By Topic

Advanced Networks and Telecommuncations Systems (ANTS), 2012 IEEE International Conference on

Date 16-19 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 31
  • Program

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (79 KB)  
    Freely Available from IEEE
  • Program

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (73 KB)  
    Freely Available from IEEE
  • Home

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • Energy efficient dynamic bandwidth allocation for Ethernet passive optical networks

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    We propose a dynamic bandwidth allocation (DBA) algorithm for Ethernet passive optical networks (EPON). The DBA algorithm exploits the sleep mode functionality, where the optical network unit (ONU) at the user premises is put to sleep in every cycle according to the traffic load of the ONU. The DBA algorithm achieves up to 93% power savings in comparison to traditional power-ignore DBAs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Should ISPs adopt hybrid CDN-P2P in IP-over-WDM networks: An energy-efficiency perspective?

    Page(s): 6 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (529 KB) |  | HTML iconHTML  

    Content based services are becoming more popular in recent times. Traditional content distribution networks (CDN) are being employed for efficient content hosting and distribution. To increase scalability and reduce the cost of content distribution, peer-to-peer (P2P) systems are being considered to complement the traditional CDN systems in a hybrid manner. Research works and real life deployments have shown that hybrid CDN-P2P systems are feasible, cheap, and scalable options. However, with increasing concern for energy consumption and hence carbon footprint, energy efficiency of such a hybrid system must be taken into consideration before wider implementation. In our study, we analyze the energy consumption of hybrid CDN-P2P systems and provide indicators to help make decision for service providers. We show that the hybrid systems not only help the CDN providers to reduce server bandwidth, but also reduce a significant amount of energy in the core network. For a moderately popular content, core network will consume 20-40% less energy with a hybrid system compared to a traditional CDN. This will provide incentive for the service providers to adopt hybrid systems and reduce carbon footprint and operational expenses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • intelliSENSE: Location-based Wi-Fi sensing for energy efficiency in smart mobile devices

    Page(s): 12 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    Today, we use smart mobile devices to browse content, stream media, etc., in addition to making voice calls. Most smart devices are equipped with IEEE 802.11 (WiFi) interface to connect to the Internet using wireless access points (APs), as WiFi provides cost-effective connectivity to users. Wireless interfaces in smart devices drain high energy while searching for network connectivity and transition into power saving mode (PSM) after connecting to an AP. Hence, we need intelligent and energy-efficient mechanisms to scan and connect to wireless networks. In this work, we propose and investigate the characteristics of intelliSENSE, a location-based WiFi sensing mechanism for energy efficiency in smart mobile devices. We also propose adaptive polling mechanisms to further reduce the energy spent in WiFi sensing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impairment-aware lightpath provisioning in mixed line rate networks

    Page(s): 18 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (514 KB) |  | HTML iconHTML  

    In mixed line rate (MLR) networks, different line rates can coexist on the same fiber, on different wavelengths. Each lightpath can be established end-to-end, with requested line rate. Advanced modulation techniques are required for high line rates. Signals being propagated over transparent paths are exposed to detrimental effects of physical layer impairments (PLI). Advanced modulation techniques are more susceptible to impairments, especially to the cross-phase modulation (XPM) induced by intensity-modulated channels. In this study, we investigate the impairment-aware lightpath provisioning problem for MLR networks. We consider a transparent optical network where we aim to maximize the number of established connections, while avoiding disruption of existing lightpaths. We propose a weighted approach for impairment-aware lightpath provisioning in MLR networks. We employ an auxiliary graph to capture the PLIs on differently modulated channels with a weight assignment scheme. Simulation results show that the performance of our approach is noteworthy, in terms of blocking probability, bandwidth blocking ratio, and resource consumption. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplifying network management using Software Defined Networking and OpenFlow

    Page(s): 24 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    As the complexity of deployments increases, network managers face two problems that we address in this paper. First, the deployment of middleboxes in choke points (between two routers through which all traffic flows), raises concerns regarding robustness, correctness and efficiency. Second, dynamically managing traffic isolation in a network is a very tedious task. In this paper we propose using Software Defined Networks (SDN) and OpenFlow to simplify network management by addressing these two challenges. SDN consists of decoupling the control and data planes of a network. OpenFlow standardizes the way that the controller communicates with the network devices in an SDN architecture. To overcome the challenge faced by deploying middleboxes in choke points, we show how these appliances can be deployed at waypoints. In this architecture, a waypoint is only traversed by traffic that needs further processing. The remaining data flows through the network without being processed by the middlebox. We have developed an application that implements an encryption processing unit that works as a waypoint and we show how OpenFlow can be used to route through the encryption unit only the traffic that requires encryption. To overcome the challenge of dynamic traffic isolation, we show how a network manager can use an application to create, delete and modify virtual local area networks (VLANs) in a dynamic way to achieve traffic isolation. Our implementation provides a GUI to the user so that the administration of the VLANs is greatly simplified. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of 10G-EPON in streaming IPTV

