{"title":"Realization of congestion-aware energy-aware virtual link embedding","authors":"Minh Pham, D. Hoang, Z. Chaczko","doi":"10.1109/ITNAC46935.2019.9077957","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077957","url":null,"abstract":"Network virtualization is an inherent component of future internets. Network resources are virtualized and provisioned to users on demand. The virtual network embedding entails two processes: node mapping and link mapping. However, efficient and practical solutions to the link mapping problem in software-defined networks (SDN) and data centers are still lacking. This paper proposes a solution to the link mapping (LiM) process that can dynamically interact with the routing protocols of the substrate network to allocate virtual link requests to the underlying substrate links, satisfies optimizing cost, minimizing energy consumption, and avoiding congestion (CEVNE) concurrently. CEVNE LiM is realized as a composite application on top of the SDN controller running the Segment Routing (SR) application. The performance of the CEVNE LiM algorithm is compared with the k-shortest path link mapping algorithm and shows its superior performance in terms of the overall runtime, the average path length, the average node stress, the average link stress, and the overall energy consumption.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Forensic Readiness In Wireless Medical Systems","authors":"A. Kyaw, B. Cusack, Raymond Lutui","doi":"10.1109/ITNAC46935.2019.9078005","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078005","url":null,"abstract":"individuals and businesses has become dependent on digital devices. These devices and services are used in the healthcare systems including hospitals as Wireless Medical Networks (WMedSys). Security incidents in the WMedSys have increased over the past few years. This paper reports research into digital forensic readiness in wireless medical systems by inserting forensic readiness states into the network system and preparing mitigation for security failure. A design is built and tested, and then validated by expert feedback. The contribution of this research is to present a novel conceptual design for a digital forensic readiness framework for WMedSys, which can be easily implemented and integrated into existing wireless networks in the healthcare sector.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121019330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Download Traffic Scheduling for CubeSats Swarms with Inter-Satellite Links","authors":"Yawen Zheng, Kwan-Wu Chin, Luyao Wang","doi":"10.1109/ITNAC46935.2019.9077987","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077987","url":null,"abstract":"This paper considers maximizing the total downloaded data from a CubeSats swarm to ground stations. The key challenges include intermittent contact time and duration with ground stations, and limited resources. It aims to study the benefits of transferring data over Inter-Satellite Links (ISLs). It presents four satellite-to-ground (s-g) pairing rules; namely, Pair Transmit Most Data (PTMD), Random Pair (RP), Shortest Contact Duration (SCD), and Round Robin (RR). The results indicate that ISLs help CubeSats ensure they have more data to download to ground stations. Moreover, the use of ISLs simplifies s - $g$ pairing because any of the aforementioned rules can be used to yield similar amounts of downloaded data.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rais Rizal Yunus, H. Z. Abidin, F. Zaman, S. Abdullah
{"title":"Outdoor Signal Performance of LoRaWAN Technology for Campus-Scale IoT Connectivity","authors":"Rais Rizal Yunus, H. Z. Abidin, F. Zaman, S. Abdullah","doi":"10.1109/ITNAC46935.2019.9077978","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077978","url":null,"abstract":"Long range with low-power consumption wireless platform known as LoRa, is increasingly popular technology. It is specifically tailored for Low Power Area Network (LPWAN s). It offers long distance, efficient energy management, and low data rates for wireless communication. This technology has the potential to realize the application of the Internet of Things (IoT). Numerous studies have been carried out to evaluate the performance of LoRa technology. In this paper, the outdoor signal performance of Long Range Wide Area Network (LoRaWAN) technology is studied. The study is done to evaluate the outdoor signal performance of LoRaWANand to observe the relations between the signal parameters. The test was conducted at Universiti Teknologi Mara (UiTM) campus in Shah Alam, Selangor. The performance was measured in terms of Received Signal Strength Indicator (RSSI), Signal to Noise Ratio (SNR), and Time on Air (ToA) for different Spreading Factor (SF). The results show that LoRaWANtechnology is highly adaptable to be used in campus scale as well as urban IoT connectivity.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127224026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keisuke Manaka, Liyuan Chen, H. Habuchi, Y. Kozawa
{"title":"Theoretical Analysis of Equal-Weight (2, 2) VSS on VN-CSK Illumination Light Communication","authors":"Keisuke Manaka, Liyuan Chen, H. Habuchi, Y. Kozawa","doi":"10.1109/ITNAC46935.2019.9077954","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077954","url":null,"abstract":"On illumination light communications, the optical-wireless transmission scheme, which combines the visual secret sharing (VSS) scheme with the variable N-parallel code-shift-keying (VN-CSK) system, has been proposed. In this paper, the error rate performances of VSS data and two specified message data is theoretical analyzed under the general condition in which the distance from one lighting apparatus is not equal with the distance from another lighting apparatus. The relationship between the error rate and the receiver position is clarified when SNR on the receiver position (length, width, height) = (2.5,2.5,0.85) [m] is 15[dB] and the dimming level $N=1$. The optimum receiver position is (2.5, 2.5, 0.85), and then BER of VSS data achieves 4.0×10−3. It is found that SNR more than 20[dB] is necessary to provide a practical use of VSS data. On the other hand, BER of the message data from LED#1 becomes a minimum value when the receiver position is (1.25,2.5,0.85). Therefore, BER of the message data is considerably superior to that of VSS data.