{"title":"Adaptive Hybrid Scheme for Cooperative Communications","authors":"Youstina Megalli, Wassim Alexan, A. El-Mahdy","doi":"10.1109/GIIS.2018.8635731","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635731","url":null,"abstract":"Future wireless communication networks require stringent specifications in terms of much higher bit rates and reduced network energy usage. In this paper, a hybrid adaptive relaying technique is proposed to toggle between the full duplex (FD) and the half duplex (HD) relaying modes and at the same time selects between amplify-and-forward (AF) and decode-and-forward (DF) protocols according to certain criteria. The toggling between the FD and the HD relaying modes is carried out to improve the data rates with a trade-off in the bit-error-rate (BER) performance. FD has full data rate at the expense of the residual self interference (RSI) which deteriorates the BER performance. On the other hand, HD does not suffer from RSI, but it does so at the expense of halving the data rate of FD. Moreover, toggling between AF and DF for the relay is a trade-off between good performance provided by DF at the expense of complexity. Complexity is reduced by using AF at the expense of higher BER. Thus, two toggling thresholds are determined in order to toggle between FD and HD, as well as AF and DF. The performance of the proposed hybrid adaptive mode is evaluated by means of BER and capacity curves.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michail Tsikerdekis, S. Zeadally, Amy Schlesener, N. Sklavos
{"title":"Approaches for Preventing Honeypot Detection and Compromise","authors":"Michail Tsikerdekis, S. Zeadally, Amy Schlesener, N. Sklavos","doi":"10.1109/GIIS.2018.8635603","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635603","url":null,"abstract":"Honeypots have been used extensively for over two decades. However, their development is rarely accompanied with an understanding of how attackers are able to detect them. Further, our understanding of effective evasion strategies that prevent the detection of honeypots is limited. We present a classification of honeypot characteristics as well as honeypot detection evasion strategies which minimize the detection rates of honeypots. We also provide recommendations for future honeypot software which is more adaptable, modular and incorporate a dynamic intelligence design.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lukasz Kulacz, P. Kryszkiewicz, Adrian Kliks, J. Pérez-Romero
{"title":"Waveform Flexibility in Database-Oriented Cognitive Wireless Systems","authors":"Lukasz Kulacz, P. Kryszkiewicz, Adrian Kliks, J. Pérez-Romero","doi":"10.1109/GIIS.2018.8635698","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635698","url":null,"abstract":"In this paper we discuss the idea of waveform flexibility in future wireless networks utilizing cognitive radio functionality. Mainly, we consider the possibility to adjust the shape of the waveform based on the information about the surrounding environment stored in a dedicated context-information database. In our approach, the cognitive terminal has an option to select one of four available waveforms to adapt itself in the best way to the constraints delivered by the database. In this paper we present the key concept of waveform flexibility, the proposed algorithm for waveform selection and the achieved simulation results.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122397532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mehmet Ozgun Demir, Günes Karabulut-Kurt, Guido Dartmann, G. Ascheid, A. E. Pusane
{"title":"Security Analysis of Forward Error Correction Codes in Relay Aided Networks","authors":"Mehmet Ozgun Demir, Günes Karabulut-Kurt, Guido Dartmann, G. Ascheid, A. E. Pusane","doi":"10.1109/GIIS.2018.8635659","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635659","url":null,"abstract":"Network security and data confidentiality of transmitted information are among the non-functional requirements of industrial wireless sensor networks (IWSNs) in addition to latency, reliability and energy efficiency requirements. Physical layer security techniques are promising solutions to assist cryptographic methods in the presence of an eavesdropper in IWSN setups. In this paper, we propose a physical layer security scheme, which is based on both insertion of an random error vector to forward error correction (FEC) codewords and transmission over decentralized relay nodes. Reed-Solomon and Golay codes are selected as FEC coding schemes and the security performance of the proposed model is evaluated with the aid of decoding error probability of an eavesdropper. The results show that security level is highly based on the location of the eavesdropper and secure communication can be achieved when some of channels between eavesdropper and relay nodes are significantly noisier.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Karyotis, Marios Avgeris, Michalis Michaloliakos, K. Tsagkaris, S. Papavassiliou
{"title":"Utility Decisions for QoE-QoS Driven Applications in Practical Mobile Broadband Networks","authors":"V. Karyotis, Marios Avgeris, Michalis Michaloliakos, K. Tsagkaris, S. Papavassiliou","doi":"10.1109/GIIS.2018.8635761","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635761","url":null,"abstract":"This paper focuses on the design, experimental validation and evaluation of a utility based decision-making approach for wireless (mobile) broadband networks. We extend a utility function framework incorporating flow and user related parameters to be driven by both QoE, QoS parameters and utilize the (mobile) broadband infrastructure of the EU-project MONROE, in order to perform extensive realistic experiments, revealing the operation of the utility function design and quantifying its potentials. We utilize our decision-making approach in two QoE-QoS related applications, namely access network selection and load-balancing in wireless networks with multiple available network interface capabilities. Through experimentation and analysis we investigate the impact of various network aspects, such as mobility, network provider, etc., on access interface switching and relevant applications. Such results can be further exploited for improving the QoE in mobile broadband networks.