{"title":"3D- Deployment of Magnetic Induction Relays in Underwater Sensor Networks","authors":"Sai Wang, Y. Shin","doi":"10.1109/ICOIN.2019.8718105","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718105","url":null,"abstract":"Magnetic induction (MI) communication is a promising technology for underwater sensor networks (UWSNs) due to several benefits such as small transmission delay and multipath fading negligibility. However, the majority deployment strategies of the MI relays focus on 1D and 2D networks. In this paper, a optimal relay deployment algorithm is proposed to deploy the relay nodes in the 3D UWSN. To balance the number of sensor nodes in each clustering space, the K-means algorithm is used to divide the network space. In addition, the locations of the relay nodes are important for saving energy. To solve this issue, we adopt a gradient descent algorithm to find the optimal coordinates of the relay nodes. Numerical analysis shows that the proposed algorithm is a practical deployment strategy.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Fair and Efficient Bandwidth Sharing in User Provided Networks","authors":"S. E. Tasçi, Ömer Korçak","doi":"10.1109/ICOIN.2019.8718187","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718187","url":null,"abstract":"Since the first introduction of User Provided Networks (UPNs), considerable effort has been put into designing incentive mechanisms as one of the backing techniques needed to realize them. Concepts especially from game theory can be identified as the core building blocks of contemporary incentive mechanisms proposed in the literature. In this work a collaborative Internet sharing mechanism from a potential game theoretical point of view has been proposed while keeping simplicity, applicability in real world scenarios in mind. The proposed scheme supports multi-node deployments and favors fair bandwidth sharing among players as well as providing effective usage of globally available bandwidth. The proposed scheme converges to a Nash equilibrium in pure strategies, when played in best reply dynamics. In order to evaluate its performance it is compared to another scheme which is supposed to admit players' available bandwidth as its potential function. The second scheme has been investigated by rigorous simulations and shown to converge to a Nash equilibrium in pure strategies, although it still lacks an analytical demonstration to be proven as a potential game. Results show that as well as supporting multi-node deployments, the proposed scheme also fairly distributes the available bandwidth among players and increases the globally available bandwidth being shared.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks","authors":"Robert Basomingera, Young-June Choi","doi":"10.1109/ICOIN.2019.8718169","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718169","url":null,"abstract":"For the security of mobile ad-hoc networks (MANETs), a group of wireless mobile nodes needs to cooperate by forwarding packets, to implement an intrusion detection system (IDS). Some of the current IDS implementations in a clustered MANET have designed mobile nodes to wait until the cluster head is elected before scanning the network and thus nodes may be, unfortunately, exposed to several control packet attacks by which nodes identify falsified routes to reach other nodes. In order to detect control packet attacks such as route falsification, we design a route cache sharing mechanism for a non-clustered network where all one-hop routing data are collected by each node for a cooperative host-based detection. The cooperative host-based detection system uses a Support Vector Machine classifier and achieves a detection rate of around 95%. By successfully detecting the route falsification attacks, nodes are given the capability to avoid other attacks such as black-hole and gray-hole, which are in many cases a result of a successful route falsification attack.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Centric Characterization and Classification of Applications Using KMeans for Multicores","authors":"Preeti Jain, S. Surve","doi":"10.1109/ICOIN.2019.8717981","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8717981","url":null,"abstract":"The knowledge on the behavior of an application program towards consumption of shared resources in multicore systems could assist in characterizing and classifying these programs. Further categorizing applications assists in predicting optimal coschedules for multicores, which eventually leads to lower contention and enhance performance. The proposed work characterizes applications on the basis of variations in IPC due to various resource allocations. Further classification is done based on parameters of cache memory and Dram bandwidth utilization obtained using hardware counters. A statistical approach is used for classifying the applications. The variance values obtained for an application's behavior towards different resource allocations is considered to build training and test set and KMeans learning algorithm is applied to classify the workloads. The accuracy obtained with the proposed method is 85.71%.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Service Function Chaining by Resource Usage Learning in SDN/NFV Environment","authors":"Sang Il Kim, Hwa-sung Kim","doi":"10.1109/ICOIN.2019.8718190","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718190","url":null,"abstract":"Recently, to reflect diverse service requirements increasing with the popularization of various Internet devices, network functions virtualization (NFV) is attracting attention as the core technology of the next-generation network. In keeping with the progress of NFV, service function chaining (SFC) for specific network service appeared, and SFC refers to a technique for the sequential abstraction of service functions. In connection with the existing study's method for dynamic service chaining that dynamically generates a service chain through reinforcement learning, considering a node, at which service functions operate for efficient service chaining in the NFV environment, and the usage of resources such as CPU, memory, and network usage, this paper investigated a method for more stable dynamic service function chaining by flexibly calculating a fixed weight for the $r$ value, which was derived from an experiment, according to the amount of remaining resources at the relevant node.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youngpin Kim, S. Ahn, Nguyen Canh Thang, DongHo Choi, Minho Park
