The main objective of this conference is to bring together, at a truly international level, people with shared interests in future networks and distributed systems. ICFNDS continues to grow and attract high quality submissions fulfilling the steering committee vision of establishing ICFNDS as a premier meeting that encourages researchers and practitioners to exchange and share their experiences.
Proceeding Downloads
IoT standardisation: challenges, perspectives and solution
The success and widespread adoption of the Internet of Things (IoT) has increased many folds over the last few years. Industries, technologists and home users recognise the importance of IoT in their lives. Essentially, IoT has brought vast industrial ...
Integrating smart city applications in 5G networks
Typical smart city applications generally require two different communications infrastructures, a wide area cellular network to provide connectivity and long-range communications and efficient communication strategies for transmitting short data packets,...
Quicker re-allocation of regions in opensimulator framework
Scalability is one of the major issues to cope with, in digital spaces, called virtual worlds, usually parallel and distributed in nature. In our previous work, we developed a framework for scaling these environments to cope with issues in static and ...
DDoS attacks on the internet of things and their prevention methods
The Internet of Things (IoT) vulnerabilities provides an ideal target for botnets, making them a major contributor in the increased number of Distributed Denial of Service (DDoS) attacks. The increase in DDoS attacks has made it important to address the ...
Clustering algorithm for AODV routing protocol based on artificial bee colony in MANET
One of the most important challenges that MANET face is how to connect nodes together also how to adapt the dynamically changes in the network topology. A novel clustering algorithm that ensures an increase in stability and adaptability of MANET has ...
LPBR: location prediction based routing protocol for mobile IoT systems
Recent advances in the Internet of Things(IoT) had created unparalleled opportunities and new applications. Low power communication technologies for IoT are critical for this success of IoT applications. IoT communication scenarios include mobile nodes ...
Loop unrolling effect on parallel code optimization
Parallel code optimization has many challenges to improve the code performance. Loop unrolling is an optimization technique applied to the loops to reduce the frequency of branches. This optimization is a useful technique to enhance the performance of ...
IoT system to control greenhouse agriculture based on the needs of Palestinian farmers
Technology can play an important role in greenhouse agriculture. In this paper we look at the role of IoT (Internet of Things) in greenhouse agriculture in Palestine, questionnaires and interviews were used to collect data from agricultural engineers to ...
Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare
As we are within the era of the internet of things (IoT) its increasing integration to our everyday lives means that the devices involved produce massive amounts of data every second from billions of devices. The current approach used to handle this ...
Wimax technology for maritime intelligent transport systems communication
- Ayoub Bahnasse,
- Abdelmajid Badri,
- Mohamed Talea,
- Fatima Ezzahraa Louhab,
- Adel Al-Harbi,
- Azeddine Khiat,
- Said Broumi
Intelligent transport systems offer effective solutions for the management of road, air and sea traffic. Despite their great success, these systems have several constraints and the multiple challenges that are not limited only to the security of the ...
Organizational management role in information security management system
This paper proposes an organizational management model for implementing the Information Security Management System (ISMS) Plan, Do, check and Act (PDCA) framework to achieve an improved balance between the effectiveness and efficiency of an ...
Market segmentation and analysis of online shopping in Jordan and the region
This paper aims at studying the market strength of eight countries from the Middle East, in addition to utilizing Data Mining (DM) tools to come up with a model for market segmentation, for that Weka software was used and Simple K Means clustering ...
Multipath routing in a 3D torus network on chip
We propose an efficient multipath routing algorithm for routing multiple data packets in parallel over node-disjoint paths on a 3D torus Network-on-Chip. We show how to build node-disjoint paths between any two nodes of the 3D torus topology and how to ...
A survey on IoT contribution in smart goods ordering cycle: Amazon buttons
Internet of Things (IoT) is an emerging technology with a wide range of applications including smart homes, cars, offices and so on. It plays an important role in data gathering regardless of time and environment. Amazon Dash button is one of the smart ...
