2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)最新文献

筛选
英文 中文
Lightweight service announcement: The case for Wi-Fi M2M service providers 轻量级服务公告:Wi-Fi M2M服务提供商的案例
Guillaume Habault, P. Maillé, L. Toutain, A. Pelov, N. Montavont, P. Bertin
{"title":"Lightweight service announcement: The case for Wi-Fi M2M service providers","authors":"Guillaume Habault, P. Maillé, L. Toutain, A. Pelov, N. Montavont, P. Bertin","doi":"10.1109/ANTS.2013.6802884","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802884","url":null,"abstract":"Machine-to-Machine (M2M) technology enables to interconnect machines with the least possible human intervention. The nature of M2M traffic, small and periodic, is different from the traditional traffic originating from computers or mobile phones, big and bursty. However, the number of nodes involved in such technology impacts the network as it has mainly been designed for Human-to-Machine (H2M) communications. Due to the number of involved M2M nodes and their intrinsic constraints, the retrieval of M2M traffic with existing networks is a real challenge. In order to do so, the authors propose a lightweight service announcement architecture, re-using already deployed Wi-Fi networks. This solution extends information announced in the IEEE 802.11 beacon frame. It enables M2M devices to automatically detect the most appropriate network among the one discovered, reduces the amount of signaling messages exchanged to do so and consequently, the delay needed to collect this traffic. The feasibility study, based on real-world data, shows that the frequency of announcement, the amount of data to send and the available density of Access Points, have to be taken into account in order to use Wi-Fi networks to retrieve M2M traffic.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134432622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cooperative spectrum sensing with censoring of cognitive radios with majority logic fusion in Hoyt fading 霍伊特衰落中多数逻辑融合认知无线电的协同频谱感知与滤波
S. Nallagonda, Sanjay Dhar Roy, S. Kundu, G. Ferrari, R. Raheli
{"title":"Cooperative spectrum sensing with censoring of cognitive radios with majority logic fusion in Hoyt fading","authors":"S. Nallagonda, Sanjay Dhar Roy, S. Kundu, G. Ferrari, R. Raheli","doi":"10.1109/ANTS.2013.6802864","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802864","url":null,"abstract":"In this paper, the performance of cooperative spectrum sensing (CSS) is assessed in the presence of Hoyt fading. A cognitive radio (CR) user, which senses the primary users (PUs) using an energy detector (ED) in sensing channel (S-channel), is censored on the basis of the quality of the reporting channel (R-channel). A threshold-based censoring scheme is used: CR users, whose estimated R-channel fading coefficients towards the fusion center (FC) exceed a predefined threshold (denoted as censoring threshold), are allowed to transmit. Majority logic fusion is considered at the FC to estimate the performance in terms of average missed detection and total error probabilities for various values of the censoring threshold, the number of CRs, the false alarm probability, the average S-channel and R-channel signal-to-noise ratios (SNRs), under both perfect and imperfect channel coefficient estimations. The impact of the Hoyt fading parameter on the average missed detection probability is highlighted. Furthermore, an analytical expression for the probability of selection of CRs, in terms of the censoring threshold, is derived and validated with simulations.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133090684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient technique for detecting Skype flows in UDP media streams 在UDP媒体流中检测Skype流的有效技术
Tejmani Sinam, Irengbam Tilokchan Singh, Pradeep Lamabam, Nandarani Ngasham
{"title":"An efficient technique for detecting Skype flows in UDP media streams","authors":"Tejmani Sinam, Irengbam Tilokchan Singh, Pradeep Lamabam, Nandarani Ngasham","doi":"10.1109/ANTS.2013.6802872","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802872","url":null,"abstract":"As the use and popularity of VoIP applications grows, more and more Internet traffic are being generated by them. Many VoIP applications uses RTP to carry media traffic. Notable examples includes Gtalk, Google+ Hangouts, Asterisk based VoIP and Apple's FaceTime. On the other hand, Skype uses a proprietary protocol based on P2P architecture. It uses encryption for end to end communications and adopts obfuscation and anti reverse engineering techniques to prevent reverse engineering of the Skype protocol. This makes the detection of Skype flows a challenging task. Although Skype encrypts all communications, still a portion of Skype payload header known as Start of Message (SoM) is left unencrypted. In this paper, we develop an efficient technique for detection of Skype flows in UDP media streams. Our detection techniques relies on heuristics based on the information contained in Skype SoM and RTP headers.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134526333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Geometric information routing 几何信息路由
D. Papadimitriou, D. Colle, P. Audenaert, P. Demeester
