2014 Global Information Infrastructure and Networking Symposium (GIIS)最新文献

筛选
英文 中文
Energy efficient clustering protocol for WSN using PSO 基于粒子群算法的WSN节能聚类协议
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934271
Riham S. Elhabyan, M. Yagoub
{"title":"Energy efficient clustering protocol for WSN using PSO","authors":"Riham S. Elhabyan, M. Yagoub","doi":"10.1109/GIIS.2014.6934271","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934271","url":null,"abstract":"Clustering is an efficient topology control method to reduce energy consumption of the sensor nodes for maximizing lifetime and scalability of WSNs. The number of elected cluster heads can affect the network lifetime significantly. In this paper, a PSO-based protocol is used to find the optimal number of cluster heads to maximize the network energy efficiency. At the same time, the network coverage and links quality are taken into account. Furthermore, the effect of using realistic network and energy consumption model in cluster-based communication for WSN was investigated. Extensive simulations show that the proposed protocol outperforms the well-known cluster-based sensor network protocols in terms of average energy consumption while at the same time has acceptable data packets throughput.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115597803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Denial of Service (DoS) attacks detection in MANETs through statistical models 基于统计模型的manet拒绝服务攻击检测
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934261
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, D. Gaïti
{"title":"Denial of Service (DoS) attacks detection in MANETs through statistical models","authors":"M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, D. Gaïti","doi":"10.1109/GIIS.2014.6934261","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934261","url":null,"abstract":"Mobile ad-hoc networks (MANETs) are well known to be vulnerable to various attacks, due to features such as lack of centralized control, dynamic topology, and limited physical security. Denial of Service attacks still represent a serious threat for wireless networks. These attacks not only consume the system resources but also isolate legitimate users from the network. Grayhole attack is one of these attacks, which occurs when a malicious node drop some of received data packets during the route discovery process. To detect this attack, we propose in this paper a novel approach based on two Bayesian classification models: Bernoulli and Multinomial. Several tests have been performed using NS2 simulator. Our filters prove that intentionally dropping packets can be fully detected with a low-level of false alerts.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Extension of the parity check matrix to construct the best equivocation codes for syndrome coding 扩展奇偶校验矩阵构造最佳模糊码用于综合征编码
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934260
S. Al-Hassan, M. Z. Ahmed, M. Tomlinson
{"title":"Extension of the parity check matrix to construct the best equivocation codes for syndrome coding","authors":"S. Al-Hassan, M. Z. Ahmed, M. Tomlinson","doi":"10.1109/GIIS.2014.6934260","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934260","url":null,"abstract":"In this paper, we present a code design technique that produces the best equivocation codes(BEqC) for the syndrome coding scheme. This technique is based on the extension of the parity check matrix of a good (BEqC), [n, k] code by selecting the two best columns that extend the length of the code. The goal of this construction is to improve the communication security by increasing the equivocation rate. An efficient recursive method which derives the syndrome probability distribution for a particular code is presented to determine the equivocation rate for the Binary Symmetric Channel(BSC). Analysis show that the (BEqC) that is produced by adding two columns gives better equivocation rate compared to those codes that are produced by the addition of one column in two phases.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reducing DDoS attacks impact using a hybrid cloud-based firewalling architecture 使用基于混合云的防火墙架构减少DDoS攻击的影响
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934276
F. Guenane, M. N. Lima, G. Pujolle
{"title":"Reducing DDoS attacks impact using a hybrid cloud-based firewalling architecture","authors":"F. Guenane, M. N. Lima, G. Pujolle","doi":"10.1109/GIIS.2014.6934276","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934276","url":null,"abstract":"A Distributed Denial-of-Service attack is an attempt to prevent legitimate users from accessing information or services. In fact, it is a battle of resources between the defender and the attacker. Hence, in order to deal with the denial of services, the proposed mitigation tools are mainly based on the philosophy of Cloud computing which relies on sharing resources. In fact, it offers numerous resources, with high availability and performances. This concept provides us with a new way to cope with DDoS attacks. Cloud computing offered IT resources as services which are more affordable, flexible and attractive to business. Therefore, we present a DDoS attack mitigation service supported by an efficient and hybrid cloud based architecture. It uses the flexibility and the availability of the Cloud, as well as the support of traditional firewalls and intrusion detection systems, to cope with massive unanticipated volumes of traffic in order to improve their performance dynamically and on demand.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129661090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Addressing DODAG inconsistency attacks in RPL networks 解决RPL网络中的DODAG不一致攻击
