{"title":"Energy efficient clustering protocol for WSN using PSO","authors":"Riham S. Elhabyan, M. Yagoub","doi":"10.1109/GIIS.2014.6934271","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934271","url":null,"abstract":"Clustering is an efficient topology control method to reduce energy consumption of the sensor nodes for maximizing lifetime and scalability of WSNs. The number of elected cluster heads can affect the network lifetime significantly. In this paper, a PSO-based protocol is used to find the optimal number of cluster heads to maximize the network energy efficiency. At the same time, the network coverage and links quality are taken into account. Furthermore, the effect of using realistic network and energy consumption model in cluster-based communication for WSN was investigated. Extensive simulations show that the proposed protocol outperforms the well-known cluster-based sensor network protocols in terms of average energy consumption while at the same time has acceptable data packets throughput.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115597803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, D. Gaïti
{"title":"Denial of Service (DoS) attacks detection in MANETs through statistical models","authors":"M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, D. Gaïti","doi":"10.1109/GIIS.2014.6934261","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934261","url":null,"abstract":"Mobile ad-hoc networks (MANETs) are well known to be vulnerable to various attacks, due to features such as lack of centralized control, dynamic topology, and limited physical security. Denial of Service attacks still represent a serious threat for wireless networks. These attacks not only consume the system resources but also isolate legitimate users from the network. Grayhole attack is one of these attacks, which occurs when a malicious node drop some of received data packets during the route discovery process. To detect this attack, we propose in this paper a novel approach based on two Bayesian classification models: Bernoulli and Multinomial. Several tests have been performed using NS2 simulator. Our filters prove that intentionally dropping packets can be fully detected with a low-level of false alerts.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extension of the parity check matrix to construct the best equivocation codes for syndrome coding","authors":"S. Al-Hassan, M. Z. Ahmed, M. Tomlinson","doi":"10.1109/GIIS.2014.6934260","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934260","url":null,"abstract":"In this paper, we present a code design technique that produces the best equivocation codes(BEqC) for the syndrome coding scheme. This technique is based on the extension of the parity check matrix of a good (BEqC), [n, k] code by selecting the two best columns that extend the length of the code. The goal of this construction is to improve the communication security by increasing the equivocation rate. An efficient recursive method which derives the syndrome probability distribution for a particular code is presented to determine the equivocation rate for the Binary Symmetric Channel(BSC). Analysis show that the (BEqC) that is produced by adding two columns gives better equivocation rate compared to those codes that are produced by the addition of one column in two phases.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing DDoS attacks impact using a hybrid cloud-based firewalling architecture","authors":"F. Guenane, M. N. Lima, G. Pujolle","doi":"10.1109/GIIS.2014.6934276","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934276","url":null,"abstract":"A Distributed Denial-of-Service attack is an attempt to prevent legitimate users from accessing information or services. In fact, it is a battle of resources between the defender and the attacker. Hence, in order to deal with the denial of services, the proposed mitigation tools are mainly based on the philosophy of Cloud computing which relies on sharing resources. In fact, it offers numerous resources, with high availability and performances. This concept provides us with a new way to cope with DDoS attacks. Cloud computing offered IT resources as services which are more affordable, flexible and attractive to business. Therefore, we present a DDoS attack mitigation service supported by an efficient and hybrid cloud based architecture. It uses the flexibility and the availability of the Cloud, as well as the support of traditional firewalls and intrusion detection systems, to cope with massive unanticipated volumes of traffic in order to improve their performance dynamically and on demand.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129661090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sehgal, Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment, J. Schönwälder
{"title":"Addressing DODAG inconsistency attacks in RPL networks","authors":"A. Sehgal, Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment, J. Schönwälder","doi":"10.1109/GIIS.2014.6934253","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934253","url":null,"abstract":"RPL is a routing protocol for low-power and lossy constrained node networks. A malicious node can manipulate header options used by RPL to track DODAG inconsistencies, thereby causing denial of service attacks, increased control message overhead, and black-holes at the targeted node. RPL counteracts DODAG inconsistencies by using a fixed threshold, upon reaching which all subsequent packets with erroneous header options are ignored. However, the fixed threshold is arbitrary and does not resolve the black-hole issue either. To address this we present a mitigation strategy that allows nodes to dynamically adapt against a DODAG inconsistency attack. We also present the forced black-hole attack problem and a solution that can be used to mitigate it. Results from our experiments show that our proposed approach mitigates these attacks without any significant overhead.