2020 13th International Conference on Communications (COMM)最新文献

筛选
英文 中文
COMM 2020 Copyright Page COMM 2020版权页面
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/comm48946.2020.9141993
{"title":"COMM 2020 Copyright Page","authors":"","doi":"10.1109/comm48946.2020.9141993","DOIUrl":"https://doi.org/10.1109/comm48946.2020.9141993","url":null,"abstract":"","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114634045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Performance of Virtualised Communication Systems 虚拟通信系统性能研究
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141950
Adrian Popescu
{"title":"On the Performance of Virtualised Communication Systems","authors":"Adrian Popescu","doi":"10.1109/COMM48946.2020.9141950","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141950","url":null,"abstract":"The paper provides a framework for the definition and provision of performance in virtualised communication systems. For doing this, basic concepts and elements used in the performance provision in non-SDN/NFV networking environments are used. Based on that, adequate performance frameworks can be defined, including relevant metrics and models, to be used in the development, deployment and operation of future Software Defined Networking and Network Function Virtualisation (SDN/NFV) environments.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130051687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Aspects of Communications in VANETs VANETs中通信的安全问题
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142034
Stefan Mihai, Nedzhmi Dokuz, Meer Saqib Ali, P. Shah, R. Trestian
{"title":"Security Aspects of Communications in VANETs","authors":"Stefan Mihai, Nedzhmi Dokuz, Meer Saqib Ali, P. Shah, R. Trestian","doi":"10.1109/COMM48946.2020.9142034","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142034","url":null,"abstract":"The Fourth Industrial Revolution has begun and it promises breakthroughs in Artificial Intelligence, robotics, Machine Learning, Internet of Things, Digital Twin, and many other technologies that tackle advancements in the industries. The trend is headed towards automation and connectivity. In the automotive industry, advancements have been made towards integrating autonomous driving vehicles into Intelligent Transport Systems (ITS) with the use of Vehicular Ad-Hoc Networks (VANETs). The purpose of this type of network is to enable efficient communication between vehicles ( V2V communication) or vehicles and infrastructure (V2I communication), to improve driving safety, to avoid traffic congestion, and to better coordinate transport networks. This direction towards limited (or lack of) human intervention implies vulnerability to cyber attacks. In this context, this paper provides a comprehensive classification of related state-of-the-art approaches following three key directions: privacy, authentication and message integrity within VANETs. Discussions, challenges and open issues faced by the current and next generation of vehicular networks are also provided.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SDR-Based Platform for Processing the Images Transmitted Through the WLAN 802.11a Protocol 基于sdr的无线局域网802.11a协议图像处理平台
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141960
A. Timofte, Florinel Radu, A. Balan, T. Balan
{"title":"SDR-Based Platform for Processing the Images Transmitted Through the WLAN 802.11a Protocol","authors":"A. Timofte, Florinel Radu, A. Balan, T. Balan","doi":"10.1109/COMM48946.2020.9141960","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141960","url":null,"abstract":"In this paper, it is presented the implementation of a fast and versatile system with software defined radio, that contains data processing and radio communication algorithms, using the processing power of the integrated system on chip and the flexibility introduced by the programmable logic. The demonstrator system transmits and receives data – image captures of cars – using the local area wireless 802.11a protocol. The license plates of the cars are extracted and recognized, as part of an identification process that validates our solution.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Provision of Reliable Network Storage in Highly Mobile Environments 探索在高移动环境中提供可靠的网络存储
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142033
O. A. Ezenwigbo, Jose Ramirez, G. Karthick, G. Mapp, R. Trestian
{"title":"Exploring the Provision of Reliable Network Storage in Highly Mobile Environments","authors":"O. A. Ezenwigbo, Jose Ramirez, G. Karthick, G. Mapp, R. Trestian","doi":"10.1109/COMM48946.2020.9142033","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142033","url":null,"abstract":"Computing is fundamentally about processing data which must be readily accessible to processing elements. Hence, the use of storage hierarchies plays an important role in the overall performance of computer systems. Recently, due to the deployment of fast networks, network storage has emerged as a viable alternative to large local storage systems. However, trying to provide reliable network storage in highly mobile environments, such as vehicular networks, results in the need to address several issues. This paper explores these challenges by first looking at the communication dynamics required for seamless connectivity in these networks. It then looks at how services can be migrated as users move around. The results of this analysis are applied to the migration of a simple Network Memory Server using different migration techniques such as Docker, KVM, LXD and Unikernels in an edge environment, represented by a real Vehicle Ad-Hoc Network. The results show that a proactive approach to service migration is needed to support such services in highly mobile environments.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123290395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum High Secure Direct Communication with Authentication 量子高安全直接通信与认证
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142030
Liliana Zisu
{"title":"Quantum High Secure Direct Communication with Authentication","authors":"Liliana Zisu","doi":"10.1109/COMM48946.2020.9142030","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142030","url":null,"abstract":"A quantum high secure direct communication with authentication protocol is proposed by using single photons. The high security of the protocol is achieved on levels. The first level involves the verification of the quantum channel security by using fake photons. The authentication process is also ensured by the fake photons. The second level of security is given by the use of multiple polarization bases. The secret message is encoded in groups of photons; each single character of the message is associated with m (m≥7) photons. Thus, at least 27 (128) characters will be encoded. In order to defeat the quantum teleportation attack, the string of bits associated to the secret message is encrypted with a secret string of bits by using XOR operator. Encryption of the sender's identity string and the receiver's identity string by the XOR operator with a random string of fake photons defends quantum man-in-the-middle attack efficiently. Quantum memory is required to implement our protocol. Storage of quantum information is a key element in quantum information processing and provides a more flexible, effective and efficient communication. Our protocol is feasible with current technologies.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124488255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SABRES - A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures SABRES -增强云合格电子签名的概念证明
