2019 29th International Telecommunication Networks and Applications Conference (ITNAC)最新文献

筛选
英文 中文
A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology 5G网络技术下基于物联网和D2D通信的灾害响应框架
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077975
Shakil Ahmed, M. A. Rashid, F. Alam, B. Fakhruddin
{"title":"A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology","authors":"Shakil Ahmed, M. A. Rashid, F. Alam, B. Fakhruddin","doi":"10.1109/ITNAC46935.2019.9077975","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077975","url":null,"abstract":"This paper provides a conceptual framework for designing a disaster response system based on Internet of Things (IoT) and Device to Device (D2D) under the new generation 5G mobile networks. The next generation of mobile network and technologies such as Fifth Generation cellular network (5G), Device to Device (D2D) communication, Internet of Things (IoT) and big data technology can play a significant role to overcome the drawbacks of the current disaster management system. A conceptual model is simulated to study the performance of the system. Preliminary results show the possible improvements in terms of enhancing responsiveness, increasing resilience and reliability and improving scalability.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"99 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving Prediction Accuracy for Power Consumption in Virtual Environments 提高虚拟环境中功耗预测的准确性
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077952
H. Salam, F. Davoli, A. Timm‐Giel
{"title":"Improving Prediction Accuracy for Power Consumption in Virtual Environments","authors":"H. Salam, F. Davoli, A. Timm‐Giel","doi":"10.1109/ITNAC46935.2019.9077952","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077952","url":null,"abstract":"Modern processors with multi-cores and several power states make power modeling of servers challenging. This issue becomes more complex in virtualized environments, owing to the presence of hypervisors. Requests and instructions as processed at the guest (i.e Virtual Machine, VM) level cannot be straightforwardly related to instructions processed at the host, and this relation varies with changing virtual environment configuration. However, observing performance at both levels, host and guest, might be helpful in developing realistic performance models. Also, the scale of virtual systems in modern computing environments such as data centers and clouds is very large, and these systems have massive data to manage, in terms of their allocation, scheduling, migration, etc. For such heterogeneous systems and large scale data, machine learning (ML) methodologies can play a vital role. Developing power and performance models using effective performance counters at host and guest level can provide significant features for training data. In this research work correlated performance counters for the running applications are monitored and trained for different models. This novel approach of monitoring performance counters at both levels provides in-depth performance information about individual VMs and servers. Results show that estimating power using these models reduces the prediction error, and hence can help in providing more effective power-aware decisions.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132778400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature 移动云计算的数据安全框架:文献综述
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9078007
Noah Oghenefego Ogwara, K. Petrova, M. Yang
{"title":"Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature","authors":"Noah Oghenefego Ogwara, K. Petrova, M. Yang","doi":"10.1109/ITNAC46935.2019.9078007","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078007","url":null,"abstract":"Using a mobile Internet connection, Mobile Cloud Computing (MCC) customers can access the powerful computational and storage resources made available by MCC service providers. However, the MCC environment is open to security attacks, especially at the more exposed mobile device (MD) end, as the low resourced MD may not be able to implement sufficiently advanced security protection mechanisms. A number of security frameworks addressing MCC data security issues have been proposed in the extant literature. This paper reviews a selection of MCC data security frameworks and identifies challenges and directions for further work. These include the development of an MCC data protection framework that provides a comprehensive protection against the threat spectrum and across all layers of the MCC infrastructure, by adequately addressing the fundamental security requirements.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129969698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Feature Selection: Multi-source and Multi-view Data Limitations, Capabilities and Potentials 特征选择:多源和多视图数据的限制、能力和潜力
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077992
M. Cherrington, Joan Lu, David Airehrour, F. Thabtah, Qiang Xu, Samaneh Madanian