{"title":"Geometric information routing","authors":"D. Papadimitriou, D. Colle, P. Audenaert, P. Demeester","doi":"10.1109/ANTS.2013.6802893","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802893","url":null,"abstract":"In response to the increasing traffic volume in the Internet for applications such as (mobile) video and cloud computing, various proprietary technologies enabling content distribution have been developed that rely on caching and replication. Being deployed in silos, it is not possible to uniquely and securely identify named information independently of the distribution channel; moreover, these different content distribution technologies are typically implemented as an overlay, leading to unnecessary inefficiency. By introducing uniquely named data and name-based data access, Information-Centric Networking (ICN) enables data to become independent from their network location, application, storage support but also means of content exchanges enabling in turn in-network caching and replication. However, content name spaces have not been designed to sustain forwarding performance and forwarders scaling contrary to IP addresses which can be efficiently aggregated, summarized and translated. Consequently, alternatives such as name-based routing, which aim at better accommodating information/ content routing in the Internet, would also become the scaling and performance bottleneck. To address these problems, this paper proposes a third alternative: geometric information routing on universal content locators. This technique operates by associating to content identifiers (names) a content locator taken out of a geometric coordinate space from which a routing path (more precisely, a geodesic) can be derived without requiring non-local information. Upon querying specific content multiple locators can be received enabling the receiver to select the (geometrically) closest locator. Since it is based on local information only, routing on such locator space is less memory consuming than non-local information dependent routing. We analyze the performance (in terms of memory space required to locally store routing states and the resulting routing path stretch) and compare them against path-vector routing.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133311556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient approach of backup reprovisioning for multiple link failures in WDM optical networks 一种有效的WDM光网络多链路故障备份重配置方法
Shashank S. Khasare, Yashkumar B. Joshi, Sanket M. Rathod, Amit D. Joshi
{"title":"An efficient approach of backup reprovisioning for multiple link failures in WDM optical networks","authors":"Shashank S. Khasare, Yashkumar B. Joshi, Sanket M. Rathod, Amit D. Joshi","doi":"10.1109/ANTS.2013.6802857","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802857","url":null,"abstract":"This paper investigates an approach for Backup re-provisioning using Shared Path Protection to combat against concurrent multiple failures scenarios. The MSPP approach used, considers the cost related to selection of a backup resource and tries to provide backup to maximum number of vulnerable connections. Secondly, MBR and GBR policies have been used interchangeably based upon the value of Re-provisioning Success Rate (RSR) to ensure optimal resource utilization. Results show that the new approach performs well in terms of Protection Efficiency, Resource Overbuild, Re-provisioning Success Rate and Service Disruption Ratio.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eigenvalue detection based method to mitigate PUEA in cognitive radio networks 基于特征值检测的认知无线网络PUEA缓解方法
D. Das, Susmita Das
{"title":"Eigenvalue detection based method to mitigate PUEA in cognitive radio networks","authors":"D. Das, Susmita Das","doi":"10.1109/ANTS.2013.6802854","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802854","url":null,"abstract":"Cognitive radio (CR) is a promising technology in order to solve the spectrum scarcity problem by allocating the spectrum dynamically to the unlicensed users. However, it is also vulnerable to various attacks, and can not offer sufficient defense towards its security. Primary user emulation attack (PUEA) is one of the major threats to CR which significantly reduces the spectrum resources for the secondary users. In this paper, we propose the energy with minimum eigenvalue (EME) detection based method to mitigate PUEA through less spatial correlated secondary users (SUs). The SUs are selected based on their spatial correlation characteristics in log-normal shadow fading environment. Hence, the detection performance is improved. Simulation results show that our proposed method mitigates the PUEA effectively with lesser number of SUs.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133869702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SDN based architecture for QoS enabled services across networks with dynamic service level agreement 基于SDN的体系结构,支持跨网络的QoS服务,具有动态服务水平协议
Bivas Bhattacharya, D. Das