CryptDBaaS: query over encrypted DBaaS without third-party
Information storage systems usually take great care for protecting their sensitive or confidential data, even users personal data. Hence the need to implement the concept of information security as part of the system. Information security primary focus ...
A traffic tracking algorithm for a fast detection of active network sources
Denial of Service attack is a cyber-attack that overwhelms the victim resources (system resources and network bandwidth) and makes them unavailable to legitimate users. To take the edge of this problem, packet filtering schemes at the front end of ...
Training neural networks using Salp Swarm Algorithm for pattern classification
Pattern classification is one of the popular applications of neural networks. However, training the neural networks is the most essential phase. Traditional training algorithms (e.g. Back-propagation algorithm) have some drawbacks such as falling into ...
Feature selection using binary particle swarm optimization with time varying inertia weight strategies
In this paper, a feature selection approach that based on Binary Particle Swarm Optimization (PSO) with time varying inertia weight strategies is proposed. Feature Selection is an important preprocessing technique that aims to enhance the learning ...
Rank based binary particle swarm optimisation for feature selection in classification
Feature selection (FS) is an important and challenging task in machine learning. FS can be defined as the process of finding the best informative subset of features in order to avoid the curse of dimensionality and maximise the classification accuracy. ...
Graphical authentication based on anti-shoulder surfing mechanism
Authentication is one of the most important mechanisms to ensure system accessibility by legitimate users. Various authentication tools exist based on numerous techniques. Distinguishing factors of such authentication tools are the underlying passwords ...
A study of current trends in the design of processors for the internet of things
The advent of processors in early 70s has made a significant impact on our society. Since then, the continuous increase in integration density and speed, lower power consumption and better integrability with advances in communication technologies have ...
Analysis of social network for telecommunication companies
Social Network Analysis (SNA) is defined as the science of grouping members and finding influencers member inside each group by utilizing advanced set of algorithms. Most specialized data mining software firms, such as IBM, SAS, python and R, create ...
Detection and prevention of malicious cryptocurrency mining on internet-connected devices
As technology evolves, more and more devices are connected to the Internet. The popularity and increasing significance of cryptocurriences are drawing attention, and crybercriminals are trying to utilize the resources and steal the processing power of ...
Low-energy smart trash bin architecture for dynamic waste collection system
Currently, most of waste collection systems are static, which are inefficient and expensive. Performing dynamic waste collection has proven to be more efficient. In order to implement and sustain dynamic waste collection, a low power smart trash bin is ...
Embedded key cryptosystem for cloud computing applications
As the internet1 and computer cloud are becoming increasingly dependable for almost all applications, data security issues are becoming crucial. In this paper, a new symmetric block cipher cryptographic algorithm is developed that would be suitable as a ...
A distributed security protocol designed for the context of internet of things
- Abdelkader Laouid,
- Muath AlShaikh,
- Farid Lalem,
- Ahcène Bounceur,
- Reinhardt Euler,
- Madani Bezoui,
- Habib Aissaoua,
- Abdelkamel Tari
In the field of Internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product management, workplace, home support and ...
Parallel genetic algorithm with elite and diverse cores for solving the minimum connected dominating set problem in wireless networks topology control
Finding an efficient communication structure among wireless network access points and wireless sensor nodes is essential in optimizing energy consumption and minimizing broadcast latency. Wireless networks Can control their nodes for efficient resource ...
A new mechanism for textual password hardening using adopted typing rhythm
This paper presents a novel mechanism for hardening textual passwords using an adopted password keying rhythm. The proposed mechanism uses the adopted rhythm of keying a password along with the password itself for authenticating users. This approach is ...
Malware detection using DNS records and domain name features
As billions of people depend on Internet application to perform day to day tasks, the prevalent of malwares and online attacks cause a huge loss to global Internet economy prevalent. Domain name system is one of the core components of the Internet, ...
Evaluating health information apps on real life smart phone use
As the population is increasing day by day and the people are more interesting to know about their health information especially the elderly people, so they interact with the online technologies. Now it is important to design the Interface in such a way ...
Index Terms
- Proceedings of the 2nd International Conference on Future Networks and Distributed Systems