Venue : Coral Deira - Dubai, Deira, Dubai, UAE.  &  Date : April 4~5, 2014

Accepted Papers

  • Towards A Solution for Interoperability of Smarthomes Devices
    Héldon José O. Albuquerque and Gibeon S. Aquino Junior,Federal University of Rio Grande do Norte,Brazil
    ABSTRACT
    During the recent years, we can observe how mobile devices entered in the lives of people, becoming their main personal assistants and helping in various daily tasks. However not just mobile devices have evolved. And others electronic devices we use every day also experienced changes that have become smarter as the example of home devices. All these devices interconnected in the same environment or the same network, making use of services and exchange information with other devices, characterize a smart environment. smarthomes are special class of such environments and, increasingly, has become a scene with a variety of heterogeneous devices. However, due to the rapid progress of technology and the rise of a large number of heterogeneous devices, a variety of independent communication protocols were created, establishing a complex scenario to ensure interoperability between them. In this context, the main objective of this paper is to analyze the state of the art with an emphasis on the interoperability of current Mobile Devices with other digital devices present in a smarthome. Thus, it will be defined which protocols are currently most commonly used for this purpose, what are the current ongoing projects, what are the limitations of the solutions found in the research and, finally, it will be proposed an alternative solution for interoperability between the devices at a smarthome..
  • Intelligent Access Network Selection in 4G Using Neural Networks
    Hamid Taghizadeh,Urmia University of Technology,Iran
    ABSTRACT
    Next generation wireless networks will recommend broad range of services available to users anywhere at any time. Selecting one of these services depends on the users’ preferences and characteristics of the available networks. The vision is that users will not be fastened to a long-term agreement with one single operator and will instead be able to dynamically decide on which network should be selected. The progressing competitive marketplace will provide a choice of access networks in any given location, each offering different network technologies with varying characteristics to attract users’ interest. This paper highlights the need for an access network selection decision strategy to aid users operating in this heterogeneous multi-network wireless environment. We propose a neural network based approach to solve the problem of network selection for devices operating in heterogeneous environments. Simulations demonstrate the effectiveness of our proposed method which outperforms other approaches in a highly efficient manner.
  • An Anti-Clone Attack Key Management Scheme for Wireless Sensor Networks
    Heshem A. El Zouka,Arab Academy for Science & Technology and Maritime Transport,Egypt
    ABSTRACT
    Wireless Sensor Networks (WSNs) are subject to various kinds of attacks such as replaying of messages, battery exhausting, and nodes compromising. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. In this paper, we analyze several key management schemes that can be used for checking integrity and preventing cloning attacks. After analyzing the problems associated with these schemes, we propose a model that allows us to distinguish between legitimate nodes and cloned nodes in such sensor networks.
  • Algorithms for Packet Routing in Switching Networks with Reconfiguration Overhead
    Αslanidis Timotheos and Kogias Marios-Evangelos, National Technical University of Athens, Greece
    ABSTRACT
    Given a set of messages to be transmitted in packages from a set of sending stations to a set of receiving stations, we are required to schedule the packages so as to achieve the minimum possible time from the moment the 1st transmission initiates to the concluding of the last. Preempting packets in order to reroute message remains as part of some other packet to be transmitted at a later time would be a great means to achieve our goal, if not for the fact that each preemption will come with a reconfiguration cost that will delay our entire effort. The problem has been extensively studied in the past and various algorithms have been proposed to handle many variations of the problem. In this paper we propose an improved algorithm that we call the Split-Graph Algorithm (SGA). To establish its efficiency we compare it, to two of the algorithms developed in the past. These two are the best presented in bibliography so far, one in terms of approximation ratio and one in terms of experimental results.
  • Modified PF Scheduling For Heterogeneous Network with ICIC
    Islam Atef, Egypt
    ABSTRACT
    In this paper, heterogeneous LTE network is considered where femto cells are randomly deployed in a macro network. Femto cells are modeled as closed cells, namely only group member UEs can be associated with the femto cells. We propose modified proportional fair scheduling algorithms for heterogeneous network containing macro and femto cell and Compared to the existing proportional fair scheduling algorithms. We show how some of the novel features introduced in the Rel-10 specifications of the LTE standard can be leveraged by a suitable intercell interference coordination scheme (ICIC),also we use almost blank subframe (ABS) feature in our simulation to mitigate interference, we show the effect of using power control to adjust transmitted power of femto cell .Through computer simulation we assist the effect of ICIC and ABS in the simulation, also we show the effect of modified proportional fair scheduling on user throughput and cell throughput, we compared these results with PF
  • Cluster Based Enhanced Sybil Attack Detection in MANET through Integration of RSSI and CRL
    R. Vinoth Kumar and Mr. P. Ramesh, Anna University, India
    ABSTRACT
    Fully self-controlled mobile ad hoc networks represent a complex system. Due to the broadcast nature of wireless channel, MANET has many security issues. Especially, Sybil Attack is a very serious threat to the MANET as it creates multiple virtual fake identities per entity, There by affecting the routing table. The multiple virtual identities is obtained by spoofing the victims node or by creating an arbitrary node as there is no restriction to create an arbitrary node in MANET. In the existing system, authors have used RSSI as a parameter to detect the Sybil node because of its lightweight but it has failed to detect the fast moving Sybil nodes. The proposed system works considering the Certification Authority as one parameter and RSSI as the other parameter. The RSSI is used to form the cluster and to elect the cluster head. The CAs responsibility is given to the CH. Whenever huge variations occur in RSSI on neighbours entry and exit behaviour, the Certification Authority comes into play. The CA will check the certification of a node. If it is not valid, then its certificate will be revoked. Else it will be free to communicate in the network.