2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)最新文献

筛选
英文 中文
Design of 5G Dual-Antenna Passive Repeater Based On Machine Learning 基于机器学习的5G双天线无源中继器设计
Tao Tang, Tao Hong, Cong Liu, Weiting Zhao, M. Kadoch
{"title":"Design of 5G Dual-Antenna Passive Repeater Based On Machine Learning","authors":"Tao Tang, Tao Hong, Cong Liu, Weiting Zhao, M. Kadoch","doi":"10.1109/IWCMC.2019.8766614","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766614","url":null,"abstract":"In 5G communications, small cells are one of the main approaches to achieve data diversion and improve network capacity. The problem of blind area is partially solved by this way, because the distances between small base stations and users are cut short. However, the intensive deployment of small base stations will bring about complex disturbance and a large amount of energy consumption. To overcome this challenge, we propose a new approach of dual-antenna passive repeater, which consists of a four-element patch antenna array, a feeding network and an improved planar Yagi-Uda antenna with added parasitic patches. It can be used in cooperation with small base stations to replace the function of the small base stations in a certain point, change the beam pointing, and achieve wide-angle scattering to realize the blind area signal coverage. The genetic algorithm which is a branch of machine learning is used to optimize the antenna parameters. Simulation results show that our proposed passive repeater can effectively reduce the path loss and improve the signal power of the receiving end.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126607583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs) 无人机中断拒绝服务攻击(3DOS):远程驾驶航空系统(RPASs)的事件响应和取证分析
Fahad E. Salamh, Umit Karabiyik, M. Rogers, F. Hazemi
{"title":"Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs)","authors":"Fahad E. Salamh, Umit Karabiyik, M. Rogers, F. Hazemi","doi":"10.1109/IWCMC.2019.8766538","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766538","url":null,"abstract":"According to the Federal Aviation Administration (FAA), the number of Remotely Piloted Air Systems (RPASs), colloquially known as drones, will rapidly increase in the near future. Challenges with drones are focused not only on the security of these devices, but also on the criminal uses for drones which need to be carefully considered. Incident response and forensic analysis of such cases have not been sufficiently addressed by the research community. This paper focuses on incident response of cybercrimes related to drones as well as some possible anti-forensic techniques that could be used to alter digital evidence associated with drones. In addition, this paper also revisits the enacted regulations that purport to restrict the operation of drones in critical infrastructure areas. We evaluate drone incident response by exploring a case study using a hypothetical drone forensic tool to illustrate the acquisition of GPS metadata from both media files and flight logs, with a view towards aiding the incident responders and digital forensic investigators in analyzing illegal flight activities and report such incidents effectively.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"200 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network Tor匿名网络QUIC协议的实证性能评价
Lamiaa Basyoni, A. Erbad, Mashael Al Sabah, Noora Fetais, M. Guizani
{"title":"Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network","authors":"Lamiaa Basyoni, A. Erbad, Mashael Al Sabah, Noora Fetais, M. Guizani","doi":"10.1109/IWCMC.2019.8766609","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766609","url":null,"abstract":"Tor’s anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of routers (called onion routers) forming a circuit. The current design of Tor’s transport layer suffers from a number of problems affecting the performance of the network. Several researches proposed changes in the transport design in order to eliminate the effect of these problems and improve the performance of Tor’s network. In this paper. we propose \"QuicTor\", an improvement to the transport layer of Tor’s network by using Google’s protocol \"QUIC\" instead of TCP. QUIC was mainly developed to eliminate TCP’s latency introduced from the handshaking delays and the head-of-line blocking problem. We provide an empirical evaluation of our proposed design and compare it to two other proposed designs, IMUX and PCTCP. We show that QuicTor significantly enhances the performance of Tor’s network.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124678977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Survey on Recent Approaches in Intrusion Detection System in IoTs 物联网入侵检测系统研究进展综述
Aliya Tabassum, A. Erbad, M. Guizani
