2019 International Conference on Advanced Communication Technologies and Networking (CommNet)最新文献

筛选
英文 中文
On the Physical Layer Security of a Regenerative Relay-Based mixed RF/UOWC 基于再生中继的混合射频/UOWC物理层安全性研究
Elmehdi Illi, Faissal El Bouanani, D. B. D. Costa, P. Sofotasios, F. Ayoub, K. Mezher, S. Muhaidat
{"title":"On the Physical Layer Security of a Regenerative Relay-Based mixed RF/UOWC","authors":"Elmehdi Illi, Faissal El Bouanani, D. B. D. Costa, P. Sofotasios, F. Ayoub, K. Mezher, S. Muhaidat","doi":"10.1109/COMMNET.2019.8742355","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742355","url":null,"abstract":"This paper investigates the secrecy outage performance of a dual-hop decode-and-forward (DF) mixed radio-frequency/underwater optical wireless communication (RF/UOWC) system. We consider a one-antenna source node ($S$), communicating with one legitimate destination node (D) via a multi-antenna DF relay (R) node. In this context, the relay node receives the incoming signal from $S$ via an RF link, which is subject to Rayleigh fading, then performes selection-combining (SC) followed by decoding and then re-encoding for transmission to the destination over a UOWC link, subject to mixture Exponential-Gamma fading. Under the assumption of eavesdroppers attempting to intercept the S-R (RF side), a closed-form expression for the secrecy outage probability is derived. Our analytical results are corroborated through computer simulations, which verifies their validity.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Clever Approach to Develop an Efficient Deep Neural Network Based IDS for Cloud Environments Using a Self-Adaptive Genetic Algorithm 一种利用自适应遗传算法开发基于深度神经网络的云环境IDS的聪明方法
Z. Chiba, N. Abghour, K. Moussaid, Amina El Omri, M. Rida
{"title":"A Clever Approach to Develop an Efficient Deep Neural Network Based IDS for Cloud Environments Using a Self-Adaptive Genetic Algorithm","authors":"Z. Chiba, N. Abghour, K. Moussaid, Amina El Omri, M. Rida","doi":"10.1109/COMMNET.2019.8742390","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742390","url":null,"abstract":"Nowadays, Cloud Computing is one of the fastest growing and most used computing paradigms in the IT field. It is a computational platform that integrates massive computing, storage and network resources into a unified pool of resources, and offers them online over Internet to customers in an on-demand and pay-per-use fashion with least involvement of the cloud service provider. This new archetype characterized by big data and distributed technology uses such technology as multi-tenancy and virtualization, which brings along vulnerabilities, sharing risks and lead to different matters related to security and privacy in cloud computing (CC). Therefore, it is essential to create an efficient intrusion detection system to detect intruders and suspicious activities in and around the CC environment by monitoring network traffic, while maintaining performance and service quality. In this work, we propose a clever approach using a self-adaptive genetic algorithm (SAGA) to build automatically a Deep Neural Network (DNN) based Anomaly Network Intrusion Detection System (ANIDS). SAGA is a variant of standard Genetic Algorithm (GA), which is developed based on GA improved through an Adaptive Mutation Algorithm (AMA). Our method consists of using SAGA with the purpose of looking for the optimal or near optimal combination of most relevant values of the parameters included in building of DNN based IDS or impacting its performance, like feature selection, data normalization, architecture of DNN, activation function, learning rate and Momentum term, which ensure high detection rate, high accuracy and low false alarm rate. CloudSim 4.0 simulator platform and Kyoto 2006+ dataset version 2015 were employed for simulation and validation of the proposed system. The experimental results obtained demonstrate that in comparison to several traditional and recent approaches, our proposed IDS achieves higher detection rate and lower false positive rate.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114701906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Secure 2D Image Steganography Using Recamán's Sequence 使用Recamán的序列安全2D图像隐写
Sara Farrag, Wassim Alexan
{"title":"Secure 2D Image Steganography Using Recamán's Sequence","authors":"Sara Farrag, Wassim Alexan","doi":"10.1109/COMMNET.2019.8742368","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742368","url":null,"abstract":"This paper presents a double -layer secure message scheme. The first layer is of a cryptographic nature, where the Data Encryption Standard (DES), CAST5 or Blowfish is firstly applied on the message bits for a higher security level. However, the second layer is of steganographic nature, where the encrypted data is hidden in the Least Significant Bits (LSB)s of a 2D cover image using Recamán's Sequence which determines the order of bytes to embed in. The performance of the proposed scheme is measured in terms of the maximum embedding capacity, the mean square error (MSE), the peak signal to noise ratio (PSNR) and the structural similarity index metric (SSIM), as well as histogram analyses, entropy measures and running time complexity.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129491068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
H.264/AVC Video Transmission over UWB AV PHY IEEE 802.15.3c using UEP and Adaptive Modulation Techniques 基于UEP和自适应调制技术的UWB AV PHY IEEE 802.15.3c上的H.264/AVC视频传输
A. Abdallah, Amin Zribi, A. Dziri, F. Tlili, M. Terré
{"title":"H.264/AVC Video Transmission over UWB AV PHY IEEE 802.15.3c using UEP and Adaptive Modulation Techniques","authors":"A. Abdallah, Amin Zribi, A. Dziri, F. Tlili, M. Terré","doi":"10.1109/COMMNET.2019.8742382","DOIUrl":"https://doi.org/10.1109/COMMNET.2019.8742382","url":null,"abstract":"In recent years, multimedia applications especially video applications has become more and more important. The video transmission via Wireless Multimedia Sensor Networks (WMSNs) needs high rate which motivated the use of Ultra Wide Band (UWB) Audio Visual (AV) PHY IEEE 802.15.3c. This paper proposes a robust video transmission of H.264/AVC baseline coding over UWB AV PHY IEEE 802.15.3c using Unequal Error Protection (UEP), Hierarchical Modulation and Adaptive modulation, which takes into consideration the importance of the different frames in the Group Of Pictures (GOP) and the sensitivity of the encoded bit stream to the transmission errors caused by the UWB wireless channel to improve the video quality reconstruction. Simulation results show that the proposed UEP scheme outperforms the Equal Error Protection (EEP) scheme by up to 15dB in terms of Average Peak Signal-to-noise Ratio (Average PSNR). It is also demonstrated that applying UEP with Hierarchical Modulation improves the Average PSNR by 15 dB and allocating different modulation orders allows an improvement of 20 dB on the Average PSNR reconstructed video quality.","PeriodicalId":274754,"journal":{"name":"2019 International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信