2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)最新文献

筛选
英文 中文
New collaborative intrusion detection architecture based on multi agent systems 基于多智能体系统的新型协同入侵检测体系结构
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381338
M. E. Ajjouri, S. Benhadou, H. Medromi
{"title":"New collaborative intrusion detection architecture based on multi agent systems","authors":"M. E. Ajjouri, S. Benhadou, H. Medromi","doi":"10.1109/WINCOM.2015.7381338","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381338","url":null,"abstract":"The Intrusion Detection System architectures used in commercial and research systems have a number of problems that limit their configurability. An important problem of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper a new architecture for intrusion detection based in multi agent systems adding a learning feature abnormal behaviors that correspond to new attack patterns. We present the motivation and description of the approach, for the detection step, the approach adopted is based on the technique of Case-Based Reasoning (CBR). The proposed architecture is based on a hierarchical and distributed strategy separated into three layers. We focus after on the modeling of our Multi agent systems Architecture, for reasons of simplicity, we use the methodology O-MaSE.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Wireless operator strategies in emerging markets: Strategic options and directions 新兴市场的无线运营商战略:战略选择和方向
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381340
Hind Khyati
{"title":"Wireless operator strategies in emerging markets: Strategic options and directions","authors":"Hind Khyati","doi":"10.1109/WINCOM.2015.7381340","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381340","url":null,"abstract":"Wireless technologies and services in emerging markets have been central to enabling the communications explosion over the last decade that has, in many ways, revolutionized the lives and the economies of the people living there. The nature of the markets and the competitive dynamics in these regions are undergoing some delicate but very important shifts. This white paper analyzes the leading opportunities and challenges facing service providers in the wireless sector of emerging markets. It provides a clear view of the strategic options and directions required of wireless service providers - both communications service providers (CSPs) and mobile network operators (MNOs) - in an increasingly demanding ecosystem and insights into how they can profitably unlock a larger share of the customer wallet.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121725173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SKEP: A secret key exchange protocol using physiological signals in wireless body area networks SKEP:在无线体域网络中使用生理信号的秘密密钥交换协议
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381317
Najeh Jamali, L. Chaari
{"title":"SKEP: A secret key exchange protocol using physiological signals in wireless body area networks","authors":"Najeh Jamali, L. Chaari","doi":"10.1109/WINCOM.2015.7381317","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381317","url":null,"abstract":"The convergence of telecommunication technologies and the miniaturization of the electromechanical allowed an evolution proved in the world of wireless networks. This evolution is characterized by the emergence of a new generation of wireless personnel networks termed wireless body area networks (WBAN) that manages the human body functions. However, this technology has many requirements yet to be resolved. Security is the main challenge for this type of networks. In this paper, we propose a secret key exchange protocol using physiological signals in wireless body area networks (SKEP). This scheme allows a secure inter-sensor communication basing on physiological signals of the human body using cubic spline interpolation technique. Security analysis prove that our protocol guarantee data confidentiality and integrity in comparison with the previous protocol termed an efficient and secure key agreement scheme using physiological signals in body area networks.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A novel semi-analytical performance evaluation for a digital communication system using orthogonal series 基于正交级数的数字通信系统半解析性能评价方法
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381335
Mohamed Et-tolba, N. Tahiri, Nissrine Mahir
{"title":"A novel semi-analytical performance evaluation for a digital communication system using orthogonal series","authors":"Mohamed Et-tolba, N. Tahiri, Nissrine Mahir","doi":"10.1109/WINCOM.2015.7381335","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381335","url":null,"abstract":"Error probability is the most popular metric for evaluating the performance of a digital communication system. It is often estimated using Monte-Carlo simulation method since analytical expressions of the error probabilities are not always available especially for advanced communication systems. In this paper, we propose a new semi-analytical method for fast performance evaluation. This method is based on estimating the probability density using orthogonal series. We show that the proposed technique requires a few numbers of observation samples for performance evaluation compared with Monte-Carlo simulation. Consequently, it provides a significant gain in terms of computing time.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121116590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Roadmap towards beyond 4G: Key technologies and challenges for 5G 超越4G的路线图:5G的关键技术和挑战
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381324
S. E. Hassani, A. Haidine
{"title":"Roadmap towards beyond 4G: Key technologies and challenges for 5G","authors":"S. E. Hassani, A. Haidine","doi":"10.1109/WINCOM.2015.7381324","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381324","url":null,"abstract":"5G are being intensively studied in order to deliver systems by 2020. This paper presents technological challenges and perspectives beyond 4G systems. It addresses the research landscape of 5G systems and the requirements to be fullfilled. It also presents some key technologies driving 5G development in order to give form to the future generation mobile systems.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing cloud-generated logs using big data technologies 使用大数据技术管理云生成的日志
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381334
M. Lemoudden, B. E. Ouahidi