{"title":"A Survey on Recent Approaches in Intrusion Detection System in IoTs","authors":"Aliya Tabassum, A. Erbad, M. Guizani","doi":"10.1109/IWCMC.2019.8766455","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766455","url":null,"abstract":"Internet of Things (IoTs) are Internet-connected devices that integrate physical objects and internet in diverse areas of life like industries, home automation, hospitals and environment monitoring. Although IoTs ease daily activities benefiting human operations, they bring serious security challenges worth concerning. IoTs have become potentially vulnerable targets for cybercriminals, so companies are investing billions of dollars to find an appropriate mechanism to detect these kinds of malicious activities in IoT networks. Nowadays intelligent techniques using Machine Learning (ML) and Artificial Intelligence (AI) are being adopted to prevent or detect novel attacks with best accuracy. This survey classifies and categorizes the recent Intrusion Detection approaches for IoT networks, with more focus on hybrid and intelligent techniques. Moreover, it provides a comprehensive review on IoT layers, communication protocols and their security issues which confirm that IDS is required in both layered and protocol approaches. Finally, this survey discusses the limitations and advantages of each approach to identify future directions of potential IDS implementation.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127155694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Mining User Opinion Influences on Twitter Social Network: Find that Friend who Leads your Opinion Using Bayesian Method and a New Emotional PageRank Algorithm 挖掘用户意见对Twitter社交网络的影响:使用贝叶斯方法和新的情感PageRank算法找到引导你意见的朋友
Armielle Noulapeu Ngaffo, Walid El Ayeb, Z. Choukair
{"title":"Mining User Opinion Influences on Twitter Social Network: Find that Friend who Leads your Opinion Using Bayesian Method and a New Emotional PageRank Algorithm","authors":"Armielle Noulapeu Ngaffo, Walid El Ayeb, Z. Choukair","doi":"10.1109/IWCMC.2019.8766571","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766571","url":null,"abstract":"With about 326 million[1] monthly active users and many millions of tweets sent per day, Twitter is undoubtedly one of the social networks most requested[2] by users sharing opinions, and feelings about trends, events… As a result, how users influence their opinions mutually constitute a hot issue for researchers. Indeed, the study and the estimation of the opinion influence observed between Twitter users constitutes a rich opportunity for the adjustment of services/products offered involved in the service discovery process. In this paper we propose an approach to determine the target user's Twitter friends from whom the target user opinion is influenced by. Our model is based on opinion mining of retweets and target user's Favorites markings from which we estimate the opinion influence using the Bayesian method combined with our EPR (Emotional PageRank) algorithm. The results obtained highlight our contribution compared to the standard PR (PageRank) algorithm.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"64 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130891783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Embedding Multiple-Step-Ahead Traffic Prediction in Network Energy Efficiency Problem 在网络能效问题中嵌入多步前馈流量预测
A. Bayati, K. Nguyen, M. Cheriet
{"title":"Embedding Multiple-Step-Ahead Traffic Prediction in Network Energy Efficiency Problem","authors":"A. Bayati, K. Nguyen, M. Cheriet","doi":"10.1109/IWCMC.2019.8766634","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766634","url":null,"abstract":"Adaptive Link Rate (ALR) is widely used to save energy consumption of network by adjusting the link rate according to the carried traffic through a network-level optimization of the flow allocation process. Existing ALR solution is mainly reactive, in which link speed is changed only when new traffic demand is requested. Also, they focus on energy consumption, and do not consider the cost of changes in the network (e.g., change in traffic routes, and link rates). Once bandwidth has been allocated for a demand, the link rate remains constant during the entire session. Therefore, this solution may result in sub-optimal schemes and requires multiple re-optimizations as traffic flows are fluctuating during the session, hence reducing the overall network performance. In this paper, we improve the ALR with a multiple-step-ahead method to optimize link rates based on forecasting traffic demand predictively. We formulate the proposed Predictive ALR (PALR) as an Integer Linear Programming (ILP) model and then design a heuristic simulated annealing (SA) -based algorithm to solve it. Our experimental results show our approach provides energy saving while it decreases on average 18% of link state transition and 11% of the flow reroutings compared to the original ALR.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121641739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Space-Time Variation of Property Crime in Beijing with ESDA Method 基于ESDA方法的北京市财产犯罪时空变异研究
Sheng Li, Wenzhong Tang
