2021 International Conference on Networking and Advanced Systems (ICNAS)最新文献

筛选
英文 中文
ClusterChain: Decentralized and Trustworthy Clustering Over Blockchain ClusterChain:在区块链上分散和可信的集群
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628967
Khenfouci Yamina, Challal Yacine, Hamdad Leila
{"title":"ClusterChain: Decentralized and Trustworthy Clustering Over Blockchain","authors":"Khenfouci Yamina, Challal Yacine, Hamdad Leila","doi":"10.1109/icnas53565.2021.9628967","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628967","url":null,"abstract":"Artificial Intelligence (AI) algorithms follow probabilistic models instead of deterministic ones, therefore the results produced by the AI algorithms may fail occasionally. This represents a tremendous obstacle for large scale deployment of AI. Also, The centralized AI can lead to the possibility of data tempering and fraud. Moreover, the reliability and integrity of data sources are not guaranteed. This may lead to AI decision outcomes that can be highly erroneous and risky. In ordrer to address these issues, in this paper, we explore the integration benefit of AI and Blockchain technology and contribute to the construction of a reliable and immutable infrastructure for a trustworthy decentralized AI based on the Blockchain called ClusterChain. In ClusterChain, we implement a new decentralized consensus mechanism based on a clustering of data, in which multiple nodes in competition, run locally a clustering model and syncronise the best obtained solution which is saved in blocks resistant to the modification and could be traced back.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132398004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Recent Traffic-Aware Scheduling Functions for 6TiSCH Networks 最新6TiSCH网络流量感知调度函数的性能评价
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628941
Abdeldjalil Tabouche, Badis Djamaa, Mustapha Réda Senouci
{"title":"Performance Evaluation of Recent Traffic-Aware Scheduling Functions for 6TiSCH Networks","authors":"Abdeldjalil Tabouche, Badis Djamaa, Mustapha Réda Senouci","doi":"10.1109/icnas53565.2021.9628941","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628941","url":null,"abstract":"In the Internet of Things (IoT), IEEE 802.15.4-2015 Time Slotted Channel Hopping (TSCH) is a promising link-layer protocol for low-power wireless communications. The IPv6 over TSCH (6TiSCH) architecture integrates this MAC layer into the IoT due to its outstanding reliability and energy-saving performance to promote the so-called Industrial IoT. Within the 6TiSCH architecture, communications resources allocation is managed by a Scheduling Function (SF) to support critical applications. The construction of an efficient SF is an active research area, and many SFs have been proposed in the last few years. However, SFs are not all adaptable to applications with varying traffic loads. This paper conducts a performance evaluation study of recent traffic-aware SFs and quantitatively compares A3 and CRSF; two recent traffic-aware schedulers with the Minimal Scheduling Function (MSF); a reference SF that was recently standardized. We discuss their ability to satisfy the requirements of critical 6TiSCH applications by ensuring low latency and a high-reliability. We also study their awareness of traffic changes. Obtained results show that these SFs are not robust enough against bursty traffic patterns, which witness the need to devise new solutions that better meet such requirements.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122816437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formal Specification and Verification of 5G Authentication and Key Agreement Protocol using mCRL2 基于mCRL2的5G认证与密钥协商协议正式规范与验证
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628917
H. Hafidi, Zohra Hmidi, L. Kahloul, Saber Benharzallah
{"title":"Formal Specification and Verification of 5G Authentication and Key Agreement Protocol using mCRL2","authors":"H. Hafidi, Zohra Hmidi, L. Kahloul, Saber Benharzallah","doi":"10.1109/icnas53565.2021.9628917","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628917","url":null,"abstract":"The fifth-generation (5G) standard is the last telecommunication technology, widely considered to have the most important characteristics in the future network industry. The 5G system infrastructure contains three principle interfaces, each one follows a set of protocols defined by the 3rd Generation Partnership Project group (3GPP). For the next generation network, 3GPP specified two authentication methods systematized in two protocols namely 5G Authentication and Key Agreement (5G-AKA) and Extensible Authentication Protocol (EAP). Such protocols are provided to ensure the authentication between system entities. These two protocols are critical systems, thus their reliability and correctness must be guaranteed. In this paper, we aim to formally re-examine 5G-AKA protocol using micro Common Representation Language 2 (mCRL2) language to verify such a security protocol. The mCRL2 language and its associated toolset are formal tools used for modeling, validation, and verification of concurrent systems and protocols. In this context, the authentication protocol 5G-AKA model is built using Algebra of Communication Processes (ACP), its properties are specified using Modal mu-Calculus and the properties analysis exploits Model-Checker provided with mCRL2. Indeed, we propose a new mCRL2 model of 3GPP specification considering 5G-AKA protocol and we specify some properties that describe necessary requirements to evaluate the correctness of the protocol where the parsed properties of Deadlock Freedom, Reachability, Liveness and Safety are positively assessed.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diabetes mellitus early stage risk prediction using machine learning algorithms 利用机器学习算法预测糖尿病早期风险
