2019 International Conference on Information Networking (ICOIN)最新文献

筛选
英文 中文
3D- Deployment of Magnetic Induction Relays in Underwater Sensor Networks 水下传感器网络中磁感应继电器的三维部署
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718105
Sai Wang, Y. Shin
{"title":"3D- Deployment of Magnetic Induction Relays in Underwater Sensor Networks","authors":"Sai Wang, Y. Shin","doi":"10.1109/ICOIN.2019.8718105","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718105","url":null,"abstract":"Magnetic induction (MI) communication is a promising technology for underwater sensor networks (UWSNs) due to several benefits such as small transmission delay and multipath fading negligibility. However, the majority deployment strategies of the MI relays focus on 1D and 2D networks. In this paper, a optimal relay deployment algorithm is proposed to deploy the relay nodes in the 3D UWSN. To balance the number of sensor nodes in each clustering space, the K-means algorithm is used to divide the network space. In addition, the locations of the relay nodes are important for saving energy. To solve this issue, we adopt a gradient descent algorithm to find the optimal coordinates of the relay nodes. Numerical analysis shows that the proposed algorithm is a practical deployment strategy.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Fair and Efficient Bandwidth Sharing in User Provided Networks 用户提供网络中公平有效的带宽共享
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718187
S. E. Tasçi, Ömer Korçak
{"title":"On Fair and Efficient Bandwidth Sharing in User Provided Networks","authors":"S. E. Tasçi, Ömer Korçak","doi":"10.1109/ICOIN.2019.8718187","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718187","url":null,"abstract":"Since the first introduction of User Provided Networks (UPNs), considerable effort has been put into designing incentive mechanisms as one of the backing techniques needed to realize them. Concepts especially from game theory can be identified as the core building blocks of contemporary incentive mechanisms proposed in the literature. In this work a collaborative Internet sharing mechanism from a potential game theoretical point of view has been proposed while keeping simplicity, applicability in real world scenarios in mind. The proposed scheme supports multi-node deployments and favors fair bandwidth sharing among players as well as providing effective usage of globally available bandwidth. The proposed scheme converges to a Nash equilibrium in pure strategies, when played in best reply dynamics. In order to evaluate its performance it is compared to another scheme which is supposed to admit players' available bandwidth as its potential function. The second scheme has been investigated by rigorous simulations and shown to converge to a Nash equilibrium in pure strategies, although it still lacks an analytical demonstration to be proven as a potential game. Results show that as well as supporting multi-node deployments, the proposed scheme also fairly distributes the available bandwidth among players and increases the globally available bandwidth being shared.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks 基于路由缓存的移动Ad-Hoc网络控制包入侵检测SVM分类器
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718169
Robert Basomingera, Young-June Choi
{"title":"Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks","authors":"Robert Basomingera, Young-June Choi","doi":"10.1109/ICOIN.2019.8718169","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718169","url":null,"abstract":"For the security of mobile ad-hoc networks (MANETs), a group of wireless mobile nodes needs to cooperate by forwarding packets, to implement an intrusion detection system (IDS). Some of the current IDS implementations in a clustered MANET have designed mobile nodes to wait until the cluster head is elected before scanning the network and thus nodes may be, unfortunately, exposed to several control packet attacks by which nodes identify falsified routes to reach other nodes. In order to detect control packet attacks such as route falsification, we design a route cache sharing mechanism for a non-clustered network where all one-hop routing data are collected by each node for a cooperative host-based detection. The cooperative host-based detection system uses a Support Vector Machine classifier and achieves a detection rate of around 95%. By successfully detecting the route falsification attacks, nodes are given the capability to avoid other attacks such as black-hole and gray-hole, which are in many cases a result of a successful route falsification attack.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Resource Centric Characterization and Classification of Applications Using KMeans for Multicores 以资源为中心的多核KMeans应用表征与分类
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8717981
Preeti Jain, S. Surve
