2nd International Conference on Wireless Intelligent and Distributed Environment for Communication (eBook)

WIDECOM 2019
eBook Download: PDF
2019 | 1st ed. 2019
XVI, 264 Seiten
Springer International Publishing (Verlag)
978-3-030-11437-4 (ISBN)

Lese- und Medienproben

2nd International Conference on Wireless Intelligent and Distributed Environment for Communication -
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2019), sponsored by the University of Milan, Milan, Italy, February 11-13, 2019. The conference deals both with the important core and the specialized issues in the areas of new dependability paradigms design and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The WIDECOM proceedings features papers addressing issues related to the design, analysis, and implementation, of infrastructures, systems, architectures, algorithms, and protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and IoT systems. It is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels.
  • Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2019), Milan, Italy, February 11-13, 2019;
  • Includes an array of topics networking computing, mobile/ubiquitous systems, cloud systems, and IoT systems;
  • Addresses issues related to protecting information security and establishing trust in the digital space.


Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broad band (DABNEL) Research Lab. Dr. Woungang has published 10 books and over 92 refereed technical articles in scholarly international journals and proceedings of international conferences. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier), and the International Journal of Communication Systems (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier), Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). From 2012 to 2017, he served as Chair of Computer Chapter, IEEE Toronto Section.

Professor Sanjay Kumar Dhurandher received the M. Tech. and Ph.D. Degrees in Computer Sciences from the Jawaharlal Nehru University, New Delhi, India. He is presently working as a Professor in the Department of Information Technology, Netaji Subhas University of Technology (Formerly NSIT) New Delhi, India. He is also the Head of the IT Department at NSUT and the Head of the Advanced Centre CAITFS, Department of Information Technology, NSUT, New Delhi. He is a Senior Member of IEEE.Currently, he is serving as the Associate Editor of the International Journal of Communication Systems published by John Wiley & Sons and even as the Associate Editor of Security and Privacy Journal, by John Wiley & Sons. He served as a Guest Editor, to the Special Issue of Computers & Electrical Engineering by Elsevier and IET Communications. He has even written/edited a book titled 'Routing in Opportunistic Networks' published by Springer. From 1995 to 2000 he worked as a Scientist/Engineer at the Institute for Plasma Research, Gujarat, India which is under the Department of Atomic Energy, India. His current research interests include Wireless ad-hoc Networks, Sensor Networks, Computer Networks, Network Security, Underwater Sensor Networks, Opportunistic Networks and Cognitive Radio Networks.

Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broad band (DABNEL) Research Lab. Dr. Woungang has published 10 books and over 92 refereed technical articles in scholarly international journals and proceedings of international conferences. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier), and the International Journal of Communication Systems (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier), Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). From 2012 to 2017, he served as Chair of Computer Chapter, IEEE Toronto Section. Professor Sanjay Kumar Dhurandher received the M. Tech. and Ph.D. Degrees in Computer Sciences from the Jawaharlal Nehru University, New Delhi, India. He is presently working as a Professor in the Department of Information Technology, Netaji Subhas University of Technology (Formerly NSIT) New Delhi, India. He is also the Head of the IT Department at NSUT and the Head of the Advanced Centre CAITFS, Department of Information Technology, NSUT, New Delhi. He is a Senior Member of IEEE.Currently, he is serving as the Associate Editor of the International Journal of Communication Systems published by John Wiley & Sons and even as the Associate Editor of Security and Privacy Journal, by John Wiley & Sons. He served as a Guest Editor, to the Special Issue of Computers & Electrical Engineering by Elsevier and IET Communications. He has even written/edited a book titled “Routing in Opportunistic Networks” published by Springer. From 1995 to 2000 he worked as a Scientist/Engineer at the Institute for Plasma Research, Gujarat, India which is under the Department of Atomic Energy, India. His current research interests include Wireless ad-hoc Networks, Sensor Networks, Computer Networks, Network Security, Underwater Sensor Networks, Opportunistic Networks and Cognitive Radio Networks.