{"title":"Managing cloud-generated logs using big data technologies","authors":"M. Lemoudden, B. E. Ouahidi","doi":"10.1109/WINCOM.2015.7381334","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381334","url":null,"abstract":"Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, massive growth in the scale of data generated through cloud computing has been observed. A large part of that data has been machine-generated log data; it is generated at every layer and component within the cloud information technology ecosystem that spans a range of IT functions from storage and computation to networking and application services. Log files are essential for enterprise-level monitoring, troubleshooting, security, debugging, compliance, etc. We argue that cloud computing is in need of a new methodology for recording, managing, storing and analyzing the log data that is generated by the cloud infrastructure, based on big data technologies, allowing for the access to a wealth of knowledge that can contribute to its own advancement. Our paper discusses and expands existing standard log management solutions to design new methods of exploiting the unstructured log data in order to gain unprecedented insights.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128116332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Literature survey on dynamic community detection and models of social networks 动态社区检测与社会网络模型的文献综述
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381332
Imane Tamimi, Mohamed El-Kamili
{"title":"Literature survey on dynamic community detection and models of social networks","authors":"Imane Tamimi, Mohamed El-Kamili","doi":"10.1109/WINCOM.2015.7381332","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381332","url":null,"abstract":"In this paper, we realize a literature survey on the issue of community detection over time, first we present some basic concepts about networks modeled as graphs, then we state in an non exhaustive way the research fields arising from social networks. We present some of the existing models and methods to track communities over time. Community detection in networks is a prevailing subject in the area of social network analysis. There exist numerous methods and algorithms in the literature that have been dealing with that issue.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"50 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120883709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance assessment of the routing protocol for low power and lossy networks 低功耗损耗网络中路由协议的性能评估
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381329
Hanane Lamaazi, N. Benamar, M. Imaduddin, A. Jara
{"title":"Performance assessment of the routing protocol for low power and lossy networks","authors":"Hanane Lamaazi, N. Benamar, M. Imaduddin, A. Jara","doi":"10.1109/WINCOM.2015.7381329","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381329","url":null,"abstract":"RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) is proposed by the ROLL working group at IETF. This protocol used in the Internet of Things is optimal for Low power and Lossy Networks (LLNs). However, the RPL network has some limits when the network is dense. In this paper we evaluate the performance of RPL in three different scenarios. We first, evaluate the characteristics of RPL with fixed nodes, (one sink and others are senders). Then we add mobility, and we compare mobile nodes to fixed nodes in order to show how mobility can influence protocol parameters. Finally, we study the behavior of RPL when the network is dense in order to assess the protocol performances. In this study, we use Contiki OS and Cooja software for all simulations. The results show that RPL performances are greatly influenced by the number of nodes, type of mobility and the topology of the network. When the number of nodes increases, all metrics increase too, especially the power consumption which arrives until an augmentation of 52,85%. Furthermore, Random Waypoint Mobility Model (RWP) gives better metrics than Random Walk (RWK) Mobility Model in terms of number of hops and Expected Transmission (ETX) value. Also, in RWP model, nodes consume 10,73% of power than RWK. Our simulations show clearly that the power consumption is directly related to the number of sink nodes in the network. The more this type of node is present in the network the less power is consumed. The power reduction may occur till 5%.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Closed-form performance analysis of generalized M-QAM over multihop weibull fading channels 广义M-QAM在多跳威布尔衰落信道上的封闭性能分析
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381309
A. Soulimani, M. Benjillali
{"title":"Closed-form performance analysis of generalized M-QAM over multihop weibull fading channels","authors":"A. Soulimani, M. Benjillali","doi":"10.1109/WINCOM.2015.7381309","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381309","url":null,"abstract":"In this paper, we present a closed-form performance analysis of multihop cooperative schemes in the context of the global effort towards the design of future 5G systems. We adopt the advocated Weibull channel fading model for its flexible ability to cover different channel conditions, and supported by many recent measurement campaigns in various emerging 5G scenarios. The analyzed scheme consists of multiple \"Detect-and-Forward\" relays with generalized high-order M-QAM transmissions. The end-to-end performance of the multihop communication is evaluated in terms of the outage probability, bit error rate, and ergodic capacity. For all these metrics, we present exact closed-form expressions, some in terms of the Meijer's G-function. Numerical results illustrate the analysis, and Monte-Carlo simulations assess the accuracy of our obtained results for different system and channel parameters.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks 无线传感器网络中安全路由的一种新方法
2015 International Conference on Wireless Networks and Mobile Communications (WINCOM) Pub Date : 2015-10-01 DOI: 10.1109/WINCOM.2015.7381307
Ridouane El Mezouary, Abdellah Houmz, Jamila Jalil, M. Elkoutbi
{"title":"PRoPHET-RAIP5: A new approach to secure routing in wireless sensor networks","authors":"Ridouane El Mezouary, Abdellah Houmz, Jamila Jalil, M. Elkoutbi","doi":"10.1109/WINCOM.2015.7381307","DOIUrl":"https://doi.org/10.1109/WINCOM.2015.7381307","url":null,"abstract":"Probabilistic routing in wireless sensor network (WSNs) use the mobility history when making a forwarding decision. This type of routing provides a very rapid development and new perspectives in WSNs. However, there are several constraints and challenges to overcome the security problems. In this paper, we propose a security solution based on the RAID5 technology and a multi-path routing, to develop a protective mechanism against the various attacks in mobile WSNs. To demonstrate our concept, we have implemented this solution on Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET). We have compared our new protocol (PRoPHET-RAIP5) with standard PRoPHET to enhance security parameters.","PeriodicalId":389513,"journal":{"name":"2015 International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114996675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信