{"title":"Channel Estimation for Secret Key Generation","authors":"M. McGuire","doi":"10.1109/AINA.2014.60","DOIUrl":"https://doi.org/10.1109/AINA.2014.60","url":null,"abstract":"Generating secret keys from radio channel measurements has been shown to allow private communications. Previously described methods for performing wireless key generation have not come close to achieving the theoretical upper bounds on key rates theory for this technique. This paper demonstrates how using a Kalman filter based on an auto-regressive (AR) model for the channel process, channel gain measurements can be converted into a sequence of independent Gaussian vectors. Methods for processing these vectors so they are compatible with existing secret key quantization and error reconciliation techniques are also presented. It is shown how the mutual information in these vectors is near that of the theoretical upper bounds. Finally, it is shown that most of the available secret key bits can be extracted using practical quantization and error reconciliation techniques.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131282092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. B. Abdo, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi
{"title":"Application-Aware Fast Dormancy in LTE","authors":"J. B. Abdo, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/AINA.2014.28","DOIUrl":"https://doi.org/10.1109/AINA.2014.28","url":null,"abstract":"Two Radio Resource Control states have been proposed in LTE and implemented to ensure low UE power consumption and high network resource availability. Transiting between these two states optimizes network performance if tuned properly. Currently, a UE switches from the LTE_ACTIVE state to the LTE_IDLE state after a pre-configured static inactivity duration. This paper seeks to demonstrate that no static timeout is optimal for all users at all times. In addition, a user-level dynamic decision algorithm is proposed to have fine-grain user level optimization. Since achieving better efficiency is related to context awareness, we present a solution that allows the UE to auto-learn its traffic behavior. The dynamic algorithm was applied to five different user load scenarios of combined application and legacy traffic, and the results showed that we are able to attain power savings of up to 30% when compared to the fixed timeout case.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"os-58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dilawaer Duolikun, A. Aikebaier, T. Enokido, M. Takizawa
{"title":"Energy-Aware Replication Models of Mobile Agents","authors":"Dilawaer Duolikun, A. Aikebaier, T. Enokido, M. Takizawa","doi":"10.1109/AINA.2014.138","DOIUrl":"https://doi.org/10.1109/AINA.2014.138","url":null,"abstract":"Application processes are performed on servers in a cluster. Here, processes have to be not only reliably performed in presence of server faults but also the total electric power consumed by servers has to be reduced. The more number of replicas, the more reliably a process can be performed but the more amount of electric power is consumed by the servers. In this paper, we consider a mobile agent approach to realizing fault-tolerant energy-aware clusters. Here, a mobile agent is passively replicated on multiple servers. One primary replica of a mobile agent moves around servers and is performed on servers while the other secondary replicas are not performed. If the primary replica is faulty, one of the secondary replicas takes over the primary replica. In this paper, we discuss how to select servers for replicas to reliably and energy-efficiently perform mobile agents. We evaluate the energy-efficient passive replication scheme of a mobile agent in terms of average execution time of each mobile agent.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133217451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalized Healthcare Recommender Based on Social Media","authors":"Juan Li, Nazia Zaman","doi":"10.1109/AINA.2014.120","DOIUrl":"https://doi.org/10.1109/AINA.2014.120","url":null,"abstract":"Social media is rapidly changing the nature and speed of healthcare interaction. As more and more people go online to search for their health-related issues, providing them with appropriate information would save them from being overwhelmed by mountains of information. For this purpose, in this paper we propose a personalized healthcare recommending system to recommend highly relevant and trustworthy healthcare-related information to users. The system identifies key factors impacting the recommendation in a healthcare social networking environment, and uses semantic web technology and fuzzy logic to represent and evaluate the recommendation. Experiments were conducted and demonstrated that our approach can generate good outcomes in making recommendation and predicting the scope and impact of different factors.