    Page(s): 30 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (729 KB) |  | HTML iconHTML  

    Performance of 10G-EPON in streaming IPTV is studied using a synthetic trace generator. Parameters of interest are number of concurrent channels, degree of video compression, average and maximum packet delays, packet delay variance, and buffer sizes in ONUs. It is shown that 10G-EPON can support a large number of concurrent IPTV channels with minimal buffer size at moderate rates of video compression. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new protection scheme for a combined ring-star based hybrid WDM/TDM PON architecture

    Page(s): 33 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (402 KB) |  | HTML iconHTML  

    In this paper we propose ahybrid WDM/TDM PON architecture that utilizes a combined ring-star based connectivity to provide shared protection against optical line terminal (OLT) failure. We have further proposed an appropriate control mechanism to reduce the protection switching time. We have evaluated the availability figures of the network service per end-user subject to different failure scenarios within the proposed network architecture along with its associated capital expenditure (CAPEX) per user. Finally we have demonstrated that our proposed architecture provides a significant cost benefit over 1:1 protection scheme for achieving almost the same value of network availability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link datarate based admission control in wireless networks

    Page(s): 38 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (142 KB) |  | HTML iconHTML  

    This paper presents a link data-rate based admission control mechanism for a wireless network using a transmit power allocation algorithm. The admission control mechanism uses the nodes' link datarate requirements as an input parameter. Transmit power control enables the nodes to set their power levels such that the required link datarate requirements are met while minimizing the interference caused to other transmissions. The link datarate requirement of a node is converted to its signal strength requirement that is subsequently used for admission control. We establish the relationship between key parameters in admission control such as signal strength requirement, link datarate requirement, number of nodes in the system etc. The proposed algorithm is studied using analytic and simulation techniques to show that it enables the nodes to meet their respective link datarate requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of spectrum congestion in cognitive radio ad hoc networks

    Page(s): 44 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    Spectrum congestion refers to the situation where there are not enough frequencies to accommodate multiple radios or radio systems operating simultaneously. For instance, spectrum congestion is not uncommon in the unlicensed band, where multiple WiFi, Bluetooth, and Zigbee radios may compete for spectrum. Although there are many studies on spectrum congestion in the unlicensed band, it is not well studied for a cognitive radio ad hoc network employing dynamic spectrum access. Since spectrum congestion in a cognitive radio ad hoc network incurs severe degradation of overall network performance, a novel spectrum congestion detection method is proposed in this paper to detect and locate congestions in such networks. Specifically, we propose a Spectrum-Aware Split Multipath Routing (SA-SMR) with dynamic channel assignment as a baseline multipath routing protocol, and investigate the feasibility of detecting spectrum congestion based on the statistics of the resulted paths from multipath routing. Furthermore, a cross-layer approach is proposed to deduce the cause of the spectrum congestion by comparing information from multiple layers, so that appropriate mitigation procedures can be carried out. Simulation results show the effectiveness of the proposed scheme, and the effects of the primary users' activities and the cognitive users' strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity driven capability based access control (ICAC) scheme for the Internet of Things

    Page(s): 49 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (423 KB) |  | HTML iconHTML  

    Internet of Things (IoT) is becoming integral and mandatory part of everyday life. Scalability and manageability is intimidating due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is important to establish secure communication between multiple devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related to the complexity and dynamics of device identities. ICAC is implemented for Wi-Fi and results shows that ICAC is scalable and performs better compared to other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against man-in-the-middle attack, especially eavesdropping and replay attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting dual-mode forwarding in content-centric network

    Page(s): 55 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    Information-centric networking (ICN) aims to replace current host-centric IP architecture with one based on efficient, secure, and reliable dissemination of information. This paper extends content-centric networking (CCN), one of the ICN architectures, for dual-mode forwarding, wherein, the forwarding plane distinguishes sharable traffic from non-sharable traffic characterized by its global shareability. The proposed extensions allow sharable traffic to be forwarded in a non-expedite mode following the packet processing of CCN, while non-sharable traffic is forwarded in the proposed expedite mode subjected to fast-path forwarding only involving the FIB. We enable this dual-mode forwarding using a new header which optionally includes a source-object name. We support our proposal with simulation results where the benefit of separating these two types of traffic in the forwarding plane results in better utilization of content store, pending interest table, and improved user QoE for sharable applications in terms of content delivery latency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group key establishment (GKE): Two/three party key exchange to GKE

    Page(s): 61 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (175 KB) |  | HTML iconHTML  

