2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)最新文献

筛选
英文 中文
A MOGA-Markov chain optimized ranking algorithm for wireless access networks in heterogeneous environment 异构环境下无线接入网络的MOGA-Markov链优化排序算法
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993804
Qazi Zia Ullah, F. Ullah, F. W. Karam, H. Shahzad, Sungchang Lee
{"title":"A MOGA-Markov chain optimized ranking algorithm for wireless access networks in heterogeneous environment","authors":"Qazi Zia Ullah, F. Ullah, F. W. Karam, H. Shahzad, Sungchang Lee","doi":"10.1109/ICUFN.2017.7993804","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993804","url":null,"abstract":"The mounting customer demands for bandwidth-desirous services are deriving for a cost effective, robust, and high capacity wireless access network. The end users expect a satisfactory and economical delivery of “Quad-play” applications (voice, video, data, and mobility) and rich-media applications (multimedia, interactive gaming, and meta-verse) over the wireless network. In last two decades, a remarkable evolution of wireless networks is observed. Moreover, after the advent of software defined radio enabled wireless sets, the selection of the optimum wireless access network for different applications (live video streaming, online gaming voice calling and browsing) is gaining vital importance. In this paper, a ranking algorithm based on Markov chain optimized learning approach is formulated for the heterogeneous environment. The algorithm is designed on the basis of most important Quality of Service (QoS) parameters like throughput, delay/error and cost. The proposed technique is robust against the change in number of available networks where, previously proposed techniques TOPSIS, VIKOR and RafoQ are unable to handle the change in available networks adequately. The Simulation results verify the selection of optimal access network for varying applications conforming to defined ranking algorithm.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126879639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the antenna efficiency of coexisting networks with broadcast and point-to-point channels (Invited Paper) 广播和点对点信道共存网络的天线效率研究(特邀论文)
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993962
Feng Liu, Dengfei Kang, Cong-gai Li, Liansun Zeng
{"title":"On the antenna efficiency of coexisting networks with broadcast and point-to-point channels (Invited Paper)","authors":"Feng Liu, Dengfei Kang, Cong-gai Li, Liansun Zeng","doi":"10.1109/ICUFN.2017.7993962","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993962","url":null,"abstract":"We investigate the coexisting network of hybrid broadcast and point-to-point channels, where there is a public message required by each receiver except its own private message in the broadcast channel. Based on distributed zero-forcing approach, the minimum antenna configuration is deduced, under the condition of least antennas at each receiver. Then we propose a linear transceiver design for the network. Performance analyses including the antenna efficiency and achievable rate are provided and further validated by simulations.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction of optical camera communication for Internet of vehicles (IoV) 车联网(IoV)光学摄像头通信介绍
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993760
Amirul Islam, Md. Tanvir Hossan, Y. Jang
{"title":"Introduction of optical camera communication for Internet of vehicles (IoV)","authors":"Amirul Islam, Md. Tanvir Hossan, Y. Jang","doi":"10.1109/ICUFN.2017.7993760","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993760","url":null,"abstract":"In this paper, we have introduced optical camera communication (OCC) as a new technology for internet of vehicles (IoV). OCC has already been established in many areas which can also be used in vehicular communication. There have some researches in the field of OCC-based vehicular communication but these are not mature enough. Here, we have proposed a new system which will provide great advantages to the vehicular system. We proposed a combination of OCC and cloud-based communication for IoV which will ensure secure, stable, and system. We have also proposed an algorithm to provide cloud based IoV service.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123482921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An approach to integrate quantum key distribution technology into standard secure communication applications 一种将量子密钥分配技术集成到标准安全通信应用中的方法
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993926
Y. Tanizawa, R. Takahashi, H. Sato, A. Dixon
