Tao Tang, Tao Hong, Cong Liu, Weiting Zhao, M. Kadoch
{"title":"Design of 5G Dual-Antenna Passive Repeater Based On Machine Learning","authors":"Tao Tang, Tao Hong, Cong Liu, Weiting Zhao, M. Kadoch","doi":"10.1109/IWCMC.2019.8766614","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766614","url":null,"abstract":"In 5G communications, small cells are one of the main approaches to achieve data diversion and improve network capacity. The problem of blind area is partially solved by this way, because the distances between small base stations and users are cut short. However, the intensive deployment of small base stations will bring about complex disturbance and a large amount of energy consumption. To overcome this challenge, we propose a new approach of dual-antenna passive repeater, which consists of a four-element patch antenna array, a feeding network and an improved planar Yagi-Uda antenna with added parasitic patches. It can be used in cooperation with small base stations to replace the function of the small base stations in a certain point, change the beam pointing, and achieve wide-angle scattering to realize the blind area signal coverage. The genetic algorithm which is a branch of machine learning is used to optimize the antenna parameters. Simulation results show that our proposed passive repeater can effectively reduce the path loss and improve the signal power of the receiving end.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126607583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fahad E. Salamh, Umit Karabiyik, M. Rogers, F. Hazemi
{"title":"Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs)","authors":"Fahad E. Salamh, Umit Karabiyik, M. Rogers, F. Hazemi","doi":"10.1109/IWCMC.2019.8766538","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766538","url":null,"abstract":"According to the Federal Aviation Administration (FAA), the number of Remotely Piloted Air Systems (RPASs), colloquially known as drones, will rapidly increase in the near future. Challenges with drones are focused not only on the security of these devices, but also on the criminal uses for drones which need to be carefully considered. Incident response and forensic analysis of such cases have not been sufficiently addressed by the research community. This paper focuses on incident response of cybercrimes related to drones as well as some possible anti-forensic techniques that could be used to alter digital evidence associated with drones. In addition, this paper also revisits the enacted regulations that purport to restrict the operation of drones in critical infrastructure areas. We evaluate drone incident response by exploring a case study using a hypothetical drone forensic tool to illustrate the acquisition of GPS metadata from both media files and flight logs, with a view towards aiding the incident responders and digital forensic investigators in analyzing illegal flight activities and report such incidents effectively.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"200 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lamiaa Basyoni, A. Erbad, Mashael Al Sabah, Noora Fetais, M. Guizani
{"title":"Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network","authors":"Lamiaa Basyoni, A. Erbad, Mashael Al Sabah, Noora Fetais, M. Guizani","doi":"10.1109/IWCMC.2019.8766609","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766609","url":null,"abstract":"Tor’s anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of routers (called onion routers) forming a circuit. The current design of Tor’s transport layer suffers from a number of problems affecting the performance of the network. Several researches proposed changes in the transport design in order to eliminate the effect of these problems and improve the performance of Tor’s network. In this paper. we propose \"QuicTor\", an improvement to the transport layer of Tor’s network by using Google’s protocol \"QUIC\" instead of TCP. QUIC was mainly developed to eliminate TCP’s latency introduced from the handshaking delays and the head-of-line blocking problem. We provide an empirical evaluation of our proposed design and compare it to two other proposed designs, IMUX and PCTCP. We show that QuicTor significantly enhances the performance of Tor’s network.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124678977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Recent Approaches in Intrusion Detection System in IoTs","authors":"Aliya Tabassum, A. Erbad, M. Guizani","doi":"10.1109/IWCMC.2019.8766455","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766455","url":null,"abstract":"Internet of Things (IoTs) are Internet-connected devices that integrate physical objects and internet in diverse areas of life like industries, home automation, hospitals and environment monitoring. Although IoTs ease daily activities benefiting human operations, they bring serious security challenges worth concerning. IoTs have become potentially vulnerable targets for cybercriminals, so companies are investing billions of dollars to find an appropriate mechanism to detect these kinds of malicious activities in IoT networks. Nowadays intelligent techniques using Machine Learning (ML) and Artificial Intelligence (AI) are being adopted to prevent or detect novel attacks with best accuracy. This survey classifies and categorizes the recent Intrusion Detection approaches for IoT networks, with more focus on hybrid and intelligent techniques. Moreover, it provides a comprehensive review on IoT layers, communication protocols and their security issues which confirm that IDS is required in both layered and protocol approaches. Finally, this survey discusses the limitations and advantages of each approach to identify future directions of potential IDS implementation.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127155694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Armielle Noulapeu Ngaffo, Walid El Ayeb, Z. Choukair
{"title":"Mining User Opinion Influences on Twitter Social Network: Find that Friend who Leads your Opinion Using Bayesian Method and a New Emotional PageRank Algorithm","authors":"Armielle Noulapeu Ngaffo, Walid El Ayeb, Z. Choukair","doi":"10.1109/IWCMC.2019.8766571","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766571","url":null,"abstract":"With about 326 million[1] monthly active users and many millions of tweets sent per day, Twitter is undoubtedly one of the social networks most requested[2] by users sharing opinions, and feelings about trends, events… As a result, how users influence their opinions mutually constitute a hot issue for researchers. Indeed, the study and the estimation of the opinion influence observed between Twitter users constitutes a rich opportunity for the adjustment of services/products offered involved in the service discovery process. In this paper we propose an approach to determine the target user's Twitter friends from whom the target user opinion is influenced by. Our model is based on opinion mining of retweets and target user's Favorites markings from which we estimate the opinion influence using the Bayesian method combined with our EPR (Emotional PageRank) algorithm. The results obtained highlight our contribution compared to the standard PR (PageRank) algorithm.