LNCS 9944 Parosh Aziz Abdulla Carole Delporte-Gallet (Eds.) Networked Systems 4th International Conference, NETYS 2016 Marrakech, Morocco, May 18–20, 2016 Revised Selected Papers 123 Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zurich, Switzerland John C Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany 9944 More information about this series at http://www.springer.com/series/7411 Parosh Aziz Abdulla Carole Delporte-Gallet (Eds.) • Networked Systems 4th International Conference, NETYS 2016 Marrakech, Morocco, May 18–20, 2016 Revised Selected Papers 123 Editors Parosh Aziz Abdulla Uppsala University Uppsala Sweden Carole Delporte-Gallet Université Paris Diderot Paris France ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-319-46139-7 ISBN 978-3-319-46140-3 (eBook) DOI 10.1007/978-3-319-46140-3 Library of Congress Control Number: 2016950896 LNCS Sublibrary: SL5 – Computer Communication Networks and Telecommunications © Springer International Publishing AG 2016 This work is subject to copyright All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Preface NETYS 2016 received 121 submissions The reviewing process was undertaken by a Program Committee of 31 international experts in the areas of networking, distributed computing, security, formal methods, and verification This process led to the definition of a strong scientific program The Program Committee accepted 22 regular papers and 11 short papers In addition, 19 papers were selected for poster presentation Besides these high-quality contributions, the program of NETYS 2016 included keynote talks by three world-renowned researchers: Joost-Pieter Katoen (RWTH Aachen University, Germany), Andreas Podelski (University of Freiburg, Germany), and Luis Rodrigues (Universidade de Lisboa, Portugal) We warmly thank all the authors for their great contributions, all the Program Committee members for their hard work and their commitment, all the external reviewers for their valuable help, and the three keynote speakers to whom we are deeply grateful for their support Special thanks to the two conference general chairs, Mohammed Erradi (ENSIAS, Rabat, Morocco), and Rachid Guerraoui (EPFL, Lausanne, Switzerland), for their invaluable guidance and tremendous help June 2016 Parosh Aziz Abdulla Carole Delporte-Gallet Organization Program Committee Parosh Aziz Abdulla Mohamed Faouzi Atig Slimane Bah Gregor Bochmann Silvia Bonomi Ahmed Bouajjani Carole Delporte-Gallet Stéphane Devismes Mohamed El Kamili Mohammed El Koutbi Michael Emmi Javier Esparza Panagiota Fatourou Hugues Fauconnier Bernd Freisleben Maurice Herlihy Zahi Jarir Mohamed Jmaiel Anne-Marie Kermarrec Akash Lal Roland Meyer Ouzzif Mohammed Madhavan Mukund Madan Musuvathi Guevara Noubir Franck Petit Michel Raynal Ahmed Rezine Liuba Shrira Serdar Tasiran Viktor Vafeiadis Uppsala University, Sweden Uppsala University, Sweden Ecole Mohammadia d’Ingénieurs - Mohammed V University, Morocco University of Ottawa, Canada Sapienza Università di Roma, Italy LIAFA, University Paris Diderot, France University Paris Diderot, France VERIMAG UMR 5104, France LiM, FSDM, USMBA, Fès, Morocco ENSIAS, Morocco IMDEA Software Institute, Spain Technische Universität München, Germany University of Crete & FORTH ICS, Greece LIAFA, France University of Marburg, Germany Brown University, USA Cadi Ayyad University, Marrakech, Morocco ReDCAD, ENIS, Tunisia Inria, France Microsoft Research, India University of Kaiserslautern, Germany ESTC, Morocco Chennai Mathematical Institute, India Microsoft Research, USA Northeastern University, USA LiP6 CNRS-INRIA UPMC Sorbonne Universités, France IRISA, France Linköping University, Sweden Brandeis University, USA Koc University, Turkey MPI-SWS, Germany Contents Nonrepudiation Protocols Without a Trusted Party Muqeet Ali, Rezwana Reaz, and Mohamed G Gouda Exploiting Concurrency in Domain-Specific Data Structures: A Concurrent Order Book and Workload Generator for Online Trading Raphaël P Barazzutti, Yaroslav Hayduk, Pascal Felber, and Etienne Rivière 16 Fault Tolerant P2P RIA Crawling Khaled Ben Hafaiedh, Gregor von Bochmann, Guy-Vincent Jourdan, and Iosif Viorel Onut 32 Nearest Neighbors Graph Construction: Peer Sampling to the Rescue Yahya Benkaouz, Mohammed Erradi, and Anne-Marie Kermarrec 48 Accurate Optimization Method for Allocation of Heterogeneous Resources in Embedded Systems Aissam Berrahou Understanding the