2018 Global Information Infrastructure and Networking Symposium (GIIS)最新文献

筛选
英文 中文
Adaptive Hybrid Scheme for Cooperative Communications 协同通信的自适应混合方案
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635731
Youstina Megalli, Wassim Alexan, A. El-Mahdy
{"title":"Adaptive Hybrid Scheme for Cooperative Communications","authors":"Youstina Megalli, Wassim Alexan, A. El-Mahdy","doi":"10.1109/GIIS.2018.8635731","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635731","url":null,"abstract":"Future wireless communication networks require stringent specifications in terms of much higher bit rates and reduced network energy usage. In this paper, a hybrid adaptive relaying technique is proposed to toggle between the full duplex (FD) and the half duplex (HD) relaying modes and at the same time selects between amplify-and-forward (AF) and decode-and-forward (DF) protocols according to certain criteria. The toggling between the FD and the HD relaying modes is carried out to improve the data rates with a trade-off in the bit-error-rate (BER) performance. FD has full data rate at the expense of the residual self interference (RSI) which deteriorates the BER performance. On the other hand, HD does not suffer from RSI, but it does so at the expense of halving the data rate of FD. Moreover, toggling between AF and DF for the relay is a trade-off between good performance provided by DF at the expense of complexity. Complexity is reduced by using AF at the expense of higher BER. Thus, two toggling thresholds are determined in order to toggle between FD and HD, as well as AF and DF. The performance of the proposed hybrid adaptive mode is evaluated by means of BER and capacity curves.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Approaches for Preventing Honeypot Detection and Compromise 防止蜜罐检测和泄露的方法
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635603
Michail Tsikerdekis, S. Zeadally, Amy Schlesener, N. Sklavos
{"title":"Approaches for Preventing Honeypot Detection and Compromise","authors":"Michail Tsikerdekis, S. Zeadally, Amy Schlesener, N. Sklavos","doi":"10.1109/GIIS.2018.8635603","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635603","url":null,"abstract":"Honeypots have been used extensively for over two decades. However, their development is rarely accompanied with an understanding of how attackers are able to detect them. Further, our understanding of effective evasion strategies that prevent the detection of honeypots is limited. We present a classification of honeypot characteristics as well as honeypot detection evasion strategies which minimize the detection rates of honeypots. We also provide recommendations for future honeypot software which is more adaptable, modular and incorporate a dynamic intelligence design.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Waveform Flexibility in Database-Oriented Cognitive Wireless Systems 面向数据库的认知无线系统中的波形灵活性
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635698
Lukasz Kulacz, P. Kryszkiewicz, Adrian Kliks, J. Pérez-Romero
{"title":"Waveform Flexibility in Database-Oriented Cognitive Wireless Systems","authors":"Lukasz Kulacz, P. Kryszkiewicz, Adrian Kliks, J. Pérez-Romero","doi":"10.1109/GIIS.2018.8635698","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635698","url":null,"abstract":"In this paper we discuss the idea of waveform flexibility in future wireless networks utilizing cognitive radio functionality. Mainly, we consider the possibility to adjust the shape of the waveform based on the information about the surrounding environment stored in a dedicated context-information database. In our approach, the cognitive terminal has an option to select one of four available waveforms to adapt itself in the best way to the constraints delivered by the database. In this paper we present the key concept of waveform flexibility, the proposed algorithm for waveform selection and the achieved simulation results.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122397532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Analysis of Forward Error Correction Codes in Relay Aided Networks 中继辅助网络中前向纠错码的安全性分析
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635659
Mehmet Ozgun Demir, Günes Karabulut-Kurt, Guido Dartmann, G. Ascheid, A. E. Pusane
{"title":"Security Analysis of Forward Error Correction Codes in Relay Aided Networks","authors":"Mehmet Ozgun Demir, Günes Karabulut-Kurt, Guido Dartmann, G. Ascheid, A. E. Pusane","doi":"10.1109/GIIS.2018.8635659","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635659","url":null,"abstract":"Network security and data confidentiality of transmitted information are among the non-functional requirements of industrial wireless sensor networks (IWSNs) in addition to latency, reliability and energy efficiency requirements. Physical layer security techniques are promising solutions to assist cryptographic methods in the presence of an eavesdropper in IWSN setups. In this paper, we propose a physical layer security scheme, which is based on both insertion of an random error vector to forward error correction (FEC) codewords and transmission over decentralized relay nodes. Reed-Solomon and Golay codes are selected as FEC coding schemes and the security performance of the proposed model is evaluated with the aid of decoding error probability of an eavesdropper. The results show that security level is highly based on the location of the eavesdropper and secure communication can be achieved when some of channels between eavesdropper and relay nodes are significantly noisier.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Utility Decisions for QoE-QoS Driven Applications in Practical Mobile Broadband Networks 实际移动宽带网络中qos驱动应用的效用决策