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"64 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130891783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedding Multiple-Step-Ahead Traffic Prediction in Network Energy Efficiency Problem","authors":"A. Bayati, K. Nguyen, M. Cheriet","doi":"10.1109/IWCMC.2019.8766634","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766634","url":null,"abstract":"Adaptive Link Rate (ALR) is widely used to save energy consumption of network by adjusting the link rate according to the carried traffic through a network-level optimization of the flow allocation process. Existing ALR solution is mainly reactive, in which link speed is changed only when new traffic demand is requested. Also, they focus on energy consumption, and do not consider the cost of changes in the network (e.g., change in traffic routes, and link rates). Once bandwidth has been allocated for a demand, the link rate remains constant during the entire session. Therefore, this solution may result in sub-optimal schemes and requires multiple re-optimizations as traffic flows are fluctuating during the session, hence reducing the overall network performance. In this paper, we improve the ALR with a multiple-step-ahead method to optimize link rates based on forecasting traffic demand predictively. We formulate the proposed Predictive ALR (PALR) as an Integer Linear Programming (ILP) model and then design a heuristic simulated annealing (SA) -based algorithm to solve it. Our experimental results show our approach provides energy saving while it decreases on average 18% of link state transition and 11% of the flow reroutings compared to the original ALR.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Space-Time Variation of Property Crime in Beijing with ESDA Method","authors":"Sheng Li, Wenzhong Tang","doi":"10.1109/IWCMC.2019.8766640","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766640","url":null,"abstract":"property crime like residential burglary is a frequently occurred offence in Beijing. For crime reduction, it is important to know if there are hotspots exist and if it does, how many of them are maintained. In this study, spatial and temporal pattern of residential burglary by Policing command unit of Chaoyang district of Beijing is investigated. The method of ESDA (Exploration of Spatial Data Analysis) is proposed for identifying crime hotspots and test their significance. The results demonstrate that identified significant crime hotspots varied by time of day and day of week. Specifically, the burglary was observed to be clustered in center and south of Chaoyang district but none in northern. While by day of week, the patterns of burglary distribution changed and outliers appeared on Tuesday, Wednesday, Saturday and Sunday. By time of day, the burglary outlier appeared in the period between 18:00 PM and 22:00 PM.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122530668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility Traffic Model Based on Combination of Multiple Transportation Forms in the Smart City","authors":"Mohammed Bin Hariz, Dhaou Said, H. Mouftah","doi":"10.1109/IWCMC.2019.8766676","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766676","url":null,"abstract":"In this paper, an affordable and suitable mobility system is developed for passenger with trip cost optimization in smart city concept. This system based on trip in the city by using multiple transportation forms of buses and carpooling. A Mobility Traffic Algorithm (MTA) is proposed to manage a passenger’s specific needs based on real-time information of buses and carpooling. The proposed model is implemented with a realistic scenario in the city of Ottawa using the OpenStreetMap program and the OMNET++. The results show that passenger satisfaction is improved when using a combination of multiple transportation forms in the city. Also, the simulation is proved that the stress level of the buses and carpooling during the daytime is reduced to its minimum by using MTA model.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114159059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Discovery in Heterogeneous IoT Environments based on OCF/IoTivity","authors":"K. Elsayed, Mohamed Abu Baker Ibrahim, H. Hamza","doi":"10.1109/IWCMC.2019.8766488","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766488","url":null,"abstract":"We present a framework for service discovery in a device area network comprised of heterogeneous devices. First, we identify the sources of heterogeneity in the IoT devices layer and then present how to handle the different types of heterogeneity with the target of presenting a unified service architecture based on the Open Connectivity Foundation (OCF) specifications. This service discovery framework is part of an overall IoT framework called the CAMPIE Platform. This platform presents how the device layer can be integrated with the CAMPIE middleware and cloud service. The work demonstrates the feasibility of using OCF as a general framework for service discovery and eventually service composition.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117016171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing dynamic adaptive streaming over HTTP for multi-homed users using a Multi-Armed Bandit algorithm","authors":"Ali Hodroj, M. Ibrahim, Y. H. Aoul, B. Sericola","doi":"10.1109/IWCMC.2019.8766642","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766642","url":null,"abstract":"Mobile video traffic accounted for more than half of all mobile data traffic over the past two years. Due to the limited bandwidth, users demand for high-quality video streaming becomes a challenge, which could be addressed by exploiting the emerging diversity of access network and adaptive video streaming. In this paper, a network selection algorithm is proposed for Dynamic Adaptive Streaming over HTTP (DASH), the famous international standard on video streaming, to enhance the received video quality to a \"multi-homed user\" equipped with multiple interfaces. A Multi-Armed Bandit (MAB) heuristic is proposed for a dynamic selection of the best interface at each step. While the Adaptive Bitrate Rules (ABR) used in DASH allow the video player client to dynamically pick the bit rate level according to the perceived network conditions, at each switching step a quality degradation may occur due to the difference in network conditions of the available interfaces. This paper aims to close this gap by (i) designing a MAB algorithm over DASH for a multi-homed user, (ii) evaluating the proposed mechanism through a test-bed implementation, (iii) extending the classic MAB model and (iv) discussing some open issues.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}