{"title":"Resource Centric Characterization and Classification of Applications Using KMeans for Multicores","authors":"Preeti Jain, S. Surve","doi":"10.1109/ICOIN.2019.8717981","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8717981","url":null,"abstract":"The knowledge on the behavior of an application program towards consumption of shared resources in multicore systems could assist in characterizing and classifying these programs. Further categorizing applications assists in predicting optimal coschedules for multicores, which eventually leads to lower contention and enhance performance. The proposed work characterizes applications on the basis of variations in IPC due to various resource allocations. Further classification is done based on parameters of cache memory and Dram bandwidth utilization obtained using hardware counters. A statistical approach is used for classifying the applications. The variance values obtained for an application's behavior towards different resource allocations is considered to build training and test set and KMeans learning algorithm is applied to classify the workloads. The accuracy obtained with the proposed method is 85.71%.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Service Function Chaining by Resource Usage Learning in SDN/NFV Environment SDN/NFV环境下基于资源使用学习的动态业务功能链
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718190
Sang Il Kim, Hwa-sung Kim
{"title":"Dynamic Service Function Chaining by Resource Usage Learning in SDN/NFV Environment","authors":"Sang Il Kim, Hwa-sung Kim","doi":"10.1109/ICOIN.2019.8718190","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718190","url":null,"abstract":"Recently, to reflect diverse service requirements increasing with the popularization of various Internet devices, network functions virtualization (NFV) is attracting attention as the core technology of the next-generation network. In keeping with the progress of NFV, service function chaining (SFC) for specific network service appeared, and SFC refers to a technique for the sequential abstraction of service functions. In connection with the existing study's method for dynamic service chaining that dynamically generates a service chain through reinforcement learning, considering a node, at which service functions operate for efficient service chaining in the NFV environment, and the usage of resources such as CPU, memory, and network usage, this paper investigated a method for more stable dynamic service function chaining by flexibly calculating a fixed weight for the $r$ value, which was derived from an experiment, according to the amount of remaining resources at the relevant node.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks 基于软件定义网络中ARP更新状态的ARP投毒攻击检测
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718158
Youngpin Kim, S. Ahn, Nguyen Canh Thang, DongHo Choi, Minho Park
{"title":"ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks","authors":"Youngpin Kim, S. Ahn, Nguyen Canh Thang, DongHo Choi, Minho Park","doi":"10.1109/ICOIN.2019.8718158","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718158","url":null,"abstract":"Recently, the novel networking technology Software-Defined Networking(SDN) and Service Function Chaining(SFC) are rapidly growing, and security issues are also emerging for SDN and SFC. However, the research about security and safety on a novel networking environment is still unsatisfactory, and the vulnerabilities have been revealed continuously. Among these security issues, this paper addresses the ARP Poisoning attack to exploit SFC vulnerability, and proposes a method to defend the attack. The proposed method recognizes the repetitive ARP reply which is a feature of ARP Poisoning attack, and detects ARP Poisoning attack. The proposed method overcomes the limitations of the existing detection methods. The proposed method also detects the presence of an attack more accurately.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133709085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed ID/Locator Resolution System for Inter Mesh Networks 网状网络的分布式ID/定位器解析系统
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718162
M. Ohnishi, Kazuyuki Shudo
{"title":"Distributed ID/Locator Resolution System for Inter Mesh Networks","authors":"M. Ohnishi, Kazuyuki Shudo","doi":"10.1109/ICOIN.2019.8718162","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718162","url":null,"abstract":"We propose an ID/Locator resolution system for super wide area wireless mesh networks constructed using Delaunay overlay networks. Unlike conventional mobile ad-hoc network protocols, the proposed system does not use flooding to spread the locator notification messages of each node. The proposed method sends one-hop locator notifications on skip links such as skip graphs. The proposed system realized scalability by controlling the route, frequency, and storing locations of the locator notification message. Specifically, when the number of nodes increases, the average load on communication links and the message database of each node are approximately O(log n), where n is the total number of nodes. The scalability of the proposed method is confirmed through simulations.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122779914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Driving Car Meets Multi-Access Edge Computing for Deep Learning-Based Caching 自动驾驶汽车满足基于深度学习的缓存的多访问边缘计算
