{"title":"Dynamic spectrum access with traffic prioritization in Cognitive Radio networks","authors":"M. Safwat","doi":"10.1109/ISNCC.2015.7238574","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238574","url":null,"abstract":"Cognitive Radio networks (CRN) enable cognitive users to use portions of the licensed spectrum of the primary users (PU). Dynamic spectrum access (DSA) is a design aspect that facilitates the transmission of cognitive radio (CR) users over idle channels. In many cases, it is not preferable that CR users to be treated equally. Provisioning quality of service (QoS) to some CR users is a challenge in DSA design. In this situation, The CR user traffic is divided into high and low priority classes. Sub-channel reservation (SCR) scheme is the most traditional scheme to provide priority to CR users in admission. In this paper, a new scheme named “low priority bounding” (LPB) scheme is used to provide QoS for CR users. The LPB scheme provides priority by restricting the number of low priority CR users by a threshold. This scheme maintains a suitable level of service to high priority users (as provided by SCR scheme) while improve the level of service for low priority ones. So the revenue gained from LPB scheme is optimized in comparison with SCR scheme. The impact of LPB scheme in the provided QoS is evaluated in terms of blocking probability, service termination rate, and service completion rate. Simulation results are compared with SCR scheme and it shows that the LPB scheme can significantly improve the revenue gained over the traditional SCR scheme.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent advances in cryptographic solutions for vehicular networks","authors":"M. Mejri, Mohamed Hamdi","doi":"10.1109/ISNCC.2015.7238573","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238573","url":null,"abstract":"As vehicles become increasingly intelligent, it is expected that in the near future they will be equipped with radio interfaces. This will enable the formation of vehicular networks, commonly referred to as VANETs, an instance of mobile ad hoc networks with cars as the mobile nodes. As VANETs exhibit several unique features (e.g. high mobility of nodes, geographic extension) traditional security mechanisms are not always applicable. Consequently, a plethora of research contributions have been presented to cope with the intrinsic characteristics of vehicular communication. This paper outlines the communication architecture of VANETs and discusses the security and privacy challenges that need to be overcome to make such networks practically viable. It compares the various cryptographic schemes that were suggested for VANETs and explores some future trends that will shape the research in cryptographic protocols for intelligent transportation systems.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116802399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software implementation of Bechmann-Pasquinucci and Peres protocol for qutrits","authors":"G. Mogos","doi":"10.1109/ISNCC.2015.7238589","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238589","url":null,"abstract":"The main goals of cryptography are for a sender and a receiver to be able to communicate in a way that is unintelligible to third parties, and for the authentication of messages to prove that they were not altered in transit. Both of these goals can be accomplished with provable security if sender and receiver are in possession of shared, the secret key. This paper presents a software-prototype of the Bechmann-Pasquinucci and Peres protocol for qutrits, on two cases: with and without cyber-attack (the Intercept-Resend attack). Presence of the enemy is determined by calculating the errors obtained at the end of transmission through quantum channel. The method Quantum Trit Error Rate (QTER) for detecting enemy can be applied to the majority key distribution systems, each system having its own acceptable error rate.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward V2I communication technology-based solution for reducing road traffic congestion in smart cities","authors":"S. Djahel, N. Jabeur, Robert Barrett, John Murphy","doi":"10.1109/ISNCC.2015.7238584","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238584","url":null,"abstract":"Due to the limited capacity of road networks and sporadic on-route events, road traffic congestions are posing serious problems in most big cities worldwide and resulting in considerable number of casualties and financial losses. In order to deal efficiently with these problems and alleviate their impact on individuals, environment, and economic activities, advanced traffic monitoring and control tools (e.g., SCATS and SCOOT) are being widely used in hundreds of major cities in the world. However, due to increasing road traffic and dynamic spatio-temporal events, additional proactive mechanisms remain needed to prevent traffic congestions. Within this context, we argue that the emergent V2X communication technologies, and especially V2I (Vehicle to Infrastructure), would be of great help. To this end, we investigate in this paper the opportunities that could be offered by V2I technology in improving commuters' journey duration and mitigating the above irritating and frequent problems. We then propose an approach where road-side facilities (e.g. traffic light controllers at road intersections) communicate traffic light cycle information to approaching vehicles. Based on this information, the vehicles collaboratively determine their optimal speeds and other appropriate actions to undertake in order to cross road intersections with minimum delays while ultimately avoiding stoppings. The obtained evaluation results show that our approach achieves a significant gain in terms of the commuters' average travel time reduction.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125164015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy consumption evaluation for LTE scheduling algorithms","authors":"Takoua Ghariani, B. Jouaber","doi":"10.1109/ISNCC.2015.7238594","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238594","url":null,"abstract":"Reducing energy consumption over mobile networks and devices is an important and challenging issue. On the one hand, power is a limited resource on mobile devices and its usage should be optimized. On the other hand, energy consumption constitutes an important item within operating expenditure (OPEX) for network providers. In the literature, many studies are dedicated to evaluate scheduling mechanisms from the energy consumption perspective. However, most of these only consider few well known schemes such as Proportional Fair, Best-CQI and Round Robin. In the paper, we extend these studies to include new promising scheduling techniques such as PF, EXP-PF and MLWDF algorithm. In addition, we consider multiple metrics related to QoS, energy and fairness. Performance results show that MLWDF is more energy efficient than EXP-PF and PF schemes while providing better QoS for users.