C. Tselikis, C. Douligeris, S. Mitropoulos, N. Komninos, G. Tselikis
{"title":"Adaptation of a Conference Key Distribution System for the wireless ad hoc network","authors":"C. Tselikis, C. Douligeris, S. Mitropoulos, N. Komninos, G. Tselikis","doi":"10.1109/ICC.2017.7996339","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996339","url":null,"abstract":"In this paper we review previous works done with respect to Conference Key Distribution Systems (CKDS). We focus on the system proposed by Kim et al. and we propose improvements on that scheme a) from the perspective of security and anonymity, b) from the perspective of efficient calculation of the Lagrange polynomial coefficients, and c) from the perspective of adaptation into the dynamic wireless ad hoc network. The security of the proposed scheme is based on the difficulty of computing discrete logarithms over elliptic curves, the intractability of inverting a one-way hash function and the pseudo-randomness of user coordinates. We demonstrate the effectiveness of the proposed scheme through the analysis of characteristic attack scenarios.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81913198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Iordache, Simon Jouet, Angelos K. Marnerides, D. Pezaros
{"title":"Distributed, multi-level network anomaly detection for datacentre networks","authors":"M. Iordache, Simon Jouet, Angelos K. Marnerides, D. Pezaros","doi":"10.1109/ICC.2017.7996569","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996569","url":null,"abstract":"Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, high-speed datacentre networks. In this paper, we present a two-level solution for anomaly detection leveraging independent execution and message passing semantics. We employ these constructs within a network-wide distributed anomaly detection framework that allows for greater detection accuracy and bandwidth cost saving through attack path reconstruction. Experimental results using real operational traffic traces and known network attacks generated through the Pytbull IDS evaluation framework, show that our approach is capable of detecting anomalies in a timely manner while allowing reconstruction of the attack path, hence further enabling the composition of advanced mitigation strategies. The resulting system shows high detection accuracy when compared to similar techniques, at least 20% better at detecting anomalies, and enables full path reconstruction even at small-to-moderate attack traffic intensities (as a fraction of the total traffic), saving up to 75% of bandwidth due to early attack detection.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"63 1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85385485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assuring virtual network function image integrity and host sealing in Telco cloue","authors":"Shankar Lal, Sowmya Ravidas, Ian Oliver, T. Taleb","doi":"10.1109/ICC.2017.7997299","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997299","url":null,"abstract":"In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious tampering during shipping and even after uploaded to the cloud image database. Furthermore, due to various applications, there is a requirement from mobile network operators to seal VNFs on specific platforms which satisfy certain hardware and software configurations. This requires cloud service providers to introduce some mechanisms to verify VNF image integrity and host sealing before the instantiation of VNFs. In this paper, we present a proof of concept demonstrated with the help of an experimental setup to solve the above-mentioned problems. We also evaluate the performance of the envisioned setup and present some insights on its usability.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89232487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS-oriented capacity planning for edge computing","authors":"Yu Xiao, Marius Noreikis, Antti Ylä-Jääski","doi":"10.1109/ICC.2017.7997387","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997387","url":null,"abstract":"An increasing number of online services are hosted on public clouds. However, since a centralized cloud architecture imposes high network latency, researchers suggested moving latency sensitive applications, such as virtual and augmented reality ones, to the edge of the network. Nevertheless, little has been done for edge layer capacity estimation resulting in a great need towards practical tools and techniques for initial capacity planning. In this work we provide a novel capacity planning solution for hierarchical edge cloud that considers QoS requirements in terms of response delay, and diverse demands for CPU, GPU and network resources. Our solution improves edge utilization by combining complementary resource demands while satisfying QoS requirements. We prove effectiveness of our solution through a case study where we plan edge capacity for deploying an AR navigation and information system.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"130 1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81130177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Shaikh, Fereidoun H. Panahi, T. Ohtsuki, Kouhei Suzaki, Hirofumi Sasaki, Hideya So, T. Nakagawa
{"title":"Q-learning based superposed band detection in multicarrier transmission","authors":"A. Shaikh, Fereidoun H. Panahi, T. Ohtsuki, Kouhei Suzaki, Hirofumi Sasaki, Hideya So, T. Nakagawa","doi":"10.1109/ICC.2017.7997432","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997432","url":null,"abstract":"Superposed multicarrier transmission is a known method to improve frequency utilization efficiency when several wireless systems share the same spectrum. Obviously, an enhanced spectral efficiency comes at the expense of interference. To suppress the effect of interference, forward error correction (FEC) metric masking can be applied. In FEC, the corresponding log-likelihood (LLR) of the superposed band is set to zero or to other proper values determined by the other parameters such as the desired to undesired power ratio (DUR). To be able to apply the FEC metric masking, the information on the superposed band sub-carriers is required at the receiver side. Therefore, in this paper, we propose a novel method for detecting the superposed bands of multicarrier transmissions using Q-learning. We present the simulation results that show a higher rate of superposed band detection accuracy in lower DUR over the conventional method, as well as similar accuracy over other DUR.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76129893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liqin Shi, Liqiang Zhao, Kai Liang, Xiaoli Chu, Gang Wu, Hsiao-Hwa Chen
