2019 29th International Telecommunication Networks and Applications Conference (ITNAC)最新文献

筛选
英文 中文
Realization of congestion-aware energy-aware virtual link embedding 拥塞感知、能量感知虚拟链路嵌入的实现
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077957
Minh Pham, D. Hoang, Z. Chaczko
{"title":"Realization of congestion-aware energy-aware virtual link embedding","authors":"Minh Pham, D. Hoang, Z. Chaczko","doi":"10.1109/ITNAC46935.2019.9077957","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077957","url":null,"abstract":"Network virtualization is an inherent component of future internets. Network resources are virtualized and provisioned to users on demand. The virtual network embedding entails two processes: node mapping and link mapping. However, efficient and practical solutions to the link mapping problem in software-defined networks (SDN) and data centers are still lacking. This paper proposes a solution to the link mapping (LiM) process that can dynamically interact with the routing protocols of the substrate network to allocate virtual link requests to the underlying substrate links, satisfies optimizing cost, minimizing energy consumption, and avoiding congestion (CEVNE) concurrently. CEVNE LiM is realized as a composite application on top of the SDN controller running the Segment Routing (SR) application. The performance of the CEVNE LiM algorithm is compared with the k-shortest path link mapping algorithm and shows its superior performance in terms of the overall runtime, the average path length, the average node stress, the average link stress, and the overall energy consumption.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensic Readiness In Wireless Medical Systems 无线医疗系统中的数字取证准备
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9078005
A. Kyaw, B. Cusack, Raymond Lutui
{"title":"Digital Forensic Readiness In Wireless Medical Systems","authors":"A. Kyaw, B. Cusack, Raymond Lutui","doi":"10.1109/ITNAC46935.2019.9078005","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078005","url":null,"abstract":"individuals and businesses has become dependent on digital devices. These devices and services are used in the healthcare systems including hospitals as Wireless Medical Networks (WMedSys). Security incidents in the WMedSys have increased over the past few years. This paper reports research into digital forensic readiness in wireless medical systems by inserting forensic readiness states into the network system and preparing mitigation for security failure. A design is built and tested, and then validated by expert feedback. The contribution of this research is to present a novel conceptual design for a digital forensic readiness framework for WMedSys, which can be easily implemented and integrated into existing wireless networks in the healthcare sector.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121019330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Download Traffic Scheduling for CubeSats Swarms with Inter-Satellite Links 下载具有卫星间链路的立方体卫星群的流量调度
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077987
Yawen Zheng, Kwan-Wu Chin, Luyao Wang
{"title":"Download Traffic Scheduling for CubeSats Swarms with Inter-Satellite Links","authors":"Yawen Zheng, Kwan-Wu Chin, Luyao Wang","doi":"10.1109/ITNAC46935.2019.9077987","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077987","url":null,"abstract":"This paper considers maximizing the total downloaded data from a CubeSats swarm to ground stations. The key challenges include intermittent contact time and duration with ground stations, and limited resources. It aims to study the benefits of transferring data over Inter-Satellite Links (ISLs). It presents four satellite-to-ground (s-g) pairing rules; namely, Pair Transmit Most Data (PTMD), Random Pair (RP), Shortest Contact Duration (SCD), and Round Robin (RR). The results indicate that ISLs help CubeSats ensure they have more data to download to ground stations. Moreover, the use of ISLs simplifies s - $g$ pairing because any of the aforementioned rules can be used to yield similar amounts of downloaded data.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outdoor Signal Performance of LoRaWAN Technology for Campus-Scale IoT Connectivity LoRaWAN技术用于校园规模物联网连接的室外信号性能
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077978
Rais Rizal Yunus, H. Z. Abidin, F. Zaman, S. Abdullah