{"title":"Feature Selection: Multi-source and Multi-view Data Limitations, Capabilities and Potentials","authors":"M. Cherrington, Joan Lu, David Airehrour, F. Thabtah, Qiang Xu, Samaneh Madanian","doi":"10.1109/ITNAC46935.2019.9077992","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077992","url":null,"abstract":"Feature Selection (FS) is a crucial step in high-dimensional and big data analytics. It mitigates the ‘curse of dimensionality’ by removing redundant and irrelevant features. Most FS algorithms use a single source of data and struggle with heterogeneous data, yet multi-source (MS) and multi-view (MV) data are rich and valuable knowledge sources. This paper reviews numerous, emerging FS techniques for both these data types. The major contribution of this paper is to underscore uses and limitations of these heterogeneous methods concurrently, by summarising their capabilities and potentials to inform key areas of future research, especially in numerous applications.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115264020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Method for Comparing OpenFlow and P4 一种比较OpenFlow和P4的方法
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077951
Paul Zanna, P. Radcliffe, K. G. Chavez
{"title":"A Method for Comparing OpenFlow and P4","authors":"Paul Zanna, P. Radcliffe, K. G. Chavez","doi":"10.1109/ITNAC46935.2019.9077951","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077951","url":null,"abstract":"OpenFlow has had a significant impact on computer networking and ushered in the age of Software Defined Networking (SDN). Now the P4 programming language promises to drive this innovation even further by allowing the unparalleled customisability of network devices. Even though they have different capabilities and goals, there is still an overlap in functionality between OpenFlow and P4. This overlap, predominately in the way packets are processed, has not been compared and therefore remains a question that could impact operators considering these two implementations. The primary reason for the lack of comparison data lies in the physical deployment model of these technologies. The inability to isolate pipeline processing and perform a comparison based on identical functionality, without the external influence from auxiliary functions, has made this type of measurement difficult. In this paper, we present such a comparison using the Zodiac FX a hybrid hardware/software Ethernet switch with a dedicated open-source firmware capable of running both implementations equally. By developing a P4 compiler backend capable of generating an equivalent packet processing pipeline for the Zodiac FX, we have been able to perform a direct like-for-like comparison of the performance and efficiency of these two approaches. This comparison highlights the similarity in performance of the two approaches when implementing the equivalent functionality on the same hardware.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Link Scheduling for Data Collection in SIC-Capable UAV Networks sic无人机网络数据采集链路调度
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077998
Yawen Zheng, Kwan-Wu Chin
{"title":"Link Scheduling for Data Collection in SIC-Capable UAV Networks","authors":"Yawen Zheng, Kwan-Wu Chin","doi":"10.1109/ITNAC46935.2019.9077998","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077998","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are ideal as aerial base stations, mobile relays or data collectors. In this paper, we consider a UAV with a Successive Interference Cancellation (SIC) radio that visits M collection points to download data from ground devices or sensors. The problem at hand is to determine the links to be scheduled at each data collection point. To this end, we formulate an Integer Linear Program (ILP) to compute the optimal transmission schedule. We also propose a Cross-Entropy (CE) approach to select links when there are a large number of ground devices. Our results show that SIC helps double the amount of data collected by the UAV. We also find that the average throughput is affected by the number of ground devices and the number of data collection points. Lastly, our CE approach is capable of producing a schedule that is near optimal.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Context-Aware and Technology-Assisted Informal Caregiver Selection Method to support Medical Emergency 情境感知和技术辅助的非正式护理人员选择方法以支持医疗紧急情况
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077991
Md. Akbar Hossain, S. K. Ray, Seyed Reza Shahamiri
{"title":"A Context-Aware and Technology-Assisted Informal Caregiver Selection Method to support Medical Emergency","authors":"Md. Akbar Hossain, S. K. Ray, Seyed Reza Shahamiri","doi":"10.1109/ITNAC46935.2019.9077991","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077991","url":null,"abstract":"Communities globally are experiencing an increasing number of patients with medical conditions and elderly people, living alone, who need immediate attention and support in case of medical emergency incidents. At times, even calling an ambulance becomes difficult for them and even then ambulance may turn up late causing to their sufferings. On the other hand, ambulances may turn up only to find a situation a non-emergency one not requiring an ambulance but that costs them money and wastes their time. In context to such situations, informal caregivers, in forms of friends, families and neighbours, can initially attend the patients and elderly people before the arrival of ambulance. Selection of appropriate informal caregivers is critical for a patient or a particular medical emergency situation and in this paper we propose a context-aware recommendation system (CARS) to recommend appropriate informal caregivers based on a list of pre-identified context information of informal caregivers, patients and elderly people. CARS operates as part of the technology-assisted medical emergency framework introduced by us. This work discusses the different phases of CARS, namely, context dimension, context acquisition and processing and context recommendation, and explains the entire informal caregiver recommendation procedure of CARS. Preliminary simulation results have shown that our proposed CARS perform better than other such existing systems.