{"title":"Why Internet Protocols Need Incentives","authors":"David Murray","doi":"10.1109/WAINA.2015.48","DOIUrl":"https://doi.org/10.1109/WAINA.2015.48","url":null,"abstract":"Internet routers are a commons. While modest regulatory measures have generally been successful for Information Communication Technologies (ICT), this paper argues that the lack of regulation has hindered the technological evolution of the Internet in some areas. This issue is examined through five Internet problems, and the technological solutions adopted. The key contribution of this paper is the explanation of these issues and the identification of areas where misaligned incentives promote inadequate solutions or inaction. The paper reviews the available measures to encourage the adoption of globally beneficial Internet technologies.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"104 1","pages":"261-266"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86944110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System","authors":"Goshi Sato, Noriki Uchida, Y. Shibata","doi":"10.1109/AINA.2015.262","DOIUrl":"https://doi.org/10.1109/AINA.2015.262","url":null,"abstract":"Through the information network recovery experience on the East Japan Great Earthquake on March 11, 2011, we learned that the combination of various existing wireless network technologies such as satellite IP network, 3G/LTE, Wi-Fi was useful in term of network connectivity. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best performance network among the possible network links even though the serious disaster occurred and some of those network links were seriously damaged. We also introduce an Open Flow based access network to automatically control link and route selections within the cognitive wireless network to Internet by periodically monitoring and evaluating their network states. In order to verify the usefulness of our proposed system, a prototype of Open Flow based cognitive wireless network system is constructed by connecting the disaster areas in the East Japan Great Earthquake and its performance is evaluated.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"10 1","pages":"741-746"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87187448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE Networks","authors":"H. Safa, Nadine Ahmad","doi":"10.1109/AINA.2015.241","DOIUrl":"https://doi.org/10.1109/AINA.2015.241","url":null,"abstract":"In LTE networks, tracking areas (TAs) design affects the signaling cost of user equipments (UEs) during mobility. Indeed, when the latter are called, the mobility management entity (MME), which records the TA in which the UE is registered, broadcasts a paging message in the UE's TA to determine the exact cell through which the call should be delivered. When a UE moves to a new TA, a TA update might be performed either to update the MME or the home subscriber server (HSS) depending on whether the move is intra-or inter-MME. TA update and paging result in a significant amount of signaling overhead. The TA design is usually optimized during the network planning phase. However, the mobility of UEs might turn the initial TA configuration inefficient requiring TA reconfiguration. In this paper we use the tabu search (TS) heuristic to solve TAs reconfiguration problem in LTE networks taking into consideration both signaling overhead and reconfiguration cost. We compare our solution with a variation of the genetic algorithm (GA) based solution found in the literature. Preliminary numerical results showed that the TS algorithm outperformed the GA due to the TS different memory mechanisms used to avoid moves that might lead to non-feasible solutions.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"593-599"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81526735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, W. Chu
{"title":"Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method","authors":"Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, W. Chu","doi":"10.1109/WAINA.2015.49","DOIUrl":"https://doi.org/10.1109/WAINA.2015.49","url":null,"abstract":"With the popularity of cloud computing due to increasing requests for cloud services, the demand for building better cloud infrastructure is increasing. Many services on cloud infrastructure are not being accessed all the time, during periods of low usage, if lots of servers keep working, it will cause unnecessary power waste. The aim of this paper is based on the Cloud service Infrastructure as a Service, use KVM and libvirt to build cloud environments. By giving every host and VM a power cap, we perform live-migration on VMs and shutdown idle hosts to save power. We also build an interface that enables users to monitor virtual machines and physical machines. In the experiment, we use PDU to record the power consumption information, and from analysis of these data we prove that we can more effectively utilize hardware resources and save power.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"33 1","pages":"223-228"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82852036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmitting Scalable Video Streaming over Wireless Ad Hoc Networks","authors":"Walayat Hussain, F. Hussain, O. Hussain","doi":"10.1109/AINA.2015.186","DOIUrl":"https://doi.org/10.1109/AINA.2015.186","url":null,"abstract":"Due to the rapid increase in the use of social networking websites and applications, the need to stream video over wireless networks has increased. There are a number of considerations when transmitting streaming video between the nodes connected through wireless networks, such as throughput, the size of the multimedia file, response time, delay, scalability and loss of data. The scalability of ad-hoc networks needs to be analyzed by considering various aspects, such as self-organization, security, routing flexibility, availability of bandwidth, data distribution, Quality of Service, throughput, response time and efficiency. In this paper, we discuss the existing approaches to multimedia routing and transmission over wireless ad-hoc networks by considering scalability. The study draws several conclusions and makes recommendations for future directions.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"35 1","pages":"201-206"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89450986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nueraili Aierken, R. Gagliardi, L. Mostarda, Zaib Ullah