{"title":"Outdoor Signal Performance of LoRaWAN Technology for Campus-Scale IoT Connectivity","authors":"Rais Rizal Yunus, H. Z. Abidin, F. Zaman, S. Abdullah","doi":"10.1109/ITNAC46935.2019.9077978","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077978","url":null,"abstract":"Long range with low-power consumption wireless platform known as LoRa, is increasingly popular technology. It is specifically tailored for Low Power Area Network (LPWAN s). It offers long distance, efficient energy management, and low data rates for wireless communication. This technology has the potential to realize the application of the Internet of Things (IoT). Numerous studies have been carried out to evaluate the performance of LoRa technology. In this paper, the outdoor signal performance of Long Range Wide Area Network (LoRaWAN) technology is studied. The study is done to evaluate the outdoor signal performance of LoRaWANand to observe the relations between the signal parameters. The test was conducted at Universiti Teknologi Mara (UiTM) campus in Shah Alam, Selangor. The performance was measured in terms of Received Signal Strength Indicator (RSSI), Signal to Noise Ratio (SNR), and Time on Air (ToA) for different Spreading Factor (SF). The results show that LoRaWANtechnology is highly adaptable to be used in campus scale as well as urban IoT connectivity.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127224026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Theoretical Analysis of Equal-Weight (2, 2) VSS on VN-CSK Illumination Light Communication 等权(2,2)VSS在VN-CSK照明光通信中的理论分析
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077954
Keisuke Manaka, Liyuan Chen, H. Habuchi, Y. Kozawa
{"title":"Theoretical Analysis of Equal-Weight (2, 2) VSS on VN-CSK Illumination Light Communication","authors":"Keisuke Manaka, Liyuan Chen, H. Habuchi, Y. Kozawa","doi":"10.1109/ITNAC46935.2019.9077954","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077954","url":null,"abstract":"On illumination light communications, the optical-wireless transmission scheme, which combines the visual secret sharing (VSS) scheme with the variable N-parallel code-shift-keying (VN-CSK) system, has been proposed. In this paper, the error rate performances of VSS data and two specified message data is theoretical analyzed under the general condition in which the distance from one lighting apparatus is not equal with the distance from another lighting apparatus. The relationship between the error rate and the receiver position is clarified when SNR on the receiver position (length, width, height) = (2.5,2.5,0.85) [m] is 15[dB] and the dimming level $N=1$. The optimum receiver position is (2.5, 2.5, 0.85), and then BER of VSS data achieves 4.0×10−3. It is found that SNR more than 20[dB] is necessary to provide a practical use of VSS data. On the other hand, BER of the message data from LED#1 becomes a minimum value when the receiver position is (1.25,2.5,0.85). Therefore, BER of the message data is considerably superior to that of VSS data.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree 基于人工免疫系统决策树的简易MANET自利节点检测
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077968
L. Jim, M. Gregory
{"title":"Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree","authors":"L. Jim, M. Gregory","doi":"10.1109/ITNAC46935.2019.9077968","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077968","url":null,"abstract":"Mobile Ad hoc networks (MANET) are a grouping of independent mobile devices that can act as both host and router. This type of network does not require a centralized controller, can be created or dissolved dynamically, and does not necessarily include fixed infrastructure. MANETs encounter packet delays and loss due to the presence of nodes with malicious intent. Nodes that deviate from normal behavior are termed as selfish nodes. A selfish node is responsible for packet loss, often to conserve energy, and this harms traffic flows within the MANET. MANET nodes take on the responsibility for the relay and routing of packets being transmitted across the network and it is vital that the participating nodes remain unselfish. However, nodes may become selfish as resources diminish, particularly energy, and it is important to identify selfish nodes so that they can be avoided from the routing path. Here an improved scheme based on an Artificial Immune System incorporating a Decision Tree is used to identify selfish nodes. This strategy improves MANET packet delivery performance.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology 5G网络技术下基于物联网和D2D通信的灾害响应框架
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077975
Shakil Ahmed, M. A. Rashid, F. Alam, B. Fakhruddin
{"title":"A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology","authors":"Shakil Ahmed, M. A. Rashid, F. Alam, B. Fakhruddin","doi":"10.1109/ITNAC46935.2019.9077975","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077975","url":null,"abstract":"This paper provides a conceptual framework for designing a disaster response system based on Internet of Things (IoT) and Device to Device (D2D) under the new generation 5G mobile networks. The next generation of mobile network and technologies such as Fifth Generation cellular network (5G), Device to Device (D2D) communication, Internet of Things (IoT) and big data technology can play a significant role to overcome the drawbacks of the current disaster management system. A conceptual model is simulated to study the performance of the system. Preliminary results show the possible improvements in terms of enhancing responsiveness, increasing resilience and reliability and improving scalability.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"99 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving Prediction Accuracy for Power Consumption in Virtual Environments 提高虚拟环境中功耗预测的准确性