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628955
Sarra Samet, Mohamed Ridda Laouar, Issam Bendib
{"title":"Diabetes mellitus early stage risk prediction using machine learning algorithms","authors":"Sarra Samet, Mohamed Ridda Laouar, Issam Bendib","doi":"10.1109/icnas53565.2021.9628955","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628955","url":null,"abstract":"Diabetic patients are on the rise. Diabetes is one of the most debilitating diseases. Undiagnosed and untreated diabetes can lead to a number of health issues, including heart disease and stroke. It is necessary for the patient to visit a diagnostic institution and contact a doctor. With the advent of machine learning, this important problem has been overcome. A primary objective of this work is to build a model that can reliably predict a person’s probability of developing diabetes. To detect diabetes at an early stage, six supervised machine learning classification methods and a hybrid model based on the top three findings are employed. UCI’s machine learning repository provides access to the Pima Indians Diabetes Database, which is used in the experiments. All of them are evaluated based on a variety of measures. It is highlighted that the hybrid model which got an accuracy of 90,62% performs better than other state-of-the-art methods.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-Effective Space Partitioning Approach for IoT Data Indexing and Retrieval 物联网数据索引和检索的高性价比空间划分方法
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628904
Ibtissem Kemouguette, Zineddine Kouahla, Ala-Eddine Benrazek, Brahim Farou, Hamid Seridi
{"title":"Cost-Effective Space Partitioning Approach for IoT Data Indexing and Retrieval","authors":"Ibtissem Kemouguette, Zineddine Kouahla, Ala-Eddine Benrazek, Brahim Farou, Hamid Seridi","doi":"10.1109/icnas53565.2021.9628904","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628904","url":null,"abstract":"IoT technology implies a huge group of connected devices to capture a tremendous quantity of information. Computing and storing this huge amount of data requires scalable and efficient indexing solutions. Among the latest indexing structures in the BCCF-tree metric space, one framework is focused on providing recursive clustering of the space using the k-means algorithm. This solution suffers from data overlap between space partitioning at large scale. This study aims to optimize the structure of the BCCF. We propose to replace the k-means algorithm with an algorithm for estimating the overlap rate between the partitions of the space. Experimental results show good performance of the construction and search algorithms on several types of datasets.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123703657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning and Classical Machine Learning for code mapping in Heterogeneous Platforms 基于深度学习和经典机器学习的异构平台代码映射
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628950
Yacine Hakimi, Riyadh Baghdadi, Y. Challal
{"title":"Deep Learning and Classical Machine Learning for code mapping in Heterogeneous Platforms","authors":"Yacine Hakimi, Riyadh Baghdadi, Y. Challal","doi":"10.1109/icnas53565.2021.9628950","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628950","url":null,"abstract":"Programming modern heterogeneous systems is becoming more and more challenging due to their complexity. To simplify software development for such architectures, more advanced compilers are being designed. Such compilers automatically optimize code and hide the complexity of the target heterogeneous architecture from the developer. An example of problems that these compilers need to solve is to decide whether to map (run) a piece of code on CPU or GPU (Graphics Processing Unit). State-of-the-art compilers use accurate optimization heuristics to solve such problems and decide about how to optimize a code automatically. Traditional machine learning and Deep Learning approaches have both been used to build such heuristics. While traditional machine learning is well suited for training on small datasets, it is not well suited for extracting a set of high-quality features, on the other hand, deep learning can automatically extract features, but it needs a large amount of data to get satisfactory results.In this paper, we propose a new machine-learning-based model that allows a compiler to automatically decide whether to map a piece of code to CPU or GPU. Our model uses traditional machine learning and deep learning by exploiting the advantages of each of them. We show that our proposed model, which requires a small amount of data and training time, matches and outperforms state-of-the-art pre-trained deep learning models that require large amounts of data.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Interpolation-based Reversible Watermarking for Protecting Fingerprint Images 基于插值的指纹图像保护的有效可逆水印
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628987
Mohamed Lamine Benseddik, Khalil Zebbiche, M. S. Azzaz, S. Sadoudi
