Mounia Bouabdellah, Faissal El Bouanani, D. B. D. Costa, P. Sofotasios, H. Ben-Azza, K. Mezher, S. Muhaidat
{"title":"On the Secrecy Analysis of Dual-Hop Underlay Multi-Source CRNs with Multi-Eavesdroppers and a Multi-Antenna Destination","authors":"Mounia Bouabdellah, Faissal El Bouanani, D. B. D. Costa, P. Sofotasios, H. Ben-Azza, K. Mezher, S. Muhaidat","doi":"10.1109/COMMNET.2019.8742354","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742354","url":null,"abstract":"In this paper, the physical layer security in cognitive radio networks (CRNs) is investigated. We consider an underlay relay assisted CRN consisting of multiple secondary sources, multiple-antenna destination, a single relay, and multiple eavesdroppers. The destination node performs the maximal-ratio combining under uncorrelated Rayleigh fading channels. In more details, we consider, a secondary source is randomly selected to transmit its data, and a jammer is chosen from the remaining source nodes to send a jamming signal to the eavesdroppers. The closed-form expression of the secrecy outage probability is derived, based on the statistical characteristics of the communication channels, under the primary user's quality of service constraint. The derived analysis gives deep insights into the impact of network parameters on the performance of on the secrecy outage performance. Analytic results are corroborated through Monte Carlo simulation.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127345676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet) Proceedings [Copyright notice]","authors":"","doi":"10.1109/commnet.2019.8742350","DOIUrl":"https://doi.org/10.1109/commnet.2019.8742350","url":null,"abstract":"","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117003993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An access authentication algorithm based on a hierarchical identity-based signature over lattice for the space-ground integrated network","authors":"Zhuo Yi, Xuehui Du, Ying Liao, Xin Lu","doi":"10.1109/COMMNET.2019.8742367","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742367","url":null,"abstract":"Access authentication is a key technology to identify the legitimacy of mobile users when accessing the space-ground integrated networks (SGIN). A hierarchical identity-based signature over lattice (L-HIBS) based mobile access authentication mechanism is proposed to settle the insufficiencies of existing access authentication methods in SGIN such as high computational complexity, large authentication delay and no-resistance to quantum attack. Firstly, the idea of hierarchical identity-based cryptography is introduced according to hierarchical distribution of nodes in SGIN, and a hierarchical access authentication architecture is built. Secondly, a new L-HIBS scheme is constructed based on the Small Integer Solution (SIS) problem to support the hierarchical identity-based cryptography. Thirdly, a mobile access authentication protocol that supports bidirectional authentication and shared session key exchange is designed with the aforementioned L-HIBS scheme. Results of theoretical analysis and simulation experiments suggest that the L-HIBS scheme possesses strong unforgeability of selecting identity and adaptive selection messages under the standard security model, and the authentication protocol has smaller computational overhead and shorter private keys and shorter signature compared to given baseline protocols.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124856329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samia El Haddouti, Mohamed Dâfir Ech-Cherif El Kettani
{"title":"Analysis of Identity Management Systems Using Blockchain Technology","authors":"Samia El Haddouti, Mohamed Dâfir Ech-Cherif El Kettani","doi":"10.1109/COMMNET.2019.8742375","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742375","url":null,"abstract":"The emergence of Blockchain technology as the biggest innovations of the 21stcentury, has given rise to new concepts of Identity Management to deal with the privacy and security challenges on the one hand, and to enhance the decentralization and user control in transactions on Blockchain infrastructures on the other hand. This paper investigates and gives analysis of the most popular Identity Management Systems using Blockchain: uPort, Sovrin, and ShoCard. It then evaluates them under a set of features of digital identity that characterizes the successful of an Identity Management solution. The result of the comparative analysis is presented in a concise way to allow readers to find out easily which systems satisfy what requirements in order to select the appropriate one to fit into a specific scenario.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124190601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet) [Front cover]","authors":"","doi":"10.1109/commnet.2019.8742347","DOIUrl":"https://doi.org/10.1109/commnet.2019.8742347","url":null,"abstract":"","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123126873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing-Plan duplicator: A reliable assistant for safe and seamless migration toward SDN","authors":"M. B. Lehocine, Salim Djaaboub, M. Batouche","doi":"10.1109/COMMNET.2019.8742352","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742352","url":null,"abstract":"Recently, Software-Defined Networks (SDNs) paradigm became a very interesting area for both researchers in academia and executive-boards in industry. The main goals of SDN are to improve the network performances, to allow more flexibility in controlling and managing networks and to enrich the network services via customizable network applications. In order to migrate, partially or fully, from a traditional network toward an SDN network, the network administrators are required to guarantee the consistency of the IP addressing scheme along with the routing plan. This is to fulfill a safely transit, responding to the business or research needs. In this paper, we present a new approach allowing to restore automatically the routing plan from traditional networks based on extending a topology discovery algorithm. The gathered data are then used to configure automatically the SDN routing applications through the exposed REST APIs. The proposed solution ensures a seamless and reliable layer-three migration, which saves time and prevents human errors.