{"title":"SDN based architecture for QoS enabled services across networks with dynamic service level agreement","authors":"Bivas Bhattacharya, D. Das","doi":"10.1109/ANTS.2013.6802868","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802868","url":null,"abstract":"Nowadays QoS enabled real time services are demanding and dominating over Internet. However, providing end-to-end QoS requirement across Internet is still a challenge. With changing challenges and demands, service providers should be able to implement their strategic and business policies dynamically. Therefore current Internet architecture needs a change to support the present and future requirements, as well as any new innovation for better performance. The advent of Software Defined Network (SDN) is giving an opportunity to rethink and experiment with new innovations for Networking. In this paper we analyze current problems of Internet and propose a novel architecture and algorithm to address QoS across Internet with open opportunity for future enhancements by introducing dynamic relationship among service providing entities. Our simulation results reveal that proposed SDN architecture dealing with interactions among Internet service providers with dynamic Service Level Agreement (SLA) is advantageous for QoS enabled applications than the current architecture.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129067485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
On downstream coax framing in EPON protocol over coax (EPoC) 基于同轴电缆的EPON协议(EPoC)中的下游同轴帧
Partha Bhaumik, Saigopal Thota, Kira Zhangli, Jim Chen, Hesham Elbakoury, L. Fang, B. Mukherjee
{"title":"On downstream coax framing in EPON protocol over coax (EPoC)","authors":"Partha Bhaumik, Saigopal Thota, Kira Zhangli, Jim Chen, Hesham Elbakoury, L. Fang, B. Mukherjee","doi":"10.1109/ANTS.2013.6802878","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802878","url":null,"abstract":"In this short paper, we propose three different framing approaches for downstream transmissions in the coax segment of EPON Protocol over Coax (EPoC), based on how subcarriers in an orthogonal frequency division multiplexed (OFDM) symbol are modulated. We analyze the merits and demerits of each approach, and then compare them based on their control overheads and the maximum average data transmission rates each of them can achieve.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework for mobility prediction and high bandwidth utilization to support mobile multimedia streaming 一个用于移动预测和高带宽利用的框架,以支持移动多媒体流
Apollinaire Nadembega, A. Hafid, T. Taleb
{"title":"A framework for mobility prediction and high bandwidth utilization to support mobile multimedia streaming","authors":"Apollinaire Nadembega, A. Hafid, T. Taleb","doi":"10.1109/ANTS.2013.6802888","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802888","url":null,"abstract":"With the increasing number of mobile users on one hand, and the scarce resources in wireless networks on the other hand, there is need for efficient bandwidth utilization in order to avoid/reduce calls blocking/dropping. In this paper, we propose a framework that aims at ensuring QoS in terms of bandwidth reservation along a user's path (i.e., from his source location to his destination). For this objective, knowledge of user's path from source to destination and his handoff times is required. Therefore, we exploit user mobility prediction schemes [1, 2] to predict users' mobility and handoff time windows estimation schemes [3] to predict bandwidth availability for efficient call admission; however, these schemes [1-3] allow for processing individual user requests. Thus, to make the proposed framework scalable (with the number of users), we also propose a group-based path prediction model that estimates path to destination for a group of users (not only for a single user). The simulation results show that the proposed framework is effective in reducing the dropping rate of handoff calls and new call blocking rate, and in improving bandwidth utilization.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115350695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks 无线传感器网络中基于节能ECC和TinySec的安全方案分析
S. Basu, M. Pushpalatha
{"title":"Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks","authors":"S. Basu, M. Pushpalatha","doi":"10.1109/ANTS.2013.6802851","DOIUrl":"https://doi.org/10.1109/ANTS.2013.6802851","url":null,"abstract":"Modern day scientific society has seen the emergence of various trends in research and implementation. Wireless Sensor Network (WSN) is one among those research trends that has emerged, but its progress has been dammed by the security concerns due to certain limitations in resource and energy scarcity. In this paper we have analysed the performance of certain common well known security schemes like TinySec, RC5, ECIES and ECDSA by implementing it in real time scenarios. We have made a detailed comparison among them to find out their affectivity and their performance under multiple metrics. The paper also promotes the use of a security scheme based on Elliptical Curve Cryptography (ECC), utilizing ECDSA and Diffie-Hellman (DH key transfer). Analysis results shows that the scheme works better than the common existent schemes and is also energy efficient as well as can conserve resources if used appropriately.","PeriodicalId":286834,"journal":{"name":"2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信