{"title":"Efficient Interpolation-based Reversible Watermarking for Protecting Fingerprint Images","authors":"Mohamed Lamine Benseddik, Khalil Zebbiche, M. S. Azzaz, S. Sadoudi","doi":"10.1109/icnas53565.2021.9628987","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628987","url":null,"abstract":"In this paper, an efficient interpolation-based reversible watermarking scheme for protecting fingerprint images is proposed. The interpolation approach, which generates additional pixels, is adopted to ensure perfect retrieval of the original image. The aim of this scheme is to guarantee both authenticity and integrity verification of fingerprint images, by embedding two multibit watermarks into interpolated pixels. A new robust watermarking technique is proposed to embed the authenticity watermark into the Lifting Wavelet Transform (LWT) coefficients, by using an adapted perceptual model. The insertion of the integrity watermark is achieved by adapting a semi-fragile technique, which is based on the Intermediate Significant Bit Substitution (ISBS) approach and operates in the spatial domain. The integrity watermark is generated from a block checksum procedure and serves for tamper detection and localization purposes. Experimental results showed that the proposed technique offers good performances in terms of imperceptibility and robustness, and is also capable of detecting and localizing tampers on watermarked images.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131629363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Q-learning based Forwarding Strategy for Named Data Networking 基于q学习的命名数据网络转发策略
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628982
Yakoub Mordjana, Badis Djamaa, Mustapha Réda Senouci
{"title":"A Q-learning based Forwarding Strategy for Named Data Networking","authors":"Yakoub Mordjana, Badis Djamaa, Mustapha Réda Senouci","doi":"10.1109/icnas53565.2021.9628982","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628982","url":null,"abstract":"Interest packets forwarding is one of the key features of Named Data Networking (NDN). Traditional Interest forwarding strategies exploit the faces setup by the routing protocol in the Forwarding Information Base (FIB) table. The main drawback of such strategies is that the changing network conditions can invalidate the forwarding rules in the FIB. Recent strategies do not rely on the routing information and actively seek new delivery paths using reinforcement learning techniques. However, these solutions usually introduce modifications in the NDN data structures and/or packets. In this paper, we devise a new lightweight forwarding strategy, dubbed QRF, using the Q-learning algorithm. QRF does not rely on the FIB table while preserving all NDN-related data structures and packets. QRF performs online learning to adapt its forwarding decision according to the state of the Pending Information Table (PIT). Simulation results show that QRF outperforms BestRoute in terms of delivery time in congested scenarios.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134189274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Coverage Algorithms in Multimedia Wireless Sensor Networks 多媒体无线传感器网络覆盖算法分类
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628905
Manel Bouhali, Amira Bendjeddou, Nacira Ghoualmi-Zine
{"title":"Classification of Coverage Algorithms in Multimedia Wireless Sensor Networks","authors":"Manel Bouhali, Amira Bendjeddou, Nacira Ghoualmi-Zine","doi":"10.1109/icnas53565.2021.9628905","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628905","url":null,"abstract":"In recent years, with the technological development that we are witnessing, the multimedia wireless sensor networks (WMSNs) are attracting more and more interest from researchers, these later are used in various applications for their advantages and reliability. However, the WMSNs have different problems that become the focus of attention of researchers who strived to make various proposals to address these problems. The best-known and popular problem for this type of network is improving and optimizing their coverage. In this paper, several approaches for the coverage optimization problem in the multimedia wireless sensor networks are presented and the advantages and limitations of each one of them are highlighted. Then, a classification of these approaches is made.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114549554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep learning for cryptanalysis attack on IoMT wireless communications via smart eavesdropping 通过智能窃听对IoMT无线通信进行密码分析攻击的深度学习
2021 International Conference on Networking and Advanced Systems (ICNAS) Pub Date : 2021-10-27 DOI: 10.1109/icnas53565.2021.9628924
Zakaria Tolba, M. Derdour
{"title":"Deep learning for cryptanalysis attack on IoMT wireless communications via smart eavesdropping","authors":"Zakaria Tolba, M. Derdour","doi":"10.1109/icnas53565.2021.9628924","DOIUrl":"https://doi.org/10.1109/icnas53565.2021.9628924","url":null,"abstract":"The Internet of Medical Things (IoMT) faces grave protection concerns due to weakness related to the leakage of sensitive data controlled by detectors and transferred to the cloud through open wireless connections.In most IoMTs, patients information is encrypted by terminal devices, and the published cryptanalysis works demonstrate apparent limitations because they are performed for the theoretical model without any real implementation scenario on wireless encryption protocols, which poses a performance gap between the hypothetical investigation and practical employment of these attacks. To overcome these drawbacks, we suggest an approach based on a deep learning model for an attack simulation on specific IoMT protocols that discovers the private key of IoMT wireless communications using a smart eavesdropping conceptual scenario on multilevel layers of IoMT protocol stack for its implementation. We detail the attack process for building the datasets from wireless packet protocols with the aim of training the proposed cryptanalysis model.","PeriodicalId":321454,"journal":{"name":"2021 International Conference on Networking and Advanced Systems (ICNAS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122645074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信