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree","authors":"L. Jim, M. Gregory","doi":"10.1109/ITNAC46935.2019.9077968","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077968","url":null,"abstract":"Mobile Ad hoc networks (MANET) are a grouping of independent mobile devices that can act as both host and router. This type of network does not require a centralized controller, can be created or dissolved dynamically, and does not necessarily include fixed infrastructure. MANETs encounter packet delays and loss due to the presence of nodes with malicious intent. Nodes that deviate from normal behavior are termed as selfish nodes. A selfish node is responsible for packet loss, often to conserve energy, and this harms traffic flows within the MANET. MANET nodes take on the responsibility for the relay and routing of packets being transmitted across the network and it is vital that the participating nodes remain unselfish. However, nodes may become selfish as resources diminish, particularly energy, and it is important to identify selfish nodes so that they can be avoided from the routing path. Here an improved scheme based on an Artificial Immune System incorporating a Decision Tree is used to identify selfish nodes. This strategy improves MANET packet delivery performance.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shakil Ahmed, M. A. Rashid, F. Alam, B. Fakhruddin
{"title":"A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology","authors":"Shakil Ahmed, M. A. Rashid, F. Alam, B. Fakhruddin","doi":"10.1109/ITNAC46935.2019.9077975","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077975","url":null,"abstract":"This paper provides a conceptual framework for designing a disaster response system based on Internet of Things (IoT) and Device to Device (D2D) under the new generation 5G mobile networks. The next generation of mobile network and technologies such as Fifth Generation cellular network (5G), Device to Device (D2D) communication, Internet of Things (IoT) and big data technology can play a significant role to overcome the drawbacks of the current disaster management system. A conceptual model is simulated to study the performance of the system. Preliminary results show the possible improvements in terms of enhancing responsiveness, increasing resilience and reliability and improving scalability.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"99 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Prediction Accuracy for Power Consumption in Virtual Environments","authors":"H. Salam, F. Davoli, A. Timm‐Giel","doi":"10.1109/ITNAC46935.2019.9077952","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077952","url":null,"abstract":"Modern processors with multi-cores and several power states make power modeling of servers challenging. This issue becomes more complex in virtualized environments, owing to the presence of hypervisors. Requests and instructions as processed at the guest (i.e Virtual Machine, VM) level cannot be straightforwardly related to instructions processed at the host, and this relation varies with changing virtual environment configuration. However, observing performance at both levels, host and guest, might be helpful in developing realistic performance models. Also, the scale of virtual systems in modern computing environments such as data centers and clouds is very large, and these systems have massive data to manage, in terms of their allocation, scheduling, migration, etc. For such heterogeneous systems and large scale data, machine learning (ML) methodologies can play a vital role. Developing power and performance models using effective performance counters at host and guest level can provide significant features for training data. In this research work correlated performance counters for the running applications are monitored and trained for different models. This novel approach of monitoring performance counters at both levels provides in-depth performance information about individual VMs and servers. Results show that estimating power using these models reduces the prediction error, and hence can help in providing more effective power-aware decisions.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132778400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature","authors":"Noah Oghenefego Ogwara, K. Petrova, M. Yang","doi":"10.1109/ITNAC46935.2019.9078007","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078007","url":null,"abstract":"Using a mobile Internet connection, Mobile Cloud Computing (MCC) customers can access the powerful computational and storage resources made available by MCC service providers. However, the MCC environment is open to security attacks, especially at the more exposed mobile device (MD) end, as the low resourced MD may not be able to implement sufficiently advanced security protection mechanisms. A number of security frameworks addressing MCC data security issues have been proposed in the extant literature. This paper reviews a selection of MCC data security frameworks and identifies challenges and directions for further work. These include the development of an MCC data protection framework that provides a comprehensive protection against the threat spectrum and across all layers of the MCC infrastructure, by adequately addressing the fundamental security requirements.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129969698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link Scheduling for Data Collection in SIC-Capable UAV Networks","authors":"Yawen Zheng, Kwan-Wu Chin","doi":"10.1109/ITNAC46935.2019.9077998","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077998","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are ideal as aerial base stations, mobile relays or data collectors. In this paper, we consider a UAV with a Successive Interference Cancellation (SIC) radio that visits M collection points to download data from ground devices or sensors. The problem at hand is to determine the links to be scheduled at each data collection point. To this end, we formulate an Integer Linear Program (ILP) to compute the optimal transmission schedule. We also propose a Cross-Entropy (CE) approach to select links when there are a large number of ground devices. Our results show that SIC helps double the amount of data collected by the UAV. We also find that the average throughput is affected by the number of ground devices and the number of data collection points. Lastly, our CE approach is capable of producing a schedule that is near optimal.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}