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718113
Anselme Ndikumana, C. Hong
{"title":"Self-Driving Car Meets Multi-Access Edge Computing for Deep Learning-Based Caching","authors":"Anselme Ndikumana, C. Hong","doi":"10.1109/ICOIN.2019.8718113","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718113","url":null,"abstract":"In the future, self-driving cars are expected to be involved in public transportation. Once passengers are comfortable with them, the self-driving cars will be new spaces for entertainment. However, getting infotainment contents from Data Centers (DCs) can be perturbed by the high end-to-end delay. To address this issue, we propose caching for infotainment contents in close proximity to the self-driving cars and in self-driving cars. In our proposal, Multi-access Edge Computing (MEC) helps self-driving cars by deploying MEC servers to the edge of the network at macro base stations (BSs), WiFi access points (WAPs), and roadside units (RSUs) for caching infotainment contents in close proximity to the self-driving cars. Based on the passenger's features learned via self-driving car deep learning approach proposed in this paper, the self-driving car can download infotainment contents that are appropriate to its passengers from MEC servers and cache them. The simulation results show that our prediction for the infotainment contents need to be cached in close proximity to the self-driving cars can achieve 99.28% accuracy.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Optimal and Secure Controller Placement in SDN Based Smart City Network 基于SDN的智慧城市网络中控制器的优化和安全配置
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718165
Samir Kumar Tarai, S. Shailendra
{"title":"Optimal and Secure Controller Placement in SDN Based Smart City Network","authors":"Samir Kumar Tarai, S. Shailendra","doi":"10.1109/ICOIN.2019.8718165","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718165","url":null,"abstract":"The exponential growth of Internet of Things (IoT) devices and cloud based systems has resulted in an increased demand of new services and applications. In an IoT network like smart city, it is desirable that these services and applications can be provisioned on demand and securely. SDN (Software Defined Networking) has emerged as a new paradigm that facilitates on demand provisioning of the network, services and applications. An efficient and secure controller placement is the key to the efficient deployment of an SDN based network. In this paper, we have addressed the dual problem of optimal and secure controller placement in an SDN based network such that it optimizes the flow setup time for dynamically changing network conditions. Our approach takes care of controller fault tolerance by introducing a well-defined strategy of Master-Equal-Slave (M-E-S) controllers combination. We have built our own Java based simulator and extensive simulations have been carried out to verify the proposed algorithms.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction Based Sub-Task Offloading in Mobile Edge Computing 移动边缘计算中基于预测的子任务卸载
2019 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2019.8718183
Kitae Kim, Jared Lynskey, S. Kang, C. Hong
{"title":"Prediction Based Sub-Task Offloading in Mobile Edge Computing","authors":"Kitae Kim, Jared Lynskey, S. Kang, C. Hong","doi":"10.1109/ICOIN.2019.8718183","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718183","url":null,"abstract":"Mobile Edge Cloud Computing has been developed and introduced to provide low-latency service in close proximity to users. In this environment., resource constrained UE (user equipment) incapable to execute complex applications (i.e VR/AR., Deep Learning., Image Processing Applications) can dynamically offload computationally demanding tasks to neighboring MEC nodes. To process tasks even faster with MEC nodes., we can divide one task into several sub-tasks and offload to multiple MEC nodes simultaneously., thereby each sub-task will be processed in parallel. In this paper., we predict the total processing duration of each task on each candidate MEC node using Linear Regression. According to the previously observed state of each MEC node., we offload sub-tasks to their respective edge node. We also developed a monitoring module at core cloud. The results show a decrease in execution duration when we offload an entire application to one edge node compared with local execution.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信