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A location aware based handoff algorithm in V2I system of railway environment","authors":"Juntao Li, T. Luo, Lei Ding","doi":"10.1109/GIIS.2014.6934273","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934273","url":null,"abstract":"By taking advantage of the regularity of train track, a high-data-rate access system based on 802.11 network is proposed for passengers to surf on Internet when they are travelling on the railway or subway. The system mainly consists of a gateway with multi-antennas on the train, terminals in the train and access points (APs) along the track. Then, a location aware based handoff algorithm (LAB-HA) is proposed to shorten the time on handoff, avoid the signaling storm and decrease the packet loss ratio caused by frequent handoff. In LAB-HA, numbers of handoff procedures between lots of terminals with passengers and APs along the way can be replaced by the only one handoff procedure between the gateway and APs. The LAB-HA algorithm contains three parts. Firstly, creating and maintaining a table of APs which contains the location information for handoff process. The candidate location area for handoff is selected by statistical learning, where the probability of successful handoff is nearly 100%. Secondly, the gateway is authenticated. Only when the gateway moves into an extended service set (ESS) at first time, it sends the authentication request packet to the new AP. Finally, the gateway on the train detects its location information by GPS periodically while moving. If it moves into the candidate area, the handoff process is triggered. The table is then updated by the result whether the handoff is successful or not. Simulation results reveal that LAB-HA can reduce the handoff latency dramatically compared with fast BSS transition (FT) in the 802.11 standard, and LAB-HA is more reliable while it provides higher throughput. LAB-HA can be used in wireless access network based on 802.11 for data transmission in some special scenes, such as subway or railway.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishing a rendezvous channel for co-located cognitive radios","authors":"Bhargavi Chandrakumar, M. N. Lima","doi":"10.1109/GIIS.2014.6934285","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934285","url":null,"abstract":"The open research problem of geographically colocated cognitive radios (CRs) identifying one another in an infrastructure-less setting is considered in the paper. We propose novel metrics to capture the dynamic spectrum access by other CRs and primary users (PUs). These metrics are used by CRs across the network to pick the best “common” channel to communicate (referred to as a rendezvous channel).","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114475491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time detection of reaction forces during gait on a ground equipped with a large force platform","authors":"B. Samadi, M. Raison, C. Detrembleur, L. Ballaz","doi":"10.1109/GIIS.2014.6934268","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934268","url":null,"abstract":"Introduction: In health monitoring and biotelemetry, the real-time recording of ground reaction forces under each foot during gait has a large potential for the automatic detection of abnormal posture, falling prevention, etc. at home or in public places. For this, mounting a large force platform on/in the ground ensures to record data for numerous footsteps while avoiding the step `targeting' problem. Davis and Cavanagh (1993) have proposed a solution using a large force plate but several points of Davis and Cavanagh's method remain unclear and hardly computable. Objective: Develop a method that decomposes left and right GRF profiles from the GRF profile recorded on a single platform. This method aims to include a systematic detection of the single to double stand-phase-instants in order to lead to accurate measurement of the total GRF component in typically developing children. Methods: Six children were asked to walk without targeting their footsteps on a set-up composed of independent force platforms. The total GRF component, independently measured on the different platforms, was numerically summed to obtain the corresponding global total GRF, to which the decomposition method was applied. Then, the validation consisted in comparing the total GRF computed from this decomposition to the independently measured total GRF. Results: The mean relative error between the computed total GRF and the corresponding measured vertical GRF of 36 double stances (6 double stances × 6 children) is equal to 3.8±2.6%. Conclusion: We have implemented an innovative method to assess with accuracy the vertical GRF component under each foot using a unique large force platform. This leads to large perspectives in health monitoring and biotelemetry.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hidden Markov Model security scheme for query state inference in discovery services","authors":"A. Dahbi, M. Khair, H. Mouftah","doi":"10.1109/GIIS.2014.6934263","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934263","url":null,"abstract":"Discovery Services refer to a suite of network services enabling efficient track-and-trace capabilities of objects in the Internet of Things (IoT). Deployment of such services may be performed in the form of simple queries originating from the corresponding stakeholders either to store/retrieve data in/from the Cloud. An example of such services is the EPCglobal Discovery Services. The extremely sensitive nature and the expected large scale of the exchanged data in the IoT (e.g, the EPCglobal Network) highlight the importance of a security scheme capable of distinguishing safe queries from risky ones, based both on a vector of observed real values extracted from the current query, and on a pattern inferred from the past queries. In this paper, we propose a probabilistic security scheme enhancing the accuracy of detecting risky queries in the EPCglobal Network. Our proposed scheme is based on a Hidden Markov Model (HMM) which is first trained, then used to infer the state of the query at hand. We assume that the observed real values, extracted from the queries, follow Gaussian distributions, depending on the inherent nature of the query at hand; i.e. safe or risky. We conducted extensive experiments. The results show that our HMM-based security scheme enhances the accuracy of detecting risky queries.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122279865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for impulsive noise mitigation in ZigBee communication system","authors":"Jia Jia, J. Meng","doi":"10.1109/GIIS.2014.6934265","DOIUrl":"https://doi.org/10.1109/GIIS.2014.6934265","url":null,"abstract":"This research focuses on improving the performance of ZigBee-based wireless communications in high impulsive noise environments such as those found in power utility and manufacturing facilities. Previous research has shown the physical layer used by the ZigBee standard to be vulnerable to impulsive noise due to its wide frequency spectrum and high energy content. Hence, our goal is to develop a novel protection scheme that limits the effects of impulsive noise on the ZigBee communication link. In this regard, a conventional Reed-Solomon encoder in combination with a novel composite comparison value filter is employed to manage impulsive noise. Our results indicate the ZigBee transmission performance is improved by our proposed approach.","PeriodicalId":392180,"journal":{"name":"2014 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"109 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}