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635761
V. Karyotis, Marios Avgeris, Michalis Michaloliakos, K. Tsagkaris, S. Papavassiliou
{"title":"Utility Decisions for QoE-QoS Driven Applications in Practical Mobile Broadband Networks","authors":"V. Karyotis, Marios Avgeris, Michalis Michaloliakos, K. Tsagkaris, S. Papavassiliou","doi":"10.1109/GIIS.2018.8635761","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635761","url":null,"abstract":"This paper focuses on the design, experimental validation and evaluation of a utility based decision-making approach for wireless (mobile) broadband networks. We extend a utility function framework incorporating flow and user related parameters to be driven by both QoE, QoS parameters and utilize the (mobile) broadband infrastructure of the EU-project MONROE, in order to perform extensive realistic experiments, revealing the operation of the utility function design and quantifying its potentials. We utilize our decision-making approach in two QoE-QoS related applications, namely access network selection and load-balancing in wireless networks with multiple available network interface capabilities. Through experimentation and analysis we investigate the impact of various network aspects, such as mobility, network provider, etc., on access interface switching and relevant applications. Such results can be further exploited for improving the QoE in mobile broadband networks.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive Control of Statistical Data Aggregation to Minimize Latency in IoT Gateway 物联网网关统计数据聚合自适应控制最小化时延
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635712
H. Yoshino, Kenko Ota, T. Hiraguri
{"title":"Adaptive Control of Statistical Data Aggregation to Minimize Latency in IoT Gateway","authors":"H. Yoshino, Kenko Ota, T. Hiraguri","doi":"10.1109/GIIS.2018.8635712","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635712","url":null,"abstract":"Latency-critical Internet of Things (IoT) applications, such as factory automation and smart grids, have received great attention recently. To satisfy the stringent latency requirements for such applications, it is important to suppress the latency in an IoT gateway that aggregates a large amount of small-sized data from massive IoT devices. In a previous study, we have analyzed two fundamental statistical data aggregation schemes for the IoT gateway: constant interval and constant number, and derived simple and accurate estimation formulas for the optimal aggregation parameters under steady-state conditions with a Poisson arrival. In this paper, we propose an adaptive control scheme of statistical data aggregation that minimizes the latency when time variation exists in the arrival rate. Applying the estimation formula of the optimal aggregation number to the proposed scheme, we realized adaptive control of the aggregation number according to the offered traffic. The transient and average characteristics of the proposed scheme with time-variant inputs were clarified by simulation. The results indicate that the proposed scheme achieved stable and nearly theoretically optimal latency, even during an overloaded traffic condition.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122777152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy Consumption and Proximity Accuracy of BLE Beacons for Internet of Things Applications 物联网应用中BLE信标的能耗和接近精度
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635746
Andrew Mackey, P. Spachos
{"title":"Energy Consumption and Proximity Accuracy of BLE Beacons for Internet of Things Applications","authors":"Andrew Mackey, P. Spachos","doi":"10.1109/GIIS.2018.8635746","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635746","url":null,"abstract":"In the Internet of Things (IoT) era, with millions of connected devices to the internet, indoor location services regarding room discovery and resource identification/tracking are among the most popular applications for smart homes and smart buildings. Bluetooth Low Energy (BLE) beacons are a promising solution to improve the scalability and accuracy of indoor localization applications. They are low cost, configurable, small transmitters designed to attract attention to a specific location. In this paper, we investigate three popular BLE beacon devices available on the market and compare them in terms of energy consumption and proximity accuracy for indoor localization services. In addition, two state-estimation filters are developed for the Android mobile platform in order to improve the proximity accuracy when using smartphone devices. Specifically, a static Kalman filter and Gaussian filter are implemented.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quality of Coverage: A Novel Approach to Coverage for Mobile Crowd Sensing Systems 覆盖质量:移动人群传感系统覆盖的一种新方法