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems","authors":"M. Nir, A. Matrawy, M. St-Hilaire","doi":"10.1109/AINA.2014.71","DOIUrl":"https://doi.org/10.1109/AINA.2014.71","url":null,"abstract":"In this paper, we present our work in the area of Cyber Foraging (CF), which enables mobile devices to offload heavy computations to resourceful computing nodes. The main focus of the paper is to minimize the total energy consumption across all the mobile devices in a large Cyber Foraging System (CFS). We use a centralized architecture where a broker node handles the task scheduling. We model the task scheduling problem for this centralized architecture and optimally solve the problem to minimize the total energy consumption, which is equivalent to maximizing the total energy saving across all mobile devices. Simulation results show that using a centralized broker able to optimally offload tasks can provide a significant reduction in energy consumption.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Muhammad, E. Munir, M. Bilal, Muhammad Asad, Asad Ali, Tauseef Shah, Syed Bilal
{"title":"HADCC: Hybrid Advanced Distributed and Centralized Clustering Path Planning Algorithm for WSNs","authors":"A. Muhammad, E. Munir, M. Bilal, Muhammad Asad, Asad Ali, Tauseef Shah, Syed Bilal","doi":"10.1109/AINA.2014.81","DOIUrl":"https://doi.org/10.1109/AINA.2014.81","url":null,"abstract":"Designing and development of energy effective path planning algorithm is very key research domain in order to tackle the issues of limited life-time for Wireless Sensor Networks (WSNs). So in WSNs, energy efficiency is major concern of researchers. Overall advancement in routing protocols prove that clustering is much better approach as compared to flat and location-based energy efficient routing protocols. Due to better performance, multiple energy efficient clustering routing protocols have been proposed. But existing clustering algorithms are centralized or distributed, which are not intelligent enough and do not produce hybrid cluster-head selection. In this paper, we propose a cluster structured path planning algorithm named, Hybrid Advance Distributed Centralized Clustering (HADCC) path planning energy efficient algorithm. HADCC proposed model is fascinated with hybrid cluster head selection algorithm. This hybrid algorithm makes decision of cluster head selection of nodes. In order to execute proposed model we have also proposed an advance network topology, in which the whole network region is divided into two physical levels. First physical level consists of a circular region, containing homogeneous normal nodes and all important Base Station. While, second physical level is outer region of the circle that contains advanced heterogeneous nodes. Simulation results indicate that HADCC prolongs the network lifetime as compared to existing advanced clustering routing protocols for both homogeneous and heterogeneous WSNs. HADCC outperforms in case of stability and network life time as compared to the existing clustering algorithms.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115679324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Run-Time Filters for Network Intrusion Detection Systems","authors":"Victor C. Valgenti, Hai Sun, Min Sik Kim","doi":"10.1109/AINA.2014.19","DOIUrl":"https://doi.org/10.1109/AINA.2014.19","url":null,"abstract":"Network Intrusion Detection Systems (NIDS) examine millions of network packets searching for malicious traffic. Multi-gigabit line-speeds combined with growing databases of rules lead to dropped packets as the load exceeds the capacity of the device. Several areas of research have attempted to mitigate this problem through improving packet inspection efficiency, increasing resources, or reducing the examined population. A popular method for reducing the population examined is to employ run-time filters that can provide a quick check to determine that a given network packet cannot match a particular rule set. While this technique is an excellent method for reducing the population under examination, rogue elements can trivially bypass such filters with specially crafted packets and render the run-time filters effectively useless. Since the filtering comes at the cost of extra processing a filtering solution could actually perform worse than a non-filtered solution under such pandemic circumstances. To defend against such attacks, it is necessary to consider run-time filters as an independent anomaly detector capable of detecting attacks against itself. Such anomaly detection, together with judicious rate-limiting of traffic forwarded to full packet inspection, allows the detection, logging, and mitigation of attacks targeted at the filters while maintaining the overall improvements in NIDS performance garnered from using run-time filters.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kiki Maulana, D. Taniar, M. Indrawan, Dirda M. K. Latjuba
