Stelios Sotiriadis, N. Bessis, E. Asimakopoulou, N. Mustafee
{"title":"Towards Simulating the Internet of Things","authors":"Stelios Sotiriadis, N. Bessis, E. Asimakopoulou, N. Mustafee","doi":"10.1109/WAINA.2014.74","DOIUrl":"https://doi.org/10.1109/WAINA.2014.74","url":null,"abstract":"There is an increasing interest in Internet of Things (IoT) and healthcare is considered to be one of the most common applications of it. Using the IoT paradigm, various devices including smart-phones and sensor-embedded healthcare applications can be used for monitoring health. In this study, we model an IoT use case scenario with regard to monitoring the activities associated with health. In particular, we present our use case using the SimIoT extended simulation toolkit to demonstrate the various functions and the interactions occurring within the IoT-enabled healthcare context. Specifically, we extend the functionalities of the SimIC simulation toolkit by adding the IoT layer that incorporates IoT devices which generated data for the private clouds. We focus our experimental analysis from the perspective of cloud performance to illustrate the turnaround and make span of the system.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS-Aware Packet Chunking Schemes for M2M Cloud Services","authors":"Anan Sawabe, K. Tsukamoto, Y. Oie","doi":"10.1109/WAINA.2014.36","DOIUrl":"https://doi.org/10.1109/WAINA.2014.36","url":null,"abstract":"With the emergence of machine-to-machine (M2M) communications, huge numbers of devices have been connected and massive amounts of traffic are exchanged. However, since M2M applications typically generate packets of very small size, the number of incoming packets is becoming larger than the maximum number of packets that a router can handle per second, and network throughput is decreased. That is, network resources cannot be used efficiently. Therefore, the M2M cloud network operator makes chunks of these small packets, but a waiting time for chunking is inevitable, and thus application requirements may not be satisfied. This paper proposes new packet chunking schemes to both meet the QoS application requirement and improve the router's achievable throughput. The proposed schemes need multiple buffers and then classify the arrival packets to one buffer based on their acceptable waiting time. After that, the chunk packet is made based on an attribute of each packet to meet the application requirements. Through simulation experiments, we showed that the proposed scheme attains excellent performance even in cases of overloaded and imbalanced traffic.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125432635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gustavo Furquim, Filipe Neto, G. Pessin, J. Ueyama, J. Albuquerque, M. C. Fava, E. Mendiondo, V. C. B. Souza, D. Dimitrova, T. Braun
{"title":"Combining Wireless Sensor Networks and Machine Learning for Flash Flood Nowcasting","authors":"Gustavo Furquim, Filipe Neto, G. Pessin, J. Ueyama, J. Albuquerque, M. C. Fava, E. Mendiondo, V. C. B. Souza, D. Dimitrova, T. Braun","doi":"10.1109/WAINA.2014.21","DOIUrl":"https://doi.org/10.1109/WAINA.2014.21","url":null,"abstract":"This paper addresses an investigation with machine learning (ML) classification techniques to assist in the problem of flash flood now casting. We have been attempting to build a Wireless Sensor Network (WSN) to collect measurements from a river located in an urban area. The machine learning classification methods were investigated with the aim of allowing flash flood now casting, which in turn allows the WSN to give alerts to the local population. We have evaluated several types of ML taking account of the different now casting stages (i.e. Number of future time steps to forecast). We have also evaluated different data representation to be used as input of the ML techniques. The results show that different data representation can lead to results significantly better for different stages of now casting.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wun-Yuan Huang, Tahsin Chou, Jen-Wei Hu, Te-Lung Liu
{"title":"Automatical End to End Topology Discovery and Flow Viewer on SDN","authors":"Wun-Yuan Huang, Tahsin Chou, Jen-Wei Hu, Te-Lung Liu","doi":"10.1109/WAINA.2014.140","DOIUrl":"https://doi.org/10.1109/WAINA.2014.140","url":null,"abstract":"Recently, the Future Internet technology becomes a popular research topic. To solve the problems caused in traditional network, most researchers propose various new network architectures. One of the famous architectures is Software-defined network (SDN), which can help users develop their own strategies freely without the limited functions on physical machines provided by specific venders. One of the famous software that realizes the concepts of SDN is Open Flow. It is very important to manage and maintain an Open Flow network since many organizations apply Open Flow in their data centers (for example, Google). However, current version of Open Flow does not support Inter-domain technology. In other words, from the GUI, users cannot know the actual positions of other hosts and Open Flow switches in another domains. When performing SLA, it is inconvenient for management and maintenance since managers cannot know correct routing paths. Therefore, this paper will enhance our previous work of Inter-domain network topology and flow display system and Floodlight to study and implement host information demonstration.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlling Network Processors by Using Packet-Processing Cores","authors":"Y. Kanada","doi":"10.1109/WAINA.2014.112","DOIUrl":"https://doi.org/10.1109/WAINA.2014.112","url":null,"abstract":"A network processor (NP) usually contains multiple packet processing cores (PPCs) and a control processing core (CPC), and the synchronization and communication between CPC and PPCs, which is required for controlling an NP, is very complex. To reduce the complexity, a method for controlling packet processing in NPs by using PPCs is proposed. By means of this method, complex control messages are partially processed and divided into simplified control packets by a CPU outside the NP chip, and these packets are sent to a control-processing PPC. The control-processing PPC controls data-processing PPCs by using data-exchange mechanisms, such as a shared memory or an on-chip network, which are more uniform and simpler than those between a CPC and PPCs. This control method is applied to a virtual-link control-processing task and packet-processing tasks in a network node with a virtualization function. Both tasks are described by a hardware-independent high-level language called \"Phonepl,\" and communication between the PPCs is programmed following normal and uniform shared-memory semantics. As a result, programming the control-processing task and porting the program become much easier.