{"title":"Grid-based directional minimum cost routing for massively dense wireless sensor networks","authors":"Jing-Ya Li, Ren-Song Ko","doi":"10.1109/ICOIN.2014.6799680","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799680","url":null,"abstract":"We propose the grid-based directional routing for massively dense wireless sensor networks to alleviate the complexity arising from the problem scale. The objective is to minimize the total routing cost, which only depends on positions. The grid-based directional routing consists of two stages: equally spaced grid points compute their routing directions and each node uses the routing direction of the closest grid point as guidance to determine its next forwarding node. This paper mainly describes two approaches for the first stage, based on Dijkstra's method and the fast marching method. Our simulation results reveal that the routing directions derived by the fast marching method work better for determining the minimum cost paths.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117315331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel single-cell transmission scheme for multicast services in LTE-advanced","authors":"J. Na, Dae-Ik Kim, J. Moon, Sangho Lee, Y. Shin","doi":"10.1109/ICOIN.2014.6799689","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799689","url":null,"abstract":"As the rate of smart phone users increases, the utilization of wireless resources for mobile networks is becoming more important. The 3rd Generation Partnership Program (3GPP) organization has pushed ahead the standardization of broadcasting services in mobile cells for the benefit of every mobile device. In addition, the Long Term Evolution (LTE)-Advanced standardization group provides the concepts of the Enhanced Multimedia Broadcast and Multicast Service (E-MBMS) network architecture using a multi-cell transmission scheme. However a multi-cell transmission scheme demonstrates inefficiency in wireless resource usage in the case of small user group multicasts, such as social broadcasting and personal broadcasting services. Therefore, we propose a novel single-cell transmission scheme for small user group multicast services appropriate for the LTE-advanced system. We design a single-cell transmission scheme and show how the scheme is applied to a test-bed platform of the LTE-advanced system.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124196109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A genetic algorithm based power consumption scheduling in smart grid buildings","authors":"Eunji Lee, H. Bahn","doi":"10.1109/ICOIN.2014.6799726","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799726","url":null,"abstract":"With the recent advances in smart grid technologies as well as the increasing dissemination of smart meters, the electricity usage of every moment can be detected in modern smart building environments. Thus, the utility company adopts different price of electricity at each time slot considering the peak time. This paper presents a new power consumption scheduling algorithm for smart buildings that adopts smart meters and real-time pricing of electricity. The proposed algorithm dynamically changes the power mode of each electric device according to the change of electricity prices. Specifically, we formulate the electricity usage scheduling problem as a real-time task scheduling problem, and show that it is a complex search problem that has an exponential time complexity. The proposed scheme uses an efficient heuristic based on genetic algorithms to cut down the huge searching space and finds a reasonable schedule within a feasible time budget. Experimental results with various building conditions show that the proposed algorithm reduces the electricity charge of a smart building by 25.6% on average and up to 33.4%.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117282604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shimin Sun, Li Han, Sungchol Cho, Sunyoung Han, Junfeng Wang, B. Paillassa
{"title":"Performance optimization of media distribution in overlay networks using OpenFlow","authors":"Shimin Sun, Li Han, Sungchol Cho, Sunyoung Han, Junfeng Wang, B. Paillassa","doi":"10.1109/ICOIN.2014.6799481","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799481","url":null,"abstract":"Throughout the last decade, overlay multicast is a hot issue for media distribution services. High bandwidth consumption and multi-source multicasting in widely distributed networks is a critical issue for a wide range of applications including video conferencing, multi-party games, content distribution etc. A number of research projects have explored to use multicast as an efficient and scalable mechanism to deal with group oriented communications. However, there are still some limitations, such as long latency, duplicated packet transmission at certain points and lack of network equipment functionality support. With the appearance of Software Defined Networking, represented by OpenFlow devices, network control and management becomes possible to remote administrators. With the support of OpenFlow, it is possible to do some optimizations of existing media distribution mechanisms in overlay networks. In this paper, we proposed a novel method to improve the traditional overlay multicast relay networks with available limited number of OpenFlow devices, to cut down the bandwidth expenditures and perform a good control and management of media distribution services.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121946071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a trust management for VANETs","authors":"Yeongkwun Kim, Injoo Kim, C. Y. Shim","doi":"10.1109/ICOIN.2014.6799748","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799748","url":null,"abstract":"Information transmitted over a vehicular network may be sensitive and affect important safety decisions. Exchanging information must be based on trust; however, an issue that arises is the degree to which drivers can trust the received information from other (previously unknown) drivers. Thus, trust management is a fundamental and critical issue in vehicular ad-hoc networks (VANETs). However, studies and research have yet to thoroughly address this important problem. In this paper, we offer some discussion on the topic and propose a possible way of building an effective trust management system. Finally, we also present a discussion on the topics of privacy and reputation in VANETs.