Welcome Message from WIDECOM 2019 General Chair 6
Welcome Message from the WIDECOM 2019 Program Cochairs 8
WIDECOM 2019 Organizing Committee 9
WIDECOM 2019 Keynote Talks 11
From WSNs to VANETs: Paradigms, Technologies, and Open Research Issues for Challenged Networks 11
Making Sense(s) of Smart Contracts in a Connected World 11
WIDECOM 2019 Tutorials 13
Tutorial 1: High-Speed Cryptography 13
Tutorial 2: Understanding the Key Pre-distribution Aspect of Linear Wireless Sensor Network 13
Tutorial 3: Efficient Cryptographic Algorithms for Securing Passwords 14
Contents 15
1 Performance Evaluation of G.711 and GSM Codecs on VoIP Applications Using OSPF and RIP Routing Protocols 17
1.1 Introduction 17
1.2 Background 18
1.2.1 Voice Encoding Codec 18
1.2.2 Routing Protocols 18
1.3 Related Work 19
1.4 Network Model 20
1.4.1 Network Topology 20
1.4.2 Configuration Parameters 21
1.4.3 Routing Scenarios 23
1.5 Simulation Results 23
1.5.1 Traffic Sent 24
1.5.2 Traffic Received 24
1.5.3 Jitter 25
1.5.4 End-to-End Delay 27
1.5.5 Packet Delay Variation 28
1.5.6 Mean Opinion Score 29
1.6 Conclusion 30
References 31
2 Cyclic Redundancy Check Based Data Authenticationin Opportunistic Networks 33
2.1 Introduction 33
2.2 Related Work 35
2.3 Overview of CRC (Cyclic Redundancy Check) 35
2.4 Proposed Work 36
2.4.1 Assumptions 36
2.4.2 Authentication Key 36
2.4.3 Algorithm 37
2.5 Results and Analysis 39
2.6 Conclusion 41
References 41
3 Hybrid Cryptographic Based Approach for Privacy Preservation in Location-Based Services 43
3.1 Introduction 43
3.2 Literature Survey 44
3.2.1 Categorization of Crypto-Based Privacy Model for LBS 44
3.2.1.1 TTP Free Schema 44
3.3 Motivation of Proposed Approach 45
3.4 Experimental Results and Evaluation 47
3.4.1 Datasets 47
3.4.2 Density Based Clustering Algorithms 47
3.4.3 Results 47
3.5 Conclusion 49
References 49
4 Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks 51
4.1 Introduction 51
4.2 Background and Related Work 52
4.2.1 PRoPHET 52
4.2.2 Spray-and-Wait 53
4.2.3 Related Work 54
4.3 Proposed EPRoPHET Routing Protocol 54
4.3.1 EPRoPHET 54
4.3.2 ES& W Routing Protocol
4.4 Performance Evaluation 55
4.4.1 Simulation Parameters 55
4.4.2 Performance Matrix 57
4.5 Simulation Results 58
4.5.1 Comparison of EPRoPHET and PRoPHET 58
4.5.2 Comparison of S& W and ES&
4.5.3 Comparison of ES& W and EPRoPHET Routing Protocol
4.6 Conclusion 61
References 61
5 An Asymmetric RSA-Based Security Approach for Opportunistic IoT 63
5.1 Introduction 63
5.2 Literature Review 64
5.3 Proposed Work 66
5.3.1 A Secure Location Prediction-Based Forwarding Scheme for Opportunistic Internet of Things 66
5.4 Simulation Results 68
5.5 Conclusion 74
References 75
6 Performance Analysis of A*-Based Hop Selection Techniquein Opportunistic Networks Through Movement Mobility Models 77
6.1 Introduction 77
6.2 Related Work and Background 78
6.2.1 A* Search-Based Next Hop Selection Routing Protocol: A*OR 78
6.2.2 Random Way-Point Model 78
6.2.3 Shortest Path Map-Based Movement Model 79
6.2.4 Real Time Traces 79
6.3 Experimental Setup 80
6.3.1 Experiment Performance Metric Setup 80
6.3.2 Experimental Environment 80
6.4 Experiment Result Analysis 81