{"title":"ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks","authors":"Youngpin Kim, S. Ahn, Nguyen Canh Thang, DongHo Choi, Minho Park","doi":"10.1109/ICOIN.2019.8718158","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718158","url":null,"abstract":"Recently, the novel networking technology Software-Defined Networking(SDN) and Service Function Chaining(SFC) are rapidly growing, and security issues are also emerging for SDN and SFC. However, the research about security and safety on a novel networking environment is still unsatisfactory, and the vulnerabilities have been revealed continuously. Among these security issues, this paper addresses the ARP Poisoning attack to exploit SFC vulnerability, and proposes a method to defend the attack. The proposed method recognizes the repetitive ARP reply which is a feature of ARP Poisoning attack, and detects ARP Poisoning attack. The proposed method overcomes the limitations of the existing detection methods. The proposed method also detects the presence of an attack more accurately.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133709085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed ID/Locator Resolution System for Inter Mesh Networks","authors":"M. Ohnishi, Kazuyuki Shudo","doi":"10.1109/ICOIN.2019.8718162","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718162","url":null,"abstract":"We propose an ID/Locator resolution system for super wide area wireless mesh networks constructed using Delaunay overlay networks. Unlike conventional mobile ad-hoc network protocols, the proposed system does not use flooding to spread the locator notification messages of each node. The proposed method sends one-hop locator notifications on skip links such as skip graphs. The proposed system realized scalability by controlling the route, frequency, and storing locations of the locator notification message. Specifically, when the number of nodes increases, the average load on communication links and the message database of each node are approximately O(log n), where n is the total number of nodes. The scalability of the proposed method is confirmed through simulations.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122779914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Driving Car Meets Multi-Access Edge Computing for Deep Learning-Based Caching","authors":"Anselme Ndikumana, C. Hong","doi":"10.1109/ICOIN.2019.8718113","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718113","url":null,"abstract":"In the future, self-driving cars are expected to be involved in public transportation. Once passengers are comfortable with them, the self-driving cars will be new spaces for entertainment. However, getting infotainment contents from Data Centers (DCs) can be perturbed by the high end-to-end delay. To address this issue, we propose caching for infotainment contents in close proximity to the self-driving cars and in self-driving cars. In our proposal, Multi-access Edge Computing (MEC) helps self-driving cars by deploying MEC servers to the edge of the network at macro base stations (BSs), WiFi access points (WAPs), and roadside units (RSUs) for caching infotainment contents in close proximity to the self-driving cars. Based on the passenger's features learned via self-driving car deep learning approach proposed in this paper, the self-driving car can download infotainment contents that are appropriate to its passengers from MEC servers and cache them. The simulation results show that our prediction for the infotainment contents need to be cached in close proximity to the self-driving cars can achieve 99.28% accuracy.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal and Secure Controller Placement in SDN Based Smart City Network","authors":"Samir Kumar Tarai, S. Shailendra","doi":"10.1109/ICOIN.2019.8718165","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718165","url":null,"abstract":"The exponential growth of Internet of Things (IoT) devices and cloud based systems has resulted in an increased demand of new services and applications. In an IoT network like smart city, it is desirable that these services and applications can be provisioned on demand and securely. SDN (Software Defined Networking) has emerged as a new paradigm that facilitates on demand provisioning of the network, services and applications. An efficient and secure controller placement is the key to the efficient deployment of an SDN based network. In this paper, we have addressed the dual problem of optimal and secure controller placement in an SDN based network such that it optimizes the flow setup time for dynamically changing network conditions. Our approach takes care of controller fault tolerance by introducing a well-defined strategy of Master-Equal-Slave (M-E-S) controllers combination. We have built our own Java based simulator and extensive simulations have been carried out to verify the proposed algorithms.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction Based Sub-Task Offloading in Mobile Edge Computing","authors":"Kitae Kim, Jared Lynskey, S. Kang, C. Hong","doi":"10.1109/ICOIN.2019.8718183","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718183","url":null,"abstract":"Mobile Edge Cloud Computing has been developed and introduced to provide low-latency service in close proximity to users. In this environment., resource constrained UE (user equipment) incapable to execute complex applications (i.e VR/AR., Deep Learning., Image Processing Applications) can dynamically offload computationally demanding tasks to neighboring MEC nodes. To process tasks even faster with MEC nodes., we can divide one task into several sub-tasks and offload to multiple MEC nodes simultaneously., thereby each sub-task will be processed in parallel. In this paper., we predict the total processing duration of each task on each candidate MEC node using Linear Regression. According to the previously observed state of each MEC node., we offload sub-tasks to their respective edge node. We also developed a monitoring module at core cloud. The results show a decrease in execution duration when we offload an entire application to one edge node compared with local execution.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}