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129872508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of BitTorrent inspired by The Application Layer Traffic Optimization","authors":"Nattee Pinthong, W. Lilakiatsakun","doi":"10.1109/ICOIN.2014.6799483","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799483","url":null,"abstract":"This paper present an Analysis of BitTorrent inspired by The Application Layer Traffic Optimization. Recent studies suggest that the long-term relationships among BitTorrent peers can be explored to enhance the downloading performance. In such systems, The mechanisms like tit-for-tat, optimistic unchoking, anti-snubbing and various piece and selection strategy have been working very well. This work is an attempt to study the analysis of BitTorrent protocol and its networking infrastructure through two strategies, (A) we propose a novel approach to make BitTorrent node aware of the topology of underlying networks. Then we modify BitTorrent's original algorithms and replace them with new localized algorithms based on autonomous system (AS) hops. (B) we conduct comprehensive experiments to verify the correctness and effectiveness of our scheme based on the PeerSim simulation. The simulation result shows that, with our scheme, nodes in BitTorrent-like systems have better sense of the topology of their underlying networks, and can interact more efficiently. Besides, our scheme can help to decrease the traffic, optimize traffic distribution across the whole networks, and obtained are used to infer various performance parameters of BitTorrent protocols.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jhu-Jyun Jheng, Fan-Hsun Tseng, H. Chao, Li-Der Chou
{"title":"A novel VM workload prediction using Grey Forecasting model in cloud data center","authors":"Jhu-Jyun Jheng, Fan-Hsun Tseng, H. Chao, Li-Der Chou","doi":"10.1109/ICOIN.2014.6799662","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799662","url":null,"abstract":"In recent years, the resource demands in cloud environment have been increased incrementally. In order to effectively allocate the resources, the workload prediction of virtual machines (VMs) is a vital issue that makes the VM allocation more instantaneous and reduces the power consumption. In this paper, we propose a workload prediction method using Grey Forecasting model to allocate VMs, which is the first string in the research field. Firstly, we utilize the time-dependent of workload at the same period in every day, and forecast the VM workload tendency towards increasing or decreasing. Next, we compare the predicted value with previous time period on workload usage, then determine to migrate which VM wherein the physical machine (PM) for the balanced workload and lower power consumption. The simulation results show that our proposed method not only uses the fewer data to predict the workload accurately but also allocates the resource of VMs with power saving.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm","authors":"J. Konorski, A. Makutunowicz","doi":"10.1109/ICOIN.2014.6799488","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799488","url":null,"abstract":"We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures like smart grid systems, we seek a Threshold Attendance Protocol (TAP) that keeps the number of DISABLED nodes below a predefined threshold. The security challenge is that TAP messages have to be forwarded via the DSCC, which is exposed to various attacks and may turn rogue. In contrast, the nodes are arguably secure. For this `reverted security paradigm' we propose a TAP based on Shamir secret sharing, and discuss its correctness, optimizations and efficiency.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127914796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyoungchel Bae, Jongha Yoon, Yunseong Lee, Juho Lee, Taejin Kim, Jeongseok Yu, Sungrae Cho
{"title":"User-friendly demand side management for smart grid networks","authors":"Hyoungchel Bae, Jongha Yoon, Yunseong Lee, Juho Lee, Taejin Kim, Jeongseok Yu, Sungrae Cho","doi":"10.1109/ICOIN.2014.6799728","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799728","url":null,"abstract":"Demand side management (DSM) is an important technique for demand response (DR) system in smart grid networks. The DSM techniques traditionally have focused on minimizing electricity bill or peak load. More recent work reveals that users wish to reduce their electricity bills without sacrificing user convenience. Hence, waiting time has been introduced to reflect the user comfort for the DSM. Residents usually preferred that finish their work as soon as possible than less waiting time. These techniques have not taken previous usage pattern consideration, thus have been limited for use in home appliances. In this paper, we propose a system architecture and an algorithm for DSM referred to as user-friendly DSM (UDSM) using ICT. The UDSM is based on time-varying price information considering the following three-fold factors: electricity bill, usage pattern, and rebound peak load. Our proposed algorithm is divided into two steps. In the first step, we formulate the objective function based on electricity bill and usage pattern, and we minimize the electricity bill and maximize the usage similarity. Then, as the second step, we apply a load balancing algorithm to avoid blackout and to minimize rebound peak load. Our algorithm is tested in a real data from Jeju Island's smart grid test site, and experimental results validate the proposed DSM scheme shifts the operation to off-peak times and consequently leads to significant electricity bill saving and user satisfaction ratio.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hojae Lee, Seonghyun Kim, Sooyong Choi, Chungyong Lee, Daesik Hong, Sanghoon Lee, Jungshin Park, J. Kwun
{"title":"Load balancing based on dynamic overlay clustering","authors":"Hojae Lee, Seonghyun Kim, Sooyong Choi, Chungyong Lee, Daesik Hong, Sanghoon Lee, Jungshin Park, J. Kwun","doi":"10.1109/ICOIN.2014.6799707","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799707","url":null,"abstract":"In this paper, we propose a load balancing and a dynamic overlay clustering procedures including the fusion procedure. The proposed load balancing gets some loss for the throughput of the overall system but it improves the throughput of the cell-edge users. Through the simulations, we verify that the load and the number of users of the proposed system are changed uniformly. In addition, we demonstrate that the proposed system can improve the quality of service for cell-edge users while guaranteeing user fairness.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122294161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}