6.5 Conclusion and Future Work 89
References 89
7 Data Loss Prevention Using Document Semantic Signature 91
Abbreviations 91
7.1 Introduction 92
7.1.1 Context 92
7.1.2 Research Problem and Contribution 93
7.1.3 Approach Overview 93
7.2 Related Works 94
7.2.1 On Insider Threat Detection and Prediction 94
7.2.2 On DLP 95
7.2.3 On Ontology-Based Search and Information Retrieval 96
7.2.4 On Ontology Management and Semantic Models 97
7.3 Proposed DLP Model 98
7.3.1 Ontology Concept Tree 98
7.3.2 Document Concept Map 99
7.3.3 Document Concept Tree 99
7.3.4 Document Semantic Signature 100
7.3.5 Semantic Signature Matching 101
7.4 Experiments 103
7.4.1 Dataset 103
7.4.2 Selected Ontology 104
7.4.3 Evaluation Approach and Metrics 104
7.4.4 Model Evaluation Results 105
7.4.5 Comparison with Baseline Models 107
7.5 Conclusion 109
Appendix: Examples 110
References 115
8 Understanding Optimizations and Measuring Performancesof PBKDF2 116
8.1 Introduction 116
8.2 Cryptographic Preliminaries 117
8.2.1 PBKDF2 117
8.2.2 HMAC 118
8.2.3 SHA-1 119
8.3 Understanding Optimizations 121
8.3.1 PBKDF2 Optimizations 122
8.3.2 HMAC Optimizations 122
8.3.3 SHA-1 Optimizations 123
8.4 Measuring Performances 124
8.4.1 GPU Testing 124
8.4.2 CPU Testing 126
8.5 Conclusions 127
References 127
9 PSARV: Particle Swarm Angular Routing in VehicularAd Hoc Networks 130
9.1 Introduction 130
9.2 Dynamic Source Routing 131
9.3 Design of the PSARV Protocol 132
9.3.1 Swarm Movement Algorithm 132
9.3.2 PSARV Protocol 133
9.3.2.1 Initiate the Route Discovery 133
9.3.2.2 Moving the Received RREQ-Swarm Forward 134
9.4 Performance Evaluation 137
9.4.1 Simulation Parameters 137
9.4.2 Simulation Results 138
9.5 Conclusion 141
References 142
10 A Reliable Firefly-Based Routing Protocol for Efficient Communication in Vehicular Ad Hoc Networks 143
10.1 Introduction 143
10.2 Background and Related Work 144
10.2.1 Firefly Algorithm 145
10.2.2 Dynamic Source Routing 146
10.2.3 Related Work 146
10.3 Proposed Firefly Routing Protocol Protocol 146
10.3.1 EFR Route Discovery 147
10.3.2 EFR Technique 148
10.4 Performance Evaluation 149
10.4.1 Simulation Parameters 150
10.4.2 Simulation Results 150
10.5 Conclusion 154
References 154
11 Exploring the Application of Random Sampling in Spectrum Sensing 156
11.1 Introduction 156
11.2 Spectral Components Calculation Using a Random Sampling Mode 157
11.3 Spectrum Sensing Based on the Energy Detector Method 159
11.4 Results and Discussion 160
11.4.1 Monte Carlo Simulation for the Proposed Spectrum Sensing Approach 160
11.4.2 Feasibility Study of the Proposed Approach of Spectrum Sensing Based on a Real FM Radio Signal 162
11.5 Conclusion 164
References 164
12 White-Box Cryptography: A Time-Security Trade-Offfor the SPNbox Family 166
12.1 Introduction 166
12.2 White-Box Constructions and Attacks 168
12.3 SPACE 170
12.3.1 SPACE Design 170
12.3.2 Feistel Function as a Look-Up Table 171
12.4 The SPNbox Family 173
12.5 Our Contribution 175
12.5.1 Performance Evaluation 177
12.6 Conclusions and Future Works 177
References 178
13 CESIS: Cost-Effective and Self-Regulating Irrigation System 180
13.1 Introduction and Motivation 180
13.2 The Proposed Irrigation System (CESIS) 182
