{"title":"Security Flaws and Improvement of a Cloud-Based Authentication Protocol for RFID Supply Chain Systems","authors":"J. Khor, M. Sidorov","doi":"10.1109/CCOMS.2018.8463255","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463255","url":null,"abstract":"Cloud-based radio frequency identification (RFID) is an emerging solution for supply chain systems to solve capacity limitation found in a traditional backend server. However, most of the solutions proposed in previous research works are not suitable to be implemented for resource constrained RFID tags. Therefore, a cloud-based mutual authentication (CMA) protocol was proposed by Lin et al. using a hash function and exclusive-OR and was claimed to achieve confidentiality, untraceability, mutual authentication, and forward secrecy. Furthermore, it was claimed that the protocol is resistant to tag/reader impersonation attacks, replay attacks, desynchronization attacks, and denial of service (DoS) attacks. However, this paper proves that the CMA protocol is vulnerable to two types of attack, namely desynchronization and DoS attacks. A detailed security analysis of the CMA protocol is shown in this paper to prove its security vulnerability. In addition, an enhanced CMA protocol is proposed in this paper that is secure against desynchronization and DoS attacks.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Frequency-Domain Signal Detection for Single-Carrier Spatial Modulation Systems","authors":"Yinman Lee, Sok-Ian Sou","doi":"10.1109/CCOMS.2018.8463352","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463352","url":null,"abstract":"It is shown that spatial modulation (SM) can be effectively combined with single-carrier (SC) transmission to obtain the advantages in both aspects for broadband wireless communications. However, the signal detection methods for the cyclic-prefix (CP) based SC-SM system are generally not sophisticated enough to provide good performance in many scenarios. In this paper, to lower the frequency-domain equalization complexity, we first consider employing a special recursive method to invert the Gram matrix in the minimum mean-squared-error (MMSE) weight calculation. Second, energy detection is used to locate the active transmit antennas for each SM symbol. Simple single-symbol maximum likelihood (ML) detection can then be used to extract the transmitted modulated symbols in those active transmit antennas with negligible loss in the error-rate performance. On the other hand, $M$ -algorithm is applied for enhancing the error rate to various extents. Results show that a better compromise between the computational complexity and the error rate can","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127887887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Collision Rate-Based Backoff Algorithm for Contention-Based Wireless Networks","authors":"Cheng-Han Lin, Yu-Chin Tsai, Yu Wei, C. Shieh","doi":"10.1109/CCOMS.2018.8463348","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463348","url":null,"abstract":"Following the rapid development of wireless networks, IEEE 802.11 technology has become the most widely used wireless network access technology. The contention channel of the distributed coordination function (DCF) is the default mechanism, which is used to determine the waiting time required before sending data. Once any collision has happened, the contention window expands to prevent future collisions, whereas when data has been successfully transmitted, the contention window shrinks to reduce backoff time. Determination of the increase or decrease of contention windows has become a vital to the transmission performance of networks. Through experimentation with different numbers of stations and different contention window sizes, this study found a collision rate range with superior efficiency, and thus proposed a collision rate-based backoff algorithm (CRBA). The proposed algorithm adjusts the contention window size according to collision rate, achieving enhanced efficiency and a reduced collision rate. According to the analysis of experimental results, the CRBA outperformed other relevant channel contention mechanisms (BEB, EIED, LILD, and ELBA) in terms of throughput, collision rate, and channel utilization rate.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Throughput Estimation Model for IEEE 802.11n MIMO Link in Wireless Local-Area Networks","authors":"Sumon Kumar Debnath, M. Saha, N. Funabiki, W. Kao","doi":"10.1109/CCOMS.2018.8463225","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463225","url":null,"abstract":"To design an efficient wireless local-area network (WLAN), we have studied the throughput estimation model for the IEEE 802.11n link both in indoor and outdoor environments. This model first estimates the received signal strength (RSS) at the receiving node using the log distance path loss model. Then, it converts RSS to the throughput using the sigmoid function. The parameters in these functions are optimized by applying the parameter optimization tool to measurement results. In this paper, we examine the throughput estimation model for the Multiple Input Multiple Output (MIMO) link in IEEE 802.11n. MIMO link can increase the transmission capacity using multiple streams. First, throughput measurements for MIMO links are conducted using commercial devices and software in three network fields. Then, using the results, the parameters in the model are optimized by the tool. The evaluation results show that this model can estimate throughputs with considerably high accuracy in any field when compared with the ns-3 network simulator. Besides, the model is modified to improve the accuracy when multiple hosts are communicating with one access point (AP) simultaneously.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128449386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Afdallyna Fathiyah Harun, S. Benford, C. O'Malley, Nor Laila Md Noor
