HomeContact UsPast Events

Accepted Papers

  • ATTACK ANALYSIS IN VEHICULAR AD HOC NETWORKS
    Omer Mintemur and Sevil Sen, Hacettepe University, Turkey
    ABSTRACT

    One of the most promising and exciting area of communication technology is Vehicular Ad Hoc Networks (VANETs). It enables cars to communicate among and between each other and fixed infrastructures and, provides safe and enjoyable driving experience. However, VANETs are very susceptible to attacks that could easily be evasive due to its dynamic topology and, cause very dramatic results in traffic. To develop suitable security solutions for VANETs, we must firstly understand how attacks could affect the network. Therefore, we analyse four different types of attacks against two popular routing protocols (AODV, GPSR) in VANETs. All attacks, blackhole, dropping, flooding and bogus information, are implemented on two real maps having low and high density. The results clearly show how attacks could severely affect the communication and, the need of security solutions for such highly dynamic networks.

  • ANALYSIS OF WORMHOLE ATTACK CONFIRMATION SYSTEM DURING EMAIL DUMPING ATTACK
    Divya Sai Keerthi T and Pallapa Venkataram, Indian Institute of Science - Bangalore, India
    ABSTRACT

    The wormhole attack is a severe attack on application in a Mobile Ad hoc Network (MANET). This attack causes the applications to choose longer routes and disturbs the communications. A wormhole attacker can cause havoc on a MANET even without compromising the host of the application. For a wormhole attacker, email dumping attack is a simple attack that can lead to disastrous effects. So in this paper we demonstrate the working of wormhole attack confirmation system in case of email dumping attack. The proposed method used the honeypot to keep the attacker busy by interacting with it, and simultaneously identifies the attack using attack trees. It further reduces the false alarms, using the history of past attacks, stored in the Attack History Database. The system was tested in various sizes of MANETs, and the results prove that, the system efficiently identifies the email dumping attack with reduce false alarms.

  • PERFORMANCE COMPARISON OF AD HOC ROUTING PROTOCOLS IN VANETS FOR SMART CITY
    Khadija Raissi and Bechir Ben Gouissem, University of Tunis El Manar, Tunisia
    ABSTRACT

    VANETs are ad hoc networks which have been set to allow vehicles to intercommunicate for specific purposes like data sharing, road traffic management, safety and comfort applications. In this paper, we intend to discuss some routing protocols (AODV, DSDV, OLSR, DSR) including hierarchical ones (VMASC) in a VANET. First we shortly discuss the routing protocols and afterwards we compare the efficiency between these protocols in terms of packet delivery ratio(PDR) and throughput using the Network Simulator 3(NS3). The results show that VMASC protocol is favoured for all evaluation criteria. Indeed, this protocol supports the high dynamics of vehicular networks and it solves the problem of reliable realization, fast data transmission and link stability in VANETs.

  • 5G RADIO RESOURCE MANAGEMENT APPROACH FOR INTERNET OF THINGS COMMUNICATIONS
    Ahlem Saddoud1 , Wael Doghri2, Emna Charfi3 and Lamia Chaari Fourati4, 1,2Faculty of Economic Sciences and Management of Sfax, Tunisia, 3Faculty of Sciences of Sfax and 4Digital Research Center of SFAX (CRNS), Tunisia
    ABSTRACT

    Internet of Things (IoT) communications are considered to be a key technology to enhance 4G Long Term Evolution-Advanced (LTE-A), and to maintain its dominance in 5G systems. Due to the high performance requirements of 5G IoT applications, enhancements are needed to support the weighty uplink (UL) traffic produced by Machine-to-Machine (M-M) and Human-to-Human (H-H) communications. In this paper, we present a radio resource management (RRM) approach based on Quality of Service (QoS) requirements of the UL IoT flows. The proposed scheme provides best scenarios that aim to provide a tradeoff between the two types of traffics by guaranteeing the network performance, maximizing the bandwidth utilisation rate and avoiding flow starvation.

  • LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
    Mohammed A. Al-taha and Ra’ad A. Muhajjar, University of Basrah, Iraq
    ABSTRACT

    Wireless Sensor Networks (WSNs) are critical component in many applications that used for data collection. Since sensors have limited resource, security issues have become a critical challenge in Wireless Sensor Networks. To achieve security of communicated data in the network and to extend the WSNs lifetime; this paper proposes a new scheme called Lightweight Key Management Scheme (LKMS). LKMS used Symmetric Key Cryptography that depends only on a Hash function and XOR operation. Symmetric Key Cryptography is less computation than Asymmetric Key Cryptography. Simulation results show that the proposed scheme provides security, save the energy of sensors with low computation overhead and storage.

  • ESTIMATING CROWD DENSITIES USING WIFI, BLUETOOTH AND MOBILE PHONES
    Odonchimeg Lkhagva, Mongolian University of Science and Technology (MUST), Mongolia
    ABSTRACT

    Managing crowds of people and ensuring their safety is a challenging task. Near real-time information about the crowd’s size and dynamics would allow for taking suitable actions promptly. However, current methods of crowd monitoring are video-based requiring substantial human assistance and do not suit all kinds of monitoring environments. This paper investigates WiFi and Bluetooth signals that modern smartphones transmit for their potential to estimate crowd characteristics. It describes different tools to capture WiFi and Bluetooth signals and reports on experiments with real crowds.

  • A COMBINED PROCESSING ALGORITHM FOR DOWNLINK MULTIUSER MIMO SYSTEM
    Zhong Tao, Zhou Hongming, Ma Yu, Pu Yueli, Yuxi Normal University, China
    ABSTRACT

    The use of space-division multiple access (SDMA) in the downlink of a multiuser multiple-input multiple-output (MIMO) wireless communication system can provide a gain in system throughput. However, there exists the co-channel interference of other users in the downlink of a MIMO wireless communication system. This is a challenge. In order to reduce the co-channel interference, a combined processing algorithm is proposed for Uplink multiuser MIMO system. We combine th block diagonalization (BD) algorithm with minimal mean-square error (MMSE) algorithm to process the signals. The proposed algorithm efficiently reduces the co-channel interference and improves the system performances. The effectiveness of the proposed algorithm is verified by simulation.






                                                                                          Copyright © WiMoA 2017                                                                                  Designed By Wireilla