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128138422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems","authors":"Erez Gilady, Dale Lindskog, S. Aghili","doi":"10.1109/WAINA.2014.133","DOIUrl":"https://doi.org/10.1109/WAINA.2014.133","url":null,"abstract":"Biometrics is a field in which very little progress has been made since it was first established. One of the major milestones in the field was the introduction of the multi-modal biometrics concept which uses a multi-factor authentication method. In this method, multiple factors are being authenticated as opposed to a single factor in the 'classic' unimodal biometric systems. This paper proposes an extension to the multi-modal biometrics concept to check for individuals' consent or intent to authenticate. It does that by checking certain physiological characteristics during authentication together with the classic biometric traits of fingerprints, iris etc. This additional physiological measurement will indicate whether the user authenticating is doing so without consent or whether the authentication is done with mal intentions.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133299170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Contact Network Generation for Cyber-bullying Detection","authors":"Mingmei Li, A. Tagami","doi":"10.1109/WAINA.2014.70","DOIUrl":"https://doi.org/10.1109/WAINA.2014.70","url":null,"abstract":"Cyber-bullying is widely recognized as a serious social problem, especially for adolescents and it is also becoming a threat to the viability of online social networks. Several researchers have proposed digital-communication based frameworks whose goal is to help detect bullying in social networks. In this paper, our study focuses on detecting relation-based cyber-bullying, which is an indirect attack on a human, e.g., isolating a victim by ignoring the victim's messages. Recently, relationship-based cyber-bullying has received attention as a new type of cyber-bullying, and detecting it is still a novel problem. As it attacks a human relationship, the detection should monitor the change of the human relationship. In this paper, for the first step of relation-based cyber-bullying detection, we propose a framework to generate a contact network. The framework consists of two phases for a reduction of false negative, i.e. Students are friends in the school but detected as non-friend in the Social Networking Service (SNS), which is a serious problem for the cyber-bullying detection. Finally, this paper analyzes the collected SNS data with the actual human relationships, and evaluates the proposed framework.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131587880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ontology Driven Software Framework for the Healthcare Applications Based on ANT+ Protocol","authors":"N. Mehmood, R. Culmone, L. Mostarda","doi":"10.1109/WAINA.2014.48","DOIUrl":"https://doi.org/10.1109/WAINA.2014.48","url":null,"abstract":"Programmers are not flexible in integrating devices and sensors for their products due to lack of interoperability between thousands of drivers, ah-hoc APIs and protocols. How to concentrate on the functionality instead of technical details is a major requirement. We propose a development framework which classifies the devices based on their functionality and provides an abstraction layer to escape physical hardware constraints and connectivity issues. We propose the usage of ontologies in order to expose the devices functionality represented by an ontology concept. The problem is addressed in context to the healthcare application domain while using the ANT+ protocol technology.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127710053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Services Orchestration: A Comparative Study of Existing Approaches","authors":"Khadija Bousselmi, Zaki Brahmi, M. Gammoudi","doi":"10.1109/WAINA.2014.72","DOIUrl":"https://doi.org/10.1109/WAINA.2014.72","url":null,"abstract":"Cloud Computing is emerging today as a service model used to relocate locally-based data and applications to virtualized services available via Internet at a lower cost. A key to exploit the benefits of this model is orchestration which consists in coordinating effectively the deployment of a set of virtualized services in order to fulfill operational and quality objectives of end users and Cloud providers. Cloud orchestration can be carried out at two levels: hardware level orchestration and software level orchestration. In this paper, we highlight the main challenging points about the Cloud orchestration concept. Then, we carry on a comparative study of some existing research works involved with this concept at hardware and software levels.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures","authors":"William Hurst, M. Merabti, P. Fergus","doi":"10.1109/WAINA.2014.141","DOIUrl":"https://doi.org/10.1109/WAINA.2014.141","url":null,"abstract":"The research presented in this paper offers a way of supporting the security currently in place in critical infrastructures by using behavioural observation and big data analysis techniques to add to the Defence in Depth (DiD). As this work demonstrates, applying behavioural observation to critical infrastructure protection has effective results. Our design for Behavioural Observation for Critical Infrastructure Security Support (BOCISS) processes simulated critical infrastructure data to detect anomalies which constitute threats to the system. This is achieved using feature extraction and data classification. The data is provided by the development of a nuclear power plant simulation using Siemens Tecnomatix Plant Simulator and the programming language SimTalk. Using this simulation, extensive realistic data sets are constructed and collected, when the system is functioning as normal and during a cyber-attack scenario. The big data analysis techniques, classification results and an assessment of the outcomes is presented.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}