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635769
Sherif B. Azmy, N. Zorba, H. Hassanein
{"title":"Quality of Coverage: A Novel Approach to Coverage for Mobile Crowd Sensing Systems","authors":"Sherif B. Azmy, N. Zorba, H. Hassanein","doi":"10.1109/GIIS.2018.8635769","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635769","url":null,"abstract":"Mobile Crowd Sensing (MCS) is an effective paradigm that utilizes the crowd as an extended instrument for the purpose of collecting data. However, utilizing the crowd comes with the risks stemming from the crowd's heterogeneity. Thus, the MCS administrator must carefully recruit and evaluate MCS participants for the reliable execution of MCS tasks. In this paper, we tackle some of the criteria required for the proper characterization of an Area of Interest $(AoI)$. We propose a coverage metric aimed at MCS systems that takes into consideration the global view of the AoI as a whole, as well as a local picture with regards to the subdivisions with the AoI. The developed coverage metric allows the MCS administrator to identify which regions within the AoI are lacking, in terms of quality, and how they can be compensated by moving participants from neighboring regions. We demonstrate the performance of the presented metric by means of a computer simulation.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm AES加密算法素数+探测侧信道攻击的运行时检测
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635767
M. Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, R. N. B. Rais, Vianney Lapôtre, G. Gogniat
{"title":"Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm","authors":"M. Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, R. N. B. Rais, Vianney Lapôtre, G. Gogniat","doi":"10.1109/GIIS.2018.8635767","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635767","url":null,"abstract":"This paper presents a run-time detection mechanism for access-driven cache-based Side-Channel Attacks (CSCAs) on Intel’s x86 architecture. We demonstrate the detection capability and effectiveness of proposed mechanism on Prime+Probe attcks. The mechanism comprises of multiple machine learning models, which use real-time data from the HPCs for detection. Experiments are performed with two different implementations of AES cryptosystem while under Prime+Probe attack. We provide results under stringent design constraints such as: realistic system load conditions, real-time detection accuracy, speed, system-wide performance overhead and distribution of error (i.e., false positives and negatives) for the used machine learning models. Our results show detection accuracy of $> 99$% for Prime+Probe attack with performance overhead of 3-4% at the highest detection speed, i.e., within 1-2% completion of 4800 AES encryption rounds needed to complete a successful attack.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Game-theoretic Learning-based QoS Satisfaction in Autonomous Mobile Edge Computing 自主移动边缘计算中基于博弈论学习的QoS满足
2018 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2018-10-01 DOI: 10.1109/GIIS.2018.8635770
P. Apostolopoulos, Eirini-Eleni Tsiropoulou, S. Papavassiliou
{"title":"Game-theoretic Learning-based QoS Satisfaction in Autonomous Mobile Edge Computing","authors":"P. Apostolopoulos, Eirini-Eleni Tsiropoulou, S. Papavassiliou","doi":"10.1109/GIIS.2018.8635770","DOIUrl":"https://doi.org/10.1109/GIIS.2018.8635770","url":null,"abstract":"Mobile Edge Computing (MEC) has arisen as an effective computation paradigm to deal with the advanced application requirements in Internet of Things (IOT). In this paper, we treat the joint problem of autonomous MEC servers’ operation and mobile devices’ QoS satisfaction in a fully distributed IOT network. The autonomous MEC servers’ activation is formulated as a minority game and through a distributed learning algorithm each server determines whether it becomes active or not. The mobile devices acting as stochastic learning automata select in a fully distributed manner an active server to get associated with for computation offloading, while for energy efficiency considerations, a non- cooperative game of satisfaction form among the IOT devices is formulated to determine the transmission power of each device in order to guarantee its QoS satisfaction. The performance evaluation of the proposed framework is achieved via modeling and simulation and detailed numerical and comparative results demonstrate its effectiveness, scalability, and robustness.","PeriodicalId":318525,"journal":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130292107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信