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve R2L Attack Detection Using Trimmed PCA","authors":"Zyad Elkhadir, Archi Taha, M. Benattou","doi":"10.1109/COMMNET.2019.8742361","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742361","url":null,"abstract":"Due to the large growth of modern network traffic in term of size and complexity, intrusion detection systems have shown a lot of limits such as the detection rate deterioration and the rising of false positive rate. To overcome this problem, we have to eliminate the noisy content within the original high dimensional data by exploiting a feature extraction method. In literature, many publications proposed to use Principal Component Analysis (PCA). However, this method has an important limitation. The estimated general mean vector is prone to outliers. In this paper, to alleviate this issue, we suggest to exploit the trimmed mean with different percentages. Many experiments on NSL-KDD show a promising results.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123043581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Renzhi Yuan, Jianshe Ma, Ping Su, Yuhan Dong, Julian Cheng
{"title":"An Importance Sampling Method for Monte-Carlo Integration Model for Ultraviolet Communication","authors":"Renzhi Yuan, Jianshe Ma, Ping Su, Yuhan Dong, Julian Cheng","doi":"10.1109/COMMNET.2019.8742366","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742366","url":null,"abstract":"This paper improves the Monte-Carlo integration model for multiple scattering channel of ultraviolet communication. An importance sampling method is introduced to improve the convergence speed of the original Monte-Carlo integration model. We compare the convergence speed and calculation speed of the proposed Monte-Carlo integration model based on importance sampling, the original Monte-Carlo integration model based on uniform sampling and a widely used Monte-Carlo simulation model. Simulation results show that the computation efficiency of the proposed model is about 9.6 times of the original Monte-Carlo integration model and is about 4.35 times of the Monte-Carlo simulation model.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajalekshmi Kishore, Sanjeev Gurugopinath, S. Muhaidat, P. Sofotasios, K. Mezher, O. Dobre, N. Al-Dhahir
{"title":"Superior Selective Reporting-Based Spectrum Sensing in Energy Harvesting-Aided HCRNs","authors":"Rajalekshmi Kishore, Sanjeev Gurugopinath, S. Muhaidat, P. Sofotasios, K. Mezher, O. Dobre, N. Al-Dhahir","doi":"10.1109/COMMNET.2019.8742385","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742385","url":null,"abstract":"In the present contribution we investigate the performance of superior selective reporting (SSR) for cooperative spectrum sensing in an energy harvesting-enabled multi-channel heterogeneous cognitive radio network (HCRN). To this end, we first analyze the throughput of the SSR and the optimal conventional cooperative sensing (CCS). Then, we formulate a nonlinear integer programming problem to find a throughput-optimal set of spectrum sensors scheduled to sense a particular channel, under primary user (PU) interference and energy harvesting constraints. In this context, we derive a solution based on the cross entropy (CE) method, and compare its performance with the exhaustive-search method counterpart. Furthermore, we study the tradeoff between the channel available time and detection accuracy of the SSR and CCS schemes. It is shown that this inherent tradeoff is between the channel available time and the detection accuracy. Furthermore, it is shown that as the number of spectrum sensors increases, the channel available time turns out to be the system's limiting factor in HCRNs.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128196793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Meter Band Rate Mechanism to Improve the Native QoS Capability of OpenFlow and OpenDaylight","authors":"M. Breiki, Suiping Zhou, Y. Luo","doi":"10.1109/COMMNET.2019.8742360","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742360","url":null,"abstract":"The exponential growth of mobile connected devices with advanced multimedia features imposes a requirement to enhance quality of service (QoS) from heterogeneous systems and networks. In order to satisfy mission-critical multimedia QoS requirements new generation mobile networks must present content-optimized mechanisms in order to use valuable network resources efficiently and provide QoS requirements for each application. This research explores a novel solution for quality of service performance for streaming mission-critical video data in OpenFlow SDN networks. A Meter Band Rate Evaluator (MBE) Mechanism is proposed based on a new band rate description language to improve the native QoS capability of OpenFlow and OpenDaylight. Its design and development are presented and the mechanism is verified through a simulated experiment in an SDN testbed. The results revealed a significant percentage increase in QoS performance when the MBE was enabled. These findings provide support and validation for the effectiveness of the MBE to enhance the native capability of OpenFlow and OpenDaylight for efficient QoS provision.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}