13.2.1 Block Diagram 182
13.2.2 Use Case Diagram 182
13.2.3 Sequence Diagram 183
13.2.4 Activity Diagram 184
13.2.5 Class Diagram 184
13.3 Implementation of CESIS 186
13.3.1 System Modules 186
13.3.2 System Model and Implementation 186
13.3.3 The CESIS Variant 187
13.3.4 Implementation Results 188
13.4 Conclusions and Future Scope 189
13.4.1 Conclusions 190
13.4.2 Future Scope 192
References 193
14 Maximum Eigenvalue Based Detection Using Jittered Random Sampling 195
14.1 Introduction 195
14.2 Maximum Eigenvalue Detector Basis 196
14.3 Random Sampling Mode 198
14.4 Applications and Simulation Results 199
14.5 Conclusion 202
References 202
15 Prevention of Flooding Attacks in Mobile Ad Hoc Networks 204
15.1 Introduction 204
15.2 Related Work 205
15.3 Two-Step Protection Method 207
15.4 Simulation and Result 209
15.5 Conclusion 211
References 212
16 Exploiting ST-Based Representation for High Sampling Rate Dynamic Signals 213
16.1 Introduction 213
16.2 Time–Frequency Transforms 214
16.3 Discrete ST with Dual-Resolution 215
16.4 Spectrum Measurements on Real Dynamic Signals 217
16.4.1 Testbed Architecture 217
16.4.2 Data Acquisition 218
16.5 Validation and Comparison with STFT 219
16.6 Conclusion and Future Directions 224
References 226
17 Real-Time Spectrum Occupancy Prediction 228
17.1 Introduction 228
17.2 Spectrum Sensing Methods Overview 229
17.3 System Architecture 230
17.3.1 Computational Resources: Software-Defined Radio 230
17.3.2 Software Architecture 231
17.3.2.1 Scenario Controller 231
17.3.2.2 Experiment Scenario 232
17.3.3 Primary User's Engine 233
17.3.4 Secondary User's Engine: Cognitive Engine 234
17.3.5 Neural Network Configuration 236
17.4 Results 237
17.5 Conclusion 240
References 240
18 SCC-LBS: Secure Criss-Cross Location-Based Servicein Logistics 242
18.1 Introduction 242
18.2 Related Work 243
18.3 Features of Proposed Scheme 247
18.4 Secure Criss-Cross Location-Based Service 249
18.4.1 System Architecture 249
18.4.2 Phase 1: Identifying Location Updaters 250
18.4.3 Phase 2: Querying Location Updaters 252
18.4.4 Phase 3: Security of SCC-LBS 255
18.5 Simulation Scenario and Evaluation Metrics 257
18.6 Results and Analysis 259
18.7 Conclusion and Future Work 262
References 263
Index 265

Erscheint lt. Verlag 27.3.2019
Reihe/Serie Lecture Notes on Data Engineering and Communications Technologies
Lecture Notes on Data Engineering and Communications Technologies
Zusatzinfo XVI, 264 p. 146 illus., 110 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Web / Internet
Technik Elektrotechnik / Energietechnik
Schlagworte Cloud Systems • Information Security • IoT systems • Mobile/ubiquitous systems • Network Computing • Next Generation control • Next Generation design • Next Generation management • Next Generation Networks • Next Generation Wireless Network • Protection, assurance and trust in information security • WIDECOM 2019 • Wireless Intelligent & Distributed Environments for Comm.
ISBN-10 3-030-11437-6 / 3030114376
ISBN-13 978-3-030-11437-4 / 9783030114374
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Handbuch für Ausbildung und Beruf

von Vivian Pein

eBook Download (2024)
Rheinwerk Computing (Verlag)
27,93