Memory Consumption of the MiBench Embedded Benchmark Antoine Blin, Cédric Courtaud, Julien Sopena, Julia Lawall, and Gilles Muller 63 71 Benchmarking Energy-Centric Broadcast Protocols in Wireless Sensor Networks Quentin Bramas and Sébastien Tixeuil 87 Transactional Pointers: Experiences with HTM-Based Reference Counting in C++ Maria Carpen-Amarie, Dave Dice, Gaël Thomas, and Pascal Felber 102 A Multi-channel Energy Efficient Cooperative MIMO Routing Protocol for Clustered WSNs Alami Chaibrassou and Ahmed Mouhsen 117 Counting in Practical Anonymous Dynamic Networks is Polynomial Maitri Chakraborty, Alessia Milani, and Miguel A Mosteiro 131 Internet Computing: Using Reputation to Select Workers from a Pool Evgenia Christoforou, Antonio Fernández Anta, Chryssis Georgiou, and Miguel A Mosteiro 137 VIII Contents Asynchronous Consensus with Bounded Memory Carole Delporte-Gallet and Hugues Fauconnier 154 A Fuzzy AHP Approach to Network Selection Improvement in Heterogeneous Wireless Networks Maroua Drissi, Mohammed Oumsis, and Driss Aboutajdine 169 A Fault-Tolerant Sequentially Consistent DSM with a Compositional Correctness Proof Niklas Ekström and Seif Haridi 183 Exploiting Crowd Sourced Reviews to Explain Movie Recommendation Sara El Aouad, Christophe Dupuy, Renata Teixeira, Francis Bach, and Christophe Diot 193 A Formal Model for WebRTC Signaling Using SDL Asma El Hamzaoui, Hicham Bensaid, and Abdeslam En-Nouaary 202 An Incremental Proof-Based Process of the NetBill Electronic Commerce Protocol Sanae El Mimouni and Mohamed Bouhdadi 209 Securing NFC Credit Card Payments Against Malicious Retailers Oliver Jensen, Tyler O’Meara, and Mohamed Gouda 214 An Approach to Resolve NP-Hard Problems of Firewalls Ahmed Khoumsi, Mohamed Erradi, Meryeme Ayache, and Wadie Krombi 229 Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems Zouheir Labbi, Ahmed Maarof, Mohamed Senhadji, and Mostafa Belkasmi 244 Time-Efficient Read/Write Register in Crash-Prone Asynchronous Message-Passing Systems Achour Mostéfaoui and Michel Raynal 250 Traffic Lights Optimization with Distributed Ant Colony Optimization Based on Multi-agent System Mouhcine Elgarej, Mansouri Khalifa, and Mohamed Youssfi 266 A Mechanized Refinement Proof of the Chase-Lev Deque Using a Proof System Suha Orhun Mutluergil and Serdar Tasiran 280 Contents The Out-of-core KNN Awakens: The Light Side of Computation Force on Large Datasets Nitin Chiluka, Anne-Marie Kermarrec, and Javier Olivares IX 295 The 4-Octahedron Abstract Domain Rachid Oucheikh, Ismail Berrada, and Outman El Hichami 311 Reversible Phase Transitions in a Structured Overlay Network with Churn Ruma R Paul, Peter Van Roy, and Vladimir Vlassov 318 Verification of Common Business Rules in BPMN Process Models Anass Rachdi, Abdeslam En-Nouaary, and Mohamed Dahchour 334 Is Youtube Popularity Prediction a Good Way to Improve Caching Efficiency? Nada Sbihi and Mounir Ghogho 340 Waiting in Concurrent Algorithms Gadi Taubenfeld 345 Corona Product Complexity of Planar Graph and S-chain Graph Fouad Yakoubi and Mohamed El Marraki 361 Vehicular Ad-Hoc Network: Evaluation of QoS and QoE for Multimedia Application Imane Zaimi, Zineb Squalli Houssaini, Abdelali Boushaba, Mohammed Oumsis, and Driss Aboutajdine 367 Abstracts of Posters An Implementation of the Keccak Hash Function Soufiane El Moumni, Mohamed Fettach, and Abderrahim Tragha 375 A Secure Processor Using Homomorphic Encryption Bouchra Echandouri, Youssef Gahi, Mouhcine Guennoun, and Fouzia Omary 376 An Ontology Based Social Search System Anas El-ansari, Abderrahim Beni-hssane, and Mostafa Saadi 377 An Adaptive Routing Scheme in Scale-Free Networks Nora Ben Haddou, Hamid Ez-zahraouy, and Abdelilah Benyoussef 378 Communication Interface for Distributed SDN Fouad Benamrane, Mouad Ben Mamoun, and Redouane Benaini 379 ... Parosh Aziz Abdulla Carole Delporte-Gallet (Eds.) • Networked Systems 4th International Conference, NETYS 2016 Marrakech, Morocco, May 18–20, 2016 Revised Selected Papers 123 Editors Parosh Aziz... collect all its needed evidence c Springer International Publishing AG 2016 P.A Abdulla and C Delporte-Gallet (Eds.): NETYS 2016, LNCS 9944, pp 1–15, 2016 DOI: 10.1007/978-3-319-46140-3 M Ali... and traders expect the latencies c Springer International Publishing AG 2016 P.A Abdulla and C Delporte-Gallet (Eds.): NETYS 2016, LNCS 9944, pp 16–31, 2016 DOI: 10.1007/978-3-319-46140-3 Exploiting