{"title":"Playing with Rules: Structuring Written Rules for Visual Marker Design","authors":"Afdallyna Fathiyah Harun, S. Benford, C. O'Malley, Nor Laila Md Noor","doi":"10.1109/CCOMS.2018.8463261","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463261","url":null,"abstract":"Markers such as QR-codes is increasingly employed in information and entertainment media due to its ability to link the physical and virtual world offering new communication alternatives and interaction experience. Most types of markers are matrix forms which do not offer visual meaning - they are non-expressive limiting inference to the embedded content. d-touch overcame this issue by allowing users to design their own markers and control the aesthetic expression. However, to do this, a set of rules subscribing to the algorithm needs to be followed. We set to observe if children could grasp the rules through written instructions. We report a user study which demonstrate iterative attempts from children demonstrating that reliance on written instructions can be a frustrating process.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Formulization of Remote Robot System by Using Difference Differential Equation","authors":"Hitoshi Watanabe, Y. Ishibashi, Pingguo Huang","doi":"10.1109/CCOMS.2018.8463335","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463335","url":null,"abstract":"Destabilizations are pointed out in the remote robot systems with haptics under the condition of telecommunication delay and the countermeasure for mitigating these phenomenon by using viscosity have been proposed. But the mechanism is not clarified sufficiently. This paper proposes a formulization of analysis of the stability of the systems by using the difference differential equations. From this formulization, the stability condition of a certain case is obtained and one of elucidation of the effect of viscosity has been proposed. Moreover, an example that the characteristics' of operator influences the stability and the mitigation method has been investigated.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128847275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive Interest Adaptation and Content Caching for Adaptive Bit-Rate Video Streaming Over NDN","authors":"S. Awiphan, Kanin Poobai, Kenji Kanai, J. Katto","doi":"10.1109/CCOMS.2018.8463312","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463312","url":null,"abstract":"Named Data Networking (NDN) has been recently introduced as a new network architecture. The implementation of adaptive bit-rate video streaming on NDN is one of the most challenging tasks. The in-network caching feature of NDN could mislead a consumer to overestimate the end-to-end throughput for the next video segment. In this paper, we propose a strategy for more efficient rate adaptation by allowing Interest message adaptation in a hop-by-hop fashion. Moreover, the proactive content caching is designed to be utilized on the related router when a bottleneck on the transmission path was detected. The experiments using NDN-JS and DASH-JS demonstrate that our proposed solution provides better average stream bit-rate than the traditional rate adaptation method. Also, the link bandwidth consumption for video data transmission using the proposed scheme could be reduced efficiently.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Improving Gauss-Seidel Iteration for Signal Detection in Uplink Multiuser Massive MIMO Systems","authors":"Yinman Lee, Sok-Ian Sou","doi":"10.1109/CCOMS.2018.8463344","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463344","url":null,"abstract":"Gauss-Seidel (GS) iteration can be used to approximate the minimum mean-squared error (MMSE) result of signal detection in uplink multiuser massive MIMO systems. In this paper, we first propose to employ decision in GS iteration to enhance the detection performance in various aspects. Specifically, GS iteration with decision (GSID) converges faster than the conventional GS iteration and performs even better than the exact MMSE detection in terms of the resultant error rate. By virtue of the use of decision, interference cancelation can be employed to lower the dimension of the signal model in the detection process, and therefore the computational complexity can be significantly reduced. In addition, grey region is introduced in the signal constellation for decision, which lessens the error-propagation effect and further improves the error-rate performance.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124172796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. I. Suliman, Muhammad Safwan Abd Shukor, M. Kassim, R. Mohamad, S. Shahbudin
{"title":"Network Intrusion Detection System Using Artificial Immune System (AIS)","authors":"S. I. Suliman, Muhammad Safwan Abd Shukor, M. Kassim, R. Mohamad, S. Shahbudin","doi":"10.1109/CCOMS.2018.8463274","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463274","url":null,"abstract":"The number of computer network attacks are increasing due to the global use of Internet in our daily life. This has led to the increased risks of data stealing, hacking, privacy intrusion and others. The research on intrusion detection system (IDS) has gained significant attention due capacity. In this paper, we propose the use of Artificial Immune System (AIS) as the tool to detect the occurrence of intrusion in a computer network. In a computer network connection, many features are involved such as duration, type of protocol and type of service among others. The combination of different connection features can be grouped by using classification method. Based on this classification, IDS can be utilized to distinguish between valid and attack connections. Data from KDD Cup 99 competition were utilized in this study to determine the type of connection. The results obtained indicate that the proposed method is effective in identifying attack connections with a high success rate.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115349367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan-Ren Chen, I. Liu, Cheng-Wei Chou, Jung-Shian Li, Chuan-Gang Liu
{"title":"Multiple Virtual Machines Live Migration Scheduling Method Study on VMware vMotion","authors":"Yan-Ren Chen, I. Liu, Cheng-Wei Chou, Jung-Shian Li, Chuan-Gang Liu","doi":"10.1109/CCOMS.2018.8463330","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463330","url":null,"abstract":"VM vMotion is the key feature of virtualization and it allows a working virtual machine moving to another physical host without disrupting its service. When administrators perform VM vMotion, they need to consider the vMotion sequence, resource allocation problem and then run vMotion one by one by monitoring the whole vMotion process. However, when the data center is larger and needs to be redeployed, it will become highly complicated and manual operation will be very inefficient. Therefore we present the automatically scheduling method of multiple virtual machines migration to reduce operating procedures and minimize the total migration time. Experimental results show that 50% of the total migration time can be reduced.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124075659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}