{"title":"An approach to integrate quantum key distribution technology into standard secure communication applications","authors":"Y. Tanizawa, R. Takahashi, H. Sato, A. Dixon","doi":"10.1109/ICUFN.2017.7993926","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993926","url":null,"abstract":"Quantum Key Distribution (QKD) technology provides unconditional secure cryptography key sharing between two separate sites based on the laws of physics. With the shared keys, applications are able to communicate with each other in an information theoretically secure manner. We propose a method for providing secure communication that selects between QKD-based security and standard cryptography-based security automatically according to the current amount of QKD keys stored by QKD. The proposed method provides a QKD-based secure communication function. However, in the case of a shortage of QKD keys stored, the method alternatively provides a standard cryptography-based secure communication function to avoid a communication delay. Since the method has an OpenSSL-compatible interface, that is, a de facto standard cryptography library for secure communication, it makes it easy to port existing secure communication applications developed with the OpenSSL library to QKD-ready applications. It could also make it possible to phase QKD technology into existing secure communication applications. The quantitative performance evaluation showed the secure session establishment delay. Although the result reveals that the proposed method increases the session establishment delay, the delay overhead of the proposed cryptography method selection is 7 msec., which is acceptable for some practical applications. In addition, the result also shows that the delay difference from the standard cryptography can be reduced when the standard cryptography uses a larger key.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126802727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An experimental study of security for service function chaining 业务功能链安全的实验研究
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993906
Van-Ca Nguyen, Anh-Vu Vu, Kyoungjae Sun, Younghan Kim
{"title":"An experimental study of security for service function chaining","authors":"Van-Ca Nguyen, Anh-Vu Vu, Kyoungjae Sun, Younghan Kim","doi":"10.1109/ICUFN.2017.7993906","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993906","url":null,"abstract":"In recent years, service function chaining (SFC) has been developed besides software-defined networking (SDN) and network function virtualization (NFV), which open new opportunities for flexible provisioning and composition of network services. However, the adoption of SFC requires various security considerations to protect sensitive information in context headers of the network service header (NSH). In this paper, we discuss various SFC encapsulation methods to protect the context headers of the NSH exchanged among service functions. We then implement the SFC encapsulation methods as secure solutions for the context header in NSH. Finally, we conduct an experimental study based on OpenDaylight SFC as an SFC controller and OVS as a data plane to compare the performance of the solutions in term of end-to-end latency.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementation of optimal greenhouse control: Multiple influences approach 实施最优温室控制:多重影响方法
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993788
Dong-Hee Noh, Su-Yong An, Jaeyoung Kim
{"title":"Implementation of optimal greenhouse control: Multiple influences approach","authors":"Dong-Hee Noh, Su-Yong An, Jaeyoung Kim","doi":"10.1109/ICUFN.2017.7993788","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993788","url":null,"abstract":"Recently, many educated farmers have adopted automated greenhouse control systems to increase productivity while reducing their labor cost in greenhouse management. In this paper, to increase level of automation, we propose a reliable greenhouse control system that runs without human intervention based on multi-variable control scheme, which concurrently takes various inner and outer environmental factors into account. To cool or heat a greenhouse in an efficient way, we introduce a cooling and a heating load being calculated from sunlight level, outer temperature, and wind speed as well as inner temperature. Each actuator is then controlled by its own control parameters which are tightly associated with these load amounts. The proposed control scheme has been tested in a real greenhouse, and experimental results showed that inner temperature was consistently controlled according to users setting while obtaining minimum number of actuator operations (i.e., ventilation, curtain, and heater).","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124994865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
p-BORE: Prioritized beacon repetition and contention window selection based MAC protocol in underwater wireless sensor networks 基于优先信标重复和竞争窗口选择的水下无线传感器网络MAC协议
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993790
Eunbae Moon, Sungwon Lee, M. A. Yaqub, Dongkyun Kim