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141954
Iulian Aciobanitei, Vlad Dedita, Mihai-Lica Pura, V. Patriciu
{"title":"SABRES - A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures","authors":"Iulian Aciobanitei, Vlad Dedita, Mihai-Lica Pura, V. Patriciu","doi":"10.1109/COMM48946.2020.9141954","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141954","url":null,"abstract":"Public Key Infrastructure (PKI) is an essential technology that enables secure communications over the Internet. Trust Service Providers (TSPs) have a crucial role in assuring the binding of the owner’s identity to the public key through the digital certificates. Therefore, any breach may lead to major security and privacy issues. Since 2013, proposed solutions aim to improve the security of PKIs, many of them by using blockchain technology. This way a distributed trust is obtained. But the majority of the proposed solutions are not compliant with the working standards and therefore the adoption process is very difficult. Offering cloud Qualified Electronic Signatures (QES) services puts even more pressure on the TSPs, which have to ensure the sole control of the user over the private keys stored server-side. The solutions proposed so far to assure this sole control of the user have been focused on proposing remote signature protocols that guarantee the exclusive access of the user to the private keys. The problem is that this exclusiveness cannot be formally proved to the user. Therefore, in the end, this goes down to just trusting the TSP. In this context, introducing a distributed trust source would significantly grow the reliability and security of the cloud QES services. The current paper proposes a new solution that uses blockchain to improve trust in QES performed in the cloud, but not through a signature protocol, but through a distributed means of logging and verifying all accesses to one’s private key. The proposed solution is fully compliant with all working standards for cloud QES and combines PKI and blockchain advantages: interoperability with current working systems and distributed trust.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reflection Coefficient in Pressure Pulse of Human Blood Flow 人体血流压力脉冲反射系数
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142027
L. Evdochim, A. Zhdanov, V. Borisov, D. Dobrescu
{"title":"Reflection Coefficient in Pressure Pulse of Human Blood Flow","authors":"L. Evdochim, A. Zhdanov, V. Borisov, D. Dobrescu","doi":"10.1109/COMM48946.2020.9142027","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142027","url":null,"abstract":"The cardiovascular system is a result of evolutionary process with the main purpose to streamline its functionality. Although, applying scientific theorems on this biological system the first impression will be that is behave in a weird manner. Analyzing the pulse pressure waveform from brachial artery will show that the primary wave which is given by the heart cycle is followed by a secondary wave. The ratio of the amplitudes of the two waves during at one cardiac cycle given the reflection coefficient. This term has a major importance in medical diagnosis since it reveals cardiovascular disease or give an insight about performance of the blood flow. An experiment with external induced pressure was made in order to highlight the behavior of the arterial system. The test was conducted on a young healthy subject without any cardiovascular affection in the past. The results show a variation of the reflection coefficient dependent by the subject systolic and diastolic pressure.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114300359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CNN Hyperspectral Image Classification Using Training Sample Augmentation with Generative Adversarial Networks 基于生成对抗网络的训练样本增强CNN高光谱图像分类
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142021
V. Neagoe, Paul Diaconescu
{"title":"CNN Hyperspectral Image Classification Using Training Sample Augmentation with Generative Adversarial Networks","authors":"V. Neagoe, Paul Diaconescu","doi":"10.1109/COMM48946.2020.9142021","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142021","url":null,"abstract":"A big challenge for hyperspectral image recognition is to perform pixel classification when only a few hyperspectral training labeled pixels are available. In this research we have built Generative Adversarial Networks (GANs) that generate additional virtual training hyperspectral pixels based on features extracted from the originally labeled pixels belonging to training dataset. The experiments show a better performance of pixel classification for a classifier based on Deep Convolutional Neural Networks (DCNNs) using GANs for training sample augmentation versus the performance of the DCNN classifier without GAN augmentation. The score of 95.32% correct classification using DCNN classifier with GANs versus the score of 92.94% of DCNN classifier without GANs proves the obvious advantage of the presented approach.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121597853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security threats identification and definition in early design phases of automotive IT services 汽车IT服务早期设计阶段的安全威胁识别和定义
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142039
R. Lupu, Octavian Catrina, Nicolas Moro
{"title":"Security threats identification and definition in early design phases of automotive IT services","authors":"R. Lupu, Octavian Catrina, Nicolas Moro","doi":"10.1109/COMM48946.2020.9142039","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142039","url":null,"abstract":"As part of security and privacy threats modelling process, the systematic identification, definition and analysis of threats is important to accurately highlight the resources that would ultimately play a critical role in achieving the organization’s business objectives. We show how we proceeded to identify and formalize the security threats based on the automotive emergency service use-case scenario. Furthermore, we propose a technique to scale for scenarios with many stakeholders. Even though the related information system was in its concept phase (i.e. only coarse risk assessment was possible), we focused on the rigorous dichotomy of the business assets and critical resources and the mapping in-between via the security goals set definition, a technique that facilitates the definition of the attacks’ goals, as well as a more precise evaluation of the impacts on organization business assets.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信