{"title":"Congestion load balancing game with losses","authors":"Babacar Toure, S. Paturel, E. Altman","doi":"10.1109/WINCOM50532.2020.9272491","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272491","url":null,"abstract":"We study the symmetric version of the load balancing game introduced by H. Kameda. We consider a non-splittable atomic game with lossy links. Thus costs are not additive and flow is not conserved (total flow entering a link is greater than the flow leaving it). We show that there is no unique equilibrium in the game. We identify several symmetric equilibria and show how the number of equilibria depends on the problem's parameters. We compute the globally optimal solution and compare its performance to the equilibrium. We finally identify the Kameda paradox which was introduced initially in networks without losses.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WINCOM 2020 Committees","authors":"J. B. Othman","doi":"10.1109/wincom50532.2020.9272413","DOIUrl":"https://doi.org/10.1109/wincom50532.2020.9272413","url":null,"abstract":"","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125947626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies","authors":"Hafsa Benaddi, Khalil Ibrahimi","doi":"10.1109/WINCOM50532.2020.9272464","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272464","url":null,"abstract":"Several anomaly detection systems prototypes are deployed to set up real-world solutions exclusively dedicated to the banking industry due to the high potentials of attacks. Exchanging highly security-sensitive data over a network between nodes requires high-security levels of IoT devices, representing a big challenge. Thus, many systems were developed to detect and predict any malicious activity. In our digital world, it is very challenging to master the fact that we, as a whole internet community, create an uncountable number of bytes of data every 24 hours. This truth leads researchers to explore and discover new technologies to handle massive data by ensuring individuals security and privacy. Inspired by this, our work supports researchers in this field by providing a selective overview of the most relevant findings investigating and proposing solutions on Intrusion Detection Systems (IDS) over the Internet of Thing (IoT). Furthermore, the Blockchain integration as the principal registry for safe data storage is well explained and detailed while covering security qualities that analyze and classify different confronted open challenges in this path.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"8 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132837038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zakariae Abbad, Ahmed Drissi El Maliani, Said Ouatik El Alaoui, M. Hassouni
{"title":"A Graph-based approach to derive the geodesic distance on Statistical manifolds: Application to Multimedia Information Retrieval","authors":"Zakariae Abbad, Ahmed Drissi El Maliani, Said Ouatik El Alaoui, M. Hassouni","doi":"10.1109/WINCOM50532.2020.9272434","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272434","url":null,"abstract":"In this paper, we leverage the properties of non-Euclidean Geometry to define the Geodesic distance (GD) on the space of statistical manifolds. The Geodesic distance is a real and intuitive similarity measure that is a good alternative to the purely statistical and extensively used Kullback-Leibler divergence (KLD). Despite the effectiveness of the GD, a closed-form does not exist for many manifolds, since the geodesic equations are hard to solve. This explains that the major studies have been content to use numerical approximations. Nevertheless, most of those do not take account of the manifold properties, which leads to a loss of information and thus to low performances. We propose an approximation of the Geodesic distance through a graph-based method. This latter permits to well represent the structure of the statistical manifold, and respects its geometrical properties. Our main aim is to compare the graph-based approximation to the state of the art approximations. Thus, the proposed approach is evaluated for two statistical manifolds, namely the Weibull manifold and the Gamma manifold, considering the Content-Based Texture Retrieval application on different databases.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122065390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concept of a TSN to Real-Time Wireless Gateway in the Context of 5G URLLC","authors":"Jannis Ohms, Martin Böhm, D. Wermser","doi":"10.1109/WINCOM50532.2020.9272460","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272460","url":null,"abstract":"Wireless real-time communication protocols enable lots of use-cases within Industry 4.0. As one of the three main components of the upcoming 5G advertises, Ultra-Reliable Low-Latency Communication (URLLC) should achieve a latency below 1ms. URLLC is part of release 17 of the 3GPP and is currently in specification which should be finished within 2022. Nevertheless, other wireless real-time technologies exist and can already be used for some of the use-cases. In the field of wired real-time communication, Time-Sensitive Networking (TSN), as an open-standard solution, is currently in development, after most of the standards have been released recently. The vision of moving the control of Cyber Physical Systems (CPS) into the cloud requires a combination of wireless and wired real-time communication. This paper investigates current wireless real-time technologies and presents first thoughts on a gateway to connect TSN with other wireless technologies.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"34 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Flauzac, Erick Mauricio Gallegos Robledo, Carlos Gonzalez, Fabien Mauhourat, F. Nolot
{"title":"SDN Architecture to prevent attacks with OpenFlow","authors":"O. Flauzac, Erick Mauricio Gallegos Robledo, Carlos Gonzalez, Fabien Mauhourat, F. Nolot","doi":"10.1109/WINCOM50532.2020.9272445","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272445","url":null,"abstract":"The impact of the Internet of Things (IoT) evolves rapidly, increasing the volume of traffic, and complicating the management of large scalable networks. Despite the security tools offered today, IoT devices are susceptible to many potential attacks. The introduction of software-defined networks (SDN) presents the opportunity for efficient management of threat detection and secure the protection of a network infrastructure. In this paper, we present the design and implementation of a network dynamic architecture including security policies and traffic monitoring decisions. In our approach, the intrusion and detection are performed by Suricata and the controller, automatically blocking attempted attacks using Openflow rules. We demonstrate the effectiveness of the proposed framework through the use of five attack scenarios. The performance results improve the rapid response time under possible attacks and flexible management of secure flow rules with Openflow.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114348504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of the monthly Runoff from precipitation and flow measurement networks using Artificial Neural Network","authors":"Said Rachidi, J. Alami, E. E. Mazoudi","doi":"10.1109/WINCOM50532.2020.9272514","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272514","url":null,"abstract":"The Ourika river originated in the High Atlas generate the average water resources of 157 Mm3/year, Since there is no dam in this river, the water supplies are regulated by traditional channels to irrigate 19 855 ha, hence the importance of developing runoff-rainfall model for water estimation in this context. In the presented study Artificial Neural Network is applied to forecast the monthly runoff in outlet of basin. This study uses runoff from two stations and monthly precipitation data recorded at measurement network composed of 5 stations located in Ourika basin during 15 years from 2000 to 2015. For evaluate the performance of model in the phases training and validation the appropriate statistical methods were used.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134360748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effectiveness of DCFM on different mobility models","authors":"Nadav Schweitzer, Ariel Stulman","doi":"10.1109/WINCOM50532.2020.9272467","DOIUrl":"https://doi.org/10.1109/WINCOM50532.2020.9272467","url":null,"abstract":"Simulation based network protocol testing requires that one model reality correctly. Mis-modelling can render results invalid. Hence, one must determine the context in which a solution is to be implemented for the results to be meaningful. In this work, we investigate whether the security augmentation technique DCFM (denial contradictions with fictitious nodes) for OLSR based mobile ad-hoc networks (MANET) is valid for multiple contexts. We accomplish this by running the node isolation attack and DCFM defense on a variety of mobility models, comparing the results. We show that for most models the technique performs well, while for a specific scenario (e.g. street based) it fails. Additionally we describe the infrastructure that was built to support the street based simulations.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}