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Control of Statistical Data Aggregation to Minimize Latency in IoT Gateway","authors":"H. Yoshino, Kenko Ota, T. Hiraguri","doi":"10.1109/GIIS.2018.8635712","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635712","url":null,"abstract":"Latency-critical Internet of Things (IoT) applications, such as factory automation and smart grids, have received great attention recently. To satisfy the stringent latency requirements for such applications, it is important to suppress the latency in an IoT gateway that aggregates a large amount of small-sized data from massive IoT devices. In a previous study, we have analyzed two fundamental statistical data aggregation schemes for the IoT gateway: constant interval and constant number, and derived simple and accurate estimation formulas for the optimal aggregation parameters under steady-state conditions with a Poisson arrival. In this paper, we propose an adaptive control scheme of statistical data aggregation that minimizes the latency when time variation exists in the arrival rate. Applying the estimation formula of the optimal aggregation number to the proposed scheme, we realized adaptive control of the aggregation number according to the offered traffic. The transient and average characteristics of the proposed scheme with time-variant inputs were clarified by simulation. The results indicate that the proposed scheme achieved stable and nearly theoretically optimal latency, even during an overloaded traffic condition.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122777152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Consumption and Proximity Accuracy of BLE Beacons for Internet of Things Applications","authors":"Andrew Mackey, P. Spachos","doi":"10.1109/GIIS.2018.8635746","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635746","url":null,"abstract":"In the Internet of Things (IoT) era, with millions of connected devices to the internet, indoor location services regarding room discovery and resource identification/tracking are among the most popular applications for smart homes and smart buildings. Bluetooth Low Energy (BLE) beacons are a promising solution to improve the scalability and accuracy of indoor localization applications. They are low cost, configurable, small transmitters designed to attract attention to a specific location. In this paper, we investigate three popular BLE beacon devices available on the market and compare them in terms of energy consumption and proximity accuracy for indoor localization services. In addition, two state-estimation filters are developed for the Android mobile platform in order to improve the proximity accuracy when using smartphone devices. Specifically, a static Kalman filter and Gaussian filter are implemented.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of Coverage: A Novel Approach to Coverage for Mobile Crowd Sensing Systems","authors":"Sherif B. Azmy, N. Zorba, H. Hassanein","doi":"10.1109/GIIS.2018.8635769","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635769","url":null,"abstract":"Mobile Crowd Sensing (MCS) is an effective paradigm that utilizes the crowd as an extended instrument for the purpose of collecting data. However, utilizing the crowd comes with the risks stemming from the crowd's heterogeneity. Thus, the MCS administrator must carefully recruit and evaluate MCS participants for the reliable execution of MCS tasks. In this paper, we tackle some of the criteria required for the proper characterization of an Area of Interest $(AoI)$. We propose a coverage metric aimed at MCS systems that takes into consideration the global view of the AoI as a whole, as well as a local picture with regards to the subdivisions with the AoI. The developed coverage metric allows the MCS administrator to identify which regions within the AoI are lacking, in terms of quality, and how they can be compensated by moving participants from neighboring regions. We demonstrate the performance of the presented metric by means of a computer simulation.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, R. N. B. Rais, Vianney Lapôtre, G. Gogniat
{"title":"Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm","authors":"M. Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, R. N. B. Rais, Vianney Lapôtre, G. Gogniat","doi":"10.1109/GIIS.2018.8635767","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635767","url":null,"abstract":"This paper presents a run-time detection mechanism for access-driven cache-based Side-Channel Attacks (CSCAs) on Intel’s x86 architecture. We demonstrate the detection capability and effectiveness of proposed mechanism on Prime+Probe attcks. The mechanism comprises of multiple machine learning models, which use real-time data from the HPCs for detection. Experiments are performed with two different implementations of AES cryptosystem while under Prime+Probe attack. We provide results under stringent design constraints such as: realistic system load conditions, real-time detection accuracy, speed, system-wide performance overhead and distribution of error (i.e., false positives and negatives) for the used machine learning models. Our results show detection accuracy of $> 99$% for Prime+Probe attack with performance overhead of 3-4% at the highest detection speed, i.e., within 1-2% completion of 4800 AES encryption rounds needed to complete a successful attack.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Apostolopoulos, Eirini-Eleni Tsiropoulou, S. Papavassiliou
{"title":"Game-theoretic Learning-based QoS Satisfaction in Autonomous Mobile Edge Computing","authors":"P. Apostolopoulos, Eirini-Eleni Tsiropoulou, S. Papavassiliou","doi":"10.1109/GIIS.2018.8635770","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635770","url":null,"abstract":"Mobile Edge Computing (MEC) has arisen as an effective computation paradigm to deal with the advanced application requirements in Internet of Things (IOT). In this paper, we treat the joint problem of autonomous MEC servers’ operation and mobile devices’ QoS satisfaction in a fully distributed IOT network. The autonomous MEC servers’ activation is formulated as a minority game and through a distributed learning algorithm each server determines whether it becomes active or not. The mobile devices acting as stochastic learning automata select in a fully distributed manner an active server to get associated with for computation offloading, while for energy efficiency considerations, a non- cooperative game of satisfaction form among the IOT devices is formulated to determine the transmission power of each device in order to guarantee its QoS satisfaction. The performance evaluation of the proposed framework is achieved via modeling and simulation and detailed numerical and comparative results demonstrate its effectiveness, scalability, and robustness.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}