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks 物联网网络中用于中间人(MITM)攻击检测的混合路由
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077977
James Jin Kang, Kiran Fahd, S. Venkatraman, Rolando Trujillo-Rasua, P. Dowland
{"title":"Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks","authors":"James Jin Kang, Kiran Fahd, S. Venkatraman, Rolando Trujillo-Rasua, P. Dowland","doi":"10.1109/ITNAC46935.2019.9077977","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077977","url":null,"abstract":"Affordable and expandable low power networks such as 5G and Low Power Wide Area Networks (LPWAN) in the public and private network areas have improved network bandwidth capacities and processing performance. Internet of Things (IoT) technologies are increasing in popularity with numerous applications and devices being developed for smart environments and health-related applications. This raises security concerns in these networks, as many IoT devices handle confidential information such as IP/MAC addresses, which could be used to identify a user's location. As a result, there is vulnerability to data tampering by man-in-the-middle (MITM) attacks, which feature two observable characteristics: (1) there is a measurable delay in the session and (2) has unusual travel times compared to prior normal transactions. To improve the detection of these attacks, this paper proposes a novel scheme using a hybrid routing mechanism, which involves appointing dedicated nodes for enforcing routing between IoT devices and users with minimal intervention and workload to the network. The function of dedicated devices with more computational and battery power can provide three advantages: (1) determine secured paths within the network by avoiding suspicious nodes and networks, (2) provide stable travel times (less fluctuations) for a trusted time server (TTS) to improve the accuracy of estimated travel times, and (3) provide packet inspection for security checks. This proposed solution contributes towards increasing the security of IoT networks by enabling the real-time detection of intruders.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132415150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks 防止域名系统缓存投毒攻击的加密算法
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9078019
Xue Jun Li, M. Ma, N. Arjun
{"title":"An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks","authors":"Xue Jun Li, M. Ma, N. Arjun","doi":"10.1109/ITNAC46935.2019.9078019","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078019","url":null,"abstract":"One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many security protocols have been proposed. This paper proposes character-wise encryption (CWE) method to provide better security against CP attacks (the probability of successful attack is low as 10−33) as compared to the shift-key based method. In addition, the proposed method results in shorter encryption time. For example, with a domain name length of 30, CWE can reduce the encryption time by 10.7% as compared to the shift-key based method.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Staircase Power Distributions for Reduced Number of Power Levels for 5G Planar Array Antenna Analog Beamforming 面向5G平面阵列天线模拟波束成形的阶梯功率分布分析
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077979
Muhsiul Hassan, N. Nafi, Nguyen Vo, Rahul G. Thakkar, M. Gregory
{"title":"Analysis of Staircase Power Distributions for Reduced Number of Power Levels for 5G Planar Array Antenna Analog Beamforming","authors":"Muhsiul Hassan, N. Nafi, Nguyen Vo, Rahul G. Thakkar, M. Gregory","doi":"10.1109/ITNAC46935.2019.9077979","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077979","url":null,"abstract":"High frequency analog beamforming, especially over 20GHz array antenna, is a challenge as the width of the feed line is reduced. In this paper different beamforming techniques have been analysed using theory and simulation to compare Beam Efficiency (BE), 3 dB beamwidth and Minimum Side-lobe Level (MSLL). Techniques such as Gaussian, Taylor, and Chebyshev give more power levels that are complicated to implement in a very thin substrate system. Staircase power distribution is an exciting recent technique, and that can be tailored to reduce the number of power levels with the same features as in BE, 3 dB beamwidth and MSLL, which is a significant achievement. The analysis can be used to design power distribution feed lines for high frequency array antenna.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124126254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信