{"title":"Space-Time Variation of Property Crime in Beijing with ESDA Method","authors":"Sheng Li, Wenzhong Tang","doi":"10.1109/IWCMC.2019.8766640","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766640","url":null,"abstract":"property crime like residential burglary is a frequently occurred offence in Beijing. For crime reduction, it is important to know if there are hotspots exist and if it does, how many of them are maintained. In this study, spatial and temporal pattern of residential burglary by Policing command unit of Chaoyang district of Beijing is investigated. The method of ESDA (Exploration of Spatial Data Analysis) is proposed for identifying crime hotspots and test their significance. The results demonstrate that identified significant crime hotspots varied by time of day and day of week. Specifically, the burglary was observed to be clustered in center and south of Chaoyang district but none in northern. While by day of week, the patterns of burglary distribution changed and outliers appeared on Tuesday, Wednesday, Saturday and Sunday. By time of day, the burglary outlier appeared in the period between 18:00 PM and 22:00 PM.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122530668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobility Traffic Model Based on Combination of Multiple Transportation Forms in the Smart City 基于多种交通形态组合的智慧城市移动交通模型
Mohammed Bin Hariz, Dhaou Said, H. Mouftah
{"title":"Mobility Traffic Model Based on Combination of Multiple Transportation Forms in the Smart City","authors":"Mohammed Bin Hariz, Dhaou Said, H. Mouftah","doi":"10.1109/IWCMC.2019.8766676","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766676","url":null,"abstract":"In this paper, an affordable and suitable mobility system is developed for passenger with trip cost optimization in smart city concept. This system based on trip in the city by using multiple transportation forms of buses and carpooling. A Mobility Traffic Algorithm (MTA) is proposed to manage a passenger’s specific needs based on real-time information of buses and carpooling. The proposed model is implemented with a realistic scenario in the city of Ottawa using the OpenStreetMap program and the OMNET++. The results show that passenger satisfaction is improved when using a combination of multiple transportation forms in the city. Also, the simulation is proved that the stress level of the buses and carpooling during the daytime is reduced to its minimum by using MTA model.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114159059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Service Discovery in Heterogeneous IoT Environments based on OCF/IoTivity 基于OCF/IoTivity的异构物联网环境中的服务发现
K. Elsayed, Mohamed Abu Baker Ibrahim, H. Hamza
{"title":"Service Discovery in Heterogeneous IoT Environments based on OCF/IoTivity","authors":"K. Elsayed, Mohamed Abu Baker Ibrahim, H. Hamza","doi":"10.1109/IWCMC.2019.8766488","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766488","url":null,"abstract":"We present a framework for service discovery in a device area network comprised of heterogeneous devices. First, we identify the sources of heterogeneity in the IoT devices layer and then present how to handle the different types of heterogeneity with the target of presenting a unified service architecture based on the Open Connectivity Foundation (OCF) specifications. This service discovery framework is part of an overall IoT framework called the CAMPIE Platform. This platform presents how the device layer can be integrated with the CAMPIE middleware and cloud service. The work demonstrates the feasibility of using OCF as a general framework for service discovery and eventually service composition.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117016171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing dynamic adaptive streaming over HTTP for multi-homed users using a Multi-Armed Bandit algorithm 使用多武装强盗算法增强HTTP上的动态自适应流
Ali Hodroj, M. Ibrahim, Y. H. Aoul, B. Sericola
{"title":"Enhancing dynamic adaptive streaming over HTTP for multi-homed users using a Multi-Armed Bandit algorithm","authors":"Ali Hodroj, M. Ibrahim, Y. H. Aoul, B. Sericola","doi":"10.1109/IWCMC.2019.8766642","DOIUrl":"https://doi.org/10.1109/IWCMC.2019.8766642","url":null,"abstract":"Mobile video traffic accounted for more than half of all mobile data traffic over the past two years. Due to the limited bandwidth, users demand for high-quality video streaming becomes a challenge, which could be addressed by exploiting the emerging diversity of access network and adaptive video streaming. In this paper, a network selection algorithm is proposed for Dynamic Adaptive Streaming over HTTP (DASH), the famous international standard on video streaming, to enhance the received video quality to a \"multi-homed user\" equipped with multiple interfaces. A Multi-Armed Bandit (MAB) heuristic is proposed for a dynamic selection of the best interface at each step. While the Adaptive Bitrate Rules (ABR) used in DASH allow the video player client to dynamically pick the bit rate level according to the perceived network conditions, at each switching step a quality degradation may occur due to the difference in network conditions of the available interfaces. This paper aims to close this gap by (i) designing a MAB algorithm over DASH for a multi-homed user, (ii) evaluating the proposed mechanism through a test-bed implementation, (iii) extending the classic MAB model and (iv) discussing some open issues.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信