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133782039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine-grained access control to medical records in digital healthcare enterprises","authors":"M. F. F. Khan, K. Sakamura","doi":"10.1109/ISNCC.2015.7238590","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238590","url":null,"abstract":"Adopting IT as an integral part of business and operation is certainly making the healthcare industry more efficient and cost-effective. With the widespread digitalization of personal health information, coupled with big data revolution and advanced analytics, security and privacy related to medical data - especially ensuring authorized access thereto - is facing a huge challenge. In this paper, we argue that a fine-grained approach is needed for developing access control mechanisms contingent upon various environmental and application-dependent contexts along with provision for secure delegation of access-control rights. In particular, we propose a context-sensitive approach to access control, building on conventional discretionary access control (DAC) and role-based access control (RBAC) models. Taking a holistic view to access control, we effectively address the precursory authentication part as well. The eTRON architecture - which advocates use of tamper-resistant chips equipped with functions for mutual authentication and encrypted communication - is used for authentication and implementing the DAC-based delegation of access-control rights. For realizing the authorization and access decision, we used the RBAC model and implemented context verification on top of it. Our approach closely follows regulatory and technical standards of the healthcare domain. Evaluation of the proposed system in terms of various security and performance showed promising results.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126986500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A genetic algorithm-based approach to optimize the coverage and the localization in the wireless audio-sensors networks","authors":"Sami Mnasri, Adel Thaljaoui, N. Nasri, T. Val","doi":"10.1109/ISNCC.2015.7238591","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238591","url":null,"abstract":"Coverage is one of the most important performance metrics for sensor networks that reflects how well a sensor field is monitored. In this paper, we are interested in studying the positioning and placement of sensor nodes in a WSN in order to maximize the coverage area and to optimize the audio localization in wireless sensor networks. First, we introduce the problem of deployment. Then we propose a mathematical formulation and a genetic based approach to solve this problem. Finally, we present the results of experimentations. This paper presents a genetic algorithm which aims at searching for an optimal or near optimal solution to the coverage holes problem. Compared with random deployment as well as existing methods, our genetic algorithm shows significant performance improvement in terms of quality.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126418337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive radio networks management using an ANFIS approach with QoS/QoE mapping scheme","authors":"A. B. Zineb, M. Ayadi, S. Tabbane","doi":"10.1109/ISNCC.2015.7238588","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238588","url":null,"abstract":"Future networks are characterized by a panoply of novel services based on multimedia services like gaming and real time video streaming. In addition, cognitive radio is considered as an emergent candidate of next generation (NextG) networks. Therefore, there is a need of some techniques that can ensure self-managed networks with learning capabilities. Our approach is based on adaptive neuro-fuzzy inference system (ANFIS) used for predicting the user video perception (e.g. MOS) and for managed decisions that can be achieved by a specific radio configuration (e.g. data rate, handover). The ANFIS model with Quality of Services/Quality of Experience (QoS/QoE) mapping is able to sense environment, decide, learn and optimize its decisions online by a learning algorithm that uses a set of experimental measurements. We used an implementation tool of the ANFIS model under MATLAB/SIMULINK environment supporting the development of real time scenarios.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129321883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strict-sense nonblocking networks with three multiplexing and switching levels","authors":"W. Kabaciński, J. Kleban, M. Michalski, M. Żal","doi":"10.1109/ISNCC.2015.7238577","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238577","url":null,"abstract":"Changes in traffic characteristics impose new requirements on interconnection network in large data centers. These requirements force changes to be done in the network architecture and used technology. Traditional tree network topology is being replaced by Clos network, called also Leaf-Spine topology, and optical interconnection networks are added in parallel to conventional electronic switching networks. Circuit switching is also used in such network instead of packet switching. In this paper we analyze the three-stage Clos network in which three multiplexing schemes are used simultaneously on input, output, and interstage links and with circuit switching mode. Strict-sense nonblocking conditions for this network with three multiplexing levels (space, wavelength, and mode) are derived and proved. Up till now such network with at most two multiplexing levels (space and time, or space and wavelength) has been considered.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The analysis of time reaction in OpenFlow switches in NetFPGA cards and ROFL","authors":"M. Michalski, Tytus Sielach","doi":"10.1109/ISNCC.2015.7238575","DOIUrl":"https://doi.org/10.1109/ISNCC.2015.7238575","url":null,"abstract":"In this paper we present the results of the delay measurements of the Ethernet traffic handled by different Open-Flow switches realized in the NetFPGA cards. We investigated three different software approaches: reference software for Open-Flow on NetFPGA cards, xDPd/ROFL prepared for OpenFlow implementation in NetFPGA cards and xDPD/ROFL library prepared for GNU/Linux cooperating with reference NIC with four ethernet ports realized on NetFPGA cards. All three cases have been realized on two versions of the NetFPGA cards - with 1G and 10G ports.","PeriodicalId":430315,"journal":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}