{"title":"Reverse Nearest Neighbour by Region on Mobile Devices","authors":"Kiki Maulana, D. Taniar, M. Indrawan, Dirda M. K. Latjuba","doi":"10.1109/AINA.2014.57","DOIUrl":"https://doi.org/10.1109/AINA.2014.57","url":null,"abstract":"Reverse Nearest Neighbour queries is known for the heavyweight algorithm that makes it difficult to be implemented in mobile devices due to high computations needed to verify the objects. Since the rapid development of mobile devices' hardware and also the new lightweight approach in solving the Reverse Nearest Neighbour problem, this problem can be solved in mobile devices. In this paper, we implemented the Contact Zone algorithm to create bichromatic reverse nearest neighbour region for a specific query point on mobile devices. The model is developed in a closed wireless network and various types of mobile devices with different hardware specifications are used. Our experiments show that RNN queries by region can be solved in mobile devices and different mobile CPUs do not give significant performance in processing the queries.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114201151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud Trust Evaluation System Using Hierarchical Fuzzy Inference System for Service Selection","authors":"Chenhao Qu, R. Buyya","doi":"10.1109/AINA.2014.104","DOIUrl":"https://doi.org/10.1109/AINA.2014.104","url":null,"abstract":"Cloud computing is an utility computing paradigm that allows users to flexibly acquire virtualized computing resources in a pay-as-you-go model. To realize the benefits of using cloud, users need to first select the suitable cloud services that can satisfy their applications' functional and non-functional requirements. However, this is a difficult task due to large number of available services, users' unclear requirements, and performance variations in cloud. In this paper, we propose a system that evaluates trust of clouds according to users' fuzzy Quality of Service (QoS) requirements and services' dynamic performances to facilitate service selection. We demonstrate the effectiveness and efficiency of our system through simulations and case studies.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124746313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sameera Abar, Pierre Lemarinier, G. Theodoropoulos, Gregory M. P. O'Hare
{"title":"Automated Dynamic Resource Provisioning and Monitoring in Virtualized Large-Scale Datacenter","authors":"Sameera Abar, Pierre Lemarinier, G. Theodoropoulos, Gregory M. P. O'Hare","doi":"10.1109/AINA.2014.117","DOIUrl":"https://doi.org/10.1109/AINA.2014.117","url":null,"abstract":"Infrastructure as a Service (IaaS) is a pay-as-you go based cloud provision model which on demand outsources the physical servers, guest virtual machine (VM) instances, storage resources, and networking connections. This article reports the design and development of our proposed innovative symbiotic simulation based system to support the automated management of IaaS-based distributed virtualized data enter. To make the ideas work in practice, we have implemented an Open Stack based open source cloud computing platform. A smart benchmarking application \"Cloud Rapid Experimentation and Analysis Tool (aka CBTool)\" is utilized to mark the resource allocation potential of our test cloud system. The real-time benchmarking metrics of cloud are fed to a distributed multi-agent based intelligence middleware layer. To optimally control the dynamic operation of prototype data enter, we predefine some custom policies for VM provisioning and application performance profiling within a versatile cloud modeling and simulation toolkit \"CloudSim\". Both tools for our prototypes' implementation can scale up to thousands of VMs, therefore, our devised mechanism is highly scalable and flexibly be interpolated at large-scale level. Autonomic characteristics of agents aid in streamlining symbiosis among the simulation system and IaaS cloud in a closed feedback control loop. The practical worth and applicability of the multiagent-based technology lies in the fact that this technique is inherently scalable hence can efficiently be implemented within the complex cloud computing environment. To demonstrate the efficacy of our approach, we have deployed an intelligible lightweight representative scenario in the context of monitoring and provisioning virtual machines within the test-bed. Experimental results indicate notable improvement in the resource provision profile of virtualized data enter on incorporating our proposed strategy.","PeriodicalId":316052,"journal":{"name":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125058760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}