{"title":"Profit maximization in wireless powered communications with improved non-linear energy conversion and storage efficiencies","authors":"Liqin Shi, Liqiang Zhao, Kai Liang, Xiaoli Chu, Gang Wu, Hsiao-Hwa Chen","doi":"10.1109/ICC.2017.7997317","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997317","url":null,"abstract":"In this paper, we investigate profit maximization problem in wireless powered communication (WPC) systems, where the profit is defined as the difference between the revenue earned from uplink data transmission and total energy cost of the system. Since the efficiencies of energy harvesting (EH) circuits and battery storage are both non-linear, conventional linear models will lead to suboptimal resource allocation. In this paper, we propose to maximize the profit of a WPC system under nonlinear energy harvesting and storage models. In order to solve the non-convex optimization problem, we develop a piecewise linear EH model, which is more accurate than conventional linear EH models and existing non-linear EH models. Numerical results show that the power and time allocation design based on the non-linear energy harvesting and storage models outperforms that based on existing linear models in terms of the profit.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88211073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unequal steganography with unequal error protection for wireless physiological signal transmission","authors":"Neerja Sahu, D. Peng, H. Sharif","doi":"10.1109/ICC.2017.7996377","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996377","url":null,"abstract":"In this paper, an innovative idea of secure and energy efficient electrocardiogram steganography based on Discrete Wavelet Transform (DWT) is proposed, in which different important ECG data are steganographed with variable embedding strengths so that the reconstructed ECG signal quality is preserved. Incorporating the proposed Unequal Steganography Embedding (USE) with Unequal Error Protection (UEP), the proposed scheme further improves transmission performance in terms of ECG signal quality, ensures the confidentiality as well as reliability of a user's data, and makes the transmission more energy efficient. Simulation results demonstrate that USE attains very low distortion (WWPRD less than 0.45 %). Furthermore, high correlation between host and stego ECG and ECG data remains diagnosable after steganography. Based on our literature reviews, the reliability, robustness, and energy efficiency of this proposed method are unmatched in comparison with any other published methods.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"68 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85731216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sihem Ouahouah, T. Taleb, Jaeseung Song, Chafika Benzaid
{"title":"Efficient offloading mechanism for UAVs-based value added services","authors":"Sihem Ouahouah, T. Taleb, Jaeseung Song, Chafika Benzaid","doi":"10.1109/ICC.2017.7997362","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997362","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are expected to be used everywhere to provision different services and applications, impacting different aspects of our daily lives. Basically, UAVs are characterized by their high mobility. Some may remain motionless for a specific time to perform pre-programmed missions. Whilst UAVs would be used for specific applications, they could additionally offer numerous IoT (Internet of Things) value-added services (VAS) when they are equipped with suitable IoT devices. Many IoT VAS applications require high amount of resources and/or diverse IoT devices that cannot be offered by a single UAV. In order to overcome this limitation, this paper aims to explore, i) the diversity of IoT devices on-board UAVs, and ii) the mobility of UAVs for offering UAVs-based IoT VAS. Two solutions are proposed for carrying out different IoT VAS. Both solutions are modeled using linear integer programming. While the first solution aims to reduce the energy consumption, the second one aims to shorten the response time. The simulation results demonstrate the efficiency of both solutions in achieving their design goals.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"29 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73883559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-graph Zero-knowledge-based authentication system in Internet of Things","authors":"I. Chuang, Bing-Jie Guo, Jen-Sheng Tsai, Y. Kuo","doi":"10.1109/ICC.2017.7996820","DOIUrl":"https://doi.org/10.1109/ICC.2017.7996820","url":null,"abstract":"Internet of Things (IoT) is an emerging network technology applied to provide various services in our daily life. Generally, IoT environments are composed of numerous heterogeneous devices with constrained resource. The limited capability of IoT devices makes it impractical to perform traditional security mechanisms, and thus IoT services are usually vulnerable to all kinds of security threats, such as impersonation and forgery attacks. Moreover, the inflexible protection provided by these security mechanisms leads to inefficiency because different services haves diverse requirements. To provide IoT services suitable security protection, Multi-graph Zero-knowledge-based Authentication System (M-ZAS), which is not only light-weight but also high-adaptive, is proposed. Compared to traditional authentication mechanisms as well as other Zero-knowledge-proof (ZKP) methods such as GMW-ZKP, M-ZAS provides higher performance and better security protection. In addition, M-ZAS has lower transmission overheads than GMW-ZKP does. Considering relevant contexts as parameters, M-ZAS provides adaptive protection to fulfill what users actually need. Experiment results show that M-ZAS is 3 times faster than GMW-ZKP and even 7 times than traditional authentication mechanisms in IoT devices. Also, M-ZAS reduces 3 times network traffic than GMW-ZKP. Thus, the proposed M-ZAS is the most practical authentication system in IoT environments.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90569662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Wiśniewska, Bilal Khan, Ala Al-Fuqaha, K. Dombrowski, M. A. Shattal
{"title":"When brands fight over bands: Sociality in the cognitive radio ecosystem","authors":"A. Wiśniewska, Bilal Khan, Ala Al-Fuqaha, K. Dombrowski, M. A. Shattal","doi":"10.1109/ICC.2017.7997383","DOIUrl":"https://doi.org/10.1109/ICC.2017.7997383","url":null,"abstract":"As wireless devices continue to proliferate, spectrum management is essential to a healthy and functioning digital ecosystem. Here we present an evolutionary analysis of how interbrand relationships can be expected to evolve in the cognitive radio domain over long time scales. We find that a range of trajectories are possible, and that the eventual outcomes depend on a variety of system parameters including the number of users and transmission band switching costs. Starting from previous bio-socially inspired fair spectrum sharing protocols, we put forward an extended model of secondary user etiquette that allows for a range of inter-group dynamics to arise in the natural course of competition over and co-use of spectrum resources. We show that as populations grow, increases in transmission switching costs lead to evolutionary pressures toward increasing antagonism between brands, and that in such scenarios devices tend to segregate by brand across bands. Understanding the drivers behind emerging inter-brand dynamics from an evolutionary perspective is an important input to the long term view of the successful application of distributed spectrum access and cognitive radio.","PeriodicalId":6517,"journal":{"name":"2017 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76807593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}