2017 27th International Telecommunication Networks and Applications Conference (ITNAC)

22-24 Nov. 2017

Filter Results

Displaying Results 1 - 25 of 96
  • [Copyright notice]

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2017, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Technical program committee welcome

    Publication Year: 2017, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (51 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote topic: Network cloudification: SDN-NFV and 5G-MEC with edge and fog computing

    Publication Year: 2017, Page(s):1 - 8
    Request permission for reuse | PDF file iconPDF (286 KB)
    Freely Available from IEEE
  • Program

    Publication Year: 2017, Page(s):1 - 28
    Request permission for reuse | PDF file iconPDF (245 KB)
    Freely Available from IEEE
  • Technical program committee

    Publication Year: 2017, Page(s):1 - 4
    Request permission for reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Advisory panel

    Publication Year: 2017, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):1 - 10
    Request permission for reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2017, Page(s):1 - 7
    Request permission for reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (890 KB)
    Freely Available from IEEE
  • Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Supervisory control and data acquisition (SCADA) systems are the key driver for critical infrastructures and industrial facilities. Cyber-attacks to SCADA networks may cause equipment damage or even fatalities. Identifying risks in SCADA networks is critical to ensuring the normal operation of these industrial systems. In this paper we propose a Bayesian network-based cyber-security risk assessmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive data transfer methods via policy evolution for UAV swarms

    Publication Year: 2017, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    This paper presents an adaptive robotic swarm of Unmanned Aerial Vehicles (UAVs) enabling communications between separated non-swarm devices. The swarm nodes utilise machine learning and hyper-heuristic policy evolution to provide agility within the swarm, enabling each swarm member to select the most appropriate mobility policy for the environment given the swarm's abilities. The swarm evolution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A credit-aware clustering scheme for the proximate sharing of geo data downloading

    Publication Year: 2017, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Mobile Social Network (MSN) can enable many services, such as letting people in an MSN share some useful information during the touring journey. In this work, a clustering scheme is proposed to allow a group of persons, who are in the same MSN and are within the WiFi hot spot' signal coverage of the cluster leader who enables his handheld device's WiFi hot spot function, to share the nearby Point ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting IoT zombie attacks on web servers

    Publication Year: 2017, Page(s):1 - 3
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Internet of Things (IoT) devices pose a serious threat to the web as poorly configured or faulty devices can be used for massive Distributed Denial of Service attacks. High jacked IoT devices that act like real users are a particular problem that present significant difficulties for traditional detection methods. An adaptive, real time scoring system for detecting such attacks is proposed that doe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A disaster recovery system for location identification-based low power wide area networks (LPWAN)

    Publication Year: 2017, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    Low Power Wide Area Networks (LPWAN) are used in a number of applications, including disaster monitoring and recovery networks. LPWAN sensors capture data bits and transmit them via dedicated gateways, which are connected to public carrier networks (e.g., cellular networks). One of the challenges encountered in disaster management scenarios revolves around the carry/forward sensed data and geograp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A universal iot joining protocol for DIY applications

    Publication Year: 2017, Page(s):1 - 3
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Previous work has developed a remarkably low cost method which allows IoT devices to securely join domestic WiFi networks. Implementation of this method has uncovered a weakness in that only controllers (usually smart phones) capable of programmatically controlling hotspot mode can successfully implement the protocol. It is demonstrated that this weakness greatly compromises the open nature of thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Competition, regulation and institutional framework in telecommunications, implications for NGN in Mexico

    Publication Year: 2017, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    When analyzing competition in telecommunication markets it is fundamental to take into account their specific characteristics. Moreover, it is important to understand the temporal evolution of competition as a result of multiple contextual factors. For these reasons the present study analyzes competition in mobile telecommunications, measured through the Lerner Index, and explains its evolution th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topic modeling for situation understanding in telecommunication networks

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    Decreasing network downtime for wireless telecommunication systems is becoming more and more important. Therefore, degrading system performance needs to be identified long before key performance indicators pick up on it. As a lot of information about what is going on in the telecommunication network can be found in counter readings, exploratory data analysis, such as unsupervised clustering algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal-coherent and adaptive software defined inference of network traffics (OCcASION)

    Publication Year: 2017, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    In this paper, the OCcASION framework for Traffic Matrix (TM) estimation in Software Defined Networks (SDN) is proposed where, first in the learning phase, the Optimal Observation Matrix (OOM) of SNMP link-loads is estimated. Then in the measurement and inference phase, the OOM is used to coherently find the minimum-norm estimate of the unknown TM. This framework is applied under both non-adaptive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tactical line-of-sight MIMO communication system for contested networks

    Publication Year: 2017, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Tactical communications networks need to be able to operate in contested electromagnetic environments. Thus, to fulfil military missions in a timely manner, it is of paramount importance to ensure the communications survivability of wireless segments of these networks. Smart antenna systems using multiple-input-multiple-output (MIMO) techniques can improve communications network's survivability co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental evaluation of mutual interference in co-located IEEE 802.15.4-based wireless body sensor networks

    Publication Year: 2017, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Noticeable performance degradation of IEEE 802.15.4-based wireless body sensor networks (WBSNs) caused by the mutual interference has recently drawn the attention of research communities. Frequency-adaptation is to some extent an effective solution to reduce the impact of mutual interference on WBSN's performance. However, as the number of WBSNs becomes larger, this scheme is destined to fail. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure low energy AODV protocol for wireless sensor networks

    Publication Year: 2017, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Recently, a tremendous interest has been concentrated on the design and development of wireless sensor networks (WSNs) - distributed systems comprised of numerous wireless, sensor devices deployed densely in a sensing area. Battery powered sensors need efficient management due to limited energy resources, and energy conservation is a vital design issue that needs to be boosted in order to increase... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increased block size and Bitcoin blockchain dynamics

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (5591 KB) | HTML iconHTML

    Bitcoin is a peer to peer electronic payment system where payment transactions are stored in a data structure named the blockchain which is maintained by a community of participants. The Bitcoin Core protocol limits blocks to 1 MB in size. Each block contains at most some 4,000 transactions. Blocks are added to the blockchain on average every 10 minutes, therefore the transaction rate is limited t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of a semi blind pilot decontamination method in massive MIMO

    Publication Year: 2017, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Recently, a semi-blind pilot decontamination based method is proposed in [1] for multicell multiuser massive multiinput multioutput (MIMO) systems. In [1], to reduce the effect of the pilot contamination, a semiblind channel estimation method that does not require cell cooperation or statistical information of the channels is proposed. The blind pilot decontamination method in [1] is reformulated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.