{"title":"Dynamic resource allocation using reinforcement learning for LTE-U and WiFi in the unlicensed spectrum","authors":"Ying-Ying Liu, S. Yoo","doi":"10.1109/ICUFN.2017.7993829","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993829","url":null,"abstract":"The growing demand for spectrum resources and the limited licensed spectrum have led to widespread concern about the coexistence of LTE and WiFi in the unlicensed spectrum. Since LTE and WiFi are two different systems, many solutions have been proposed to solve their coexistence problems, including the coexistence scheme based on blank subframe allocation. This paper presents a scheme that uses Q-learning algorithm to dynamically allocate blank subframes so that both LTE-U and WiFi system can successfully coexist. To support the proposed scheme, we introduce a new LTE-U frame structure, which can not only allocate blank subframes but also reduce the LTE delay. Simulation results show that the proposed approach can effectively improve the overall system performance in terms of the utilization of spectrum.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126285569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youngjun Kim, Hyungoo Choi, Kiwon Hong, Minkyu Joo, Jinwoo Park
{"title":"Fast handoff by multi-beacon listening in IEEE 802.11 WLAN networks","authors":"Youngjun Kim, Hyungoo Choi, Kiwon Hong, Minkyu Joo, Jinwoo Park","doi":"10.1109/ICUFN.2017.7993909","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993909","url":null,"abstract":"It has been a challenging issue to support delay-sensitive multimedia applications in IEEE 802.11 wireless LAN (WLAN) because the current WLAN handoff procedure is subject to a long handoff delay. To improve mobility support, we propose an access point (AP) multi-channel multi-beacon scheme. In the proposed scheme, mobile stations (MSs) keep listening beacons transmitted periodically from the neighbor APs during beacon period to decide which AP is to be connected for service continuity. Numerical results show that our scheme has lower handoff delay time and is suitable for mobile multimedia applications.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jasper Meynard P. Arana, Mohammed Saquib Khan, Y. Cho
{"title":"Random access preamble design for 5G millimeter-wave cellular systems with multiple beams","authors":"Jasper Meynard P. Arana, Mohammed Saquib Khan, Y. Cho","doi":"10.1109/ICUFN.2017.7993812","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993812","url":null,"abstract":"A random access (RA) technique that is suitable for millimeter-wave cellular systems with multiple beams is proposed in this paper. A new random access preamble (RAP) is proposed to reduce the RA duration by carrying the information on beam IDs (BIDs) as well as preamble ID (PID). The properties of the RAPs such as the constant amplitude, correlation, false-alarm probability, and detection probability are analyzed for RA in a multi-user environment. It is shown by simulation that the proposed RAP is well-suited for mm-wave cellular systems with multiple beams because of its high detection probability in a multi-user environment and shorter processing time.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129963756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ROI-Based forwarding strategy for named data delay tolerant networking","authors":"Li Wang, Ru Li, Bo Cui","doi":"10.1109/ICUFN.2017.7993752","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993752","url":null,"abstract":"How to obtain content efficiently is one of the challenges in NDDTN (Named Data Delay Tolerant Networking). Previous studies indicate that using social properties can improve availability of forwarding data packets. In this paper, a forwarding strategy, called RIF based on ROI (Region of Interest) is proposed for NDDTN. RIF selects relay nodes according to similarity and adjacency of ROI sets. This paper uses real mobility traces to evaluate RIF, and simulation results indicate that RIF reduces the difference of delivery ratio of about 50 percent between PLBR and epidemic, and has lower delay and overhead ratio than PLBR.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. G. Kibria, M. Jarwar, Sajjad Ali, Sunil Kumar, I. Chong
{"title":"Web objects based energy efficiency for smart home IoT service provisioning","authors":"M. G. Kibria, M. Jarwar, Sajjad Ali, Sunil Kumar, I. Chong","doi":"10.1109/ICUFN.2017.7993747","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993747","url":null,"abstract":"Reducing energy consumption while satisfying user living comfort is a challenging issue in IoT environment for utilities and service providers. Energy consumption needs to be reduced without compromising user comfort that depends not only on current environment condition but also real world knowledge, history data and user preferences. Web Objects based IoT environment allows objects virtualization and use of semantic ontology to create real world knowledge and applies cognitive functionalities to learn user preferences. Web Objects based IoT environment allows integration of connected objects and isolation of information from multiple application domains. Depending on user current situation, location, time, history data and future prediction, energy efficiency on WoO make intelligent decision to offer services for user comfort living and reduce energy consumption. This paper proposes an architecture that supports Web Objects based energy efficiency for smart home IoT services. To realize knowledge-based intelligent IoT services, a use case scenario has been studied.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133004513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indoor localization using magnetic field anomalies and inertial measurement units based on Monte Carlo localization","authors":"Haftu Wedajo Fentaw, Tae-Hyong Kim","doi":"10.1109/ICUFN.2017.7993743","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993743","url":null,"abstract":"Localization in indoor environments has become increasingly important for various applications which require precise indoor tracking and navigation. In this paper, a system employing magnetic field anomalies and inertial navigation systems is proposed to address the problem of indoor localization. The proposed system consists of a network of magnetometers, inertial measurement units (accelerometer and gyroscope) and motion detection as well as nearest neighbors algorithms incorporated inside Monte Carlo localization (MCL). From the experiments performed, it is found that every location in a given indoor environment has its own almost unique magnetic field value. And by integrating this local variation of magnetic field with MCL algorithm, infrastructure independent indoor localization system is presented. Furthermore, the simulation results show effective indoor localization is possible using the proposed techniques.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sung-Chan Choi, Nak-Myung Sung, Jong-Hong Park, Il-Yeop Ahn, Jaeho Kim