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934253
A. Sehgal, Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment, J. Schönwälder
{"title":"Addressing DODAG inconsistency attacks in RPL networks","authors":"A. Sehgal, Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment, J. Schönwälder","doi":"10.1109/GIIS.2014.6934253","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934253","url":null,"abstract":"RPL is a routing protocol for low-power and lossy constrained node networks. A malicious node can manipulate header options used by RPL to track DODAG inconsistencies, thereby causing denial of service attacks, increased control message overhead, and black-holes at the targeted node. RPL counteracts DODAG inconsistencies by using a fixed threshold, upon reaching which all subsequent packets with erroneous header options are ignored. However, the fixed threshold is arbitrary and does not resolve the black-hole issue either. To address this we present a mitigation strategy that allows nodes to dynamically adapt against a DODAG inconsistency attack. We also present the forced black-hole attack problem and a solution that can be used to mitigate it. Results from our experiments show that our proposed approach mitigates these attacks without any significant overhead.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A location aware based handoff algorithm in V2I system of railway environment 铁路V2I系统中基于位置感知的切换算法
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934273
Juntao Li, T. Luo, Lei Ding
{"title":"A location aware based handoff algorithm in V2I system of railway environment","authors":"Juntao Li, T. Luo, Lei Ding","doi":"10.1109/GIIS.2014.6934273","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934273","url":null,"abstract":"By taking advantage of the regularity of train track, a high-data-rate access system based on 802.11 network is proposed for passengers to surf on Internet when they are travelling on the railway or subway. The system mainly consists of a gateway with multi-antennas on the train, terminals in the train and access points (APs) along the track. Then, a location aware based handoff algorithm (LAB-HA) is proposed to shorten the time on handoff, avoid the signaling storm and decrease the packet loss ratio caused by frequent handoff. In LAB-HA, numbers of handoff procedures between lots of terminals with passengers and APs along the way can be replaced by the only one handoff procedure between the gateway and APs. The LAB-HA algorithm contains three parts. Firstly, creating and maintaining a table of APs which contains the location information for handoff process. The candidate location area for handoff is selected by statistical learning, where the probability of successful handoff is nearly 100%. Secondly, the gateway is authenticated. Only when the gateway moves into an extended service set (ESS) at first time, it sends the authentication request packet to the new AP. Finally, the gateway on the train detects its location information by GPS periodically while moving. If it moves into the candidate area, the handoff process is triggered. The table is then updated by the result whether the handoff is successful or not. Simulation results reveal that LAB-HA can reduce the handoff latency dramatically compared with fast BSS transition (FT) in the 802.11 standard, and LAB-HA is more reliable while it provides higher throughput. LAB-HA can be used in wireless access network based on 802.11 for data transmission in some special scenes, such as subway or railway.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Establishing a rendezvous channel for co-located cognitive radios 为同址的认知无线电建立会合信道
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934285
Bhargavi Chandrakumar, M. N. Lima
{"title":"Establishing a rendezvous channel for co-located cognitive radios","authors":"Bhargavi Chandrakumar, M. N. Lima","doi":"10.1109/GIIS.2014.6934285","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934285","url":null,"abstract":"The open research problem of geographically colocated cognitive radios (CRs) identifying one another in an infrastructure-less setting is considered in the paper. We propose novel metrics to capture the dynamic spectrum access by other CRs and primary users (PUs). These metrics are used by CRs across the network to pick the best “common” channel to communicate (referred to as a rendezvous channel).","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114475491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time detection of reaction forces during gait on a ground equipped with a large force platform 地面大型受力平台上步态反作用力的实时检测
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934268
B. Samadi, M. Raison, C. Detrembleur, L. Ballaz
