mezher, G. Karagiannidis
{"title":"Achievable Ergodic Capacity Under F Composite Fading Conditions","authors":"P. Sofotasios, Seong Ki Yoo, S. Cotton, S. Muhaidat, F. J. López-Martínez, J. M. Romero-Jerez, K. Mezher, G. Karagiannidis","doi":"10.1109/COMMNET.2019.8742378","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742378","url":null,"abstract":"The F composite fading model was recently proposed as an accurate and tractable statistical model for the characterization of the composite fading conditions encountered in realistic wireless communication scenarios. In the present contribution we capitalize on the distinct properties of this composite model to evaluate the achievable ergodic capacity over $F$ composite fading channels. To this end, we derive an exact closed-form expression for the ergodic capacity, which is subsequently used as a benchmark for the derivation of a tight approximation and a particularly accurate asymptotic representation for large average signal-to-noise ratio values. The derived analytic expressions are provided in closed-form and benefit from their analytical and numerical tractability. This enables the development of meaningful insights on the effect of fading conditions of different severity levels on the overall system performance. Also, it allows the accurate quantification of the signal to noise ratio required in target quality of service requirements under different composite fading conditions.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130114930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A High Capacity Geometrical Domain Based 3D Image Steganography Scheme 一种基于几何域的高容量三维图像隐写方案
Sara Farrag, Wassim Alexan
{"title":"A High Capacity Geometrical Domain Based 3D Image Steganography Scheme","authors":"Sara Farrag, Wassim Alexan","doi":"10.1109/COMMNET.2019.8742346","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742346","url":null,"abstract":"As a result of the tremendous advances in digital communications and media, 3D models have become the core of various applications in diverse fields. Consequently, these models can be utilized in steganography acting as secure and innocent host media for sheltering covert data. In this paper, Blowfish encryption algorithm is performed on the secret data for a higher security level. Then, a geometrical domain based steganography method is implemented, where the polygons of triangular meshes of various Stanford 3D models are slightly modified so that they hold the secret data. The proposed method is found robust against geometrical attacks on 3D models such as rotation, uniform scaling and translation. Furthermore, it has the capability to reveal the secret data blindly. The performance of this proposed algorithm is measured and compared to its counterparts from the literature. The numerical results are a superb indicator for a reliable high capacity message security scheme.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133338353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Triple-Layer Image Security Using a Zigzag Embedding Pattern 使用之字形嵌入模式的三层图像安全
Sara Farrag, Wassim Alexan, Hisham H. Hussein
{"title":"Triple-Layer Image Security Using a Zigzag Embedding Pattern","authors":"Sara Farrag, Wassim Alexan, Hisham H. Hussein","doi":"10.1109/COMMNET.2019.8742345","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742345","url":null,"abstract":"This paper proposes a triple-layer, high capacity, message security scheme. The first two layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In the first layer, AES-128 encryption is performed on the secret message. In the second layer, a chaotic logistic map encryption is applied on the output of the first secure layer to increase the security of the scheme. In the third layer of security, a 2D image steganography technique is performed, where the least significant bit (LSB) -embedding is done according to a zigzag pattern in each of the three color planes of the cover image (i.e. RGB). The distinguishing feature of the proposed scheme is that the secret data is hidden in a zigzag manner that cannot be predicted by a third party. Moreover, our scheme achieves higher values of peak signal to noise ratio (PPSNR), mean square error (MSE), the structural similarity index metric (SSIM), normal cross correlation (NCC) and image fidelity (IF) compared to its counterparts form the literature. In addition, a histogram analysis as well as the high achieved capacity are magnificent indicators for a reliable and high capacity steganographic scheme.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115764239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Substitution Box Design Based on Chaotic Maps and Cuckoo Search Algorithm 基于混沌映射和布谷鸟搜索算法的替换盒设计
Tanveer Akhtar, Nizamuddin, Jamal Uddin
{"title":"Substitution Box Design Based on Chaotic Maps and Cuckoo Search Algorithm","authors":"Tanveer Akhtar, Nizamuddin, Jamal Uddin","doi":"10.1109/COMMNET.2019.8742391","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742391","url":null,"abstract":"The widespread use of the Internet for transmission of data demands the well-defined data protection algorithms. Symmetric block cipher protects the digital information from the un-authorized recipient. The cryptographic strength of symmetric cipher mainly depends on substitution box (S-box). So the main challenge is to create an S-box with higher value of nonlinearity. Meta-heuristic optimization algorithm has been applied to create a secure S-box. In this paper, a design scheme based on chaotic maps and Cuckoo Search Algorithm (CSA) is proposed to enhance the non-linearity of S-box. Chaotic maps are widely used to create secure S-box due to their aperiodic nature. The proposed idea produced an S-box with non-linearity 109.25, which strengthens the cipher security against linear attacks. The results are compared with the recently created S-boxes and the S-boxes obtained using meta-heuristic algorithms such as Ant Colony Optimization (ACO), Genetic Algorithm (GA) and Firefly algorithm (FA). The obtained S-box is evaluated against cryptographic criteria such as bijectivity, nonlinearity, strict avalanche criteria, bit independence criteria, linear probability and differential probability.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129747579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
BER Analysis in Relay-Based DF Cooperative Diversity Systems Over Rayleigh Fading Channels with Non-Identical Interferers Near the Destination 基于中继的DF协同分集系统在瑞利衰落信道下的误码率分析
M. Al-Mistarihi, Rami Mohaisen, Khalid A. Darabkh
