Shakil Ahmed, M. A. Rashid, F. Alam, B. Fakhruddin
{"title":"A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology","authors":"Shakil Ahmed, M. A. Rashid, F. Alam, B. Fakhruddin","doi":"10.1109/ITNAC46935.2019.9077975","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077975","url":null,"abstract":"This paper provides a conceptual framework for designing a disaster response system based on Internet of Things (IoT) and Device to Device (D2D) under the new generation 5G mobile networks. The next generation of mobile network and technologies such as Fifth Generation cellular network (5G), Device to Device (D2D) communication, Internet of Things (IoT) and big data technology can play a significant role to overcome the drawbacks of the current disaster management system. A conceptual model is simulated to study the performance of the system. Preliminary results show the possible improvements in terms of enhancing responsiveness, increasing resilience and reliability and improving scalability.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"99 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Prediction Accuracy for Power Consumption in Virtual Environments","authors":"H. Salam, F. Davoli, A. Timm‐Giel","doi":"10.1109/ITNAC46935.2019.9077952","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077952","url":null,"abstract":"Modern processors with multi-cores and several power states make power modeling of servers challenging. This issue becomes more complex in virtualized environments, owing to the presence of hypervisors. Requests and instructions as processed at the guest (i.e Virtual Machine, VM) level cannot be straightforwardly related to instructions processed at the host, and this relation varies with changing virtual environment configuration. However, observing performance at both levels, host and guest, might be helpful in developing realistic performance models. Also, the scale of virtual systems in modern computing environments such as data centers and clouds is very large, and these systems have massive data to manage, in terms of their allocation, scheduling, migration, etc. For such heterogeneous systems and large scale data, machine learning (ML) methodologies can play a vital role. Developing power and performance models using effective performance counters at host and guest level can provide significant features for training data. In this research work correlated performance counters for the running applications are monitored and trained for different models. This novel approach of monitoring performance counters at both levels provides in-depth performance information about individual VMs and servers. Results show that estimating power using these models reduces the prediction error, and hence can help in providing more effective power-aware decisions.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132778400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature","authors":"Noah Oghenefego Ogwara, K. Petrova, M. Yang","doi":"10.1109/ITNAC46935.2019.9078007","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078007","url":null,"abstract":"Using a mobile Internet connection, Mobile Cloud Computing (MCC) customers can access the powerful computational and storage resources made available by MCC service providers. However, the MCC environment is open to security attacks, especially at the more exposed mobile device (MD) end, as the low resourced MD may not be able to implement sufficiently advanced security protection mechanisms. A number of security frameworks addressing MCC data security issues have been proposed in the extant literature. This paper reviews a selection of MCC data security frameworks and identifies challenges and directions for further work. These include the development of an MCC data protection framework that provides a comprehensive protection against the threat spectrum and across all layers of the MCC infrastructure, by adequately addressing the fundamental security requirements.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129969698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Cherrington, Joan Lu, David Airehrour, F. Thabtah, Qiang Xu, Samaneh Madanian
{"title":"Feature Selection: Multi-source and Multi-view Data Limitations, Capabilities and Potentials","authors":"M. Cherrington, Joan Lu, David Airehrour, F. Thabtah, Qiang Xu, Samaneh Madanian","doi":"10.1109/ITNAC46935.2019.9077992","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077992","url":null,"abstract":"Feature Selection (FS) is a crucial step in high-dimensional and big data analytics. It mitigates the ‘curse of dimensionality’ by removing redundant and irrelevant features. Most FS algorithms use a single source of data and struggle with heterogeneous data, yet multi-source (MS) and multi-view (MV) data are rich and valuable knowledge sources. This paper reviews numerous, emerging FS techniques for both these data types. The major contribution of this paper is to underscore uses and limitations of these heterogeneous methods concurrently, by summarising their capabilities and potentials to inform key areas of future research, especially in numerous applications.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115264020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Comparing OpenFlow and P4","authors":"Paul Zanna, P. Radcliffe, K. G. Chavez","doi":"10.1109/ITNAC46935.2019.9077951","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077951","url":null,"abstract":"OpenFlow has had a significant impact on computer networking and ushered in the age of Software Defined Networking (SDN). Now the P4 programming language promises to drive this innovation even further by allowing the unparalleled customisability of network devices. Even though they have different capabilities and goals, there is still an overlap in functionality between OpenFlow and P4. This overlap, predominately in the way packets are processed, has not been compared and therefore remains a question that could impact operators considering these two implementations. The primary reason for the lack of comparison data lies in the physical deployment model of these technologies. The inability to isolate pipeline processing and perform a comparison based on identical functionality, without the external influence from auxiliary functions, has made this type of measurement difficult. In this paper, we present such a comparison using the Zodiac FX a hybrid hardware/software Ethernet switch with a dedicated open-source firmware capable of running both implementations equally. By developing a P4 compiler backend capable of generating an equivalent packet processing pipeline for the Zodiac FX, we have been able to perform a direct like-for-like comparison of the performance and efficiency of these two approaches. This comparison highlights the similarity in performance of the two approaches when implementing the equivalent functionality on the same hardware.