Match!
Yoram Haddad
Jerusalem College of Technology
Wireless networkDistributed computingComputer networkComputer scienceSoftware-defined networking
52Publications
10H-index
296Citations
What is this?
Publications 48
Newest
#1Arie Haenel (Telecom SudParis)H-Index: 1
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 10
Last. Zonghua Zhang (IMT: Institut Mines-Télécom)H-Index: 1
view all 3 authors...
The Internet of Things world is in urgent need of practical solutions for its security. In this paper, we propose a new approach to extend existing authentication protocols, using Physical Layer Radio Frequency Fingerprinting to provide efficient hybrid authentication mechanisms. Our approach uses a hybrid protocol, that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, having a measurable gain while keeping a...
Source
#1Amit Dvir (Ariel University)H-Index: 9
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 10
Last. Aviram Zilberman (Ariel University)H-Index: 2
view all 3 authors...
The software defined networking paradigm decouples the network’s control logic (the control plane) from the underlying routers and switches (the data plane), promoting centralization of network control. The controller placement problem is threefold in nature: the number of controllers to be placed in a network, the locations of these controllers and the assignment function of controllers to switches, with all of them important for the design of an efficient control plane. Most of the existing li...
Source
#1Arie Haenel (Telecom SudParis)H-Index: 1
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 10
Last. Zonghua Zhang (IMT: Institut Mines-Télécom)H-Index: 1
view all 3 authors...
A large proportion of the Internet of Things devices are battery powered cheap units, designed to stay in the field for a long time. This is the case of connected sensors and actuators. In this demo, we analyze the performance of a system fully implementing an original cross-layer security mechanism for wireless sensor nodes, by precise energy measurement of different settings of the system.
1 CitationsSource
#1Yisroel Mirsky (BGU: Ben-Gurion University of the Negev)H-Index: 9
#2Benjamin Fedidat (Jerusalem College of Technology)
Last. Yoram Haddad (Jerusalem College of Technology)H-Index: 10
view all 3 authors...
Secure communication is a necessity. However, encryption is commonly only applied to the upper layers of the protocol stack. This exposes network information to eavesdroppers, including the channel's type, data rate, protocol, and routing information. This may be solved by encrypting the physical layer, thereby securing all subsequent layers. In order for this method to be practical, the encryption must be quick, preserve bandwidth, and must also deal with the issues of noise mitigation and sync...
#1Guy Saadon (ENST: Télécom ParisTech)H-Index: 1
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 10
Last. Noëmie Simoni (ENST: Télécom ParisTech)H-Index: 8
view all 3 authors...
In network management architectures of 5G and IoT networks, standardization groups often consider the network resource virtualization layer between the physical network and the SDN controller, as a means to allow deployment and placement of network services with their virtual network functions. However, the following question arises: is this layer enough to react to real-time changes originating from customers or the network without interrupting the service? We consider that a dynamic architectu...
Source
#1Hadar Sufiev (Jerusalem College of Technology)H-Index: 1
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 10
Last. Jose SolerH-Index: 11
view all 4 authors...
The software defined networking (SDN) paradigm separates the control plane from the data plane, where an SDN controller receives requests from its connected switches and manages the operation of the switches under its control. Reassignments between switches and their controllers are performed dynamically, in order to balance the load over SDN controllers. In order to perform load balancing, most dynamic assignment solutions use a central element to gather information requests for reassignment of...
1 CitationsSource
#1Philippe Ezran (Jerusalem College of Technology)H-Index: 1
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 10
Last. Merouane Debbah (CentraleSupélec)H-Index: 78
view all 3 authors...
The question of resource allocation arises whenever demand exceeds supply. The common approach is to optimize the network efficiency while maintaining some fairness among the users. While resource allocation policies use various definitions for network efficiency and fairness, most of them are based on maximization of a utility function. The mathematical formalism underlying these approaches is the same as the mathematical formalism used in the Bernoulli model in finance, where a player is suppo...
Source
#1Guy Saadon (ENST: Télécom ParisTech)H-Index: 1
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 10
Last. Noëmie Simoni (ENST: Télécom ParisTech)H-Index: 8
view all 3 authors...
Abstract In recent years, demands on wireless network for services mobility, for ever more resources, and for a growing variety of services, have exploded. Consequently, network management as we have known it up to now, with its silos and rigid approach, cannot meet these expectations. If we add the Internet of Things, the network has to become dynamic, adaptable and flexible. In this context, the industry and forums have specified and standardized a new architecture based on Software Defined Ne...
5 CitationsSource
#1Orit Rozenblit (Jerusalem College of Technology)H-Index: 1
#2Yoram Haddad (Jerusalem College of Technology)H-Index: 10
Last. Rina Azoulay (Jerusalem College of Technology)H-Index: 2
view all 4 authors...
Abstract Accurate assessment of the wireless coverage of a station is considered a key feature in 5G networks. Determining the reception coverage of transmitters becomes a complicated problem when there are interfering transmitters, and it becomes increasingly more complicated when the transmission powers of those transmitters are not uniform. In this paper, we compare different Machine Learning techniques that can be used to predict the wireless coverage maps. We consider the following Machine ...
Source
#1Florian Metzger (University of Duisburg-Essen)H-Index: 11
#2Tobias Hobfeld (University of Duisburg-Essen)H-Index: 33
Last. Michael Jarschel (Bell Labs)H-Index: 15
view all 10 authors...
Whereas some application domains show a certain consensus on the role of system factors, human factors, and context factors, QoE management of multimedia systems and services is still faced with the challenge of identifying the key QoE influence factors. In this chapter, we focus on the potential of enhancing QoE management mechanisms by exploiting valuable context information.
Source
12345