{"title":"p-BORE: Prioritized beacon repetition and contention window selection based MAC protocol in underwater wireless sensor networks","authors":"Eunbae Moon, Sungwon Lee, M. A. Yaqub, Dongkyun Kim","doi":"10.1109/ICUFN.2017.7993790","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993790","url":null,"abstract":"The interest of Underwater Senor Networks (UWSNs) has increased recently due to the numerous applications in ocean exploration, submarine detection, intruder detection, etc. The protocols available for terrestrial networks cannot be used due to the salient features of UWSNs such as a high error ratio, long propagation delay, high packet loss and low data rate. Considering the uniqueness of UWSNs, proposing new energy efficient protocols for UWSNs is required. In this paper, we therefore propose a new MAC protocol called prioritized BeacOn REpetition and Contention Window Selection based MAC protocol (p-BORE) to conserve the energy and to give the priority for good link quality to transmit preferentially.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple information collection with frequency offset compensation by utilizing physical wireless parameter conversion sensor network (PHY-C SN) 利用物理无线参数转换传感器网络(PHY-C SN)进行频率偏移补偿的多重信息采集
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993787
Koji Kakinuma, T. Fujii, O. Takyu, M. Ohta
{"title":"Multiple information collection with frequency offset compensation by utilizing physical wireless parameter conversion sensor network (PHY-C SN)","authors":"Koji Kakinuma, T. Fujii, O. Takyu, M. Ohta","doi":"10.1109/ICUFN.2017.7993787","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993787","url":null,"abstract":"Information collection in wireless sensor network is applied to various application such as home automation, smart grid, environmental monitoring and so on. However, it takes much time to collect information from multiple sensor nodes by packet communication. In order to collect sensing information rapidly, physical wireless parameter conversion sensor network (PHY-C SN) has been studied. In PHY-C SN, the sensing information is converted to correspond subcarrier numbers of orthogonal frequency division multiplexing (OFDM) signals and the positional information is converted to time slot for transmitting. Fusion center which is an information collection node can receive multiple OFDM subcarriers simultaneously. Therefore, easier and faster information collection can be realized in PHY-C SN. However, only a kind of information collection in PHY-C SN has been studied. Thus, the method to collect various information in PHY-C SN is proposed in this paper. Moreover, frequency offset compensation in the proposed method is also considered. The effectiveness of the proposed method is evaluated by computer simulation.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131534727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perceived risks, role, and objectified trustworthiness information in the sharing economy 共享经济中的感知风险、角色与客观可信信息
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993803
Y. Yoon, Hyun-Woo Lee
{"title":"Perceived risks, role, and objectified trustworthiness information in the sharing economy","authors":"Y. Yoon, Hyun-Woo Lee","doi":"10.1109/ICUFN.2017.7993803","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993803","url":null,"abstract":"Trust plays a central role of the sharing economy because there exist potential risks in P2P transactions. To mitigate those risks, both host and guest can utilize the Objectified trustworthiness information (OTI), which is not identical to reputation because higher reputation does not always mean he is trustworthy. This study aims at analyzing factors influencing the adoption intention of OTI with regard to various factors of perceived risk, role (host versus guest), usage experience, gender, and age. The regression analysis results reveal that young guests are likely to adopt OTI to mitigate perceived risk than aged hosts.","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133902389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function 基于Shamir秘密共享方案和Keccak哈希函数的256位ECC-RFID系统实现
2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) Pub Date : 2017-07-01 DOI: 10.1109/ICUFN.2017.7993768
Ayad Al-Adhami, M. Ambroze, I. Stengel, M. Tomlinson
{"title":"A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function","authors":"Ayad Al-Adhami, M. Ambroze, I. Stengel, M. Tomlinson","doi":"10.1109/ICUFN.2017.7993768","DOIUrl":"https://doi.org/10.1109/ICUFN.2017.7993768","url":null,"abstract":"The applications of using multi-tag RFID technology have rapidly grown to be used in different fields of life. However, security and privacy are the main issues with this technology. In RFID multi-tags applications, a number of tags need to be securely authenticated. Although, various authentication protocols have been proposed, most of these protocols still lack of providing enough security and privacy levels. In order to overcome the security and privacy issues, this paper discusses the implementation of high-performance 256 bit elliptical curve cryptography (ECC) based system with ElGamal threshold cryptosystem. The security and privacy levels are ensured by providing a 256 bit ECC with Shamir Secret sharing scheme to distribute secure information amongst multiple RFID tags. For ensuring integrity of the data, the Keccak hash function has been used in the authentication phases","PeriodicalId":284480,"journal":{"name":"2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134499935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信