{"title":"Real-time detection of reaction forces during gait on a ground equipped with a large force platform","authors":"B. Samadi, M. Raison, C. Detrembleur, L. Ballaz","doi":"10.1109/GIIS.2014.6934268","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934268","url":null,"abstract":"Introduction: In health monitoring and biotelemetry, the real-time recording of ground reaction forces under each foot during gait has a large potential for the automatic detection of abnormal posture, falling prevention, etc. at home or in public places. For this, mounting a large force platform on/in the ground ensures to record data for numerous footsteps while avoiding the step `targeting' problem. Davis and Cavanagh (1993) have proposed a solution using a large force plate but several points of Davis and Cavanagh's method remain unclear and hardly computable. Objective: Develop a method that decomposes left and right GRF profiles from the GRF profile recorded on a single platform. This method aims to include a systematic detection of the single to double stand-phase-instants in order to lead to accurate measurement of the total GRF component in typically developing children. Methods: Six children were asked to walk without targeting their footsteps on a set-up composed of independent force platforms. The total GRF component, independently measured on the different platforms, was numerically summed to obtain the corresponding global total GRF, to which the decomposition method was applied. Then, the validation consisted in comparing the total GRF computed from this decomposition to the independently measured total GRF. Results: The mean relative error between the computed total GRF and the corresponding measured vertical GRF of 36 double stances (6 double stances × 6 children) is equal to 3.8±2.6%. Conclusion: We have implemented an innovative method to assess with accuracy the vertical GRF component under each foot using a unique large force platform. This leads to large perspectives in health monitoring and biotelemetry.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Hidden Markov Model security scheme for query state inference in discovery services 一种用于发现服务中查询状态推断的隐马尔可夫模型安全方案
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934263
A. Dahbi, M. Khair, H. Mouftah
{"title":"A Hidden Markov Model security scheme for query state inference in discovery services","authors":"A. Dahbi, M. Khair, H. Mouftah","doi":"10.1109/GIIS.2014.6934263","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934263","url":null,"abstract":"Discovery Services refer to a suite of network services enabling efficient track-and-trace capabilities of objects in the Internet of Things (IoT). Deployment of such services may be performed in the form of simple queries originating from the corresponding stakeholders either to store/retrieve data in/from the Cloud. An example of such services is the EPCglobal Discovery Services. The extremely sensitive nature and the expected large scale of the exchanged data in the IoT (e.g, the EPCglobal Network) highlight the importance of a security scheme capable of distinguishing safe queries from risky ones, based both on a vector of observed real values extracted from the current query, and on a pattern inferred from the past queries. In this paper, we propose a probabilistic security scheme enhancing the accuracy of detecting risky queries in the EPCglobal Network. Our proposed scheme is based on a Hidden Markov Model (HMM) which is first trained, then used to infer the state of the query at hand. We assume that the observed real values, extracted from the queries, follow Gaussian distributions, depending on the inherent nature of the query at hand; i.e. safe or risky. We conducted extensive experiments. The results show that our HMM-based security scheme enhances the accuracy of detecting risky queries.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122279865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for impulsive noise mitigation in ZigBee communication system ZigBee通信系统中脉冲噪声抑制的新方法
2014 Global Information Infrastructure and Networking Symposium (GIIS) Pub Date : 2014-10-23 DOI: 10.1109/GIIS.2014.6934265
Jia Jia, J. Meng
{"title":"A novel approach for impulsive noise mitigation in ZigBee communication system","authors":"Jia Jia, J. Meng","doi":"10.1109/GIIS.2014.6934265","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934265","url":null,"abstract":"This research focuses on improving the performance of ZigBee-based wireless communications in high impulsive noise environments such as those found in power utility and manufacturing facilities. Previous research has shown the physical layer used by the ZigBee standard to be vulnerable to impulsive noise due to its wide frequency spectrum and high energy content. Hence, our goal is to develop a novel protection scheme that limits the effects of impulsive noise on the ZigBee communication link. In this regard, a conventional Reed-Solomon encoder in combination with a novel composite comparison value filter is employed to manage impulsive noise. Our results indicate the ZigBee transmission performance is improved by our proposed approach.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"109 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信