    This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE) and the third one is a compiler that constructs a GKE from 3-KE for circular topology. Our compilers 2-TGKE and 3-TGKE are first of their kind and are efficient due to the underlying tree topology. For the circular topology, we design a compiler called 3-CGKE. By extending the compilers 2-TGKE and 3-TGKE using the techniques in [?], scalable compilers for tree based authenticated group key exchange protocols (2-TAGKE/3-TAGKE), that are secure against active adversaries can be constructed. As an added advantage our compilers can be used in a setting where there is asymmetric distribution of computing power and hence applicable for low power devices such as PDA's, palmtops, sensor network nodes and mobile phones. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic agreement framework for trading of wireless services

    Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (268 KB) |  | HTML iconHTML  

    Today's rapid change in demands of wireless services is compelling wireless service providers (WSPs) to deploy most recent wireless technologies (such as 3G, LTE) in the market. In India, there are many WSPs that hold only 2G license in a particular service area. Naturally, their business prospect is affected as they cannot provide the cutting edge services. In this work, we have suggested an efficient strategy for these WSPs to enable them to provide new age services to their own customers. We envisage a scenario where, unlicensed WSP provides services to its users by buying bulk services from any licensed WSP. In reality, similar kind of arrangement exists where some WSPs collaborate with each other by entering into a long term static agreement. However, in this work, we have proposed an agent based dynamic agreement framework as an alternative solution. In our model, agents of the licensed and unlicensed WSPs try to reach an agreement for short term by negotiating on different service attributes (such as bandwidth, quality of service, price and credit limit etc.) of any particular service e.g. high speed internet (HSI). Initially, we have proved the existence of Nash equilibrium where, utilities of both buyer and seller maximize in case of HSI service. Subsequently, we have presented a novel genetic algorithm (GA) based negotiation mechanism for the agents. We have chosen joint utility of buyer and seller as the performance measure of our trading mechanism. Our simulation result shows that our negotiation mechanism provides better joint utility compared to the current static agreement strategy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pedestrian tracking algorithm in NLOS environments

    Page(s): 73 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (187 KB) |  | HTML iconHTML  

    This paper presents a cellular network based positioning algorithm in an urban environment characterized by multipath and severe non line of sight (NLOS) errors. The proposed algorithm mitigates localization error up to 75% as shown by the simulation results. The algorithm involves an initial averaging step followed by a prediction step for optimization, confining the estimated location close to the actual location. The proposed algorithm doesn't require additional hardware like sensors, accelerometers, gyroscopes etc. for localization as used in traditional cellular network based positioning methods. This approach can also be utilized in indoor positioning system (IPS) and global positioning systems (GPS) when at most three satellites are available. Low computational complexity of the algorithm is an added advantage. Utilization of orthogonal sources of information for improving accuracy is also explored. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the construction of load-balanced (k, r-hop)-connected dominating set for WSNs

    Page(s): 76 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (133 KB) |  | HTML iconHTML  

    Connected Dominating Sets (CDS) are selected to construct a virtual backbone in Wireless Sensor Networks (WSNs). Indeed, CDS are used for fault tolerant broadcasting, routing and even efficient gathering of data. On the other hand, r-hop connected k-dominating sets ((k, r)-CDS) are introduced to reduce the size of CDS and the total amount of information to be transmitted. Unfortunately, no work considers the load-balance factor of (k, r)-CDS. Recently, there is a proposition of constructing load-balanced CDS for WSNs. In this paper we reuse the same concept of selecting load-balanced CDS to construct a Load-Balanced (k, r)-CDS (LB(k, r)-CDS). Then, the allocation of dominatees to the appropriate dominators is done. Through simulations, the proposed method of constructing LB(k, r)-CDS extends network lifetime by an important rate compared with the most recent (k, r)-CDS construction method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient data collection with directional antenna and network coding in wireless sensor networks

    Page(s): 81 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (132 KB) |  | HTML iconHTML  

    In wireless sensor networks (WSNs), with converge-cast, the data flow pattern forms a funnel structure and converges at the Sink. Reduction of traffic flow to the Sink cuts down the funneling effect and improves the efficiency of the network. This paper presents an energy Efficient Triangular (regular) Deployment strategy with Directional Antenna (ETD-DA) while analyzing the directivity of antenna beam in the network. A triangular deployment strategy, where nodes are placed at different layers, has been adopted in view of the funneling effect of traffic in a single Sink network. A particular layer of ETD-DA involves in sensing and generating data for an event in WSN. On the proposed pattern, ETD-DA, the inter-level communication has been analyzed. The 2-connectivity pattern of communication has been achieved by orienting the directional antenna beam of a sensor in a particular direction towards the Sink. For the improvement of reliability (protection of data against path failure) of the network, a network coding based forwarding strategy has also been proposed for inter level communication in the ETD-DA with 2-connectivity pattern. The energy consumption has been significantly reduced due to the combination of directional beam and network coding. A detailed theoretical analysis and simulation have been performed to show the efficacy of the proposed approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge sharing framework for cooperative networks