{"title":"RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks","authors":"Nueraili Aierken, R. Gagliardi, L. Mostarda, Zaib Ullah","doi":"10.1109/WAINA.2015.86","DOIUrl":"https://doi.org/10.1109/WAINA.2015.86","url":null,"abstract":"Prolonging the network lifetime, scalability and balancing are very important requirements when implementing a wireless sensor network (WSN). Clustering is a technique that has been widely applied for achieving these goals. However, there exists the energy hole problem which causes an unbalanced energy consumption in equally formed clusters. More specifically, nodes near the base station (BS) die very quickly since they, not only transmit their own data, but also forwards the rest of the network data. In this article, we propose a rotated unequal clustering protocol RUHEED in order to mitigate the energy hole problem. Our experiments show that RUHEED improves the network lifetime when compared to other clustering protocols.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"170-174"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89605692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Stock Market Using Twitter Trust Network","authors":"Yefeng Ruan, L. Alfantoukh, A. Durresi","doi":"10.1109/AINA.2015.217","DOIUrl":"https://doi.org/10.1109/AINA.2015.217","url":null,"abstract":"As social networks are becoming more and more popular, more and more data are available from them. Researchers are now trying to extract useful information from these big data. One possible usage of social media is to investigate stock market. There are two major events to measure in stock market - price change and trade volume. In this paper, we firstly use our trust framework to build up trust network among Twitter users in a stock market group. We compare trust information extracted from Twitter group with Dow Jones Industrial Average (DJIA) get from Yahoo! Finance. Our results show that by taking trust information into account, they are more correlated than just counting the number of tweets. Also it shows us that trade volume is stronger correlated than price change.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"428-433"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82472310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Endorsement-Based Mobile Payment System for a Disaster Area","authors":"B. Ojetunde, N. Shibata, Juntao Gao, Minoru Ito","doi":"10.1109/AINA.2015.225","DOIUrl":"https://doi.org/10.1109/AINA.2015.225","url":null,"abstract":"A payment system in a disaster area is essential for people to buy necessities such as groceries, clothing, and medical supplies. However, existing payment systems require the needed communication infrastructures (like wired networks and cellular networks) to enable transactions, so that these systems cannot be relied on in disaster areas, where these communication infrastructures may be destroyed. In this paper, we propose a mobile payment system, adopting infrastructure less mobile adhoc networks (MANETs), which allow users to shop in disaster areas while providing secure transactions. Specifically, we propose an endorsement-based scheme to guarantee each transaction and a scheme to provide monitoring based on location information, and thus achieve transaction validity and reliability. Our mobile payment system can also prevent collusion between two parties and reset and recover attacks by any user. Security is ensured by using location-based mutual monitoring by nearby users, avoiding thereby double spending in the system.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"482-489"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82070833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Protocol for End-to-End Key Establishment During Route Discovery in MANETs","authors":"Shrikant H. Talawar, R. Hansdah","doi":"10.1109/AINA.2015.183","DOIUrl":"https://doi.org/10.1109/AINA.2015.183","url":null,"abstract":"An end-to-end shared secret key between two distant nodes in a mobile ad hoc network (MANET) is essential for providing secure communication between them. However, to provide effective security in a MANET, end-to-end key establishment should be secure against both internal as well as external malicious nodes. An external malicious node in a MANET does not possess any valid security credential related to the MANET, whereas an internal malicious node would possess some valid security credentials related to the MANET. Most of the protocols for end-to-end key establishment in MANETs either make an unrealistic assumption that an end-to-end secure channel exists between source and destination or use bandwidth consuming multi-path schemes. In this paper, we propose a simple and efficient protocol for end-to-end key establishment during route discovery (E2-KDR) in MANETs. Unlike many other existing schemes, the protocol establishes end-to-end key using trust among the nodes which, during initial stage, is established using public key certificate issued by an off-line membership granting authority. However, the use of public key in the proposed protocol is minimal to make it efficient. Since the key is established during route discovery phase, it reduces the key establishment time. The proposed protocol exploits mobility to establish end-to-end key, and provides comprehensive solution by making use of symmetric keys for protecting routing control messages and end-to-end communication. Moreover, as the end-to-end keys are established during route discovery phase, the protocol is on-demand and only necessary keys are established, which makes the protocol storage scalable. The protocol is shown to be secure using security analysis, and its efficiency is confirmed by the results obtained from simulation experiments.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"176-184"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78453064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment Analysis","authors":"Fajri Koto, M. Adriani","doi":"10.1109/WAINA.2015.58","DOIUrl":"https://doi.org/10.1109/WAINA.2015.58","url":null,"abstract":"As one of the largest Social Media in providing public data every day, Twitter has attracted the attention of researcher to investigate, in order to mine public opinion, which is known as Sentiment Analysis. Consequently, many techniques and studies related to Sentiment Analysis over Twitter have been proposed in recent years. However, there is no study that discuss about sentence pattern of positive/negative sentence and neither subjective/objective sentence. In this paper we propose POS sequence as feature to investigate pattern or word combination of tweets in two domains of Sentiment Analysis: subjectivity and polarity. Specifically we utilize Information Gain to extract POS sequence in three forms: sequence of 2-tags, 3-tags, and 5-tags. The results reveal that there are some tendencies of sentence pattern which distinguish between positive, negative, subjective and objective tweets. Our approach also shows that feature of POS sequence can improve Sentiment Analysis accuracy.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"274 1","pages":"547-551"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76742779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}