Selected Papers from the 4th International Conference on Mobile, Secure and Programmable Networks (MSPN 2018)

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Cloud Continuum and Enabled Applications".

Deadline for manuscript submissions: closed (20 October 2018) | Viewed by 16510

Special Issue Editor


E-Mail Website
Guest Editor
LIGM, University Gustave Eiffel, CNRS, ESIEE Paris, 93162 Noisy-le-Grand, France
Interests: communication; security; machine learning; environmental issues
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

MSPN 2018 is the 4th edition of the successful International Conference on Mobile, Secure and Programmable Networking. The goal of the conference is to provide a forum for scientists, engineers and researchers to discuss and exchange novel ideas, results, experiences and works-in-process on all aspects of computer and information technology. Each year, MSPN attendees appreciate and benefit from multidisciplinary exchanges on Mobile, Secure and Programmable Networking. For more information about the conference, please use this link: http://www.adda-association.org/mspn/.

Selected papers that presented at the conference are invited to submit their extended versions to this Special Issue of the journal Computers after the conference. All submitted papers will undergo our standard peer-review procedure. Accepted papers will be published in open access format in Computers and collected together in this Special Issue website.

The conference paper should be cited and noted on the first page of the paper; authors are asked to disclose that it is a conference paper in their cover letter, and include a statement on what has been changed compared to the original conference paper; submitted papers should be extended to the size of regular research or review articles with at least 40% extension of new results, and the papers should be not exceed 30% copy/paste from conference paper.

Please prepare and format your paper according to the Instructions for Authors. Use the LaTeX or Microsoft Word template file for the journal (both are available from the Instructions for Authors page). Manuscripts should be submitted online via our susy.mdpi.com editorial system.

Dr. Eric Renault
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • SDN
  • Virtualization
  • Mobile, Cloud and Fog Computing
  • NFV
  • 5G Networks
  • Intent-Based Networking
  • IoT
  • VANETs
  • Cognitive Radio
  • Location-Based Services

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 1155 KiB  
Article
Position Certainty Propagation: A Localization Service for Ad-Hoc Networks
by Abdallah Sobehy, Eric Renault and Paul Muhlethaler
Computers 2019, 8(1), 6; https://0-doi-org.brum.beds.ac.uk/10.3390/computers8010006 - 07 Jan 2019
Cited by 5 | Viewed by 4965
Abstract
Location services for ad-hoc networks are of indispensable value for a wide range of applications, such as the Internet of Things (IoT) and vehicular ad-hoc networks (VANETs). Each context requires a solution that addresses the specific needs of the application. For instance, IoT [...] Read more.
Location services for ad-hoc networks are of indispensable value for a wide range of applications, such as the Internet of Things (IoT) and vehicular ad-hoc networks (VANETs). Each context requires a solution that addresses the specific needs of the application. For instance, IoT sensor nodes have resource constraints (i.e., computational capabilities), and so a localization service should be highly efficient to conserve the lifespan of these nodes. We propose an optimized energy-aware and low computational solution, requiring 3-GPS equipped nodes (anchor nodes) in the network. Moreover, the computations are lightweight and can be implemented distributively among nodes. Knowing the maximum range of communication for all nodes and distances between 1-hop neighbors, each node localizes itself and shares its location with the network in an efficient manner. We simulate our proposed algorithm in a NS-3 simulator, and compare our solution with state-of-the-art methods. Our method is capable of localizing more nodes (≈90% of nodes in a network with an average degree ≈10). Full article
Show Figures

Figure 1

14 pages, 400 KiB  
Article
Heuristic Approaches for Location Assignment of Capacitated Services in Smart Cities
by Gerbrich Hoekstra and Frank Phillipson
Computers 2018, 7(4), 67; https://0-doi-org.brum.beds.ac.uk/10.3390/computers7040067 - 03 Dec 2018
Cited by 5 | Viewed by 4843
Abstract
This paper proposes two heuristic approaches to solve the Multi-Service Capacitated Facility Location Problem. This problem covers assigning equipment to access points, offering multiple services in a Smart City context. The access points should offer the services to the customer and fulfil their [...] Read more.
This paper proposes two heuristic approaches to solve the Multi-Service Capacitated Facility Location Problem. This problem covers assigning equipment to access points, offering multiple services in a Smart City context. The access points should offer the services to the customer and fulfil their demand, given the coverage of the service and their capacity constraints. Both the heuristic approaches solve the assignment problem for the services separately and combine the solutions of the step together. One of them, however, updates the cost parameters between consecutive steps and produce near optimal solutions in reasonable time compared to the solution obtained from solving an integer linear programming problem exactly. Full article
Show Figures

Figure 1

26 pages, 8442 KiB  
Article
Self-Configuring IoT Service QoS Guarantee Using QBAIoT
by Ahmad Khalil, Nader Mbarek and Olivier Togni
Computers 2018, 7(4), 64; https://0-doi-org.brum.beds.ac.uk/10.3390/computers7040064 - 17 Nov 2018
Cited by 9 | Viewed by 6074
Abstract
Providing Internet of Things (IoT) environments with service level guarantee is a challenging task for improving IoT application usage experience. We specify in this paper an IoT architecture enabling an IoT Service Level Agreement (iSLA) achievement between an IoT Service Provider (IoT-SP) and [...] Read more.
Providing Internet of Things (IoT) environments with service level guarantee is a challenging task for improving IoT application usage experience. We specify in this paper an IoT architecture enabling an IoT Service Level Agreement (iSLA) achievement between an IoT Service Provider (IoT-SP) and an IoT Client (IoT-C). In order to guarantee the IoT applications’ requirements, Quality of Service (QoS) mechanisms should be implemented within all the layers of the IoT architecture. Thus, we propose a specific mechanism for the lowest layer of our service level based IoT architecture (i.e., sensing layer). It is an adaptation of the IEEE 802.15.4 slotted CSMA/CA mechanism enabling to take into consideration the requirements of real-time IoT services. Our access method called QBAIoT (QoS based Access for IoT) extends IEEE 802.15.4 systems by creating a new contention access period for each specified traffic class in the iSLA. Furthermore, due to the huge number of IoT connected devices, self-configuring capability provisioning is necessary for limiting human intervention and total cost of ownership (TCO). Thus, we integrate a self-configuring capability to the QBAIoT access method by implementing the MAPE-K closed control loop within the IoT High Level Gateway (HL-Gw) of our proposed QoS based IoT architecture. Full article
Show Figures

Figure 1

Back to TopTop