    Page(s): 87 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (189 KB) |  | HTML iconHTML  

    Learning the network environment in a quick manner offers great operational rewards. Therefore, it is important for future network devices to share critical control information among them. In this paper, we propose a comprehensive framework for exchange of control information between nodes located in a local area. Our proposed framework enables hosts to quickly gather the operational parameters, such as the maximum supported congestion window or transmission rate and round-trip time supported by the network for a communication session, from its peers. We present results from a prototype framework and from the results we find that our framework allows key control information exchange between peer nodes in the local network, thereby, improving network performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On detecting CTS duration attacks using K-means clustering in WLANs

    Page(s): 90 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (905 KB) |  | HTML iconHTML  

    IEEE 802.11 based Wireless LAN (WLAN) standard has been one of the most successful wireless technology standards with total expected sales rising to a staggering $6.1Billion by 2015. The proliferation of 802.11 based WLANs highlights the need to focus on development of new solutions for security as enterprises and campuses increasingly being covered by WLANs. Denial of Service (DoS) is one of the popular attacks that prevents WLAN users from accessing the wireless network resources. Most DoS attacks such as the Clear-to-Send (CTS) duration attack is easy to carry out by an attacker. This work focuses on the use of clustering techniques on wireless traffic datasets for detecting CTS-based DoS attacks on 802.11 WLANs. Performance evaluation shows that, under the cases of naïve CTS duration attacker as well as the sophisticated CTS duration attacker, the k-means clustering technique is able to achieve high detection rates and low false positive rates with relatively small values of k (i.e., number of clusters). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of various PSK modulation schemes for ultra-high speed long-haul fiber-optic communication system

    Page(s): 96 - 98
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (658 KB) |  | HTML iconHTML  

    In this paper, the performance of differential phase modulation schemes for ultra-high speed long-haul fiber-optic communication system has been evaluated and compared. The quality factor Q is measured from the eye-pattern at the end of the dispersion-managed transmission line. Only self-phase modulation, dispersion effect and amplifier noise are considered here. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Layer 2 security for Smart Grid networks

    Page(s): 99 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (509 KB) |  | HTML iconHTML  

    One of the main aspects of Smart Grid communication network is providing a secure communications network. Smart Grid Network operating center and back office are pretty much secure. The problem starts when smart grid network is extended to connect to homes, commercial building and factories. With this the smart grid network access is opened up to millions of smart grid end user access points. In this paper the different security threats at each OSI layer are discussed. An overview of layer 2 security standards 802.1AE, 802.1X are elucidated. The paper finally concludes by proposing to implement the layer 2 security to achieve complete Smart Grid communication network security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive sub channel grouping in MC-CDMA systems for 4G networks

    Page(s): 105 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (451 KB) |  | HTML iconHTML  

    The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. In this paper an adaptive sub channel grouping (ASG) scheme is proposed. In this scheme channels are allocated to the users according to the CSI obtained, a channel will be allocated to that user who experiences least fading on that channel. In similar way all the channels are allocated to users and total number of channels allocated to one user forms one group. The total number of groups is equal to number of users and number of channels per group are different. The proposed algorithm reduces the required transmit power and yields a solution that maximizes the throughput. Simulations results are presented for 4G environment and it is found that the proposed ASG algorithm can significantly improve the system throughput as compared to conventional schemes of group formation where neighboring channels forms groups and number of channels per groups are same. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Path planning algorithms for mesh networked robots based on WiFi geo-location

    Page(s): 111 - 116
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (373 KB) |  | HTML iconHTML  

    Robot formation and motion planning is a challenging area in mesh networked robots (MNRs). The accuracy and speed with which two or more robots can align them so as to serve a purpose is very important. This paper reports results from our study of the characteristics of robots operating in a real world wireless network environment where robots plan their motion based on the position determined using a Wi-Fi based positioning algorithm. Further we propose and study three methods of formation planning for a leader follower system and evaluate their accuracy and efficiency. First, the followers decide their own path based on the leader's position. In the second algorithm, the motion command for the follower was decided by the leader based on the follower's position and in the third, the followers predict the leader's next position using its current position and direction of motion and moved accordingly. These methods were studied in different working environments and the effect of disturbances on the accuracy of formation was determined using a prototype MNR we built. RSSI fingerprinting was used to calculate the position of the robots and based on which, the path was planned by the leader as well as the followers. Results from the comparison of path planning algorithms are provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.