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077952
H. Salam, F. Davoli, A. Timm‐Giel
{"title":"Improving Prediction Accuracy for Power Consumption in Virtual Environments","authors":"H. Salam, F. Davoli, A. Timm‐Giel","doi":"10.1109/ITNAC46935.2019.9077952","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077952","url":null,"abstract":"Modern processors with multi-cores and several power states make power modeling of servers challenging. This issue becomes more complex in virtualized environments, owing to the presence of hypervisors. Requests and instructions as processed at the guest (i.e Virtual Machine, VM) level cannot be straightforwardly related to instructions processed at the host, and this relation varies with changing virtual environment configuration. However, observing performance at both levels, host and guest, might be helpful in developing realistic performance models. Also, the scale of virtual systems in modern computing environments such as data centers and clouds is very large, and these systems have massive data to manage, in terms of their allocation, scheduling, migration, etc. For such heterogeneous systems and large scale data, machine learning (ML) methodologies can play a vital role. Developing power and performance models using effective performance counters at host and guest level can provide significant features for training data. In this research work correlated performance counters for the running applications are monitored and trained for different models. This novel approach of monitoring performance counters at both levels provides in-depth performance information about individual VMs and servers. Results show that estimating power using these models reduces the prediction error, and hence can help in providing more effective power-aware decisions.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132778400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature 移动云计算的数据安全框架:文献综述
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9078007
Noah Oghenefego Ogwara, K. Petrova, M. Yang
{"title":"Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature","authors":"Noah Oghenefego Ogwara, K. Petrova, M. Yang","doi":"10.1109/ITNAC46935.2019.9078007","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078007","url":null,"abstract":"Using a mobile Internet connection, Mobile Cloud Computing (MCC) customers can access the powerful computational and storage resources made available by MCC service providers. However, the MCC environment is open to security attacks, especially at the more exposed mobile device (MD) end, as the low resourced MD may not be able to implement sufficiently advanced security protection mechanisms. A number of security frameworks addressing MCC data security issues have been proposed in the extant literature. This paper reviews a selection of MCC data security frameworks and identifies challenges and directions for further work. These include the development of an MCC data protection framework that provides a comprehensive protection against the threat spectrum and across all layers of the MCC infrastructure, by adequately addressing the fundamental security requirements.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129969698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Link Scheduling for Data Collection in SIC-Capable UAV Networks sic无人机网络数据采集链路调度
2019 29th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2019-11-01 DOI: 10.1109/ITNAC46935.2019.9077998
Yawen Zheng, Kwan-Wu Chin
{"title":"Link Scheduling for Data Collection in SIC-Capable UAV Networks","authors":"Yawen Zheng, Kwan-Wu Chin","doi":"10.1109/ITNAC46935.2019.9077998","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077998","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are ideal as aerial base stations, mobile relays or data collectors. In this paper, we consider a UAV with a Successive Interference Cancellation (SIC) radio that visits M collection points to download data from ground devices or sensors. The problem at hand is to determine the links to be scheduled at each data collection point. To this end, we formulate an Integer Linear Program (ILP) to compute the optimal transmission schedule. We also propose a Cross-Entropy (CE) approach to select links when there are a large number of ground devices. Our results show that SIC helps double the amount of data collected by the UAV. We also find that the average throughput is affected by the number of ground devices and the number of data collection points. Lastly, our CE approach is capable of producing a schedule that is near optimal.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信