{"title":"BER Analysis in Relay-Based DF Cooperative Diversity Systems Over Rayleigh Fading Channels with Non-Identical Interferers Near the Destination","authors":"M. Al-Mistarihi, Rami Mohaisen, Khalid A. Darabkh","doi":"10.1109/COMMNET.2019.8742388","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742388","url":null,"abstract":"A considerable amount of attention has been drawn by Adaptive relaying schemes of cooperative diversity networks. This attention has been garnered because of the efficient way in which allocation of channel resources is implemented in these networks. In cooperative networks, the incremental relaying gets use of feedback channels from a certain destination. The major reasoning of doing this is basically for utilizing the relay at the case where when the immediate way (direct path) from source to goal is in blackout (outage). As a result, two received signals, of course at the destination side, will be certainly combined utilizing the Maximum Ratio Combiner (MRC) which typically prompts to enhancing the reception of the signal. In this article, a closed formula which concerns about the Bit Error Rate (BER) is derived considering incremental relaying uses Decode-and-Forward and Rayleigh fading channels. It likewise contemplates the impacts of various L non-indistinguishable interferers close to the destination. These impacts corrupt the performance of the system because of the existence of the Cochannel obstruction or interference. Analytical results are exhibited to integrate the assumptions.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128345792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Packet Scheduling in 4G and Beyond Networks Using Cross-Layer Design Approach 利用跨层设计方法在 4G 及以上网络中调度数据包
Wisani Salani, Gbolahan Aiyetoro, F. Takawira
{"title":"Packet Scheduling in 4G and Beyond Networks Using Cross-Layer Design Approach","authors":"Wisani Salani, Gbolahan Aiyetoro, F. Takawira","doi":"10.1109/COMMNET.2019.8742383","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742383","url":null,"abstract":"The fourth generation (4G) and beyond networks are designed to provide high transmission rates, low latency and spectrum efficient radio access to a rapidly growing number of mobile devices. There are varying traffic demands with different quality of service (QoS) requirements from different set of evolving mobile devices. The optimal and efficient way to use radio resources remains a critical area of study to cover the exponential growth of network services. It is therefore very important to design an effective packet scheduling scheme that will provide a good trade-off among throughput, fairness and QoS. This paper proposes a cross-layer based packet scheduling scheme that will efficiently allocate radio resources to achieve maximal throughput and spectral efficiency without serious compromise to QoS and fairness. A heuristic approach to develop the algorithm is detailed out together with simulation setup and results.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130685564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The 2nd International Conference on Advanced Communication Technologies and Networking (CommNet'19) 第二届国际先进通信技术与网络会议(CommNet'19)
{"title":"The 2nd International Conference on Advanced Communication Technologies and Networking (CommNet'19)","authors":"","doi":"10.1109/commnet.2019.8742373","DOIUrl":"https://doi.org/10.1109/commnet.2019.8742373","url":null,"abstract":"","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132267049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines 使用面向方面的状态机管理云环境中的安全策略
Meryeme Ayache, A. Khoumsi, M. Erradi
{"title":"Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines","authors":"Meryeme Ayache, A. Khoumsi, M. Erradi","doi":"10.1109/COMMNET.2019.8742348","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742348","url":null,"abstract":"Cloud Computing is the most suitable environment for the collaboration of multiple organizations via its multi-tenancy architecture. However, due to the distributed management of policies within these collaborations, they may contain several anomalies, such as conflicts and redundancies, which may lead to both safety and availability problems. On the other hand, current cloud computing solutions do not offer verification tools to manage access control policies. In this paper, we propose a cloud policy verification service (CPVS), that facilitates to users the management of there own security policies within Openstack cloud environment. Specifically, the proposed cloud service offers a policy verification approach to dynamically choose the adequate policy using Aspect-Oriented Finite State Machines (AO-FSM), where pointcuts and advices are used to adopt Domain-Specific Language (DSL) state machine artifacts. The pointcuts define states' patterns representing anomalies (e.g., conflicts) that may occur in a security policy, while the advices define the actions applied at the selected pointcuts to remove the anomalies. In order to demonstrate the efficiency of our approach, we provide time and space complexities. The approach was implemented as middleware service within Openstack cloud environment. The implementation results show that the middleware can detect and resolve different policy anomalies in an efficient manner.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130892406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GIS Based Fuzzy Analytic Hierarchy Process for wind Energy Sites Selection 基于GIS的风能选址模糊层次分析法
F. Elmahmoudi, O. Abra, A. Raihani, O. Serrar, L. Bahatti
{"title":"GIS Based Fuzzy Analytic Hierarchy Process for wind Energy Sites Selection","authors":"F. Elmahmoudi, O. Abra, A. Raihani, O. Serrar, L. Bahatti","doi":"10.1109/COMMNET.2019.8742365","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742365","url":null,"abstract":"Site wind farm choosing is a critical element in constructing a wind power generation, that's why determining the ideal location for a wind farm is a complicated process which encounters decision makers. Multi-criteria decision making (MCDM) approach based on geographic information system (GIS) is used for selecting the best location for wind energy by assigning suitable rating to the criteria with regards to their relative importance and calculating weight of each criterion. Accordingly, Analytical Hierarchy Process (AHP) and Fuzzy Analytical Hierarchy Process (FAHP) were proposed. Analytical Hierarchy Process (AHP) is one of the easy methods for choosing a criterion among a large number of criteria. Fuzzy AHP is a developed extension of classical AHP. In this study an analogy is made between Analytic Hierarchy Process (AHP), the Buckley's Fuzzy-AHP algorithm and geometric mean Fuzzy-AHP method for selecting wind farm. The selection is managed by using six criteria such as land use, wind speed, urban area, distance to power lines, distance to roads and slope. The three approaches have been compared on the same hierarchy structure and criteria set and the three methods result display that the wind and slope have the highest priority.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133875413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信