{"title":"Enabling drone as a service: OneM2M-based UAV/drone management system","authors":"Sung-Chan Choi, Nak-Myung Sung, Jong-Hong Park, Il-Yeop Ahn, Jaeho Kim","doi":"10.1109/ICUFN.2017.7993739","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993739","url":null,"abstract":"Recently, commercial Unmanned Aerial Vehicles (UAVs) called drones have received a lot of interest in the public and civil environments for their possibility as a potential enabler of promising services such as traffic monitoring, ad hoc network establishment in a disaster area, parcel delivery, remote sensing and streaming on various service scenarios. However, in order to support those services smoothly, a stable and reliable UAV/drone control and management system is needed. Utilizing a standard-based communication scheme is helpful in realizing efficient control and management of UAV/drone-based operations. Regarding this issue, the oneM2M global standard, which provides machine-to-machine (M2M) and the Internet of Things (IoT) service layer for globally interoperable M2M/IoT solutions, has paramount benefit. In this paper, we present oneM2M global standard platform based UAV/drone management system based on the Interworking Proxy Entity (IPE) for drones. We also show our implementation and demonstration for the oneM2M based UAV/drone management system.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117086791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized implementation of chaskey MAC on 16-bit MSP430","authors":"Garam Lee, Hwajeong Seo, Taehwan Park, Howon Kim","doi":"10.1109/ICUFN.2017.7993930","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993930","url":null,"abstract":"Message Authentication Code (MAC) algorithms, which ensure an integrity of packet messages, play a critical role in emerging Internet of Things (IoT) environment. However, IoT devices are only with very limited storage, energy, computation power. For this reason, many studies have been conducted to achieve an optimized MAC implementations on IoT devices. In this paper, we propose a compact implementation of Chaskey algorithm on the 16-bit MSP430 processor. For optimized implementation, we suggest methods including addressing mode, optimized rotation left operation, operation elimination, additional branch statement, and loop unrolling. Our implementations are fairly evaluated in FELICS Triathlon framework. In the scenario 0, the speed and code optimized encryptions are 80 cycles faster and 120 bytes smaller than previous state-of-the-art, respectively. Similarly, we achieved the further optimized results in scenario 1 and scenario 2.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129731153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Federated policy management engine for reliable cloud computing","authors":"Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour","doi":"10.1109/ICUFN.2017.7993931","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993931","url":null,"abstract":"Cloud computing is a relatively emerging concept of providing dramatically scalable and virtualized IT resources. The lack of novel security controls for the cloud might arise from the fact that cloud computing is the convergence of many different technological areas, including virtualization and service oriented architectures. One of the most challenging issues in clouds is to provide an appropriate level of security for the virtualized infrastructure. Indeed, each individual cloud user needs to be granted reliable security level(s) based on defined details of SLA. In this paper, a federated policy-based resource classification model has been presented to classify and manage security levels in clouds and to provide efficient mapping between access requests and defined policies of each cloud node. This federation helps to decrease the processing power of evaluating each access request. Moreover, the process of mapping requests to target nodes is more efficient by clustering cloud nodes based on common policies. The reliability and efficiency of this policy-based classification schema have been evaluated by scientific performance, security and competitive analysis.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain based approach to enhance big data authentication in distributed environment","authors":"N. Abdullah, Anne Håkansson, E. Moradian","doi":"10.1109/ICUFN.2017.7993927","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993927","url":null,"abstract":"Existing authentication protocols for Big Data system such as Apache Hadoop is based on Kerberos. In the Kerberos protocol, there are numerous security issues that have remained unsolved; replay attacks, DDoS and single point of failure are some examples. These indicate potential security vulnerabilities and Big Data risks in using Hadoop. This paper presents drawbacks of Kerberos implementations and identifies authentication requirements that can enhance the security of Big Data in distributed environments. The enhancement proposed is based on the rising technology of blockchain that overcomes shortcomings of Kerberos.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131167435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}