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link Scheduling for Data Collection in SIC-Capable UAV Networks","authors":"Yawen Zheng, Kwan-Wu Chin","doi":"10.1109/ITNAC46935.2019.9077998","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077998","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are ideal as aerial base stations, mobile relays or data collectors. In this paper, we consider a UAV with a Successive Interference Cancellation (SIC) radio that visits M collection points to download data from ground devices or sensors. The problem at hand is to determine the links to be scheduled at each data collection point. To this end, we formulate an Integer Linear Program (ILP) to compute the optimal transmission schedule. We also propose a Cross-Entropy (CE) approach to select links when there are a large number of ground devices. Our results show that SIC helps double the amount of data collected by the UAV. We also find that the average throughput is affected by the number of ground devices and the number of data collection points. Lastly, our CE approach is capable of producing a schedule that is near optimal.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Akbar Hossain, S. K. Ray, Seyed Reza Shahamiri
{"title":"A Context-Aware and Technology-Assisted Informal Caregiver Selection Method to support Medical Emergency","authors":"Md. Akbar Hossain, S. K. Ray, Seyed Reza Shahamiri","doi":"10.1109/ITNAC46935.2019.9077991","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077991","url":null,"abstract":"Communities globally are experiencing an increasing number of patients with medical conditions and elderly people, living alone, who need immediate attention and support in case of medical emergency incidents. At times, even calling an ambulance becomes difficult for them and even then ambulance may turn up late causing to their sufferings. On the other hand, ambulances may turn up only to find a situation a non-emergency one not requiring an ambulance but that costs them money and wastes their time. In context to such situations, informal caregivers, in forms of friends, families and neighbours, can initially attend the patients and elderly people before the arrival of ambulance. Selection of appropriate informal caregivers is critical for a patient or a particular medical emergency situation and in this paper we propose a context-aware recommendation system (CARS) to recommend appropriate informal caregivers based on a list of pre-identified context information of informal caregivers, patients and elderly people. CARS operates as part of the technology-assisted medical emergency framework introduced by us. This work discusses the different phases of CARS, namely, context dimension, context acquisition and processing and context recommendation, and explains the entire informal caregiver recommendation procedure of CARS. Preliminary simulation results have shown that our proposed CARS perform better than other such existing systems.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
James Jin Kang, Kiran Fahd, S. Venkatraman, Rolando Trujillo-Rasua, P. Dowland
{"title":"Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks","authors":"James Jin Kang, Kiran Fahd, S. Venkatraman, Rolando Trujillo-Rasua, P. Dowland","doi":"10.1109/ITNAC46935.2019.9077977","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077977","url":null,"abstract":"Affordable and expandable low power networks such as 5G and Low Power Wide Area Networks (LPWAN) in the public and private network areas have improved network bandwidth capacities and processing performance. Internet of Things (IoT) technologies are increasing in popularity with numerous applications and devices being developed for smart environments and health-related applications. This raises security concerns in these networks, as many IoT devices handle confidential information such as IP/MAC addresses, which could be used to identify a user's location. As a result, there is vulnerability to data tampering by man-in-the-middle (MITM) attacks, which feature two observable characteristics: (1) there is a measurable delay in the session and (2) has unusual travel times compared to prior normal transactions. To improve the detection of these attacks, this paper proposes a novel scheme using a hybrid routing mechanism, which involves appointing dedicated nodes for enforcing routing between IoT devices and users with minimal intervention and workload to the network. The function of dedicated devices with more computational and battery power can provide three advantages: (1) determine secured paths within the network by avoiding suspicious nodes and networks, (2) provide stable travel times (less fluctuations) for a trusted time server (TTS) to improve the accuracy of estimated travel times, and (3) provide packet inspection for security checks. This proposed solution contributes towards increasing the security of IoT networks by enabling the real-time detection of intruders.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132415150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks","authors":"Xue Jun Li, M. Ma, N. Arjun","doi":"10.1109/ITNAC46935.2019.9078019","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078019","url":null,"abstract":"One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many security protocols have been proposed. This paper proposes character-wise encryption (CWE) method to provide better security against CP attacks (the probability of successful attack is low as 10−33) as compared to the shift-key based method. In addition, the proposed method results in shorter encryption time. For example, with a domain name length of 30, CWE can reduce the encryption time by 10.7% as compared to the shift-key based method.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhsiul Hassan, N. Nafi, Nguyen Vo, Rahul G. Thakkar, M. Gregory
{"title":"Analysis of Staircase Power Distributions for Reduced Number of Power Levels for 5G Planar Array Antenna Analog Beamforming","authors":"Muhsiul Hassan, N. Nafi, Nguyen Vo, Rahul G. Thakkar, M. Gregory","doi":"10.1109/ITNAC46935.2019.9077979","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077979","url":null,"abstract":"High frequency analog beamforming, especially over 20GHz array antenna, is a challenge as the width of the feed line is reduced. In this paper different beamforming techniques have been analysed using theory and simulation to compare Beam Efficiency (BE), 3 dB beamwidth and Minimum Side-lobe Level (MSLL). Techniques such as Gaussian, Taylor, and Chebyshev give more power levels that are complicated to implement in a very thin substrate system. Staircase power distribution is an exciting recent technique, and that can be tailored to reduce the number of power levels with the same features as in BE, 3 dB beamwidth and MSLL, which is a significant achievement. The analysis can be used to design power distribution feed lines for high frequency array antenna.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124126254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}